1/15
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Wireless Mesh Network
Network where multiple wireless nodes connect and communicate with each other to extend coverage
Self-Healing (Mesh Networks)
Ability of a mesh network to automatically reroute connections if one node fails or leaves
Ad Hoc (IBSS)
Wireless connection where devices communicate directly without an access point
802.11
IEEE standard used for Wi-Fi wireless networking
IoT Ad Hoc Setup
Temporary direct wireless connection used to configure a new IoT device
Point-to-Point Wireless
Wireless link connecting two distant locations such as two buildings
Infrastructure Mode
Most common wireless network mode where devices connect through an access point
Wireless Encryption
Security method used to protect wireless data from interception by nearby devices
Message Integrity Check (MIC)
Security feature that verifies received data has not been altered
WEP (Wired Equivalent Privacy)
Early wireless encryption standard later found to be insecure
WPA (Wi-Fi Protected Access)
Security protocol created as a temporary replacement for WEP
WPA Backward Compatibility
WPA was designed to work with older hardware that originally supported WEP
AES (Advanced Encryption Standard)
Encryption algorithm used by WPA2 for strong wireless security
CCMP (Counter Mode CBC-MAC Protocol)
WPA2 protocol that provides encryption and message integrity
WPA3
Wireless security standard introduced in 2018 with stronger protections
GCM (Galois/Counter Mode)
Block cipher mode used with WPA3 encryption