M5 Glossary Flashcards

1
Q

A network configuration without supporting network infrastructure. Every device involved with the ad-hoc network communicates with every other device within range, and all nodes help pass along messages

A

Ad-Hoc network:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A device that establishes data connections across phone lines and different speeds for uploading and downloading data

A

Asymmetric Digital Subscriber Line (ADSL):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A measurement of how many bits could be passed across a phone line in a second

A

Baud rate:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The most common short range wireless network

A

Bluetooth:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Any connectivity technology that isn’t dial-up Internet

A

Broadband:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A device that sits at the edge of a consumer’s network and connects it to the cable modem termination system

A

Cable modem:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Connects lots of different cable connections

to an ISP’s core network

A

Cable modem termination system:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Individual, smaller sections of the overall frequency band used by a wireless network

A

Channels:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network segment where only one device can communicate at a time

A

Collision domain:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Has all of the data of the protocols further up the stack of a frame

A

Data payload section:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Uses POTS for data transfer, and gets its name because the connection is established by actually dialing a phone number

A

Dial-up:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital subscriber line was able to send much more data across the wire than traditional dial-up technologies by operating at a frequency range that didn’t interfere with normal phone calls

A

DSL:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Digital Subscriber Line Access Multiplexers are devices that connect multiple DSL connections to a high-speed digital communications channel

A

DSLAM:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Specifies how long the total frame is

A

Duration field:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is a 4-byte or 32-bit number that represents a checksum value for the entire frame

A

Frame check sequence:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

16 bits long, it contains a number of sub-fields that are used to

describe how the frame itself should be processed

A

Frame control field:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A certain section of the radio spectrum that’s been agreed upon to be used for certain communications

A

Frequency band:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fiber to the building, fiber to the business or even fiber to the basement, since this is generally where cables to buildings physically enter. FTTB is a setup where fiber technologies are used for data delivery to an individual building

19
Q

Fiber to the home. This is used in instances where fiber is actually run to each individual residents in a neighborhood or apartment building

20
Q

Fiber to the neighborhood. This means that fiber technologies are used to deliver data to a single physical cabinet that serves a certain amount of the population

21
Q

Fiber to the premises. FTTH and FTTB may both also be referred to as FTTP

22
Q

stands for fiber to the X, where the X can be one of many things

23
Q

High Bit-rate Digital Subscriber Lines. These are DSL technologies that provision speeds above 1.544 megabits per second

24
Q

Access points are configured to only allow for connections from a specific set of MAC addresses belonging to devices you trust

A

MAC filtering:

25
Like ad-hoc networks, lots of devices communicate with each other device, forming a mesh if you were to draw lines for all the links between all the nodes
Mesh networks:
26
An internet connection where all data transfer usage is tracked. Cell phone plans that have a limit on data usage per month or that charge based on usage are examples of metered connections
Metered connection:
27
A connection where your data usage is not tracked or limited, instead you are charged a flat fee for unlimited and unrestricted usage. A Wi-Fi connection is an example of a non-metered connection
Non-metered connection:
28
Converts data from protocols the fiber network can understand to those that are more traditional twisted pair copper networks can understand
Optical Network Terminator:
29
When a wireless peripheral connects to a mobile device, and the two devices exchange information, sometimes including a PIN or password, so that they can remember each other
Pairing
30
Establishes a VPN tunnel between two sites but VPN tunneling logic is handled by network devices at either side, so that users don't all have to establish their own connections
Point-To-Point VPN:
31
The MAC address of the access point that should receive the frame
Receiving address:
32
A device that establishes data connections across phone lines and has upload and download speeds that are the same
Symmetric Digital Subscriber Line (SDSL)
33
A field that is 16 bits long and mainly contains a sequence number used to keep track of ordering the frames
Sequence control field
34
It is what mobile devices uses to connect to their peripherals
Short-range wireless network
35
Technologies Invented to transmit multiple phone calls over a single link. Eventually, they also became common transmission systems to transfer data much faster than any dial-up connection could handle
T-Carrier technologies
36
The MAC address of whatever has just transmitted the frame
Transmitter address:
37
A security program that uses a 128-bit key to protect wireless computer networks, which makes it more difficult to crack than WEP
Wi-Fi Protected Access (WPA)
38
Acts like a single network but spans across multiple physical locations. WAN technologies usually require that you contract a link across the Internet with your ISP
Wide area network:
39
An encryption technology that provides a very low level of privacy. WEP should really only be seen as being as safe as sending unencrypted data over a wired connection
Wired Equivalence Privacy (WEP)
40
A device that bridges the wireless and wired portions of a network
Wireless access point:
41
One or more access points act as a bridge between a wireless and a wired network
Wireless LANS (WLANS)
42
Networks you connect to through radios and antennas
Wireless networking
43