Wireless Technologies (Lesson 3) Flashcards

1
Q

provides the ability to communicate between two or more entities over distances without the use of wires or cables of any sort.

A

Wireless Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Discovered the electromagnetics waves.

A

Heinrich Hertz (1857 - 1894)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

established the very first commercial RF communications, the wireless telegraph, in the late 1890s.

A

Guglielmo Marconi (1874-1937)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

developed the morse code

A

Samuel F. B. Morse (1791-1872)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Wireless Technologies (6)

A
  1. Satellite Communication
  2. Infrared Communication
  3. Broadcast Radio
  4. Wi-Fi
  5. Microwave Communication
  6. Bluetooth Technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

intelecommunications, the use of artificial satellites to provide communication links between various points on Earth.

A

Satellite Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Approximately ____ artificial satellites orbiting Earth.
(how many daw na satellites)

A

2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Components of Satellite Communication (2):

A
  • Space Segment
  • Ground Segment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

means the satellites and related facilities and equipment used to support the operation of satellites owned or leased by INTELSAT,Inmarsat, or a separated entity or successor entity.

A

Space Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

consists of fixed or mobile transmission, reception and ancillary equipment and the space segment, which mainly is the satellite itself.

A

Ground Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

communication information in a device or systems through infrared radiation
Used for TV remote control, security control a communication which stays within a short range.

A

Infrared Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is sound communication by radio waves, usually through the transmission of music, news, and other types of programs from single broadcast stations to multitudes of individual listeners equipped with radio receivers.

A

Broadcast Radio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wi-Fi was invented by ____? in the Netherlands in 1991.

A

NCR Corporation/ AT & T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

By using this technology we can exchange information between two or more devices.

A

Wi-Fi (Wireless Fidelity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of WiFi Technology

A
  1. Wi-Fi- 802. 11a
  2. Wi-Fi-802. 11b
  3. Wi-Fi-802. 11g
  4. Wi-Fi-802. 11n
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is one of a series of wireless technology. That defines the format and structure of the radio signals sent out by WI-FI networking routers and antennas.

A

Wi-Fi-802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

support bandwidth 11mbps.
The signal in the unregulated frequency spectrum around 2.4 GHz.
This is a low frequency compared with Wi-Fi-802.11a means it is working a reasonable distance.

A

Wi-Fi-802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In 2002 and 2003, This Technology supporting newer slandered products.
It is the best technology of 802.11a and 802.11b.

A

Wi-Fi-802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is the newest WIFI technology.
It was designed to improve on 802.11g. It supports 100 Mbps bandwidth and increased signal intensity.

A

Wi-Fi-802.11n

20
Q

Elements of Wi-Fi

A
  • Wireless Access Point
  • WiFi Cards
  • Safeguards
21
Q

is used to allow wireless devices for connecting to the wireless network.
Uses the bandwidth to stretch so that several devices can travel on the network from a far distance.

A

Wireless Access Point

22
Q

These cards allow the wireless signal as well as the information of the relay that can be internal or external.
Also knows as adapters.

A

Wi-Fi Cards

23
Q

Limitations of WiFi (4):

A
  • Range is limited
  • Interface from other devices like microwave ovens, telephones, etc.
  • Power consumption is high
  • Risks of data security
24
Q

WiFi Technology Advantages (6):

A
  • A wireless laptop can be moved from one place to another place.
  • Wi-Fi network communication devices without wire can reduce the cost of wires.
  • Wi-Fi setup and configuration is easy than the cabling process.
  • It is completely safe and it will not interfere with any network.
  • We can also connect internet via hot spots.
  • We can connect internet wirelessly.
25
Q

WiFi Technology Disadvantages (4):

A
  • Wi-Fi generates radiations which can harm the human health.
  • We must disconnect the Wi-Fi connection whenever we are not using the server.
  • There are some limits to transfer the data, we cant able to transfer the data for long-distance.
  • Wi-Fi implementation is very expensive when compared to the wired connection.
26
Q

Applications of WiFi Technology (7):

A
  • Mobile Application
  • Business Application
  • Home Application
  • Computerized Application
  • Automotive Segment
  • Browsing Internet
  • Video Conference
27
Q

an electromagnetic wave with a wavelengthin the range 0.001–0.3 m, shorter than that of a normal radio wave but longer than those of infrared radiation.
Are used in radar, in communications.

A

Microwave Communication

28
Q

a standard for the short range wireless interconnection of mobile phones, computers, and other electronic devices.

A

Bluetooth Technology

29
Q

as the name suggests, is basically a network topology that allows all wireless devices to communicate with each other through a common medium i.e. AP .

A

Basic Service Set (BSS)

30
Q

Basic Service Set (BSS) Types (3):

A
  • Infrastructure
  • Independent
  • MESH
31
Q

is the protection of devices and networks connected in a wireless environment.

A

Wi-Fi Security

32
Q

Ways to Protect a Wi-Fi network (4):

A
  • Media Access Control (MAC)
  • Encryption
  • Virtual Private Network (VPN)
  • Security Software
33
Q

which restrict access to a Wi-Fi network.
Is a unique code or number used to identify individual devices on a network.

A

Media Access Control (MAC)

34
Q

encodes data and then decodes it only for authorized recipients.

A

Encryption

35
Q

They allow users to create secure, identity-protected tunnels between unprotected Wi-Fi networks and the internet.
Also can conceal a user’s IP address by using a virtual IP address.

A

Virtual Private Network (VPN)

35
Q

software that also can provide Wi-Fi security, such as antivirus software.

A

Security Software

36
Q

Types of Wireless Security Protocols (4):

A
  • Wired Equivalent Privacy(WEP)
  • Wi-Fi Protected Access (WPA)
  • Wi-Fi Protected Access 2 (WPA2)
  • Wi-Fi Protected Access 3 (WPA3)
37
Q

The first wireless security protocol. It was the standard method of providing wireless network security from the late 1990s until 2004.

A

Wired Equivalent Privacy (WEP)

38
Q

It delivers stronger encryption than WEP by using a security protocol known as Temporal Key Integrity Protocol(TKIP).

A

Wi-Fi Protected Access (WPA)

39
Q

A new generation of WPA. is designed to deliver simpler configuration and even stronger encryption and security than any of its predecessors.

A

Wi-Fi Protected Access 3 (WPA3)

39
Q

a later version of WPA, was developed in 2004. It’s easier to configure and provides even greater network security than WPA by using a security protocol known as the Advanced Encryption Standard (AES).

A

Wi-Fi Protected Access 2 (WPA2)

40
Q

Types of Wi-Fi network Security Devices (4):

A
  • Active Device
  • Passive Device
  • Preventive Device
  • Unified Threat Management (UTM)
41
Q

hardware configured to block surplus network traffic. Examples of these are firewalls, antivirus scanners, and content-filtering devices.

A

Active Device

42
Q

detect and report on unwanted network traffic. They also have an extra layer of security because they can communicate with Wi-Fi routers only when the routers are seeking them.
That extra layer makes man-in-the-middle (MITM) attacks more difficult.

A

Passive Device

43
Q

can scan networks to identify potential security issues, such as a wireless intrusion prevention system (WIPS).
Can be integrated into networks or overlaid using standalone sensors.

A

Preventive Device

44
Q

incorporate vital elements of network security: firewalls, content filtering, VPN, antivirus detection, and others.
Offers a simplified way to integrate multiple security functions.

A

Unified Threat Management (UTM)