Wireless Networking 3

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

Flashcards covering key terms and concepts related to wireless networks, including hardware, software, encryption, and security protocols.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Wireless Network

A network made up of nodes.

2
New cards

Node

A device that acts as a point in a network, which must have the ability to connect. eg. PC, laptop, smartphone, tablet (hardware)

3
New cards

Network Interface Card

A hardware component that enables devices to communicate over a network (connect) via radio waves. ie bluetooth, wifi (hardware)

4
New cards

Wireless Router (Modem)

A device that acts as a connection point in a wireless network, often referred to as a Wireless Access Point (WAP). (hardware)

5
New cards

Wireless Repeater

A device used to extend the range of a wireless network. (hardware)

6
New cards

Operating System

Software that manages network-related resources, protocols, hardware, and applications. (software)

7
New cards

Drivers

Software that ensures the operating system and applications can communicate with the network. (software)

8
New cards

Security Software/Firewall

Software that prevents unauthorized access to a network or blocks certain connections. (software)

9
New cards

Browser

Software used to find and retrieve content on the World Wide Web. (software)

10
New cards

DHCP (Dynamic Host Configuration Protocol)

A protocol that assigns IP addresses to devices within a network. (software)

11
New cards

WiFi

Short for Wireless Fidelity, a popular technology for home networks connecting multiple devices (PCs, laptops, printers). They typically have a small operating radius.

12
New cards

1G and 2G

Generations of wireless communication that used analog transmission, introduced in 1981 and 1992 respectively. slow

13
New cards

3G

A generation of wireless technology introduced in 2001 that utilized digital data transmission, offering more speed and security.

14
New cards

4G

Introduced in 2006, a wireless network generation that introduced the ability to transmit multimedia. also used digital

15
New cards

LTE

An evolution of 3G technology, often referred to as 3.95G, not as advanced as 4G.

16
New cards

5G

The successor to 4G, designed to provide significantly faster wireless network capabilities. (2019)

17
New cards

WiMAX

A 4G network alternative to wired connections, offering a cost-effective solution for a larger number of clients. Not as popular as LTE, which is more widespread.

18
New cards

Encryption

The process of altering data to make it unintelligible to unauthorized users, requiring keys for encryption and decryption.

19
New cards

Symmetric Encryption

An encryption method where the same key is used for both encrypting and decrypting data.

20
New cards

Public Key Encryption

An encryption method where different keys are used for encryption and decryption.

21
New cards

Authentication

The process of verifying a user's identity.

  • single factor: a password or other credential (user ID)

  • two-factor: additional authetication is achieved via another account or device that the user has

  • three-factor: refers to biometrics (fingerprint, speech pattern)

  • MAC address

22
New cards

MAC Address

The unique identifier (ID) of a device, which can be whitelisted for security.

23
New cards

WEP (Wireless Equivalent Privacy)

The most common data encryption method for wireless networks, introduced in 1999.

24
New cards

WPA/WPA2 (WiFi Protected Access)

Improved security protocols introduced in 2003-2004, WPA2 uses a special block cipher.

25
New cards

WPA3

The latest security protocol for wireless networks, introduced in 2018, offering 192-bit cryptographic strength.

26
New cards

Physical Security

Measures taken to protect physical devices and network infrastructure from potential threats.

Examples: Access controls, surveillance systems, and environmental controls.