Chapter 9 Flashcards
This layer receives the MSDU and reframes it with an 802.11 frame header to create an MPDU.
Data Link Layer
What are some of the advantages of using WMM-PS power management over legacy power management methods?
A) Applications control doze and trigger frames
B) The client does not have to wait for a beacon
C) Downlink traffic is sent in a frame burst
D) Data frames are used as trigger frames. PS-Poll frames are not used.
E) All of the above
The data unit which resides on Layer 2 is called?
Frame
This is the smallest unit of data in computer networking and is composed of either 0 or a 1.
Bit
The MAC sublayer resides at which layer of the OSI model?
Layer 2
The process a client goes through to join a BSS includes three states. These three states are different combinations of which two functions? (Choose Two)
A) Authentication
B) Association
The 802.11 Shared Key Authentication method is used for which of the following security implementations in 802.11 networking?
WEP
This process of breaking frames into smaller transmission units can sometimes improve performance of a wireless network which is experiencing high data corruption. However, using this can impede performance on a properly working wireless network.
Fragmentation
The PMD sublayer resides at which layer of the OSI model?
Layer 1
If a station is in Power Save Mode, how does it know that it has buffered unicast frames waiting for it?
By examining the TIM Field
The Beacon frame is which type of frame?
Management Frame
What is the name of the sub-layer that is responsible for modulating data onto the wireless media and creating the RF signal?
PMD
After a station sees its AID in the TIM, what typically is the next frame that the station transmits?
PS-Poll
If a client station is always awake and listening to the wireless medium with no periods of dozing which power save mode is the station using? This mode is sometimes referred to as Continuous Aware Mode.
Active Mode
The process a client goes through to join a BSS includes three states. Which of the following happens first?
Authentication