Connecting to the Internet Flashcards

1
Q

A network configuration without supporting network infrastructure. Every device involved with the ad-hoc network communicates with every other device within range, and all nodes help pass along messages

A

AD-HOC NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A device that establishes data connections across phone lines and different speeds for uploading and downloading data

A

ASYMMETRIC DIGITAL SUBSCRIBER LINE (ADSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A measurement of how many bits could be passed across a phone line in a second

A

BAUD RATE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The most common short range wireless network

A

BLUETOOTH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Any connectivity technology that isn’t dial-up Internet

A

BROADBAND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A device that sits at the edge of a consumer’s network and connects it to the cable modem termination system

A

CABLE MODEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Connects lots of different cable connections to an ISP’s core network

A

CABLE MODEM TERMINATION SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Individual, smaller sections of the overall frequency band used by a wireless network

A

CHANNELS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network segment where only one device can communicate at a time

A

COLLISION DOMAIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Has all of the data of the protocols further up the stack of a frame

A

DATA PAYLOAD SECTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Uses POTS for data transfer, and gets its name because the connection is established by actually dialing a phone number

A

DIAL-UP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Was able to send much more data across the wire than traditional dial-up technologies by operating at a frequency range that didn’t interfere with normal phone calls

A

DSL (DIGITAL SUBSCRIBER LINE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Devices that connect multiple DSL connections to a high-speed digital communications channel

A

DSLAM (DIGITAL SUBSCRIBER LINE ACCESS MULTIPLEXERS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Specifies how long the total frame is

A

DURATION FIELD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A 4-byte or 32-bit number that represents a checksum value for the entire frame

A

FRAME CHECK SEQUENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

16 bits long, it contains a number of sub-fields that are used to describe how the frame itself should be processed

A

FRAME CONTROL FIELD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A certain section of the radio spectrum that’s been agreed upon to be used for certain communications

A

FREQUENCY BAND

18
Q

A setup where fiber technologies are used for data deliver to an individual building

A

FTTB (FIBER TO THE BUILDING, BUSINESS, BASEMENT)

19
Q

This is used in instances where fiber is actually run to each individual residence in a neighborhood or apartment buildling

A

FTTH (FIBER TO THE HOME)

20
Q

This means that fiber technologies are used to deliver data to a single physical cabinet that serves a certain amount of the population

A

FTTN (FIBER TO THE NEIGHBORHOOD)

21
Q

Another way to refer to FTTH and FTTB

A

FTTP (FIBER TO THE PREMESIS)

22
Q

Another way to describe a fiber setup, where X can be one of many things

A

FTTX (FIBER TO THE X)

23
Q

These are DSL technologies that provision speeds above 1.544 megabits per second

A

HDSL (HIGH BIT-RATE DIGITAL SUBSCRIBER LINES)

24
Q

Access points are configured to only allow for connections from a specific set of MAC addresses belonging to devices you trust

A

MAC FILTERING

25
Q

Like ad-hoc networks, lots of devices communicate with each other device, forming a mesh if you were to draw lines for all the links between all the nodes

A

MESH NETWORKS

26
Q

An internet connection where all data transfer usage is tracked. EX: Cell phone plans that have a limit on data usage per month or that charge based on usage

A

METERED CONNECTION

27
Q

A connection where your data usage is not tracked or limited, instead you are charged a flat fee for unlimited and unrestricted usage. EX: A Wi-Fi connection

A

NON-METERED CONNECTION

28
Q

Converts data from protocols the fiber network can understand to those that are more traditional twisted pair copper networks can understand

A

OPTICAL NETWORK TERMINATOR

29
Q

When a wireless peripheral connects to a mobile device, and the two devices exchange information, sometimes including a PIN or password, so that they can remember each other

A

PAIRING

30
Q

Establishes a VPN tunnel between two sites but VPN tunneling logic is handled by network devices at either side, so that users don’t all have to establish their own connections

A

POINT-TO-POINT VPN

31
Q

The MAC address of the access point that should receive the frame

A

RECEIVING ADDRESS

32
Q

A device that establishes data connections across phone lines and has upload and download speeds that are the same

A

SYMMETRIC DIGITAL SUBSCRIBER LINE (SDSL)

33
Q

A field that is 16 bits long and mainly contains a sequence number used to keep track of ordering the frames

A

SEQUENCE CONTROL FIELD

34
Q

What mobile devices use to connect to their peripherals

A

SHORT-RANGE WIRELESS NETWORK

35
Q

Technologies invented to transmit multiple phone calls over a single link. Eventually, they also became common transmission systems to transfer data much faster than any dial-up connection could handle

A

T-CARRIER TECHNOLOGIES

36
Q

The MAC address of whatever has just transmitted the frame

A

TRANSMITTER ADDRESS

37
Q

A security program that uses a 128-bit key to protect wireless computer networks, which makes it more difficult to crack than WEP

A

WI-FI PROTECTED ACCESS (WPA)

38
Q

Acts like a single network but spans across multiple physical locations. WAN technologies usually require that you contract a link across the internet with your ISP

A

WIDE AREA NETWORK (WAN)

39
Q

An encryption technology that provides a very low level of privacy. Should really only be seen as being as safe as sending unencrypted data over a wired connection

A

WIRED EQUIVALENCE PRIVACY (WEP)

40
Q

A device that bridges the wireless and wired portions of a network

A

WIRELESS ACCESS POINT

41
Q

One or more access points act as a bridge between a wireless and a wired network

A

WIRELESS LANS (WLANS)

42
Q

Networks you connect to through radios and antennas

A

WIRELESS NETWORKING