WLAN

12345678910111213141516171819
Across
  1. 2. A single network formed by the connection of multiple basic service sets via the AP is known as ________ system
  2. 3. Nodes in this type of network can only communicate, without involving central access points, with each other if they can reach other physically
  3. 4. WLANs offer less quality of service due to lower bandwidth, higher delays, and higher error rates caused by ______
  4. 6. If the frequencies are not extremely high, radio transmissions do not require a _____
  5. 9. Transmission of this technology can not penetrate through walls or obstacles and is easily shielded
  6. 14. A lack of coordination between the medium access of the wireless nodes and the access point can result in this
  7. 15. ____ points serve as a bridge or connection to other wired or wireless networks in an infrastructure based network
  8. 16. It is easier to eavesdrop in WLANs than fiber optics due to the open ____ radio interface
  9. 17. Networks are separated using different ______ sequences by FHHSs to permit the coexistence of multiple networks in a particular area
  10. 19. DSSS method is robust against interference and is insensitive to ________ propagation
Down
  1. 1. This assessment is needed for the MAC mechanisms controlling the medium access and indicates if the medium is idle
  2. 5. The _____ is an identifier or an electronic marker which serves as an identification and address for a computer
  3. 7. CSMA/CA is different from CSMA/CD in the fact that it prevents collisions ____ to their occurrence
  4. 8. Each time a collision occurs, the contention window _____
  5. 10. This property of wireless networks allow people to communicate with others in times of disasters like earthquakes
  6. 11. ____ is a process where a device shifts its connection from one access point to another within the same ESS without losing connection
  7. 12. The MAC layer performs fundamental tasks such as medium access, fragmentation of user data, and _____
  8. 13. PCF and DCF both offer this type of service
  9. 15. An ____ ensures the correct reception of a frame on the MAC layer
  10. 18. ________ occurs when hackers drive around searching for unsecured wireless networks using a laptop and a portable GPS with the purpose of stealing data