Most wireless devices use one of two technologies to avoid interference. What are these technologies?

What will be an ideal response?


ANSWER: The two technologies used are as follows:
* FHSS (frequency hopping spread spectrum)-Short bursts of data are transmitted on a particular frequency within the band and the next burst goes to the next frequency in the sequence. Frequency hopping can happen hundreds of times a second. FHSS is cheaper to implement than DSSS and performs better than DSSS in crowded, indoor environments.
* DSSS (direct sequence spread spectrum)-Data streams are divided and encoded into small chunks, called chips, which are spread over all available frequencies within one of three, wide channels, all at the same time. The process of dividing and encoding the data is called chipping, and the spreading ratio used to transform the data is called the chipping code, which is unique to each device. DSSS uses the available bandwidth more efficiently than FHSS and tends to have a higher throughput.

Computer Science & Information Technology

You might also like to view...

Consider the algorithm for consensus in a synchronous system, which uses the following integrity definition: if all processes, whether correct or not, proposed the same value, then any correct process in the decided state would chose that value. Now consider an application in which correct processes may propose different results, e.g., by running different algorithms to decide which action to take in a control system’s operation. Suggest an appropriate modification to the integrity definition and thus to the algorithm.

What will be an ideal response?

Computer Science & Information Technology

Consider a class PersonAddress that represents an entry in an address book. Its attributes are

• The first name of the person • The last name of the person • The e-mail address of the person • The telephone number of the person It will have methods to • Access each attribute • Change the e-mail address • Change the telephone number • Test whether two instances are equal based solely on name a. Write a method heading for each method. b. Write preconditions and postconditions for each method. c. Write some Java statements that test the class. d. Implement the class.

Computer Science & Information Technology

Which of the following will be launched automatically if Windows 7 detects a problem while booting the system?

A. Restart Manager B. Microsoft Update C. Service-failure Recovery D. Startup Repair Tool

Computer Science & Information Technology

FarmVille is an example of a Facebook ________

Fill in the blank(s) with correct word

Computer Science & Information Technology