Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
51 Cards in this Set
- Front
- Back
What are the three main types of RFID tags?
|
Passive
Semi-passive Active |
|
A type of RFID tag that does not contain a battery; power is supplied by the reader.
|
Passive
|
|
List the major disadvantages of a passive RFID tags.
|
- Tag can be read only at a very short distances.
- Some sensors may require more power than available - The tag remains readable for a very long time |
|
List the advantages of a passive RFID tag.
|
- Tag functions without a battery
- Tagis typically much less expensive to manufacture - Tag is much smaller |
|
What is an RFID transponder that reflects RF energy back to the reader similar to passive but also has a power source onboard to run chip circuitry and potentially, an onboard sensor.
|
Semi-passive
|
|
__________ management frames enable stations to establish and maintain communications?
|
802.11
pg.35 |
|
802.11 ____________ is a process whereby the access point either accepts or rejects the identity of the client.
|
authentication
pg.35 |
|
With _____________ authentication, the client sends only one authentication frame and access point responds with an authentication frame as a response indicating acceptance or rejection.
|
open system (the default)
pg.35 |
|
With the optional _____________ authentication, the client sends an initial authentication frame and the access point responds with an authentication frame containing challenging text.
|
shared key
pg.35 |
|
How many 802.11 management frames are described in the text and name them.
|
6 Management frames
1) Authentication/Deauthentication Frame 2) Association Request/Response Frame 3) Reassociation Request/Response Frame 4) Disassociation Frame 5) Beacon Frame 6) Probe Request/Probe Response Frame There are other 802.11 management frames that are not described within the text: Action Frame for QoS and ATIM. pg.35-36 |
|
What is an RFID tag that is equipped with a battery that can be user as a complete source of power for the tag's circuitry and potentially, an onboard sensor.
|
Active
|
|
List the major advantages of an Active RFID
|
- Can be read at distances of 100ft or more
- It may have other sensors that can use electricity for powers |
|
List the disadvantages of an Active RFID
|
- Tag cannot function without battery
- Tag is typically more expensive - Tag is physically larger - Long term maintenance cost for an Active RFID can be greater than passive - Battery outages in an active tag can result in costly misread |
|
What are the two major components of an RFID tag
|
- Integrated Circuit
- Antenna |
|
This component of the RFID tag that is used for storing and processing information and modulating and demodulating the RF signal
|
Integrated Circuit
|
|
How does passive and semi-passive tags communicate?
|
Inductive or Backscatter coupling
|
|
What are based upon a transformer-type coupling between the primary coil in the reader and the secondary coil in the transponder?
|
Inductively Coupled Systems
|
|
When a proportion of the incoming RF energy is reflected by the antenna and reradiated outwards, this can be attributed to what type of coupling?
|
Backscatter Coupling
|
|
A station sends a _____________________ frame to another station if it wishes to terminate secure communications.
|
deauthentication
pg. 35 |
|
802.11 __________ enables the access point to allocate resources for and sychronize with a radio NIC.
|
association
pg.35 |
|
After receiving the association request, the acess point considers associating with the client, and (if accepted) reserves ___________ and establishes an ___________ for the client.
|
memory space, association ID
pg.35 |
|
An 802.11 access point sends an association response frame containing an ____________ or ____________ notice to the client requesting association.
|
acceptance, rejection
pg.35 |
|
If the 802.11 access point accepts the client, the frame includes information regarding the association, such as ______________________ and supported _______________.
|
association ID, data rates
|
|
RFID Exploits/attacks: How do infections spread?
|
Overwriting a blank RFID tag with malicious logic/viruses and having it re-scanned infecting the database corrupting or changing information and accessing the interconnecting management infrastructure
|
|
What is Radio Over Internet Protocol (ROIP)?
|
A method of communication that links voice, radio, and computers
|
|
What is the backbone of ROIP?
|
IP-based network
|
|
How do operators get past the Line of Sight deficiency?
|
Strategically placed radios with overlapping RF coverage
|
|
WHat allows interoperability of disparate radio platforms?
|
ROIP because it uses IP as a transport medium and IP is a universally understood language
|
|
If a 802.11 client roams away from the currently associated access point and finds another access point having a stronger beacon signal, the client will send a _________________________ frame to the new access point.
|
reassociation request
pg. 36 |
|
A 802.11 client sends a __________________ frame containing an acceptance or rejection notice to the client requesting reassociation.
|
reassociation response
pg. 36 |
|
A 802.11 station sends a ____________________ frame to another station if it wishes to terminate the association.
|
disassociation
pg. 36 |
|
The 802.11 access point periodically sends a ___________ frame to announce its presence and relay information, such as _____________, ___________, and other parameters regarding the access point to any client that is within the range.
|
beacon, timestamp, SSID
pg. 36 |
|
Mobile wireless communications systems; have specific frequency allocations, systems are traditionaly closed, private networks that are designed to allow communications between a fixed base station and multiple mobile users.
|
LMR
|
|
Three different types of radio terminals are?
|
Portable (user carried), Mobile (vehicle mounted), Fixed (not moving)
|
|
Known as a fixed station that recieves a signal but does not re-broadcast the signal to other radio users in the system.
|
Base Station
|
|
A device that recieves radio signal to extend the coverage area.
|
Repeater Station
|
|
Is a combination of a radio reciever and a radio transmitter that recieves a weak or low-level signal and retransmits it at a higher level or higher power?
|
Radio Repeater
|
|
Area used for local communications, and are placed at low altidude to reduce interferance with other users of the same radio frequencies.
|
Low-level repeaters
|
|
Are placed on tall towers or mountain tops to maximize their area of coverage. With these systems, users with low-powered radios can communicate with each other over many miles.
|
High-level repeaters
|
|
Any structure or device used to collect or radicate electromagnetic waves. Convert signals between electrical and electromagnetic form.
|
Antenna
|
|
In a ____________, a single channel is dedicated to a specific group of users. Because everyone transmits and recieves on the same channel, the network is considered half-duplex. Each user must wait until others have stopped transmitting before they can use the channel for communication.
|
Conventional LMR architecture
|
|
Allows for the automatic sharing of multiple radio channels accross the network. Efficient, many people can carry many conversations over only a few distinct frequencies. Can link to other trunked networks, packet switched data networks or telephony networks.
|
Trunked LMR architecture
|
|
Base Station _________ coordinate the overall operation of the base station equipment and provide alarm monitoring or electromagnetic assemblies.
|
Controllers
|
|
Is the process where mobile radios transmit information to a wireless system to inform the system of its availability. It ensures that a radio is allowed, or registered, with the system.
|
Autonomous Registration
|
|
A continuous data stream that all radios monitor for communication negotiation. During normal operations, a computer assigns channels to this.
|
Dedicated Control Channel
|
|
Used to authenticate radios on the network, necessary for autonomous registration.
|
Control Channel
|
|
The most common LMR network interconnection is to the?
|
PSTN
|
|
Adapt the communcations between mobile radios and different types of data networks. Example of this is short message service (SMS)
|
Gateways
|
|
Are an extension of the phone system; they temporarily store and forward audio or fax messages.
|
Voice Mail Systems
|
|
Is the use of an object applied to or incorporated into an item for the general purpose of identification and tracking using radio waves.
|
RFID
|
|
At the basic level, an RFID system requires two components:
|
RFID tag, RFID reader
|