1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna11 [192]
3 years ago
5

7.1 What is the basic building block of an 802.11 WLAN? 7.2 Define an extended service set. 7.3 List and briefly define IEEE 802

.11 services. 7.4 Is a distribution system a wireless network? 7.5 How is the concept of an association related to that of mobility? 7.6 What security areas are addressed by IEEE 802.11i? 7.7 Briefly describe the five IEEE 802.11i phases of operation. 7.8 What is the difference between TKIP and CCMP?
Computers and Technology
1 answer:
Black_prince [1.1K]3 years ago
7 0

Answer:

7.1)

BSS (Basic Service Set) is a basic building block of  802.11 wireless LAN.

It is the wireless station that executing the similar competing and the MAC protocol for accessing a similar wireless system is shared.

7.2)

The Extended Service Set is one of the basic components of IEEE 802.11 WLAN architecture which increases the mobility range to the individual BSS (Basic Service Set).

An ESS is the set that contains two or more than two Basic Service Sets

that forms an individual sub-network.

7.3)

The IEEE 802.11 service has the MAC layer implement which falls in two categories:

  1. Service Station.
  2. Distribution System Service.

Service Station - 802.11 standard has defined the services which is providing the functions among the stations.

It includes the following components:

  • Authentication
  • Deauthentication
  • Privacy
  • MSDU delivery.

Distribution System Service - It defined by the 802.11, provides the functionality across the distribution system and access point also provides the DSS.

It includes the following components:

  • Association  
  • Disassociation  
  • Distribution  
  • Integration  
  • Reassociation.

7.4)

It either may be or either not be a wireless network.  

Because distribution system has these three things:

  • Wired network
  • Wireless network
  • A switch

7.5)

Association agrees on the set security capabilities to use.

It also allows the mobile node which has made the transition to identifies itself to the AP (Access Point) within a BSS so that's why the nodes can be participated in the data exchanges with  another mobile nodes.

7.6)

The IEEE 802.11i are addresses the three types of security areas:

1) authentication,

2) key management,

3) data transfer privacy.

7.7)

You might be interested in
Magnetic video tape in a plastic casing is a?
Anestetic [448]

Answer:

what s this to me I will tell him to do the science and I am rewatching to be there to be in the

Explanation:

go see the teacher that you will be able for me and u look like me I don't want you anymore to me it will not tell you that you send me a question about your course on this subject matter as we have a lot to experience with our class on Friday

6 0
3 years ago
Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti
grin007 [14]

Answer:

a; circuit-switched network.

b; No, it does not need congestion control.

Explanation:

For A;

A circuit-switched network is a better option for this application. This is because of the fact that the application is made up of long sessions with smooth data transfer capacity needs.

The transmission rate is known, and does not transmit in short intervals(short signals), every application session can have a bandwidth reserved without significant bandwidth wastage.

Also, the overhead expenses of setting up and tearing down connections are canceled out over the extensive period of running an application session.

For B;

If the packet-switched network is used, and traffic in the network comes from the said application. Even if every applications transmit one or more network connections. Still, we already know that every connection has enough transmission capacity to handle majority of the application data rates, no congestion(insignificant queuing) will happen.

This goes to say that no congestion control will be needed given such broad-based connection.

7 0
3 years ago
7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering personal i
beks73 [17]

Answer:

D

Explanation:

Malware can be used for many things, a click of a button can send complete access to the attacking system. Malware comes in all formes and powers.

4 0
3 years ago
2. Consider the two-dimensional array A: int A[][] = new int[100][100]; where A[0][0] is at location 200 in a paged memory syste
bogdanovich [222]

Answer:

Check the explanation

Explanation:

An integer (int) is of two different bytes and each page has 200 bytes in length. What this means is that each row of array A (100 int) will fits perfectly in a page.

(a) For the initial or first array-initialization loop, one column is processed at a time, so a page fault will be generated at every inner loop iteration, with a total of 100*100=10,000 page faults.

(b)  And when it comes to the second array-initialization loop, one row is processed at a time, and a page fault is generated at every outer loop iteration, with a total of 100 page faults.

Hence second array-initialization loop, has better spatial locality.

6 0
4 years ago
Write a program that grades arithmetic quizzes as follows: Ask the user how many questions are in the quiz. Ask the user to ente
kirill115 [55]

Answer:

The program in C++ is as follows:

#include <iostream>

using namespace std;

int main(){

   int questions, answer;

   cout<<"Questions: ";

   cin>>questions;

   int answerkey[questions];

   cout<<"Enter answer keys: ";

   for(int i = 0; i< questions; i++){

       cin>>answerkey[i];    }

   int correct = 0;

   cout<<"Enter answers: ";

   for(int i = 0; i< questions; i++){

       cin>>answer;

       if(answer == answerkey[i]){

           correct++;        }    }

   cout<<"Correct answers: "<<correct<<endl;

   cout<<"Percentage correct : "<<(100 * correct)/questions<<"%";

   return 0;

}

Explanation:

This declares the number of questions and the answers submitted to each equation

   int questions, answer;

Prompt to get the number of questions

   cout<<"Questions: ";

This gets input for the number of questions

   cin>>questions;

This declares the answerkey as an array

   int answerkey[questions];

Prompt to get the answer key

   cout<<"Enter answer keys: ";

This iteration gets the answer key for each question

<em>    for(int i = 0; i< questions; i++){</em>

<em>        cin>>answerkey[i];    }</em>

This initializes the number of correct answers to 0

   int correct = 0;

Prompt to get the enter the answers

   cout<<"Enter answers: ";

This iterates through the answer keys

   for(int i = 0; i< questions; i++){

This gets the answer to each question

       cin>>answer;

This compares the answer to the answer key of the question

       if(answer == answerkey[i]){

If they are the same, correct is incremented by 1

           correct++;        }    }

Print the number of correct answers

   cout<<"Correct answers: "<<correct<<endl;

Print the percentage of correct answers

   cout<<"Percentage correct : "<<(100 * correct)/questions<<"%";

7 0
3 years ago
Other questions:
  • A Color class has three int color component instance variables: red, green, and blue. Write a toString method for this class. It
    13·1 answer
  • what properties are associated with all Microsoft Office files and include author, title, and subject
    5·1 answer
  • How do you measure objects and re-size them in tinkercad? I need it in steps.
    7·1 answer
  • Explain why the control bus is not a bus.
    7·1 answer
  • Each time you save a document, _____. you will need to type in the file type in which it should be saved you can select the Save
    11·1 answer
  • You recently started working part-time in a retail store, and are learning about the reading devices your store uses. Your store
    10·1 answer
  • A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate
    5·2 answers
  • _______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi
    12·1 answer
  • Tom wants to find a number so that the sum of the digits of a two-digit number is 7. When reversing the digits, the number shoul
    15·1 answer
  • 13. In cell B16, use the SUMIF function and structured references to display the total wins for teams in the Youth league.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!