• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/51

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

51 Cards in this Set

  • Front
  • Back
What are the three main types of RFID tags?
Passive
Semi-passive
Active
A type of RFID tag that does not contain a battery; power is supplied by the reader.
Passive
List the major disadvantages of a passive RFID tags.
- Tag can be read only at a very short distances.
- Some sensors may require more power than available
- The tag remains readable for a very long time
List the advantages of a passive RFID tag.
- Tag functions without a battery
- Tagis typically much less expensive to manufacture
- Tag is much smaller
What is an RFID transponder that reflects RF energy back to the reader similar to passive but also has a power source onboard to run chip circuitry and potentially, an onboard sensor.
Semi-passive
__________ management frames enable stations to establish and maintain communications?
802.11

pg.35
802.11 ____________ is a process whereby the access point either accepts or rejects the identity of the client.
authentication

pg.35
With _____________ authentication, the client sends only one authentication frame and access point responds with an authentication frame as a response indicating acceptance or rejection.
open system (the default)

pg.35
With the optional _____________ authentication, the client sends an initial authentication frame and the access point responds with an authentication frame containing challenging text.
shared key

pg.35
How many 802.11 management frames are described in the text and name them.
6 Management frames
1) Authentication/Deauthentication Frame
2) Association Request/Response Frame
3) Reassociation Request/Response Frame
4) Disassociation Frame
5) Beacon Frame
6) Probe Request/Probe Response Frame

There are other 802.11 management frames that are not described within the text: Action Frame for QoS and ATIM.

pg.35-36
What is an RFID tag that is equipped with a battery that can be user as a complete source of power for the tag's circuitry and potentially, an onboard sensor.
Active
List the major advantages of an Active RFID
- Can be read at distances of 100ft or more
- It may have other sensors that can use electricity for powers
List the disadvantages of an Active RFID
- Tag cannot function without battery
- Tag is typically more expensive
- Tag is physically larger
- Long term maintenance cost for an Active RFID can be greater than passive
- Battery outages in an active tag can result in costly misread
What are the two major components of an RFID tag
- Integrated Circuit
- Antenna
This component of the RFID tag that is used for storing and processing information and modulating and demodulating the RF signal
Integrated Circuit
How does passive and semi-passive tags communicate?
Inductive or Backscatter coupling
What are based upon a transformer-type coupling between the primary coil in the reader and the secondary coil in the transponder?
Inductively Coupled Systems
When a proportion of the incoming RF energy is reflected by the antenna and reradiated outwards, this can be attributed to what type of coupling?
Backscatter Coupling
A station sends a _____________________ frame to another station if it wishes to terminate secure communications.
deauthentication

pg. 35
802.11 __________ enables the access point to allocate resources for and sychronize with a radio NIC.
association

pg.35
After receiving the association request, the acess point considers associating with the client, and (if accepted) reserves ___________ and establishes an ___________ for the client.
memory space, association ID

pg.35
An 802.11 access point sends an association response frame containing an ____________ or ____________ notice to the client requesting association.
acceptance, rejection

pg.35
If the 802.11 access point accepts the client, the frame includes information regarding the association, such as ______________________ and supported _______________.
association ID, data rates
RFID Exploits/attacks: How do infections spread?
Overwriting a blank RFID tag with malicious logic/viruses and having it re-scanned infecting the database corrupting or changing information and accessing the interconnecting management infrastructure
What is Radio Over Internet Protocol (ROIP)?
A method of communication that links voice, radio, and computers
What is the backbone of ROIP?
IP-based network
How do operators get past the Line of Sight deficiency?
Strategically placed radios with overlapping RF coverage
WHat allows interoperability of disparate radio platforms?
ROIP because it uses IP as a transport medium and IP is a universally understood language
If a 802.11 client roams away from the currently associated access point and finds another access point having a stronger beacon signal, the client will send a _________________________ frame to the new access point.
reassociation request

pg. 36
A 802.11 client sends a __________________ frame containing an acceptance or rejection notice to the client requesting reassociation.
reassociation response

pg. 36
A 802.11 station sends a ____________________ frame to another station if it wishes to terminate the association.
disassociation

pg. 36
The 802.11 access point periodically sends a ___________ frame to announce its presence and relay information, such as _____________, ___________, and other parameters regarding the access point to any client that is within the range.
beacon, timestamp, SSID

pg. 36
Mobile wireless communications systems; have specific frequency allocations, systems are traditionaly closed, private networks that are designed to allow communications between a fixed base station and multiple mobile users.
LMR
Three different types of radio terminals are?
Portable (user carried), Mobile (vehicle mounted), Fixed (not moving)
Known as a fixed station that recieves a signal but does not re-broadcast the signal to other radio users in the system.
Base Station
A device that recieves radio signal to extend the coverage area.
Repeater Station
Is a combination of a radio reciever and a radio transmitter that recieves a weak or low-level signal and retransmits it at a higher level or higher power?
Radio Repeater
Area used for local communications, and are placed at low altidude to reduce interferance with other users of the same radio frequencies.
Low-level repeaters
Are placed on tall towers or mountain tops to maximize their area of coverage. With these systems, users with low-powered radios can communicate with each other over many miles.
High-level repeaters
Any structure or device used to collect or radicate electromagnetic waves. Convert signals between electrical and electromagnetic form.
Antenna
In a ____________, a single channel is dedicated to a specific group of users. Because everyone transmits and recieves on the same channel, the network is considered half-duplex. Each user must wait until others have stopped transmitting before they can use the channel for communication.
Conventional LMR architecture
Allows for the automatic sharing of multiple radio channels accross the network. Efficient, many people can carry many conversations over only a few distinct frequencies. Can link to other trunked networks, packet switched data networks or telephony networks.
Trunked LMR architecture
Base Station _________ coordinate the overall operation of the base station equipment and provide alarm monitoring or electromagnetic assemblies.
Controllers
Is the process where mobile radios transmit information to a wireless system to inform the system of its availability. It ensures that a radio is allowed, or registered, with the system.
Autonomous Registration
A continuous data stream that all radios monitor for communication negotiation. During normal operations, a computer assigns channels to this.
Dedicated Control Channel
Used to authenticate radios on the network, necessary for autonomous registration.
Control Channel
The most common LMR network interconnection is to the?
PSTN
Adapt the communcations between mobile radios and different types of data networks. Example of this is short message service (SMS)
Gateways
Are an extension of the phone system; they temporarily store and forward audio or fax messages.
Voice Mail Systems
Is the use of an object applied to or incorporated into an item for the general purpose of identification and tracking using radio waves.
RFID
At the basic level, an RFID system requires two components:
RFID tag, RFID reader