CNS Flashcards
(262 cards)
the connection between a wireless and wired network
Access point
Provides dial-in and dial-out connections to the network
Access server
Directly connect two+ clients, no access point Infrastructure Mode – connects endpoints to a central network, not directly to each other, need access point and wireless clients for IM mode wireless
Ad hoc mode
Used to match an IP address to a hardware MAC address. It sends out broadcast to a network node to reply with its hardware address. It stores the address in a dynamic table for the duration of the session, so it requests are only sent the first time
Address Resolution Protocol
IP uses the destination IP to transmit packets thru networks until delivered
Addressing
Asymmetric. More downstream bandwidth up to 18,000 feet over single copper cable pair
ADSL, Asymmetric Digital Subscriber Line
Infinite wave form, continuous signal, varied by amplification
Asynchronous communications, broadband connections, and half‐duplex links can be digital or analog.
Analog signal
Layer 4 network
Application
Provides an interface for which applications and end users can utilize networked resources.
Examples: FTP, Telnet
Application OSI
Second generation: AKA proxy server While transferring data stream to another network, it masks the data origin. operating at Application layer of OSI
Application level firewall
Layer 7: actually 3 through 7, which look at content and can involve authentication and encryption, can be more flexible and secure but also tend to be far slower.
Application Proxy firewall
Uses token passing in a star technology on coax
ARCnet
used in applications that are dedicated, such as embedded systems, when individual processors can be dedicated to specific tasks at design time
AMP: Asymmetric Multiprocessing
Sends bits of data sequentially. Same speed on both sides. Modems and dial-up remote access systems
Asynchronous
very high bandwidth. It uses 53-byte fixed size cells instead of frames like Ethernet. It can allocate bandwidth up on demand making it a solution for Busty applications. Requires fiber optics
ATM: Asynchronous Transfer Mode
A decrease in amplitude as a signal propagates along a transmission medium
Attenuation
logical or physical identifier that a computer uses to distinguish different terminal input/output data streams
Access port
attack on the authentication protocol where the attacker transmits data to the claimant or verifier. Examples include a man-in-the-middle, impersonation, and session hijacking.
Active attack
illegal attaching of an unauthorized device for the purpose of obtaining access to data
Active wiretapping
When attackers send unsolicited messages via Bluetooth
Bluejacking
Targets the data or information on Bluetooth-enabled devices
Bluesnarfing
When wireless workstation is on-lined it sends out a BootP request with its MAC address to get an IP address and the file from which it should boot. Replaced by DHCP
Bootstrap Protocol
a layer 2 device that used to connect two network segments and regulate traffic
Bridge
Forwards data to all other network segments if it’s not on the local segment. Operates at level 2 (thus no IP-addressing)
Bridges