In Infrastructure mode a single access point (AP) together with all associated stations (STAs) is called a ____.
IBSS (Independent Basic Service Set)
With 802.11 it is possible to create an ad-hoc network of client devices without a controlling Access Point called an ____, in which case the SSID is chosen by the client device that starts the network, and broadcasting of the SSID is performed in a pseudo-random order by all devices that are members of the network.
Extended Service Set
An ____ is a set of one or more interconnected BSSs and integrated local area networks (LANs) that appear as a single BSS to the logical link control layer at any station associated with one of those BSSs.
The range of RF transmissions increases with greater transmitting ____, not frequency.
A parabolic ____ is one type of a highly directional antenna.
Yagi and Patch antennas are examples of ____-directional antennas.
Dipole antennas are ____-directional antennas.
Body of water, flat stretch of earth, and metal roofs are considered to be smooth surfaces that can cause ____path.
The ____ node problem can be caused by interfering obstacles between clients.
Antenna diversity compensates for a wireless LAN problem called ____.
To achieve 54 Mbps, 802.11a uses which type of data modulation?
The 802.11 standard contains 2.4 GHz FHSS, 2.4 GHz DSSS, and ____.
Part of the roaming process involves Implementing Mobile IP, Active Scanning, and ____ Scanning.
DSSS systems support a maximum of __ APs in a co-located environment.
On August 31, 2000, the FCC mandated that FHSS systems using fewer than 75 hops must have a maximum power output of ___ mW.
Before going to sleep, a wireless station must notify the ____ of its intention to sleep.
____ System Authentication is a secure method of client device authentication onto a WLAN.
A change in the direction and intensity of a group of waves after passing by an obstacle or the bending of waves around an object is referred to as ____.
The spread spectrum FHSS exhibits resistance to narrowband __ interference by design.
Bluetooth uses a type of data modulation called ____.
WEP keys are also known as ____ Secrets.
The weather and future ____ should be considered when erecting a 2.4GHz WLAN outside antenna.
Insertion loss on WLAN splitters are measured in what units?
The FCC deals with RF Output power limits, appropriate RF Frequency band use, and ____ of frequency bands.
MAC filters can be implemented on a WLAN on an ____ point or on a RADIUS server.
A sequence of hops in a FHSS system is referred to as a ____.
A loss of -10dB yields a power ratio of ____.
All access points transmit a ____ management frame at a fixed interval.
T/F FHSS is inherently more secure than DSSS.
The FHSS hopset can be determined by listening to traffic on each of the hopping ____.
The Fresnel Zone must be at least __% cleared of obstructions.
The two RF spread spectrum technologies in the IEEE 802.11 standard is FHSS and ____.
The two types of WLAN scanning are active scanning and ____ scanning.
Data modulation methods in DSSS systems are BPSK and ____.
____ is the data modulation method used in FHSS.
Beacon frames are used for ____ synchronization and passing channel selection information.
The units for relative power are dB and dB_.
DSSS uses channels that are ___ MHz wide to transmit data in the 2.4 GHz ISM band.
A gain of +3dB yieds a power ratio of __.
WLAN client-side devices use the security features EAP and ____.