Wireless Technologies (Lesson 3) Flashcards

1
Q

provides the ability to communicate between two or more entities over distances without the use of wires or cables of any sort.

A

Wireless Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Discovered the electromagnetics waves.

A

Heinrich Hertz (1857 - 1894)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

established the very first commercial RF communications, the wireless telegraph, in the late 1890s.

A

Guglielmo Marconi (1874-1937)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

developed the morse code

A

Samuel F. B. Morse (1791-1872)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Wireless Technologies (6)

A
  1. Satellite Communication
  2. Infrared Communication
  3. Broadcast Radio
  4. Wi-Fi
  5. Microwave Communication
  6. Bluetooth Technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

intelecommunications, the use of artificial satellites to provide communication links between various points on Earth.

A

Satellite Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Approximately ____ artificial satellites orbiting Earth.
(how many daw na satellites)

A

2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Components of Satellite Communication (2):

A
  • Space Segment
  • Ground Segment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

means the satellites and related facilities and equipment used to support the operation of satellites owned or leased by INTELSAT,Inmarsat, or a separated entity or successor entity.

A

Space Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

consists of fixed or mobile transmission, reception and ancillary equipment and the space segment, which mainly is the satellite itself.

A

Ground Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

communication information in a device or systems through infrared radiation
Used for TV remote control, security control a communication which stays within a short range.

A

Infrared Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is sound communication by radio waves, usually through the transmission of music, news, and other types of programs from single broadcast stations to multitudes of individual listeners equipped with radio receivers.

A

Broadcast Radio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wi-Fi was invented by ____? in the Netherlands in 1991.

A

NCR Corporation/ AT & T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

By using this technology we can exchange information between two or more devices.

A

Wi-Fi (Wireless Fidelity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of WiFi Technology

A
  1. Wi-Fi- 802. 11a
  2. Wi-Fi-802. 11b
  3. Wi-Fi-802. 11g
  4. Wi-Fi-802. 11n
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is one of a series of wireless technology. That defines the format and structure of the radio signals sent out by WI-FI networking routers and antennas.

A

Wi-Fi-802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

support bandwidth 11mbps.
The signal in the unregulated frequency spectrum around 2.4 GHz.
This is a low frequency compared with Wi-Fi-802.11a means it is working a reasonable distance.

A

Wi-Fi-802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In 2002 and 2003, This Technology supporting newer slandered products.
It is the best technology of 802.11a and 802.11b.

A

Wi-Fi-802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is the newest WIFI technology.
It was designed to improve on 802.11g. It supports 100 Mbps bandwidth and increased signal intensity.

A

Wi-Fi-802.11n

20
Q

Elements of Wi-Fi

A
  • Wireless Access Point
  • WiFi Cards
  • Safeguards
21
Q

is used to allow wireless devices for connecting to the wireless network.
Uses the bandwidth to stretch so that several devices can travel on the network from a far distance.

A

Wireless Access Point

22
Q

These cards allow the wireless signal as well as the information of the relay that can be internal or external.
Also knows as adapters.

A

Wi-Fi Cards

23
Q

Limitations of WiFi (4):

A
  • Range is limited
  • Interface from other devices like microwave ovens, telephones, etc.
  • Power consumption is high
  • Risks of data security
24
Q

WiFi Technology Advantages (6):

A
  • A wireless laptop can be moved from one place to another place.
  • Wi-Fi network communication devices without wire can reduce the cost of wires.
  • Wi-Fi setup and configuration is easy than the cabling process.
  • It is completely safe and it will not interfere with any network.
  • We can also connect internet via hot spots.
  • We can connect internet wirelessly.
25
WiFi Technology Disadvantages (**4**):
* Wi-Fi generates radiations which can harm the human health. * We must disconnect the Wi-Fi connection whenever we are not using the server. * There are some limits to transfer the data, we cant able to transfer the data for long-distance. * Wi-Fi implementation is very expensive when compared to the wired connection.
26
Applications of WiFi Technology (**7**):
* Mobile Application * Business Application * Home Application * Computerized Application * Automotive Segment * Browsing Internet * Video Conference
27
an electromagnetic wave with a wavelength in the range 0.001–0.3 m, shorter than that of a normal radio wave but longer than those of infrared radiation. Are used in radar, in communications.
**Microwave Communication**
28
a standard for the short range wireless interconnection of mobile phones, computers, and other electronic devices.
**Bluetooth Technology**
29
as the name suggests, is basically a network topology that allows all wireless devices to communicate with each other through a common medium i.e. AP .
Basic Service Set (**BSS**)
30
Basic Service Set (**BSS**) Types (**3**):
* Infrastructure * Independent * MESH
31
is the protection of devices and networks connected in a wireless environment.
**Wi-Fi Security**
32
Ways to Protect a Wi-Fi network (**4**):
* Media Access Control (**MAC**) * Encryption * Virtual Private Network (**VPN**) * Security Software
33
which restrict access to a Wi-Fi network. Is a unique code or number used to identify individual devices on a network.
Media Access Control (**MAC**)
34
encodes data and then decodes it only for authorized recipients.
**Encryption**
35
They allow users to create secure, identity-protected tunnels between unprotected Wi-Fi networks and the internet. Also can conceal a user's IP address by using a virtual IP address.
Virtual Private Network (**VPN**)
35
software that also can provide Wi-Fi security, such as antivirus software.
**Security Software**
36
Types of Wireless Security Protocols (**4**):
* Wired Equivalent Privacy(**WEP**) * Wi-Fi Protected Access (**WPA**) * Wi-Fi Protected Access 2 (**WPA2**) * Wi-Fi Protected Access 3 (**WPA3**)
37
The first wireless security protocol. It was the standard method of providing wireless network security from the late 1990s until 2004.
Wired Equivalent Privacy (**WEP**)
38
It delivers stronger encryption than WEP by using a security protocol known as **Temporal Key Integrity Protocol**(TKIP).
Wi-Fi Protected Access (**WPA**)
39
A new generation of WPA. is designed to deliver simpler configuration and even stronger encryption and security than any of its predecessors.
Wi-Fi Protected Access 3 (**WPA3**)
39
a later version of WPA, was developed in 2004. It's easier to configure and provides even greater network security than WPA by using a security protocol known as the Advanced Encryption Standard (**AES**).
Wi-Fi Protected Access 2 (**WPA2**)
40
Types of Wi-Fi network Security Devices (**4**):
* Active Device * Passive Device * Preventive Device * Unified Threat Management (**UTM**)
41
hardware configured to block surplus network traffic. Examples of these are firewalls, antivirus scanners, and content-filtering devices.
**Active Device**
42
detect and report on unwanted network traffic. They also have an **extra layer** of security because they can communicate with Wi-Fi routers only when the routers are seeking them. That **extra layer makes man-in-the-middle** (MITM) **attacks more difficult**.
**Passive Device**
43
can scan networks to identify potential security issues, **such as a wireless intrusion prevention system** (**WIPS**). Can be integrated into networks or overlaid **using standalone sensors**.
**Preventive Device**
44
incorporate vital elements of network security: firewalls, content filtering, VPN, antivirus detection, and others. Offers a **simplified way to integrate multiple security functions**.
Unified Threat Management (**UTM**)