1. List two advantages of wireless networking. User mobility in the workplace, and cost effective networking media for use in areas that are difficult or too costly to wire.
2. What are the three areas defined for the IEEE 802.11 standard? Physical Layer (PHY): The method of transmitting the data, which may be either RF or infrared (although infrared is rarely used.)
Medium Access Control (MAC): The reliability of the data service, access control to the shared wireless medium, protecting the privacy of the transmitted data.
MAC management protocols and services: Authentication, association, data delivery, and privacy.
3. What is an ad hoc network? In this network, the wireless clients (stations) communicate directly with each
…show more content…
23. What is the purpose of the paging procedure in Bluetooth? The paging procedure is used to establish and synchronize a connection between two Bluetooth devices.
24. Define the term backscatter. It refers to the reflection of the radio waves striking the RFID tag and reflecting back to the transmitter source with its stored unique identification information.
25. What are the three parameters that define an RFID system? Means of powering the tag, frequency of operation, and communications protocol (also called the air interface protocol).
26. Explain how power is provided to a passive RFID tag. By rectifying the RF energy transmitted from the reader which strikes the RF tag antenna.
27. Cite three advantages for using an active RFID tag. The power consumption of the G2C501 is 10μA in the sleep mode and uses two AA batteries with an expected lifetime of five years, it works in the standard 915 MHz range, and it also has location capability.
28. What are the three frequency bands typically used for RFID tags? Low Frequency, High Frequency, and Ultra-High Frequency.
29. What is the WiMax frequency standard for the United States? Unlicensed: 5.8GHz and licensed: 2.5 GHz spectrum.
30. Why was OFDM selected for WiMax? This signaling format was selected for the WiMAX standard IEEE 802.16a standard because of its improved NLOS (non line-of-sight) characteristics in
Association: Each station must initially associate with an AP before it can send information through a WLAN. The association maps a station to the distribution system via an AP. For this purpose, a station must establish an association with an AP within a particular BSS. The AP can then communicate this information to other APs within the ESS to facilitate routing and delivery of addressed
Wireless security in 802.11 is less robust and has many security flaws that can be exploited by an attacker. Security best practice for wireless networks depends on a defense in depth strategy, with five control layers:
An RFID reader is a network connected device (fixed or mobile) with an antenna that sends power as well as commands to the tags. The RFID reader acts like an access point for RFID tagged items so that the tags' data can be made available to business applications.
15. The act of locating wireless local area networks while moving around a city is called ____.
4. Use the Internet to research one to two applications of the identified wireless technology. List each application found. Reference the websites you used to locate this information.
track the target once it is attached on an RFID tag. Passive tags are used to attach on the target object because they are much cheaper, long lived, lightweight and have a smaller foot print. The reader can communicated with host computer through RS232.
Regardless of the frequency, method of communication, or the power supply, the goal of any RFID system is to enable specific data to be transmitted between a portable device and the tag, and then be processed and used accordingly. RFID systems are used for objects which get lost, stolen often, underutilized, or difficult to locate in a timely manner.
1 Why is this technology appropriate for this scenario? The laptop is not tied to any cables and is using an access point located in the building.
The RFID technology consists of three kinds of tags i.e. active RFID tags, passive RFID tags, and battery
RFID consist of a tag made up of microchips or a reader with an antenna. The reader sends out some magnetic wave. The tag antenna then receives this waves. Then the RFID tag draws power from the field created by the reader and it use it to power the microchip’s circuit. The chip then modulates the waves back to the reader which converts the waves to a digital data. The cost of a RFID is not quoted because pricing is based on volume.
Step 9: The source machine will update its Address Resolution Protocol (ARP) cache with the Sender Hardware Address and Sender Protocol Address it received from the Address Resolution Protocol (ARP) reply message.
A wireless network is any type of computer network that uses wireless data connections for connecting network nodes .Wireless networking is a method by which homes, telecommunications networks and enterprise (business).Installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI model network structure.
RFID, or radio frequency identification, is the new system that is replacing the use of barcodes. RFID tags allow users to more quickly obtain information from the object that the RFID tag
Today, the passive tags are the simplest form of tags without any power source such as a battery, in order to start communication with the reader. The passive tag gets its power from the radio waves transmitted by the reader. The tag contains minimal information such as the unique tag ID and it can be read at a range of ten to twenty feet away from the reader. Passive tags are cheaper to manufacture and are mostly used in disposable items or they can also be used in asset management.
Over the years, RFID (Radio Frequency Identification) has evolved tremendously overtaking all the other wireless modes of data transfer and identification technologies. It has a huge advantage over the barcode technology, some of which are additional information storage capacity, a line of sight detection is not required and so on. Barcodes also have the disadvantage of being harder to detect during broad sunlight or some other factors like being smudged or when printed on certain substrates. (R.Want, 2006). Hence, RFID is used