Across
- 2. A single network formed by the connection of multiple basic service sets via the AP is known as ________ system
- 3. Nodes in this type of network can only communicate, without involving central access points, with each other if they can reach other physically
- 4. WLANs offer less quality of service due to lower bandwidth, higher delays, and higher error rates caused by ______
- 6. If the frequencies are not extremely high, radio transmissions do not require a _____
- 9. Transmission of this technology can not penetrate through walls or obstacles and is easily shielded
- 14. A lack of coordination between the medium access of the wireless nodes and the access point can result in this
- 15. ____ points serve as a bridge or connection to other wired or wireless networks in an infrastructure based network
- 16. It is easier to eavesdrop in WLANs than fiber optics due to the open ____ radio interface
- 17. Networks are separated using different ______ sequences by FHHSs to permit the coexistence of multiple networks in a particular area
- 19. DSSS method is robust against interference and is insensitive to ________ propagation
Down
- 1. This assessment is needed for the MAC mechanisms controlling the medium access and indicates if the medium is idle
- 5. The _____ is an identifier or an electronic marker which serves as an identification and address for a computer
- 7. CSMA/CA is different from CSMA/CD in the fact that it prevents collisions ____ to their occurrence
- 8. Each time a collision occurs, the contention window _____
- 10. This property of wireless networks allow people to communicate with others in times of disasters like earthquakes
- 11. ____ is a process where a device shifts its connection from one access point to another within the same ESS without losing connection
- 12. The MAC layer performs fundamental tasks such as medium access, fragmentation of user data, and _____
- 13. PCF and DCF both offer this type of service
- 15. An ____ ensures the correct reception of a frame on the MAC layer
- 18. ________ occurs when hackers drive around searching for unsecured wireless networks using a laptop and a portable GPS with the purpose of stealing data
