NETW 563 ( Wireless Networks ) Entire Course

 

NETW 563 Week 1 Discussion 1 Standards

NETW 563 Week 1 Discussion 2 Antennas and RF

NETW 563 Week 2 Case Study 1 Municipal Wifi

NETW 563 Week 2 Discussion 1 Wireless Modulation

NETW 563 Week 2 Discussion 2 Access Control

NETW 563 Week 3 Course Project Proposal (The Athlete s Shack Wireless Upgrade)

NETW 563 Week 3 Discussion 1 Designing the WLAN

NETW 563 Week 3 Discussion 2 Site Survey Analyzers

NETW 563 Week 4 Discussion 1 Security Organizations

NETW 563 Week 4 Discussion 2 Securing the WLAN

NETW 563 Week 4 Midterm

NETW 563 Week 5 Discussion 1 SNMP

NETW 563 Week 5 Discussion 2 Troubleshooting

NETW 563 Week 5 You Decide; Networking Problem of Richton Toys

NETW 563 Week 6 Case Study 2 Municipal Wifi in Bayton (Boon or Boondoggle)

NETW 563 Week 6 Discussion 1 Getting to 4G

NETW 563 Week 6 Discussion 2 The Future of Satellite Radio

NETW 563 Week 7 Course Project – Final Report (The Athlete s Shack Wireless Upgrade)

NETW 563 Week 7 Discussion 1 Traffic Shaping

NETW 563 Week 7 Discussion 2 Wireless Network Planning

NETW 563 Week 8 Discussion – Looking Ahead

NETW 563 Week 8 Final Exam

 

 

NETW 563 Week 4 Midterm Answers

 

Multiple Choice 8

  • Essay 6
  • Page: 1
  • 1. Question: (TCO A) An access point has a(n) _____ interface that allows it to connect to a wired network.
  • 2. Question: (TCO A) Waves that are continuous with no breaks represent a(n) _____ signal.
  • 3. Question: (TCO C) In order to accommodate additional wireless users over a wider area, which configuration should be used?
  • 4. Question: (TCO C) Each of the following is a wireless modulation scheme used in IEEE WLANs except
  • 5. Question: (TCO D) Each of the following are times that a site survey should be performed except
  • 6. Question: (TCO D) A device that converts direct current from a battery to alternating current is a(n)
  • 7. Question: (TCO E) After the security flaws in WEP were publicized, the IEEE TGi task group released a new proposed implementation known as what?
  • 8. Question: (TCO E) Which of the following is not a layer that protects information security?
  • Page: 2 
  • 1. Question: (TCO A) Give a brief summary of the characteristics of IEEE 802.11b, 802.11a, and 802.11g wireless networks.
  • 2. Question: (TCO A) Explain how an antenna functions.
  • 3. Question: (TCO C) Explain how power management functions on an infrastructure network.
  • 4. Question: (TCO C) Explain why Carrier Sense Multiple Access/Collision Detection cannot be used on a WLAN.
  • 5. Question: (TCO D) Describe two types of antennas that should be used on an AP when conducting a site survey.
  • 6. Question: (TCO E) List two ways in which a denial of service (DoS) attack can be launched against a WLAN.

 

 

NETW 563 Week 8 Final Exam Answers

 

  • Multiple Choice: 8
  • Essay: 8
  • Page: 1 Multiple Choice  
  • 1. Question: (TCO A) A wireless client network interface card performs each of the following tasks except
  • 2. Question: (TCO A) A _____ is a million hertz.
  • 3. Question: (TCO B) Cellular networks employ multiple ______ power transmitters.
  • 4. Question: (TCO C) _____ is a group of wireless devices that is served by a single access point (AP).
  • 5. Question: (TCO D) _____ is the expression often used to describe a work environment in which an employee can have continual access to the data that is needed for making decisions.
  • 6. Question: (TCO E) Guarding the availability of information is achieved by
  • 7. Question: (TCO F) Which type of statistic is measured by the GoS?
  • 8. Question: (TCO G) _____ provides users the freedom to roam beyond their home subnets while still maintaining their home IP addresses.
  • Page: 2 Essay
  • 1. Question: (TCO A) What is polarization, and why is it important to WLANs?
  • 2. Question: (TCO B) Explain how an IEEE 802.15.1 (Bluetooth) piconet functions.
  • 3. Question: (TCO C) Explain how power management functions on an infrastructure network.
  • 4. Question: (TCO D) What are the three considerations when installing and configuring an ad hoc network?
  • Page: 3 Essay
  • 1. Question: (TCO E) Explain how WEP violates the ‘cardinal rule’ of cryptography.
  • 2. Question: (TCO E) What is a dictionary attack?
  • 3. Question: (TCO F) Blocked calls can be handled in two ways. Describe the two methods of handling blocked calls.
  • 4. Question: (TCO G) Describe the two types of RF amplifiers.