Simulated PBQs - Matching Flashcards
TIPs for Simulated “Hands On” PBQ Matching
- Use Paper & Pencil to jot down your answers before checking them.
- Or use Snippit Tool to Map out your Matching before checking them.
Freebie Card. +5
MATCHING: OSI Model + Descriptions
Options:
- Physical
- Data Link
- Network
- Transport
- Session
- Presentation
- Application
Descriptions:
- This Layer defines the use of a MAC Address?
- This Layer initiates contact with the destination?
- This Layer converts signals to bits?
- This Layer is responsible for formatting data for use by a Network-Aware program?
- This Layer defines what segment number will be sent or acknowledged?
- This Layer must contain a Source IP Address?
- This Layer handles raw data only?
This Layer defines the use of a MAC Address? = 2. Data Link
This Layer initiates contact with the destination? = 5. Session
This Layer converts signals to bits? = 1. Physical
This Layer is responsible for formatting data for use by a Network-Aware program? = 6. Presentation
This Layer defines what segment number will be sent or acknowledged? = 4. Transport
This Layer must contain a Source IP Address? = 3. Network
This Layer handles raw data only? = 7. Application
MATCHING: OSI Model + Devices (Some may be used more than once.)
Options:
- Physical
- Data Link
- Network
- Transport
- Session
- Presentation
- Application
Devices:
- Access Switch?
- Email Server?
- Router?
- Computer Workstation?
- Hub?
- Bridge?
- Web Server?
- Stateful Firewall?
- Frame Relay Switch?
- File Server?
Access Switch = 2. Data Link
Email Server = 7. Application
Router = 3. Network
Computer Workstation = 7. Application
Hub = 1. Physical
Bridge = 2. Data Link
Web Server = 7. Application
Stateful Firewall = 4. Transport
Frame Relay Switch = 2. Data Link
File Server = 7. Application
MATCHING: TCP/IP Protocols + Functions
Options:
- FTP
- TLS
- HTTP
- TELNET
- IGMP
- IMAP
- ARP
- UDP
- TCP
- NTP
- POP3
- SNMP
- SIP
- SSH
- SMTP
- ICMP
- HTTPS
- RTP
- DNS
- DHCP
Descriptions:
- Used to provide nonsecure remote access from host terminals to various servers & network devices.
- The email is stored locally and might not sync if accessed from multiple locations.
- Delivers administrative alerts to and from network devices.
- Provides for the automatic assignment of IP addresses to hosts on a given network.
- Offers a secure authentication of clients to web servers by delivery of requested data.
- Used to provide connectionless network services.
- Network layer protocol that makes multicast connections for delivering mass datagrams to groups of clients.
- Email is stored on the server and can be accessed from multiple locations.
- Used to transfer files in a connection-oriented state.
- Used by email servers to deliver email between server systems.
- Network layer protocol used by programs such as ping to deliver network messages to requesting clients.
- Resolves fully qualified domain names to their unique IP addresses.
- Offers a synchronized time service to all configured network devices.
- Offers a secure connection from a virtual terminal to remote devices.
- Connection-oriented delivery of upper-layer datagrams using acknowledgements.
- Often used in audio/video delivery of real-time data requiring QoS and tight sequencing.
- Nonsecure client/server protocol used to retrieve data from web servers to their Clients.
- Provides encryption for data above the transport layer and updates the SSL protocol.
- Used to resolve IP addresses to MAC addresses for purposes of local-area message delivery.
- Manages the initiation of VoIP phone services.
Used to provide nonsecure remote access from host terminals to various servers & network devices. = 4. TELNET
The email is stored locally and might not sync if accessed from multiple locations. = 11. POP3 (Post Office Protocol)
Delivers administrative alerts to and from network devices. = 12. SNMP (Simple Network Management Protocol)
Provides for the automatic assignment of IP addresses to hosts on a given network. = 20. DHCP (Dynamic Host Configuration Protocol)
Offers a secure authentication of clients to web servers by delivery of requested data. = 17. HTTPS (Hyptertext Transfer Protocol Secure)
Used to provide connectionless network services. = 8. UDP (User Datagram Protocol)
Network layer protocol that makes multicast connections for delivering mass datagrams to groups of clients. = 5. IGMP (Internet Group Management Protocol)
Email is stored on the server and can be accessed from multiple locations. = 6. IMAP (Internet Message Access Protocol)
Used to transfer files in a connection-oriented state. = 1. FTP (File Transfer Protocol)
Used by email servers to deliver email between server systems. = 15. SMTP (Simple Mail Transfer Protocol)
Network layer protocol used by programs such as ping to deliver network messages to requesting clients. = 16. ICMP (Internet Control Message Protocol)
Resolves fully qualified domain names to their unique IP addresses. = 19. DNS (Domain Name Service)
Offers a synchronized time service to all configured network devices. = 10. NTP (Network Time Protocol)
Offers a secure connection from a virtual terminal to remote devices. = 14. SSH (Secure Shell)
Connection-oriented delivery of upper-layer datagrams using acknowledgements. 9. TCP (Transport Control Protocol)
Often used in audio/video delivery of real-time data requiring QoS and tight sequencing. = 18. RTP (Realtime Transport Protocol)
Nonsecure client/server protocol used to retrieve data from web servers to their Clients. = 3. HTTP (Hyptertext Transfer Protocol)
Provides encryption for data above the transport layer and updates the SSL protocol. = 2. TLS (Transport Layer Security)
Used to resolve IP addresses to MAC addresses for purposes of local-area message delivery. = 7. ARP (Address Resolution Protocol)
Manages the initiation of VoIP phone services. = 13. SIP (Session Initiation Protocol)
MATCHING: Well-Known Port Numbers
Options: 67 123 53 23 69 520 443 3389 80 21 22 25 161 445 110 143 5060 636
Protocols:
- POP3
- HTTP
- SNMP
- TFTP
- DHCP
- SSH
- RIP
- HTTPS
- FTP
- SMTP
- DNS
- TELNET
- NTP
- IMAP
- RDP
- SIP
- SMB
- LDAPS
POP3 = 110 (Post Office Protocol)
HTTP = 80 (Hyptertext Transfer Protocol)
SNMP = 161/162 (Simple Network Management Protocol)
TFTP = 69 (Trivial File Transfer Protocol)
DHCP = 67/68 (Dynamic Host Configuration Protocol)
SSH = 22 (Secure Shell)
RIP = 520 (Routing Information Protocol)
HTTPS = 443 (Hyptertext Transfer Protocol)
FTP = 20/21 (File Transfer Protocol)
SMTP = 25 (Simple Mail Transfer Protocol)
DNS = 53 (Domain Name Service)
TELNET = 23
NTP = 123 (Network Time Protocol)
IMAP = 143 (Internet Message Access Protocol)
RDP = 3389 (Remote Desktop Protocol)
SIP = 5060 (Session Initiation Protocol)
SMB = 445 (Server Message Block)
LDAPS = 636 (Lightweight Directory Access Protocol Secure)
MATCHING: Network Application Protocols
Options: IGMP BOOTP TLS FTP POP3 SMTP ARP RDP HTTP SNMP HTTPS TELNET IMAP RTP NTP SIP SSH TFTP
Descriptions:
- Provides a graphical user interface to a remote user.
- Used in VoIP to initiate a telephone service request.
- Provides connection-oriented data file transfers.
- Predecessor to DHCP that provided IP addresses automatically.
- Provides for connectionless data file transfer.
- Provides the ability to remotely monitor and manage network devices.
- Provides for retrieval of email using an “always-connected” session.
- Provides for transfer of email between email servers.
- Requires a login to secure access to a website.
- Provides for an email client to access email remotely as prompted by the user.
- Provides secure connection to be able to manage remote devices.
- Provides for improved streaming audio/video delivery over the internet.
- Manages multicast groups
- Provides for clock sync across a domain.
- Older method of accessing remote devices, has no security built in.
- Authentication and encryption process for retrieving web pages securely.
- Provides access to files through a web browser.
- Maps an IP address to a MAC address
Provides a graphical user interface to a remote user. = RDP (Remote Desktop Protocol)
Used in VoIP to initiate a telephone service request. = SIP (Session Initiation Protocol)
Provides connection-oriented data file transfers. = FTP (File Transfer Protocol)
Predecessor to DHCP that provided IP addresses automatically. = BOOTP
Provides for connectionless data file transfer. = TFTP (Trivial File Transfer Protocol)
Provides the ability to remotely monitor and manage network devices. = SNMP (Simple Network Management Protocol)
Provides for retrieval of email using an “always-connected” session. = IMAP (Internet Message Access Protocol)
Provides for transfer of email between email servers. = SMTP (Simple Mail Transfer Protocol)
Requires a login to secure access to a website. = HTTPS (Hyptertext Transfer Protocol Secure)
Provides for an email client to access email remotely as prompted by the user. = POP3 (Post Office Protocol)
Provides secure connection to be able to manage remote devices. = SSH (Secure Shell)
Provides for improved streaming audio/video delivery over the internet. = RTP (Realtime Transfer Protocol)
Manages multicast groups = IGMP (Internet Group Management Protocol)
Provides for clock sync across a domain. = NTP (Network Time Protocol)
Older method of accessing remote devices, has no security built in. = TELNET
Authentication and encryption process for retrieving web pages securely. = TLS (Transport Layer Security)
Provides access to files through a web browser. = HTTP (Hyptertext Transfer Protocol)
Maps an IP address to a MAC address = ARP (Address Resolution Protocol)
MATCHING: Application Layer Network Server Descriptions
Options: Web Proxy VPN Server Domain Name Server Email Server Network Address Translation Server FTP Server Domain Controller DHCP Server NTP Server
Descriptions:
- Serves as a resource to match up fully qualified domain names with an IP address?
- Provides a way to receive, store, and forward email messages on behalf of email clients?
- Substitutes public addresses for private addresses?
- Caches recently visited web pages to reduce bandwidth consumption and speed up response times?
- Automatically provides IP addresses to requesting clients?
- Performs data file transfers based on connection-oriented rule set?
- Provides for authentication and resources authorization to users logging into a network?
- Provides a secure connection that encryptions the original data and all the original headers?
- Used to provide a common time to network nodes?
Serves as a resource to match up fully qualified domain names with an IP address? = Domain Name Server (DNS)
Provides a way to receive, store, and forward email messages on behalf of email clients? = Email Server
Substitutes public addresses for private addresses? = Network Address Translation Server (NAT)
Caches recently visited web pages to reduce bandwidth consumption and speed up response times? = Web Proxy
Automatically provides IP addresses to requesting clients? = DHCP Server (Dynamic Host Configuration Protocol)
Performs data file transfers based on connection-oriented rule set? = FTP Server (File Transfer Protocol)
Provides for authentication and resources authorization to users logging into a network? = Domain Controller
Provides a secure connection that encryptions the original data and all the original headers? = VPN Server (Virtual Private Network)
Used to provide a common time to network nodes? = NTP Server (Network Time Protocol)
MATCHING: DHCP Technology
Options: 255.255.255.255:67 ipconfig /registerdns Reservation 7/8 DHCPOffer DHCPack ipconfig /renew DHCPDiscover DHCPRequest DHCPOption Lease Period
Descriptions:
- The broadcast packet that is used to elicit a DHCP offer from an DHCP server?
- The max amount of time that a client is forced to renew its DHCP address?
- Causes all local DHCP addresses to be refreshed and renewed with the DNS server?
- Additional info that a DHCP server can provide the client for max use of TCP/IP settings?
- The period of time that a client can cliam an IP address provided by DHCP?
- An attempt by a DHCP Server to present a requesting client a valid IP Address from its scope or pool of available addresses?
- The last step in a successful DHCP IP address assignment?
- The initial socket address that makes it possible for hosts to process the packet to find out if they are configured by DHCP server?
- An IP address that a specific MAC address is assigned and which cannot be assigned to any other MAC address?
- Command that directs a computer to reinitialize contact with the DHCP server and restart the lease period timer?
- Client response to accept a DHCP server offer?
The broadcast packet that is used to elicit a DHCP offer from an DHCP server? = DHCPDiscover
The max amount of time that a client is forced to renew its DHCP address? = 7/8
Causes all local DHCP addresses to be refreshed and renewed with the DNS server? = ipconfig /registerdns
Additional info that a DHCP server can provide the client for max use of TCP/IP settings? = DHCPOption
The period of time that a client can cliam an IP address provided by DHCP? = Lease Period
An attempt by a DHCP Server to present a requesting client a valid IP Address from its scope or pool of available addresses? = DHCPOffer
The last step in a successful DHCP IP address assignment? = DHCPack
The initial socket address that makes it possible for hosts to process the packet to find out if they are configured by DHCP server? =
255.255.255.255:67
An IP address that a specific MAC address is assigned and which cannot be assigned to any other MAC address? = Reservation
Command that directs a computer to reinitialize contact with the DHCP server and restart the lease period timer? = ipconfig /renew
Client response to accept a DHCP server offer? = DHCPRequest
MATCHING: Internet of Things (IoT) Terminology
Options: Industrial Control Systems (ICS) Near Field Communication (NFC) Structure Attenuation Programming Logic Circuit (PLC) ZWave Supervisory Control and Data Acquisition (SCADA) Radio Frequency Identification (RFID) Ultra Wide Band (UWB) Firmware Over the Air (FOTA) Remote Terminal Unit (RTU)
Descriptions:
- This term refers to monitoring and data collection in an enterprise for purpose of controlling devices through direct automation or indirectly
overrides.
- Dedicated circuits of limited size that used in small endpoint devices such as thermostats, sensors, and remote control devices.
-Mobile devices use this for close proximity transactions.
- Use of radio waves that are strong enough to create a current in an antenna ‘tag’ that can cause it to respond over a very short range.
- Weak RF signal used in measuring distance to an object useful in asset tracking.
- ZigBee low power, short range, standard for sensing and control within networks that are relatively small in size.
- Loss of signal as it moves through obstacles such as walls or other interference.
- Catch all term to signify industrial automation in which multiple components are designed tow ork together for a coordinated purpose.
- A method of maintaining and updating source code in IOT devices.
- An endpoint of a system that communicates with the master terminal unit or a SCADA system to provide telemetry data and receive control instructions.
This term refers to monitoring and data collection in an enterprise for purpose of controlling devices through direct automation or indirectly overrides. = Supervisory Control and Data Acquisition (SCADA)
Dedicated circuits of limited size that used in small endpoint devices such as thermostats, sensors, and remote control devices. = Programming Logic Circuit (PLC)
Mobile devices use this for close proximity transactions. = Near Field Communication (NFC)
Use of radio waves that are strong enough to create a current in an antenna ‘tag’ that can cause it to respond over a very short range. = Radio Frequency Identification (RFID)
Weak RF signal used in measuring distance to an object useful in asset tracking. = Ultra Wide Band (UWB)
ZigBee low power, short range, standard for sensing and control within networks that are relatively small in size. = ZWave
Loss of signal as it moves through obstacles such as walls or other interference. = Structure Attenuation
Catch all term to signify industrial automation in which multiple components are designed tow ork together for a coordinated purpose. = Industrial Control System (ICS)
A method of maintaining and updating source code in IOT devices. = Firmware Over the Air (FOTA)
An endpoint of a system that communicates with the master terminal unit or a SCADA system to provide telemetry data and receive control instructions. = Remote Terminal Unit (RTU)
MATCHING: Switching Terminology
Options: Switching Loop Port Mirroring 802.1q MAC Address Table POE+ POE ARP Table STP VLAN Trunking VLAN Tagging Virtual Switch
Descriptions:
- Ports that have been administratively configured to be in the same broadcast segment.
- The use of a single port to transmit and receive data for multiple VLANs.
- An Ethernet networking protocol used to define the parameters that are used to create Virtual Local Area Networks.
- A field inserted into a frame that indicates the VLAN number that the frame should be confined to when Switched to other ports.
- The result of a frame being repetitively forwarded on a redundant network connection.
- A protocol that mitigates the presense of switching loops by allowing only a single best path through a switch fabric.
- Recently resolved IP address to MAC address mappings.
- The database of all known and active MAC addresses along with their port and VLAN identifier.
- Ethernet ports that cary up to 15 watts of electrical power suitable for a small network node to safely operate.
- Ethernet ports designed to carry up to 25 watts of electric power for use of nodes requiring an electric power source.
- Use of secondary port to monitor and copy network packets for analysis.
- Use of logic software to allow virtual machines to communicate with each other, often within the same host system.
Ports that have been administratively configured to be in the same broadcast segment. = VLAN (Virtual Local Area Network)
The use of a single port to transmit and receive data for multiple VLANs. = Trunking
An Ethernet networking protocol used to define the parameters that are used to create Virtual Local Area Networks. = 802.1q
A field inserted into a frame that indicates the VLAN number that the frame should be confined to when Switched to other ports. = VLAN Tagging
The result of a frame being repetitively forwarded on a redundant network connection. = Switching Loop
A protocol that mitigates the presense of switching loops by allowing only a single best path through a switch fabric. = STP (Spanning Tree Protocol)
Recently resolved IP address to MAC address mappings. = ARP Table
The database of all known and active MAC addresses along with their port and VLAN identifier. = MAC Address Table
Ethernet ports that cary up to 15 watts of electrical power suitable for a small network node to safely operate. = POE (Power over Ethernet)
Ethernet ports designed to carry up to 25 watts of electric power for use of nodes requiring an electric power source. POE+ (Power over Ethernet Enhanced)
Use of secondary port to monitor and copy network packets for analysis. = Port Mirroring
Use of logic software to allow virtual machines to communicate with each other, often within the same host system. = Virtual Switch
MATCHING: IPv4 Address Types & Classes
Options:
- 2.2.2
- 255.0.0
- 255.255.0
- 90.9.140
- 0.0.10
- 168.234.2
- 50.3.4
- 0.0.0
- 22.2
- 0.0.1
- 255.255.255
- 16.2.2
- 254.4.220
Descriptions:
- Class C Private
- Automatic Private IP Address
- Class A Private
- Loopback Address
- Class B Public
- Class C Public
- Class B Private
- Class A Public
- Class D Multicast
- Broadcast
- Default Class A Subnet Mask
- Default Class B Subnet Mask
- Default Class C Subnet Mask
Automatic Private IP Address = 169.254.4.220
Loopback Address = 127.0.0.1
Class A Public = 2.2.2.2
(1.0.0.0 to 127.0.0.0)
Class B Public = 154.50.3.4
(128.0.0.0 to 191.255.0.0)
Class C Public = 222.2.2.2
(192.0.0.0 to 223.255.255.0)
Class A Private = 10.90.9.140
(10.0.0.0 to 10.255.255.255)
Class B Private = 172.16.2.2
(172.16.0.0 to 172.31.255.255)
Class C Private = 192.168.234.2
(192.168.0.0 to 192.168.255.255)
Class D Multicast = 224.0.0.10
(240.0.0.0 to 255.255.255.255)
Default Class A Subnet Mask = 255.0.0.0
Default Class B Subnet Mask = 255.255.0.0
Default Class C Subnet Mask = 255.255.255.0
Broadcast = 255.255.255.255
MATCHING: IPv6 Addressing Terminology
Options: Multicast Address Neighbor Discovery (ND) Router Advertisement (RA) Unicast Address IPSec Link Local Address Global Unicast Address Address Truncation Tunneling Anycast Address Unique Local Address Router Solicitation (RS)
Descriptions:
- The address that replaces the broadcast IPv4 address and allows for machines to contact all machines with a specific service to offer, such as a - Router or DNS server.
- The protocol that handles the built-in security that IPv6 incorperates to encrypt packet data.
- The process of reducing the IPv6 address to its shortest possible format.
- An address that can be assigned manually to ensure that an address stays on a private network and is not routed.
- A type of unicast address that the client computer gives to itself, similar to APIPA in IPv4.
- Similar to IPv4, a single address on a single interface forming a direct line of communication.
- A routable address used to set up a host to host link on the public Internet.
- An address that is used to receive data that is intended for many destination simultaneously.
- The process of placing an IPv6 datagram inside an IPv4 packet header for use by IPv4 networks.
- A periodic message sent to a network segment providing information about the network address and other network parameters.
- A method of learning data linke layer addresses for IPv6 machines located in the same physical or broadcast domain.
- A host generated message to force an IPv6 gateway device to advertise its network capabilities.
The address that replaces the broadcast IPv4 address and allows for machines to contact all machines with a specific service to offer, such as a Router or DNS server. = Anycast Address
The protocol that handles the built-in security that IPv6 incorperates to encrypt packet data. = IPSec
The process of reducing the IPv6 address to its shortest possible format. = Address Truncation
An address that can be assigned manually to ensure that an address stays on a private network and is not routed. = Unique Local Address
A type of unicast address that the client computer gives to itself, similar to APIPA in IPv4. = Link Local Address
Similar to IPv4, a single address on a single interface forming a direct line of communication. = Unicast Address
A routable address used to set up a host to host link on the public Internet. = Global Unicast Address
An address that is used to receive data that is intended for many destination simultaneously. = Multicast Address
The process of placing an IPv6 datagram inside an IPv4 packet header for use by IPv4 networks. = Tunneling
A periodic message sent to a network segment providing information about the network address and other network parameters. = Router Advertisement (RA)
A method of learning data linke layer addresses for IPv6 machines located in the same physical or broadcast domain. = Neighbor Discovery (ND)
A host generated message to force an IPv6 gateway device to advertise its network capabilities. = Router Solicitation (RS)
MATCHING: IPv6 address truncation (There are more answers than there are addresses, some will not be used.)
Options: 2001::1:0:0:0:2 FFC:2:3::C12:56FF:FE00:31 FFC:2:3::C12:56FF:FE:31 2001:0:1::2 FF00:1::2 FF00:0:1000::20 FC00::30:0:C12:56FF:FE00:31 2001:0:0:1::2 21::35:C1F::C3F:1CBE:F1 2001::35:C1F:0:C3F:1CBE:F1
IPv6 Addresses:
- 2001:0000:0035:0C1F:0000:OC3F:1CBE:00F1
- 2001:0000:0001:0000:0000:0000:000:0002
- FC00:0000:0030:0000:0C12:56FF:FE00:0031
- 2001:0000:0000:0001:0000:0000:0000:0002
- FF00:0000:1000:0000:0000:0000:0000:0020
2001: 0000:0035:0C1F:0000:0C3F:1CBE:00F1 ====== 2001::35:C1F:0:C3F:1CBE:F1
2001: 0000:0001:0000:0000:0000:000:0002 ====== 2001:0:1::2
FC00:0000:0030:0000:0C12:56FF:FE00:0031 ====== FC00::30:0:C12:56FF:FE00:31
2001:0000:0000:0001:0000:0000:0000:0002 ====== 2001:0:0:1::2
FF00:0000:1000:0000:0000:0000:0000:0020 ====== FF00:0:1000::20
MATCHING: WAN Terminology
Options: DSL OC3 PPP SIP Trunk T1 Cable Broadband T3 MPLS PRI PPPoE Demarcation Point SD-WAN
Descriptions:
- Use of phone line to deliver dedicated high speed digital services.
- Dedicated leased line technology allowing 1.544 Mbps.
- Dedicated leased line services delivering up to 45 Mbps.
- Delivery of high speed internet using existing shared medium TV coax.
- Optical signaling providing 155 Mbps.
- Similar to a T-1 in bandwidth, but can also use ISDN tech and requires more bandwidth to be dedicated to the signaling and control function.
- Data delivery protocol that forwards packets using the data link layer using label switching instead of routing tables.
- WAN protocol that is non-proprietary and capable of having encrypted authentication.
- Used in delivering a voice telephony service on the Internet.
- Encapsulates point to point protocol inside Ethernet frames.
- Physical point where WAN connection comes into a facility.
- Use of high speed leased lines managed via software defined network programming to lower costs.
Use of phone line to deliver dedicated high speed digital services. = DSL
Dedicated leased line technology allowing 1.544 Mbps. = T1
Dedicated leased line services delivering up to 45 Mbps. = T3
Delivery of high speed internet using existing shared medium TV coax. = Cable Broadband
Optical signaling providing 155 Mbps. = OC3
Similar to a T-1 in bandwidth, but can also use ISDN tech and requires more bandwidth to be dedicated to the signaling and control function. = PRI
Data delivery protocol that forwards packets using the data link layer using label switching instead of routing tables. = MPLS
WAN protocol that is non-proprietary and capable of having encrypted authentication. = PPP
Used in delivering a voice telephony service on the Internet. = SIP Trunk
Encapsulates point to point protocol inside Ethernet frames. = PPPoE
Physical point where WAN connection comes into a facility. = Demarcation Point
Use of high speed leased lines managed via software defined network programming to lower costs. = SD-WAN
MATCHING: Wireless Standards & Terminology
Options: ESS 802.15 802.11a SSID 802.11i AdHoc 802.11g 802.11b 802.11n 802.11e
Descriptions:
- Creates signals in the 5GHz range.
- Better for short distances and limited data for personal area networks (PAN)
- A name that is used to represent a wireless network to a set of common hosts.
- Creates 11 Mbps signals at a frequency of 2.4GHz.
- Uses MIMO to make multiple simultaneous connections while extending distance.
- WIFI Protected Access Version 2 (WPA2) Authentication.
- Can delivery 54 Mbps at 2.4GHz frequency.
- Incorperates Quality of Service to improve telephone service over wireless connections.
- Allows multiple wireless access points to work together to extend a wireless network.
- Wireless network in which one device associates itself with another device without the benefit of a wireless access point.
Creates signals in the 5GHz range. = 802.11a
Better for short distances and limited data for personal area networks (PAN) = 802.15
A name that is used to represent a wireless network to a set of common hosts. = SSID
Creates 11 Mbps signals at a frequency of 2.4GHz. = 802.11b
Uses MIMO to make multiple simultaneous connections while extending distance. = 802.11n
WIFI Protected Access Version 2 (WPA2) Authentication. = 802.11i
Can delivery 54 Mbps at 2.4GHz frequency. = 802.11g
Incorperates Quality of Service to improve telephone service over wireless connections. = 802.11e
Allows multiple wireless access points to work together to extend a wireless network. = ESS
Wireless network in which one device associates itself with another device without the benefit of a wireless access point. = AdHoc