Wireless and Mobile Networks
50 questions available
Questions
What are the four classifications of wireless networks based on the criteria of whether a packet crosses a single or multiple wireless hops, and whether there is infrastructure like a base station?
View answer and explanationWhich of the following is NOT listed as one of the three major ways wireless links differ from their wired counterparts?
View answer and explanationIn the context of the hidden terminal problem, what phenomenon is described as the reduction of a signal's strength as it travels through the wireless medium, potentially preventing two stations from hearing each other's transmissions?
View answer and explanationAccording to Table 7.1, what is the maximum data rate specified for the IEEE 802.11n (WiFi 4) standard?
View answer and explanationWhy does the 802.11 MAC protocol use a link-layer acknowledgment/retransmission (ARQ) scheme, unlike wired Ethernet?
View answer and explanationWhat is the primary function of the Request to Send (RTS) and Clear to Send (CTS) control frames in the IEEE 802.11 protocol?
View answer and explanationIn the IEEE 802.11 frame structure, what is the purpose of Address 3 when a frame is sent from a wireless station to an access point (AP) in an infrastructure network?
View answer and explanationWhat type of channel access mechanism, characterized by changing frequency in a pseudo-random manner from slot to slot, is used by Bluetooth to mitigate interference in the 2.4 GHz ISM band?
View answer and explanationIn a 4G LTE network architecture, which element is responsible for managing wireless radio resources and mobile devices within its coverage area, and is analogous to an Access Point (AP) in a WLAN?
View answer and explanationWhat is the globally unique 64-bit identifier stored on a mobile device's SIM card that identifies the subscriber in the worldwide cellular system?
View answer and explanationIn the LTE data-plane protocol stack, which sublayer is responsible for fragmenting and reassembling IP datagrams and providing link-layer reliable data transfer using an ARQ protocol?
View answer and explanationWhat is the term for the process where a mobile host moves beyond the range of one base station and changes its point of attachment to another base station?
View answer and explanationAccording to the taxonomy of wireless networks, a network of mobile vehicles that form a network without a base station is known as a what?
View answer and explanationIn the 802.11 power management scheme, a node indicates it is going to sleep to the access point by setting the power-management bit in an 802.11 frame header. How does the AP know when to expect the node to wake up?
View answer and explanationWhat is the primary drawback of the indirect routing approach for mobile devices?
View answer and explanationWhich of the 5G standards is a narrowband access type designed for applications like sensing, metering, and monitoring, with a priority on lowering power requirements for IoT devices?
View answer and explanationIn the context of mobility management for 4G/5G networks, what is the first of the four major steps when a mobile user attaches to a visited network and begins streaming video?
View answer and explanationDuring a handover in a 4G/5G network, the target base station pre-allocates resources for the mobile device before it fully connects. What is the primary benefit of this pre-allocation?
View answer and explanationWhat is the primary reason that Mobile IP has seen limited deployment in practice, despite being standardized for over 20 years?
View answer and explanationWhy can TCP's standard congestion-control response be problematic in a wireless setting?
View answer and explanationWhat is the name of the approach to improving TCP performance over wireless links that breaks an end-to-end connection into two separate transport-layer connections, one wireless and one wired?
View answer and explanationIn a CDMA system, each bit being sent is encoded by multiplying it by a code that changes at a much faster rate. What is this faster rate known as?
View answer and explanationWhich set of three channels is the only set of non-overlapping channels in the 2.4 GHz band for 802.11 networks?
View answer and explanationWhat is the maximum number of active devices, including one master and multiple clients, that can be in a single Bluetooth piconet?
View answer and explanationIn a 4G LTE network, what is the term for the deep sleep state that a mobile device enters after long periods of inactivity, during which it may move to a new cell without informing the network?
View answer and explanationWhat is a primary drawback of using millimeter wave frequencies (FR2) for 5G service?
View answer and explanationIn the 5G Core network architecture, the 4G Mobility Management Entity (MME) is decomposed into two new functional elements. What are they?
View answer and explanationWhen a device moves between 802.11 BSSs that are part of the same IP subnet and interconnected by a switch, how does the switch learn the device's new location?
View answer and explanationIn a CDMA protocol, how does a receiver recover a specific sender's original data bit from the aggregate signal of multiple interfering senders?
View answer and explanationWhat is the typical time interval between beacon frames sent by an 802.11 access point for power management purposes?
View answer and explanationIn the 802.11n, 802.11ac, and 802.11ax standards, what technology using two or more antennas on both the sending and receiving sides is employed to increase data rates?
View answer and explanationWhat is the key difference between direct routing and indirect routing for a mobile device?
View answer and explanationIn a 4G/5G network, what protocol is used to create tunnels for user data between elements like the base station and the Serving Gateway?
View answer and explanationWhat does a mobile device do during active scanning to discover nearby 802.11 Access Points?
View answer and explanationAccording to Figure 7.2, which wireless standard has a mid-range outdoor coverage of 200m to 4Km?
View answer and explanationWhich of the following is a key reason that 802.11 MAC protocol does NOT implement collision detection, unlike wired Ethernet?
View answer and explanationWhen a mobile device is roaming on a visited 4G/5G network, which entity in the mobile's HOME network is contacted by the visited network's MME to handle authentication?
View answer and explanationWhat are the three factors whose product defines the capacity of a cellular network in units of bps/km2, as discussed in the context of 5G innovations?
View answer and explanationWhat is the name of the process in a Bluetooth network where a master node discovers which other Bluetooth devices are within range?
View answer and explanationAccording to the description of 802.11 rate adaptation, what might cause the transmission rate to be decreased to the next lower rate?
View answer and explanationWhat is the primary role of the Mobility Management Entity (MME) in the 4G LTE control plane?
View answer and explanationIn a simple single-sender CDMA scenario as shown in Figure 7.5, how does the receiver recover the original data bit, di, from the received encoded bits, Zi,m?
View answer and explanationWhen a mobile station moves from BSS1 to BSS2 within the same IP subnet, it disassociates with AP1 and associates with AP2. What networking information does the mobile station get to keep during this process?
View answer and explanationWhat is the maximum data rate of the Bluetooth standard according to the text?
View answer and explanationIn the context of the global cellular network, what is an IPX Network?
View answer and explanationFrom a network-layer perspective, a device that is physically mobile but remains attached to the same 802.11 AP or LTE base station is considered what?
View answer and explanationWhat is the key advantage of a mobile device having a 'home network' in cellular architecture?
View answer and explanationWhen a 4G/5G mobile device performs a handover, which network element makes the initial decision to initiate the handover?
View answer and explanationIn a direct routing scenario for a mobile host, what must the correspondent do before it can tunnel datagrams to the mobile's visited network?
View answer and explanationWhat is the maximum range for an IEEE 802.11ah device, according to Table 7.1?
View answer and explanation