Exam 3 ISMN Flashcards
Wireless
Telecommunications in electromagnetic waves carry the signal and transmit data (microwave, satellite, radio, etc)
Binary Communication (0’s and 1’s)
Microwave Adv/Disadv
Adv: High Bandwidth, relatively inexpensive
Disadvantages: Needs unobstructed line of sight
Satellite Adv/Disadv
Adv: High Bandwidth, high coverage
Disadv: Needs unobstructed line of sight, expensive, must use encryption, signals experience propogation delay
Radio Adv/Disadv
Adv: High Bandwidth, signals pass through walls. inexpensive, easy to install
Disadv: Creates electrical interference, susceptible to snooping unless encrypted
3 basic types of Tellecommunications Satellites
GEO, MEO, LEO
How many satellites orbiting Earth? How many inactive?
> 7900, >3170
Wavelength
Trough to Trough
Wave Frequency
Waves produced from the source per second
Bluetooth
uses low-power; peer-to-peer; can transmit up to 50 Mbps up to 1,300 ft
Ultra-Wideband:
Ultra-Wideband: popular application are Real-Time Location Systems (people trackers via badges) ; transmission speeds over 100 Mbps up to 650 ft
Near Field Communication (NFC):
Embedded in mobile devices; smallest range; used for mobile wallets / proximity purchases
Wi-Fi (Wireless Fidelity)
300 ft access area (multiple access points/extenders expand
coverage)
Cellular Radio
Cell phone networks. Cell phones communicate with radio antennas
(towers) placed within geographic areas called cells. Information is transmitted to the local cell tower & passed from cell tower to cell tower until it reaches its destination.
1st Generation (1G) thru 5th Generation (5G)
Long Range
Security Concerns
transmissions can be intercepted by anyone who is close enough and has access to the appropriate
equipment
To protect wireless networks,
encryption is used
WPA2 – popular wi-fi encryption for wireless networks
Rogue Access Points
(unauthorized access point into a
wireless network/employee brings a wireless device):
i.e. Evil twin attack using a Hotspotter – device that detects wireless networks & provides info on them –
to spoof a legitimate network
War Driving
Eavesdropping
(accessing data on wireless networks by unauthorized users)
Radio Frequency Jamming
Intentional and Unintentional Interference
Mobile Computing
refers to a real-time, wireless connection between a mobile device and other computer environments
Mobility in mobile computing
users carry a device with them and can initiate a real-time contact with other systems from wherever they happen to be
Broad reach in mobile computing
refers to the fact that when users carry an open mobile device, they can be reached instantly, even across great distances
Mobile Commerce (m-commerce)
refers to e-commerce
transactions conducted with a mobile device
Telemetry
Wireless transmission and receipt of data gathered from remote sensors
Internet of Things (IoT)
a system in which any object, natural or
manmade, has a unique identity (IP Address) and is able to
send and receive information over a network without human
interaction
Managing Data
Means aquiring,