Busy. Please wait.

show password
Forgot Password?

Don't have an account?  Sign up 

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know
remaining cards
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Ess. 220-701

Ch. 17 Learning Wireless

wireless access point (WAP) centrally connects wireless nodes in the same way that a hub connects wired Ethernet.
carrier sense multiple access/collision avoidance (CSMA/CA) Networking scheme used by wireless devices to transmit data while avoiding data collision, which wireless nodes have difficulty detecting
Ad hoc mode peer-to-peer, each wireless node in direct contact with every other node in a decentralized free-for-all
infrastructure mode use one or more WAPs to connect the wireless network nodes to a wired network segment
service set identifier (SSID) network name
MAC address filtering a method that enables you to limit access to your wireless network based on the physical, hard-wired address of the units wireless NIC
Wired Equivalent Privacy (WEP) attempt to secure transmitted data. Uses 40 & 104 bit encryption
Wi-Fi Protected Access (WPA) used to address the weakness of WEP and act a an upgrade to WEP.
Wi-Fi Protected Access 2 (WPA2) lockdown wireless networks. Uses Advanced Encryption Standards (AES) among other improvement, to provide a secure wireless enviroment.
IEEE 802.11 wireless ethernet, Wi-Fi
802.11a 5 GHz freq.,up to 54 Mbps, 150 ft. range
802.11b 11 Mbps, 300 ft. range, 2.4 GHz freq.
802.11 g 54 Mbps, 300 ft. range, 2.4 GHz freq., backwards compatible
802.11n 100+ Mbps, 300+ft range, 2.4 and 5 GHz freq. backwards compatible
multiple in/multiple out (MIMO) enable a device to make simultaneous connections
Infrared Data Association (IrDA) communication through infrared devices w, speeds up to 4 Mbps
Bluetooth wireless tecnology designed to create small wireless networks preconfigured to do very specific jobs, but not replace full-function networks or Wi-Fi.
personal area networks (PAN) small wireless network created w/ bluetooth technology and intended to link PCs and other peripheral devices.
cellular wireless network enables you to connect to the Internet through a network-aware PDA
Created by: Jefferywrght