Networking & Data Communications Final Study set

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/196

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:39 PM on 5/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

197 Terms

1
New cards

Open network

A wireless network with no encryption or authentication; any nearby device can join and eavesdrop

2
New cards

Man-in-the-middle attack

An attack where an adversary silently positions themselves between two communicating parties, relaying and possibly altering messages while both sides believe they talk directly

3
New cards

Drive-by hacker

An attacker outside a building who connects wirelessly to an internal AP to reach internal systems, bypassing the border firewall

4
New cards

802.11i

The IEEE security standard for WiFi that provides strong link-layer cryptographic protections; marketed as WPA2 by the WiFi Alliance

5
New cards

Link security

Security that protects traffic on a single hop between two directly connected devices (e.g., client ↔ AP)

6
New cards

End-to-end security

Security that protects traffic all the way from the original sender to the final receiver across multiple hops

7
New cards

WEP (Wired Equivalent Privacy)

The original 802.11 security mechanism; now considered fundamentally broken and unsafe

8
New cards

WPA (WiFi Protected Access)

An interim WiFi Alliance standard based on an early 802.11i draft; better than WEP but weaker than full 802.11i

9
New cards

WPA2

The WiFi Alliance name for the full 802.11i standard; currently the correct choice for WiFi security

10
New cards

Initial authentication

The one-time procedure at the start of a session where a client proves its identity and negotiates keys with the AP

11
New cards

Ongoing protection

The steady-state phase where each frame is protected using the negotiated encryption and integrity keys

12
New cards

PSK (Pre-Shared Key) mode

802.11i mode where all devices on an AP share a single secret key for initial authentication; intended for small sites; also called 'Personal Mode'

13
New cards

802.1X mode

802.11i mode that uses a central authentication server and per-user credentials; intended for enterprises; also called 'Enterprise Mode'

14
New cards

Pre-Shared Key (PSK)

A long secret derived from a passphrase that all devices on a given AP know and use only to authenticate initially

15
New cards

Pairwise session key

A unique, temporary key used between one client and the AP for encryption after authentication

16
New cards

Passphrase

A human-memorable string (at least 20 characters for strong security) that is converted into the PSK

17
New cards

Operational security

The human and procedural aspects of keeping keys, passwords, and configurations safe

18
New cards

Supplicant

The wireless client that wishes to connect and must prove its identity (in 802.1X)

19
New cards

Authenticator

The AP that mediates between the supplicant and the authentication server during 802.1X

20
New cards

Authentication server

The central server that validates credentials and decides whether to authorize the supplicant

21
New cards

Credentials

Evidence used to prove identity (e.g., username/password, certificates, biometrics)

22
New cards

Rogue access point

An unauthorized AP deployed inside an organization by an employee without central approval

23
New cards

Weakest link problem

A situation where overall security is limited by the least secure component in the system

24
New cards

Evil twin access point

A malicious AP (often a laptop) configured to impersonate a legitimate AP and lure clients into connecting

25
New cards

VPN (Virtual Private Network)

An encrypted logical tunnel across an untrusted network that provides confidentiality between endpoints

26
New cards

Site survey

A measurement exercise to assess signal strength, interference, and coverage to refine AP placement

27
New cards

Co-channel interference

Interference that occurs when multiple APs use the same channel and their coverage areas overlap

28
New cards

SNMP (Simple Network Management Protocol)

A protocol used to monitor and manage network devices from a central console

29
New cards

SNMP Get

An SNMP operation where the manager reads status information from a device

30
New cards

SNMP Set

An SNMP operation where the manager writes configuration changes to a device

31
New cards

SNMP Trap

An unsolicited alert a device sends to the manager when certain events occur

32
New cards

Decibel (dB)

A logarithmic unit expressing the ratio of two power levels

33
New cards

Attenuation

A negative change in power — signal loss

34
New cards

Amplification

A positive change in power — signal gain

35
New cards

IoT (Internet of Things)

An ecosystem of networked physical objects that communicate data and possibly act on it, often autonomously

36
New cards

Slow and close

IoT design principle: short distance + low speed = low energy consumption; suitable for coin-battery devices

37
New cards

Coin battery

A small, flat battery (e.g., CR2032) used in IoT devices with limited energy capacity

38
New cards

Bluetooth

A short-range radio technology for creating personal area networks (PANs) that replace cables between nearby devices

39
New cards

Personal Area Network (PAN)

A small set of devices (e.g., around a person or desk) connected wirelessly at short range

40
New cards

Bluetooth Low Energy (BLE/LE)

A Bluetooth variant designed for ultra-low power consumption, enabling years of operation on coin batteries; data rates 125-500 kbps

41
New cards

Dual-mode device

A Bluetooth device that supports both Classic Bluetooth and BLE (e.g., smartphones)

42
New cards

Single-mode device

A device that supports only BLE; typical for small IoT sensors

43
New cards

Master

In Bluetooth, the device that controls timing and communication in a connection

44
New cards

Slave

The Bluetooth device that follows the master's timing and instructions

45
New cards

Piconet

A Bluetooth network consisting of one master and up to seven active slaves

46
New cards

Bluetooth profile

An application-level specification defining how devices of a given type interoperate (e.g., printing, input devices)

47
New cards

Advertising message

A small, periodic BLE transmission that announces a device's presence and capabilities

48
New cards

Beacon

A specialized BLE advertising message that includes useful application information (e.g., coupons, indoor navigation)

49
New cards

NFC (Near Field Communication)

A very short-range wireless technology (a few centimeters) that uses the near field around an antenna to exchange small amounts of data; operates at 13.56 MHz

50
New cards

Passive RFID

An RFID tag that has no internal power source; harvests energy from the reader's field to communicate

51
New cards

WiFi Direct

An 802.11 mode that allows direct device-to-device communication without an AP; historically called ad hoc mode

52
New cards

Ad hoc mode

Older term for AP-less WiFi where stations communicate directly with each other

53
New cards

Zigbee

A low-power, low-data-rate mesh networking standard for IoT devices; operates in 2.4 GHz and 800-900 MHz ISM bands

54
New cards

Z-Wave

A competing IoT mesh protocol operating only in 800-900 MHz ISM bands; uses 128-bit AES encryption

55
New cards

Ad hoc mesh network

A self-organizing network where devices route for one another without centralized wiring or fixed topology

56
New cards

ISM band

Industrial, Scientific, and Medical radio band; license-free spectrum used by WiFi, Zigbee, Z-Wave, etc.

57
New cards

BYOD (Bring Your Own Device)

A corporate practice where employees use personal devices (phones, tablets, laptops) for work

58
New cards

Eavesdropping

Passively listening to communications to extract information

59
New cards

Impersonation

Pretending to be another device/user to gain unauthorized access

60
New cards

Firmware

Low-level software controlling hardware devices; often needs updates for security fixes

61
New cards

TCP/IP

The dominant protocol suite for internetworking; governs work at the Internet (Layer 3) and Transport (Layer 4) layers

62
New cards

IETF (Internet Engineering Task Force)

The standards body that creates TCP/IP standards

63
New cards

Routing

The process of routers forwarding incoming packets closer to their destination hosts

64
New cards

Interface

A router's connector/port and its electronics (routers use 'interfaces'; switches use 'ports')

65
New cards

Hierarchical IPv4 address

A 32-bit address consisting of three parts — network, subnet, and host — that locate a host in progressively smaller divisions of the Internet

66
New cards

Network part

The first group of bits in an IPv4 address; identifies the host's recognized organization on the Internet

67
New cards

Subnet part

The middle bits in an IPv4 address; identifies a particular subnet within the network

68
New cards

Host part

The remaining bits in an IPv4 address; identifies a specific host within a subnet

69
New cards

Subnet

A smaller organizational unit within a network; used for management, security, and traffic control

70
New cards

Border router

A router whose main job is connecting different networks belonging to different organizations

71
New cards

Internal router

A router that only connects different subnets within a single network (same organization)

72
New cards

Mask (IPv4)

A 32-bit string used to extract the network or subnet portion of an address; always a run of 1s followed by 0s

73
New cards

Network mask

A mask with 1s in the network part positions only; 0s in subnet and host positions

74
New cards

Subnet mask

A mask with 1s in both network AND subnet part positions; 0s only in the host part

75
New cards

Dotted decimal notation

Represents masks (or addresses) using four decimal numbers 0-255 separated by dots

76
New cards

Prefix notation

Shortcut for a mask using /N where N = number of initial 1s (e.g., /24 = 255.255.255.0)

77
New cards

Masking operation

Applying a mask to an IPv4 address to extract network or subnet info; where mask=1, keep bits; where mask=0, result=0

78
New cards

Routing table

A table each router uses to make routing decisions; rows represent routes, columns contain route info

79
New cards

Longest match rule

Best-match row selection rule: pick the row with the longest prefix (most specific route)

80
New cards

Metric

A value describing the desirability of a route (e.g., cost, speed, reliability) used as a tiebreaker

81
New cards

Default row

A routing table row with destination 0.0.0.0 and mask /0; matches every packet but always loses to any more specific route

82
New cards

Next-hop router

The router that should receive a packet next; it then decides what to do with it

83
New cards

Decision caching

A router optimization where it remembers and reuses routing decisions for repeat destinations (not part of the IP standard)

84
New cards

TTL (Time to Live)

An 8-bit IPv4 header field; each router decrements it by 1; packet is discarded when it reaches 0, preventing infinite loops

85
New cards

Protocol field

An IPv4 header field that identifies the content of the data field: 6=TCP, 17=UDP, 1=ICMP

86
New cards

ICMP (Internet Control Message Protocol)

TCP/IP's tool for carrying Internet layer supervisory and error messages

87
New cards

QoS (Quality of Service)

Mechanisms to prioritize certain traffic (e.g., low-latency for voice/video)

88
New cards

Differentiated Services (Diffserv)

An IPv4/IPv6 field used to specify traffic priority or service type

89
New cards

IPv6

IP version 6; uses 128-bit addresses to solve IPv4 address exhaustion

90
New cards

Hop Limit

IPv6's equivalent of IPv4's TTL field; decremented by each router, packet discarded at 0

91
New cards

Extension headers

IPv6's replacement for IPv4 Options; well-organized headers daisy-chained after the main header, most only processed by the destination

92
New cards

Next Header field

An IPv6 field that specifies what comes next (another extension header or upper-layer protocol)

93
New cards

Canonical text notation

The standardized rules (RFC 5952) for writing IPv6 addresses in simplified human-readable form

94
New cards

:: (double colon)

IPv6 shorthand for one group of consecutive all-zero fields; can only be used once in an address

95
New cards

TCP (Transmission Control Protocol)

A transport layer protocol that provides reliable, ordered, connection-oriented delivery on top of IP

96
New cards

Sequence number

A TCP field (32 bits) that gives a segment's position in the stream; used to reassemble messages in order

97
New cards

Acknowledgment number

A TCP field (32 bits) that indicates which segment is being acknowledged

98
New cards

ACK bit

A TCP flag; when set, the segment acknowledges a received segment

99
New cards

SYN bit

A TCP flag; when set, the segment requests a connection opening

100
New cards

FIN bit

A TCP flag; when set, the segment requests a normal connection closing