hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Science
Computer Science
Wireless Networks Terms
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Terms in this set (76)
Frequency HoppingSpread Spectrum (FHSS)
A signaling method that uses a narrow frequency band and hops data signals in a predictable sequence from frequency to frequency over a wide band of frequencies.
Direct-SequenceSpread Spectrum (DSSS)
A signaling method that breaks data into pieces and sends the pieces across multiple frequencies in a defined range.
Orthogonal Frequency-DivisionMultiplexing (OFDM)
A signaling method that breaks data into very small data streams to send the information across long distances where environmental obstacles may be an issue.
Ad hoc
A network topology that works in peer-to-peer mode without an access point.
Infrastructure
A network topology that uses an access point (AP) that functions like a hub on an Ethernet network.
Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)
A network multiple access method used to control media access and avoid (rather than detect) collisions.
Station (STA)
A wireless NIC in an end device such as a laptop or wireless PDA.
Access point (AP)
A device that coordinates all communications between wireless devices, as well as the connection to the wired network.
Basic Service Set (BSS)
The smallest unit of a wireless network.
Independent Basic Service Set (IBSS)
A set of STAs configured in ad hoc mode.
Extended Service Set (ESS)
A set of multiple BSSs with a distribution system (DS).
Distribution System (DS)
The backbone or LAN that connects multiple APs (and BSSs) together.
Service Set Identifier (SSID)
A 32-character value that is inserted into each frame.
Basic Service Set Identifier (BSSID)
A 48-bit value that identifies an AP in an infrastructure network or an STA in an ad hoc network.
Multiple-Input, Multiple-Output (MIMO)
An antenna technology that increases bandwidth by using multiple antennas for both the transmitter and receiver.
Channel bonding
A practice that combines two non-overlapping channels into a single channel, resulting in slightly more than double the bandwidth.
Frame composition
The structure of the data frame which results in increased efficiency of data transmissions (less overhead).
Multi-user MIMO(MU-MIMO)
A wireless technology used by routers and endpoint devices that allows multiple users to use the same channel.
Region
A physical area where the AP operates
Advanced Encryption Standard (AES)
AES is an encryption method used with WPA2.
Temporal Key Integrity Protocol (TKIP)
TKIP is an encryption method used with WPA or WPA2.
Beacon
A frame that is sent out by the AP periodically.
Z-Wave
A wireless communication protocol that's broadly used in home security and home automation.
ANT+
A protocol for monitoring sensor data.
Near-Field Communication (NFC)
A set of communication protocols that allows devices to communicate and share data with each other.
Goodput
The number of useful bits delivered from the sender to the receiver over the wireless network connection.
Site survey
A component of planning and designing a wireless network. It assesses the physical features of the location of a wireless network.
Spectrum analysis
The process of gathering the frequencies or other related quantities in a specific area.
Spectrum analyzer
A tool used to determine the noise floor in the desired frequency range, allowing you to select the best available wireless channel.
Received Signal Level (RSL)
A measurement that identifies how strong the radio signal is at the receiver. The closer you are to the transmitter, the stronger the RSL. The farther away you are, the lower the RSL.
Signal-to-noise ratio(SNR)
A measurement that compares the level of the wireless network signal (RSL) to the level of background noise (measured in decibels).
Channel plan
A plan that identifies which AP will use which channel.
Independent access points
A deployment model implemented by large organizations through their facilities. Each AP stood alone, providing separate wireless networks by using its own independent configuration.
Hub-and-spoke infrastructure
A deployment model where a wireless controller is connected to all APs through wired links.
Distributed wireless mesh infrastructure
A deployment model that moves some of the network intelligence from the controller out to the individual APs. In this configuration, the controller is no longer a bottleneck.
Lightweight Access Point Protocol (LWAPP)
A protocol used to route frames back and forth between the wireless network and the wired LAN.
Wireless bridge
A device used to connect wired or wireless networks together.
Small home/home office network
A small network with typically 10 or fewer users.
SSID suppression
The act of disabling the SSID broadcast. This is also known as cloaking.
Network Address Translation (NAT)
A method for remapping one IP address space into another by modifying network address information in the headers of IP packets while they are in transit.
Wi-Fi Protected Setup (WPS)
A network security standard for wireless home networks.
Home network
A profile designed for networks in which you know and trust every device.
Work network
A profile designed to be used in a SOHO.
Public Network
A profile designed for use on unknown networks.
Authentication
The process of proving identity.
Open System Authentication
An authentication method that requires clients to provide a MAC address in order to connect to the wireless network.
Pre-Shared Key
An authentication method that uses a secret or a passphrase previously shared between two parties using a secure channel before it can be used.
802.1x
An authentication method and standard that uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients.
Wi-Fi Protected Access (WPA)
A wireless security protocol based on initial 802.11i drafts that was deployed in 2003.
Wi-Fi Protected Access 2 (WPA2)
A wireless security protocol based on the 802.11i specifications and deployed in 2005.
Wi-Fi Protected Access 3 (WPA3)
A wireless security protocol based on the 802.11s specifications and deployed in 2018.
Geofencing
A virtual boundary of a physical location.
Rogue access point
An unauthorized access point added to a network.
Evil twin
A rogue AP configured to mimic a valid AP.
Data emanation
Wireless signals that extend beyond the intended area of coverage
Wardriving
A technique used to find wireless networks.
Warchalking
Symbols drawn, often using chalk, outside a building to indicate the presence of one or more wireless networks. The identification of the network may indicate it is targeted for attack.
Packet sniffing
The interception and decoding of wireless transmissions.
Interference
A signal that corrupts or destroys the wireless signal sent by APs and other wireless devices.
Electromagnetic interference (EMI)
A signal caused by motors, heavy machinery, and fluorescent lights.
Radio frequency interference (RFI)
A signal caused by radio signals using the same radio channel. It can be caused by nearby wireless devices, such as cordless phones or microwave ovens.
Jamming
Signal interference created intentionally by an attacker to make a wireless network impossible to use.
Spark jamming
A Wi-Fi interference attack repeatedly blasting equipment with high-intensity, short-duration RF bursts at a rapid pace.
Deauthentication
An attack that spoofs your MAC address and then tells your wireless network to disconnect you from the network.
Bluetooth
A standard for the short-range wireless interconnection designed to allow devices to communicate within a close proximity.
Personal area network (PAN)
A computer network for connecting devices around an individual's workspace.
Bluejacking
The practice of anonymously sending business cards to a Bluetooth recipient within a distance of 10-100 meters, depending on the class of the Bluetooth device. The business cards usually include a flirtatious message to elicit a visual reaction from the recipient.
Bluesnarfing
An attack where an attacker gains unauthorized access to an existing Bluetooth connection between phones, desktops, laptops, or PDAs.
Bluebugging
An attack that gives an attacker access to all mobile phone commands that use Bluetooth technology. Such commands include those that initiate phone calls, send and receive messages, listen to phone calls, and read and write phonebook contacts.
Latency
The time it takes a device to receive a sent signal.
Frequency mismatch
Devices on the network are not broadcasting on the same frequency.
Bandwidth saturation
The point at which all available bandwidth on an internet connection has achieved maximum capacity and cannot pass any more data through the connection.
Device saturation
The point at which the percentage of CPU usage where I/O requests are issued to a device is at or close to 100%, or the bandwidth utilization for the device is close to 100%.
Untested updates
Updates that have not been tested in a network test environment before you apply them to your network.
Absorption
The rate at which a signal passes through objects and loses power or gets weaker.
Refraction
Radio waves that pass through objects of different densities which cause the signal to bend or change speeds.
Other sets by this creator
System Monitoring Chapter 11
20 terms
Processes And Systems Services Chapter 10
40 terms
Hardware Installation Chapter 9
30 terms
Disk and File System Management Chapter 8
150 terms
Other Quizlet sets
ITM 301 Slideshow Questions
35 terms
End of chapter 44 questions
10 terms
3710 UNit 2
91 terms