Chapter 1 - Overview of Wireless Standards, Organizations, and Fundamentals Flashcards Preview

NETW-125/PW0-105 > Chapter 1 - Overview of Wireless Standards, Organizations, and Fundamentals > Flashcards

Flashcards in Chapter 1 - Overview of Wireless Standards, Organizations, and Fundamentals Deck (48)
Loading flashcards...
1
Q

In 1970, the University of Hawaii developed the fi rst wireless network, called _____, to wirelessly communicate data between the Hawaiian Islands.

A

ALOHAnet

2
Q

Established by the Communications Act of 1934, the _____ is responsible for regulating interstate
and international communications by radio, television, wire, satellite, and cable.

A

FCC

3
Q

The FCC and the respective controlling agencies in the other countries typically regulate
two categories of wireless communications: _____ spectrum and _____ spectrum.

A

licensed, unlicensed

4
Q

The United Nations has tasked the _____ _____ _____ _____ _____ with global spectrum management.

A

International Telecommunication Union Radiocommunication Sector (ITU-R)

5
Q

What is the North and South American (Region A) arm of the ITU-R?

A

Inter-American Telecommunication Commission (CITEL)

6
Q

What is the Western European (Region B) arm of the ITU-R?

A

European Conference of Postal and Telecommunications Administration (CEPT)

7
Q

What is the Eastern European and Northern Asian (Region C) arm of the ITU-R?

A

Regional Commonwealth in the field of Communications (RCC)

8
Q

What is the African (Region D) arm of the ITU-R?

A

African Telecommunications Union (ATU)

9
Q

What is the Asian and Australasian (Region E) arm of the ITU-R?

A

Asia-Pacific Telecommunity (APT)

10
Q

The _____ _____ _____ _____ _____ _____, commonly known as the IEEE, is
a global professional society with more than 400,000 members. The IEEE’s mission is to
“foster technological innovation and excellence for the benefi t of humanity.” To networking
professionals, that means creating the standards that we use to communicate.

A

Institute of Electrical and Electronics Engineers (IEEE)

11
Q

IEEE projects are subdivided into _____ _____ to develop standards that address specific problems or needs.

A

working groups

12
Q

As the need arises to revise existing standards created by the working groups, _____ _____ are formed.

A

task groups

13
Q

The _____ _____ _____ _____, commonly known as the IETF, is an international
community of people in the networking industry whose goal is to make the Internet work
better. The mission of the IETF, as defi ned by the organization in a document known as
RFC3935, is “to produce high quality, relevant technical and engineering documents that
infl uence the way people design, use, and manage the Internet in such a way as to make the
Internet work better.

A

Internet Engineering Task Force

14
Q

The IETF is one of five main groups that are part of the Internet Society (ISOC). The ISOC groups include the following:

A

Internet Architecture Board (IAB), Internet Corporation for Assigned Names and Numbers (ICANN), Internet Engineering Steering Group (IESG), Internet Research Task Force (IRTF)

15
Q

The _____ _____ _____ _____ provides technical management of the activities of the IETF and the Internet standards process.

A

Internet Engineering Steering Group (IESG)

16
Q

An IETF _____ _____ is created by the IESG and is given a specific charter or specific topic to address.

A

working group

17
Q

The results of a working group are usually the creation of a document known as a _____ _____ _____.

A

Request for Comments (RFC)

18
Q

When an RFC becomes a standard, it still keeps its RFC number, but it is also given an “_____ xxxx” label. The relationship between the _____ numbers and the RFC numbers is not one to one.

A

STD

19
Q

STD numbers identify _____ whereas RFC numbers identify documents.

A

protocols

20
Q

The _____ _____ is a global, nonprofit industry association of more than 350 member
companies devoted to promoting the growth of WLANs. One of the primary tasks of the
_____ _____ is to market the Wi-Fi brand and raise consumer awareness of new 802.11
technologies as they become available.

A

Wi-Fi Alliance

21
Q

In addition to testing the device’s transmission capabilities, each device must support _____ _____ _____ capabilities, security mechanisms that were originally defined in
the IEEE 802.11i amendment.

A

robust security network (RSN)

22
Q

_____ is based on the QoS mechanisms that
were originally defined in the IEEE 802.11e amendment. _____ enables Wi-Fi networks
to prioritize traffic generated by different applications. In a network where _____ is supported by both the access point and the client device, traffic generated by time-sensitive
applications such as voice or video can be prioritized for transmission on the half-duplex RF medium.

A

Wi-Fi Multimedia (WMM)—Multimedia

23
Q

_____ helps conserve battery power
for devices using Wi-Fi radios by managing the time the client device spends in sleep
mode.

A

WMM Power Save (WMM-PS)—Multimedia

24
Q

_____ _____ _____ defines simplified and automatic WPA and WPA2 security configurations for home and small-business users.

A

Wi-Fi Protected Setup

25
Q

_____ _____ enables Wi-Fi devices to connect directly without the use of an access point, making it easier to print, share, synch, and display.

A

Wi-Fi Direct

26
Q

____ _____ _____-_____ _____defines performance metrics for Wi-Fi and cellular radios in a converged handset to help ensure that both technologies perform well in the presence of the other.

A

Converged Wireless Group-RF Profile (CWG-RF)

27
Q

_____ _____ offers enhanced support for voice applications in residential and small-business Wi-Fi networks.

A

Voice Personal

28
Q

The _____ is responsible for the creation of the Open Systems Interconnection (OSI) model, which has
been a standard reference for data communications between computers since the late 1970s.

A

International Organization for Standardization (ISO)

29
Q

The _____ layer does not route traffic or manipulate packets but rather performs
high-speed switching. Redundant solutions are usually designed at the _____ layer to
ensure the fast and reliable delivery of packets.

A

core

30
Q

The _____ layer routes traffic between virtual LANs (VLANs) and subnets. The
_____ layer is akin to the state and county roads that provide medium travel speeds
and distribute the traffic within the city or metropolitan area.

A

distribution

31
Q

The _____ layer of the network is responsible for slower delivery of the traffic directly to
the end user or end node. The _____ layer mimics the local roads and neighborhood streets
that are used to reach your final address. The _____ layer ensures the final delivery of packets
to the end user.

A

access

32
Q

Most wireless networks are used to provide network access to the individual client stations and are designed as _____-_____-_____ networks. This type of implementation is designed and installed on the access layer, providing connectivity to the end user.

A

point-to-multipoint

33
Q

_____ _____ links are typically used to provide connectivity between buildings in the same way that county or state roads provide distribution of traffic between neighborhoods. The purpose of _____ _____ is to connect two separate, wired networks wirelessly.

A

Wireless bridge, wireless bridging

34
Q

Routing data traffic between networks is usually associated with the _____ layer.

A

distribution

35
Q

Wireless bridge links cannot usually meet the speed or distance requirements of the core layer, but they can be very effective at the _____ layer. An 802.11 bridge link is an example of wireless technology being implemented at the _____ layer.

A

distribution

36
Q

Because data ultimately consists of bits, the transmitter needs a way of sending both 0s and 1s to transmit data from one location to another. An AC or DC signal by itself does not perform this task. However, if a signal fluctuates or is altered, even slightly, the signal can be interpreted so that data can be properly sent and received. This modified signal is now capable of distinguishing between 0s and 1s and is referred to as a _____ signal. The method of adjusting the signal to create the carrier signal is called _____.

A

carrier, modulation

37
Q

Three components of a wave that can fluctuate or be modified to create a carrier signal are _____, _____, and _____.

A

amplitude, frequency, phase

38
Q

Waves are made up of two main components: _____ and _____.

A

wavelength, amplitude

39
Q

_____ is the height, force, or power of the wave.

A

Amplitude

40
Q

_____ is the distance between similar points on two back-to-back waves.

A

Wavelength

41
Q

How fast the waves travel, or more specifically, how many waves are generated over a 1-second period of time, is known as _____.

A

frequency

42
Q

_____ is the relationship between two waves with the same frequency. To determine _____, a wavelength is divided into 360 pieces referred to as degrees

A

Phase

43
Q

When data is sent, a signal is transmitted from the transceiver. In order for the data to be transmitted, the signal must be manipulated so that the receiving station has a way of distinguishing 0s and 1s. This method of manipulating a signal so that it can represent multiple pieces of data is known as a _____ _____. A _____ _____ is what changes a signal into a carrier signal.

A

Keying Method

44
Q

Keying methods are also referred to as _____ _____.

A

modulation techniques

45
Q

Keying methods use two different techniques to represent data: _____ _____ and _____ _____.

A

current state, state transition

46
Q

_____-_____ _____ varies the amplitude, or height, of a signal to represent the binary data. _____ is a current state technique, where one level of amplitude can represent a 0 bit and another level of amplitude can represent a 1 bit.

A

Amplitude-shift keying (ASK)

47
Q

_____-_____ _____ varies the frequency of the signal to represent the binary data. _____ is a current state technique, where one frequency can represent a 0 bit and another frequency can represent a 1 bit

A

Frequency-shift keying (FSK)

48
Q

_____-_____ _____ varies the phase of the signal to represent the binary data. _____ is a state transition technique, where the change of phase can represent a 0 bit and the lack of a phase change can represent a 1 bit, or vice versa. This shifting of phase determines the data that is being transmitted. _____ technology is used extensively for radio transmissions as defined by the 802.112007 standard. When more than two phases are used, this is referred to as _____-_____ _____ _____.

A

Phase-shift keying (PSK), PSK, multiple phase-shift keying (MPSK)