2. IOT NETWORK PROTOCOLS Flashcards
49 Questions
In BLE terminology, what is a ‘GATT’?
a. Generic Audio Transmission Technology
b. Generic Attribute Profile
c. Generic Authentication Transfer Tool
d. Generic Access Transmission Technique
Generic Attribute Profile
LoRa’s spreading factor affects which of the following?
a. Power consumption only
b. Operating frequency
c. Data rate and range
d. Modulation technique
Data rate and range
Which standard does HaLow follow for wireless communication?
a. 802.11ah
b. 802.11b
c. 802.11ac
d. 802.11n
802.11ah
Link Budget …
a. refers to the amount of loss that a data link (transmitter to receiver) can tolerate in order to operate properly.
b. refers to the amount of loss that a data link (transmitter to receiver) should have.
c. refers to the difference between the minimum expected power received at the receiver’s end, and the receiver’s sensitivity.
d. refers to a connection between two entities.
refers to the amount of loss that a data link (transmitter to receiver) can tolerate in order to operate properly.
Which Sub-GHz ISM frequency does LoRa operate in Singapore?
a. 2.4 Ghz
b. 868 Mhz
c. 466 Mhz
d. 923 Mhz
923 Mhz
In LoRa, which class does the following end device fall under:
Battery-powered actuators, Energy efficient with latency controlled downlink, Slotted communication synchronized with a beacon.
a. D
b. B
c. C
d. A
B
Which of the following do not contribute to routing in a ZigBee network?
a. ZigBee Router
b. ZigBee End Device
c. ZigBee Master
d. ZigBee Coordinator
ZigBee End Device
ZigBee End Devices do not participate in the routing of data. They are typically designed to conserve power and often act as leaf nodes in the network, communicating directly with a parent node (which can be a ZigBee Router or ZigBee Coordinator) but not routing data from other devices.
Bluetooth is designed for short broadcast. There are forty 2-Mhz channels. How many of these channels are reserved for advertising? (enter numerical number)
3
Which frequency does Z-Wave operate on?
a. 433 Mhz
b. 868 Mhz
c. 2.4 Ghz
d. 5 Ghz
868 Mhz
What is the maximum data rate of latest BLE?
a. 1 Mbps
b. 3 Mbps
c. 2 Mbps
d. 4 Mbps
2 Mbps
What is the role of Zigbee end devices in the Zigbee network?
a. Communicates with other nodes
b. Controls the network
c. Both
d. None
Communicates with other nodes
Z-Wave is an implementation of a ZigBee protocol.
a. True
b. False
False
Which class of LoRaWAN is designed for bidirectional end-devices with scheduled receive slots?
a. Class C
b. Class D
c. Class A
d. Class B
Class B
Class A: Primarily focuses on battery efficiency and uses random receive windows after sending transmissions.
Class B: Offers bi-directional communication with scheduled receive slots enabled by beacon synchronization.
Class C: Aims for near-continuous connection with minimal receive windows but high power consumption.
Class D: Is still under development and not widely used yet.
What is the purpose of Zigbee communication?
a. Healthcare
b. Industrial Control
c. Home Automation
d. All of the above
All of the above
Which version of Bluetooth introduced BLE?
a. Bluetooth 4.0
b. Bluetooth 2.0
c. Bluetooth 5.0
d. Bluetooth 3.0
Bluetooth 4.0
In LoRa, what does increasing the spreading factor (SF) do to the signal’s range and data rate?
a. Increases range and decreases data rate
b. Decreases both range and data rate
c. Decreases range and increases data rate
d. Increases range and data rate
Increases range and decreases data rate
Which of the following is not a feature of Zigbee? (choose the best one)
a. High Security
b. Low Power Consumption
c. Real-time Communication
d. Large Bandwidth
Large Bandwidth
What is a characteristic of BLE’s ‘Advertising’ mode?
a. Secure data encryption.
b. High data transfer rate.
c. Device discovery and connection establishment.
d. Long-range communication.
Device discovery and connection establishment.
What does ‘Pairing’ in BLE involve?
a. Broadcasting data to multiple devices.
b. Exchanging security keys for secure communication.
c. Connecting two devices for data transfer.
d. Adjusting the power level for optimal connection.
Exchanging security keys for secure communication.