M5 Glossary Flashcards

1
Q

A network configuration without supporting network infrastructure. Every device involved with the ad-hoc network communicates with every other device within range, and all nodes help pass along messages

A

Ad-Hoc network:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A device that establishes data connections across phone lines and different speeds for uploading and downloading data

A

Asymmetric Digital Subscriber Line (ADSL):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A measurement of how many bits could be passed across a phone line in a second

A

Baud rate:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The most common short range wireless network

A

Bluetooth:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Any connectivity technology that isn’t dial-up Internet

A

Broadband:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A device that sits at the edge of a consumer’s network and connects it to the cable modem termination system

A

Cable modem:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Connects lots of different cable connections

to an ISP’s core network

A

Cable modem termination system:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Individual, smaller sections of the overall frequency band used by a wireless network

A

Channels:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network segment where only one device can communicate at a time

A

Collision domain:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Has all of the data of the protocols further up the stack of a frame

A

Data payload section:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Uses POTS for data transfer, and gets its name because the connection is established by actually dialing a phone number

A

Dial-up:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital subscriber line was able to send much more data across the wire than traditional dial-up technologies by operating at a frequency range that didn’t interfere with normal phone calls

A

DSL:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Digital Subscriber Line Access Multiplexers are devices that connect multiple DSL connections to a high-speed digital communications channel

A

DSLAM:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Specifies how long the total frame is

A

Duration field:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is a 4-byte or 32-bit number that represents a checksum value for the entire frame

A

Frame check sequence:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

16 bits long, it contains a number of sub-fields that are used to

describe how the frame itself should be processed

A

Frame control field:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A certain section of the radio spectrum that’s been agreed upon to be used for certain communications

A

Frequency band:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fiber to the building, fiber to the business or even fiber to the basement, since this is generally where cables to buildings physically enter. FTTB is a setup where fiber technologies are used for data delivery to an individual building

A

FTTB:

19
Q

Fiber to the home. This is used in instances where fiber is actually run to each individual residents in a neighborhood or apartment building

A

FTTH

20
Q

Fiber to the neighborhood. This means that fiber technologies are used to deliver data to a single physical cabinet that serves a certain amount of the population

A

FTTN:

21
Q

Fiber to the premises. FTTH and FTTB may both also be referred to as FTTP

A

FTTP

22
Q

stands for fiber to the X, where the X can be one of many things

A

FTTX

23
Q

High Bit-rate Digital Subscriber Lines. These are DSL technologies that provision speeds above 1.544 megabits per second

A

HDSL

24
Q

Access points are configured to only allow for connections from a specific set of MAC addresses belonging to devices you trust

A

MAC filtering:

25
Q

Like ad-hoc networks, lots of devices communicate with each other device, forming a mesh if you were to draw lines for all the links between all the nodes

A

Mesh networks:

26
Q

An internet connection where all data transfer usage is tracked. Cell phone plans that have a limit on data usage per month or that charge based on usage are examples of metered connections

A

Metered connection:

27
Q

A connection where your data usage is not tracked or limited, instead you are charged a flat fee for unlimited and unrestricted usage. A Wi-Fi connection is an example of a non-metered connection

A

Non-metered connection:

28
Q

Converts data from protocols the fiber network can

understand to those that are more traditional twisted pair copper networks can understand

A

Optical Network Terminator:

29
Q

When a wireless peripheral connects to a mobile device, and the two devices exchange information, sometimes including a PIN or password, so that they can remember each other

A

Pairing

30
Q

Establishes a VPN tunnel between two sites but VPN tunneling logic is handled by network devices at either side, so that users don’t all have to establish their own connections

A

Point-To-Point VPN:

31
Q

The MAC address of the access point that should receive the frame

A

Receiving address:

32
Q

A device that establishes data connections across phone lines and has upload and download speeds that are the same

A

Symmetric Digital Subscriber Line (SDSL)

33
Q

A field that is 16 bits long and mainly contains a sequence number used to keep track of ordering the frames

A

Sequence control field

34
Q

It is what mobile devices uses to connect to their peripherals

A

Short-range wireless network

35
Q

Technologies Invented to transmit multiple phone calls over a single link. Eventually, they also became common transmission systems to transfer data much faster than any dial-up connection could handle

A

T-Carrier technologies

36
Q

The MAC address of whatever has just transmitted the frame

A

Transmitter address:

37
Q

A security program that uses a 128-bit key to protect wireless computer networks, which makes it more difficult to crack than WEP

A

Wi-Fi Protected Access (WPA)

38
Q

Acts like a single network but spans across multiple physical locations. WAN technologies usually require that you contract a link across the Internet with your ISP

A

Wide area network:

39
Q

An encryption technology that provides a very low level of privacy. WEP should really only be seen as being as safe as sending unencrypted data over a wired connection

A

Wired Equivalence Privacy (WEP)

40
Q

A device that bridges the wireless and wired portions of a network

A

Wireless access point:

41
Q

One or more access points act as a bridge between a wireless and a wired network

A

Wireless LANS (WLANS)

42
Q

Networks you connect to through radios and antennas

A

Wireless networking

43
Q
A