1 Flashcards

1
Q

What are the characteristics of wired and wireless communication systems?

A

Wired systems use physical wires like fiber optic or coaxial cables, while wireless systems use radio waves. Wired communication is guided, while wireless communication is unguided and utilizes antennas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some advantages of wireless communications?

A

Wireless communications are generally less expensive than wired communications, easier to install, allow mobility, and are more resilient during disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some disadvantages of wireless communications?

A

Disadvantages include interference issues, signal strength challenges, security vulnerabilities like man-in-the-middle attacks, and potential health concerns related to electromagnetic radiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Radio Frequency Identification (RFID)?

A

RFID uses electromagnetic fields to identify and track tags attached to objects, enabling tracking and monitoring applications in various industries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Wi-Fi 6, and why is it significant?

A

Wi-Fi 6 is the latest wireless fidelity standard developed to handle the increasing number of internet-enabled devices. It operates on 2.4 GHz or 5 GHz bands, offering higher throughput and improved performance compared to previous standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is QAM, and how does it enhance Wi-Fi 6 performance?

A

Quadrature Amplitude Modulation (QAM) is a modulation scheme used in Wi-Fi 6 to transmit data wirelessly more efficiently. It allows for the transmission of more bits per transmission, thereby increasing performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different wireless local area network topologies discussed?

A

The discussed topologies include ad hoc networks, infrastructure mode, and bridge mode, each with its advantages and limitations in terms of connectivity and scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can security concerns in wireless networks be mitigated?

A

Security measures include hiding the SSID, using encryption protocols, implementing MAC address filtering, and monitoring for unauthorized access attempts through beacons and probes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the characteristics of IEEE 802.11a and 802.11b?

A

IEEE 802.11a operates at 5.8 GHz with a theoretical bandwidth of 54 Mbps, while IEEE 802.11b operates at 2.4 GHz with a theoretical bandwidth of 11 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the significance of IEEE 802.11n-2009?

A

IEEE 802.11n-2009 introduced MIMO (Multiple Input Multiple Output) technology, enabling faster network transmissions with a maximum data rate of up to 600 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is IEEE 802.11ac, and why is it important?

A

IEEE 802.11ac is a WLAN protocol operating on the 5 GHz band, offering multi-station throughput of at least 1 Gbps. It supports high-speed video streaming and outperforms previous standards like Wi-Fi 4 (802.11n).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some key features of IEEE 802.11ax?

A

IEEE 802.11ax, also known as Wi-Fi 6, aims to provide higher throughput and support for a large number of IoT devices. It introduces higher-order QAM modulation, broader channels, and MU-MIMO technology for improved performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of OFDMA in Wi-Fi 6?

A

Orthogonal Frequency Division Multiple Access (OFDMA) allows an 802.11ax router to send and receive data to multiple devices simultaneously by splitting transmission channels into sub-channels, enhancing efficiency and reducing latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does Wi-Fi scanning work?

A

Wi-Fi scanning involves active or passive methods. Active scanning involves sending probes to detect nearby access points, while passive scanning listens for beacon frames transmitted by access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some security concerns associated with wireless networks?

A

Security risks include interception of packets during transmission, decryption of traffic, access point spoofing, and unauthorized access attempts. Mitigation strategies include encryption, MAC address filtering, and SSID hiding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly