Chapter 9: Wireless Networking Terminology

Edit Answers
YJFKPIXF.ANBDJAMMINGOYXFFBL2X 802.1XAUTHENTICATIONGRKR8TUET .TZCM0BLUETOOTHINTERFERENCEDE D.RLA8QRSTQWZSEANLLNWFOQLDNZS AITKIPH2RGXKAJNJ.ZLQZR2UGEOVE TK1QLCH2AH0HDIRECTIONALEUFIWC AGHUBANDSPOKEU8YOARKNCRNPXTII E2IOCS8KAOK1F.2OCYWEATOCA0ARV MNOITARUTASHTDIWDNAB2IAYCSRER ATNIOPSSECCAEUGOR.KRZOMMKPULE NSSIDRTVXQEAWCR1.PI2ENIIEETES ASERVICESETIDENTIFIERANSTCASD TTLTM8N1.FX8FHIEJOJJDVGMSTSSE IOFABSORPTIONLAQ111HLQRANREBD OW8UDAJJ8OAK.RSGV0OHJW8TIUCRN N0FWPAVMPXI0GT2K0CKQRLJCFMIIE M2LAOMNIDIRECTIONALJUE1HFAVDT IHVGF1PJ8RWMSGFMSGCOYJSSINEGX N0MACCESSPOINT0ZS1K1FHNBNADEE ZNOITACITNEHTUAYEKDERAHSGL.SU MVZKCATTANOITACITNEHTUAEDYFRB ZM2D0QMETSYSNOITUBIRTSIDUZWQU BASICSERVICESETUMI0YEVRUSETIS 1STNIOPSSECCATNEDNEPEDNIER1BS YTESECIVRESCISABTNEDNEPEDNI.S 2LA2ZDNW8QZ.OYCNEUQERFOIDAR2. P001LNOITACITNEHTUANEPOS1HEVY ZYBASICSERVICESETIDENTIFIEREY NAIQRFNVIWKAUXNOITATSEWXEAQFT
1.
An authentication method that requires clients to provide a MAC address to connect to the wireless network.
2.
An authentication method that configures clients and access points with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.
3.
An authentication method that uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients.
4.
Any unauthorized access point added to a network.
5.
The electromagnetic field generated by a network cable or network device (such as wireless router) that can be manipulated in order to eavesdrop on conversations or steal data.
6.
The interception and decoding of wireless transmissions. It is also known as eavesdropping.
7.
A signal that corrupts or destroys the wireless signal sent by APs and other wireless devices. Interference affects the availability of a network because normal communications are made impossible.
8.
Signal interference created intentionally by an attacker to make a wireless network impossible to use.
9.
An attack that spoofs the MAC address and then disconnects the device from the wireless network. Attackers can use a deauthentication attack to stage evil twin or on-path attacks.
10.
The standard for short-range wireless interconnection. It is designed to allow devices to communicate within a personal area network (PAN) of close proximity. PAN devices include cell phones, personal digital assistants (PDAs), printers, mouses, and keybo
11.
An antenna that creates a narrow, focused signal, which increases the signal strength and transmission distance. It provides a stronger point-to-point connection and is better equipped to handle obstacles.
12.
An antenna that disperses the radio frequency wave in an equal 360-degree pattern. This provides access to many clients in a radius.
13.
The point at which all the available bandwidth on a connection has achieved maximum capacity and cannot pass any more data through the connection.
14.
The point at which bandwidth utilization for the device is close to 100%.
15.
Devices on the network are not broadcasting on the same frequency.
16.
A signal passes through objects and the signal loses power.
17.
Radio waves pass through objects of different densities, causing the signal to bend or change speeds.
18.
Access points that separate wireless networks by using independent configuration. Each AP stands alone.
19.
A wireless topology that connects to all APs through wired links. The individual APs contain very little embedded intelligence and are sometimes referred to as lightweight access points (LWAPs).
20.
These are used to connect wired or wireless networks.
21.
The name of the wireless network. Client devices see a list of available networks when trying to connect to a wireless network.
22.
The ability of devices to connect from one access point to another while maintaining connection to the same network. For example, a laptop moved from one building to another stays connected to the same network.
23.
The rate of oscillation of electromagnetic radio waves in the range of 3 kHz to 300 GHz, as well as the alternating currents carrying the radio signals. This is the frequency band that is used for communications transmission and broadcasting.
24.
A device that displays signal amplitude (strength) as it varies by signal frequency. The frequency appears on the horizontal axis; the amplitude is displayed on the vertical axis.
25.
A process of planning and designing a wireless network that includes network capacity, coverage, data rates, and quality of service.
26.
A security certification program that was developed by the Wi-Fi Alliance to secure wireless signals between devices.
27.
Encryption that implements a key-mixing feature that only the receiver can unlock.
28.
Encryption that uses 128-, 192-, or 256-bit key lengths to encrypt and decrypt block-sized messages over a wireless transmission.
29.
A station is a wireless NIC in an end device such as a laptop or wireless PDA. STA often refers to the device itself, not just the NIC. A station is often abbreviated as STA.
30.
An AP is the device that coordinates all communications between wireless devices, as well as the connection to the wired network. An AP is sometimes called a wireless AP (WAP).
31.
A BSS is the smallest unit of a wireless network. All devices in the BSS can communicate with each other. A BSS is also called a cell.
32.
An IBSS is a set of stations (STAs) configured in ad hoc mode.
33.
An ESS consists of multiple BSSs with a distribution system (DS). In an ESS, BSSs that have an overlapping transmission range use different frequencies.
34.
The LAN that connects multiple APs (and BSSs) together. The DS allows wireless clients to communicate with the wired network and with wireless clients in other cells.
35.
A case-sensitive name that specifies a service set (network) to which a wireless device can join or connect to.
36.
The BSSID is a 48-bit value that identifies an AP in an infrastructure network or an STA in an ad hoc network. The BSSID allows devices to find a specific AP within an ESS that has multiple access points, and STAs use it to keep track of APs as they roam
37.
A wireless network that works in peer-to-peer mode without an access point. The wireless NICs in each host communicate directly with one another.