6.5 Flashcards
Hold information about protocol and use the type of frame being transmitted with a frame is part of a larger fragmented packet it was the frame is one that was a real issue after an unverified delivery times. It’s two bites in length this is known as
Frame control
 This field may indicate how long is Fields transmission will take Other nodes will know when it will be available again, two bites long
Duration
6 Bites longsource address
Address one
Six bites long transmitter address
Address to
Six bites long receiver address
Address three
Two bites long indicate how large a package fragmented
Sequence control
Six bites long destination address
Address for
Up to 2312 bites, includes the data originally sent by the source host plus headers from higher layers
Data
Six bites long uses a silicone code to check for errors in transmission
Frame check sequence
Hey – – – – – assesses client requirements, facility characteristics, and coverage areas the resulting – – – – – – report will help you determine an access point arrangements so unsure reliable wireless connectivity within given areas
Site survey
Study building blueprints to identify potential obstacles, clarify the distances your network needs to spend on each floor and anticipate wireless demand The tend to occupy each floor during the dash – – –
Course of business
Users or network technicians install a specific app called an agents on the users device what is the voice is a smart phone laptop or tablet just gives the device trusted access to certain portions of the network. Access to email services file sharing services in certain network administrative features might all be controlled by the device information levels enabled by – – – – – that device
On boarding
The reverse procedure involves removing the agent for security purposes network administrators need a feature that will allow them to do this remotely and the kings devices lost or stolen
Off boarding
On boarding and off boarding policies or especially critical in a – – – – environment where IT staff motion sure the safety of the net work while allowing access by a wide range of employee on devices using Netwerk resources
BYOD Genie weenie little shriveled short dick bitches
This allows for wireless client to log on to the net work either by providing correct password for the SS ID or by providing user credentials that might be processed by – – – – server
Authentication