75 Questions
Who developed the first wireless network called ALOHAnet?
University of Hawaii
During which century did numerous inventors and scientists start experimenting with wireless communications?
19th century
Which organization developed the first wireless network, ALOHAnet?
University of Hawaii
When was wireless networking technology first used by the US military?
World War II
Who were some of the inventors and scientists involved in experimenting with wireless communications in the 19th century?
Michael Faraday, James Clerk Maxwell, Heinrich Rudolf Hertz
What was the name of the first wireless network developed to wirelessly communicate data between the Hawaiian Islands?
ALOHAnet
Which organization ratified the original 802.11 standard in 1997?
IEEE
Which organization manages RF spectrum worldwide to ensure interference-free communications?
Wi-Fi Alliance
Which technology is considered a precursor to CSMA/CD in Ethernet?
ALOHAnet
Which organization develops standards for communication technologies, including the 802.11 WLAN standard?
IEEE
Which organization promotes WLAN growth and ensures product interoperability through certification testing?
Wi-Fi Alliance
Which frequency range was the ALOHAnet wireless network operating in?
400 MHz
In which layer of the OSI model does Wi-Fi operate?
Layer 1
What is the IEEE 802.11-2012 standard primarily responsible for defining?
Mechanisms at the Physical layer and MAC sublayer of the Data-Link layer
Which layer in wireless networking is responsible for routing traffic between VLANs and subnets?
Distribution layer
What are the key concepts used to describe carrier signals in wireless communications?
Amplitude, wavelength, frequency, and phase
Which keying method uses the amplitude of a signal to represent binary data in wireless networks?
Amplitude Shift Keying (ASK)
What does Frequency-Shift Keying (FSK) vary to represent binary data in wireless networks?
Frequency of the wave
Which layer in wireless networking is responsible for delivering traffic to end users?
Access layer
What does Phase-Shift Keying (PSK) vary to represent binary data in wireless networks?
Phase of the wave
Michael Faraday was one of the inventors and scientists involved in experimenting with wireless communications in the 19th century.
True
The US military first used wireless networking technology during World War I.
False
The spread spectrum radio technologies used in today's WLANs were originally patented during World War I.
False
The University of Hawaii developed the first wireless network, ALOHAnet, in 1970.
True
The first wireless network, ALOHAnet, was used to wirelessly communicate data between the Hawaiian Islands.
True
The Wi-Fi Alliance is responsible for managing RF spectrum worldwide to ensure interference-free communications.
False
ALOHAnet technology is considered a precursor to Carrier Sense Multiple Access with Collision Detection (CSMA/CD) in Ethernet.
True
The FCC regulates only licensed spectrum communications, overseeing areas such as frequency and power.
False
The IEEE, a global professional society, does not develop standards for communication technologies, including the 802.11 WLAN standard.
False
The 802.11-2020 standard, defining WLAN frame format and MAC sublayer operations, is not the most recent version.
False
The ISO, a global organization, develops standards in partnership with sectors to meet business, government, and societal needs, including the ISO 7-layer model.
True
The IETF, an international community, creates and maintains standards (RFCs) for network-based technologies.
True
Wi-Fi operates at Layer 1 and the MAC sublayer at Layer 2.
True
Wireless bridging between buildings is an example of wireless technology being used at the distribution layer in networking.
True
In wireless networking, the Core layer is the high-speed backbone, the Distribution layer routes traffic between VLANs and subnets, and the Access layer delivers traffic to end users.
True
Keying methods such as Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK), and Phase Shift Keying (PSK) are used to represent data in wireless networks.
True
Amplitude-Shift Keying (ASK) uses the amplitude of a signal to represent binary data, while Frequency-Shift Keying (FSK) varies the frequency of the wave to represent binary data.
True
Phase-Shift Keying (PSK) varies the phase of the wave to represent binary data, and Multiple Phase-Shift Keying (M-PSK) can encode multiple bits per symbol using four phases.
True
Wi-Fi technology is typically used at the access layer networking technology.
False
The IEEE 802.11-2012 standard defines mechanisms at the Physical layer and MAC sublayer of the Data-Link layer.
False
Wi-Fi is a brand name for marketing 802.11 WLAN technology, not an acronym for ______.
wireless fidelity
The FCC regulates both licensed and unlicensed spectrum communications, overseeing areas such as ______ and power.
frequency
The IEEE ratified the original 802.11 standard in 1997, forming the foundation of ______ technologies.
WLAN
The ITU-R, a global organization under the United Nations, manages RF spectrum worldwide to ensure ______ communications.
interference-free
The ISO, a global organization, develops standards in partnership with sectors to meet business, government, and societal needs, including the ISO ______ model.
7-layer
The IETF, an international community, creates and maintains standards (RFCs) for ______ technologies.
network-based
______ networking technology was first used by the US military during World War II to transmit data over an RF medium using classified encryption technology to send battle plans across enemy lines.
Wireless
ALOHAnet, to wirelessly communicate data between the Hawaiian Islands.
developed the first wireless network
In the 19th century, numerous inventors and scientists, including Michael Faraday, James Clerk Maxwell, Heinrich Rudolf Hertz, Nikola Tesla, David Edward Hughes, Thomas Edison, and Guglielmo Marconi, began to experiment with ______ communications.
wireless
The spread spectrum radio technologies often used in today’s WLANs were also originally patented during the era of ______.
World War II
The first wireless network, ALOHAnet, was used to wirelessly communicate data between the ______.
Hawaiian Islands
In 1970, the University of Hawaii developed the first ______ network, called ALOHAnet, to wirelessly communicate data between the Hawaiian Islands.
wireless
Wi-Fi operates in ______-duplex mode, allowing both devices to transmit and receive, but only one device can transmit at a time.
half
______ methods such as Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK), and Phase Shift Keying (PSK) are used to represent data in wireless networks.
Keying
In wireless communications, amplitude, wavelength, frequency, and phase are key concepts used to describe ______ signals.
carrier
The IEEE 802.11-2012 standard defines mechanisms at the Physical layer and MAC sublayer of the ______-Link layer.
Data
In wireless networking, the Core layer is the high-speed backbone, the Distribution layer routes traffic between VLANs and subnets, and the Access layer delivers traffic to end ______.
users
In wireless networking, Wi-Fi technology is typically used at the ______ layer networking technology.
access
Wireless bridging between buildings is an example of wireless technology being used at the ______ layer in networking.
distribution
Wi-Fi operates at Layer 1 and the MAC sublayer at Layer _____.
2
Match the wireless organization with its primary role:
FCC = Regulates licensed and unlicensed spectrum communications ITU-R = Manages RF spectrum worldwide to ensure interference-free communications IEEE = Develops standards for communication technologies, including the 802.11 WLAN standard Wi-Fi Alliance = Promotes WLAN growth and ensures product interoperability through certification testing
Match the wireless networking concept with its description:
Core layer = High-speed backbone Distribution layer = Routes traffic between VLANs and subnets Access layer = Delivers traffic to end users ALOHAnet = First wireless network developed to wirelessly communicate data between the Hawaiian Islands
Match the inventor/scientist with their contribution to wireless communications:
Michael Faraday = Experimented with wireless communications in the 19th century Heinrich Rudolf Hertz = Discovered and created theories about electrical magnetic RF concepts Nikola Tesla = Experimented with wireless communications in the 19th century Guglielmo Marconi = Experimented with wireless communications in the 19th century
Match the wireless networking technology with its historical context:
19th century wireless experimentation = Numerous inventors and scientists experimenting with wireless communications World War II = First use of wireless networking technology by the US military to transmit data over an RF medium 1970 = Development of the first wireless network, ALOHAnet, to wirelessly communicate data between the Hawaiian Islands Spread spectrum radio technologies = Originally patented during the era of World War II
Match the wireless networking layer with its function:
Core layer = High-speed backbone Distribution layer = Routes traffic between VLANs and subnets Access layer = Delivers traffic to end users Physical layer = Deals with the transmission of raw bit streams over a physical medium
Match the wireless keying method with its representation of binary data:
Amplitude Shift Keying (ASK) = Uses the amplitude of a signal to represent binary data Frequency Shift Keying (FSK) = Varies the frequency of the wave to represent binary data Phase Shift Keying (PSK) = Varies the phase of the wave to represent binary data Spread spectrum radio technologies = Originally patented during the era of World War II
Match the following wireless networking technologies/standards with their descriptions:
ALOHAnet = Used in the 400 MHz frequency range CSMA/CD = Considered a precursor to ALOHAnet technology 802.11 standard = Ratified by the IEEE in 1997 Wi-Fi = Brand name for marketing 802.11 WLAN technology
Match the following organizations with their roles in wireless networking:
FCC = Regulates licensed and unlicensed spectrum communications ITU-R = Manages RF spectrum worldwide to ensure interference-free communications IEEE = Ratified the original 802.11 standard in 1997 IETF = Creates and maintains standards (RFCs) for network-based technologies
Match the following wireless networking concepts with their descriptions:
Frequency band = Where low-speed wireless data networking products emerged in the 1990s WLAN frame format = Defined by the 802.11-2020 standard RF spectrum = Managed by the ITU-R to ensure interference-free communications 802.11 technology = Promoted and marked by the Wi-Fi Alliance
Match the following wireless networking layers with their functions:
Core layer = High-speed backbone Distribution layer = Routes traffic between VLANs and subnets Access layer = Delivers traffic to end users Physical layer = Operates at Layer 1 in wireless networking
Match the following wireless networking inventors/organizations with their contributions/roles:
University of Hawaii = Developed the first ALOHAnet wireless network Wi-Fi Alliance = Promotes WLAN growth and ensures product interoperability through certification testing ISO = Develops standards in partnership with sectors to meet business, government, and societal needs Michael Faraday = Involved in experimenting with wireless communications in the 19th century
Match the wireless technology concept with its description:
Wi-Fi = Operates at Layer 1 and the MAC sublayer at Layer 2 Amplitude Shift Keying (ASK) = Uses the amplitude of a signal to represent binary data Frequency Shift Keying (FSK) = Varies the frequency of the wave to represent binary data Phase Shift Keying (PSK) = Varies the phase of the wave to represent binary data
Match the OSI model layer with its function in wireless networking:
Physical layer = Operates at Layer 1 and the MAC sublayer at Layer 2 Data Link layer = Routes traffic between VLANs and subnets Access layer = Delivers traffic to end users Core layer = High-speed backbone
Match the wireless networking technology with its usage in the OSI model:
Wi-Fi technology = Typically used at the access layer Wireless bridging between buildings = Used at the distribution layer High-speed backbone = Core layer networking technology Routing traffic between VLANs and subnets = Distribution layer networking technology
Match the keying method with its representation in wireless networks:
Amplitude Shift Keying (ASK) = Uses the amplitude of a signal to represent binary data Frequency Shift Keying (FSK) = Varies the frequency of the wave to represent binary data Phase Shift Keying (PSK) = Varies the phase of the wave to represent binary data Multiple Phase-Shift Keying (M-PSK) = Encodes multiple bits per symbol using four phases
Study Notes
Wireless Network Fundamentals and OSI Model
- Open Systems Interconnection (OSI) model was created by ISO as a standard reference for data communications between computers in the late 1970s.
- The OSI model consists of 7 layers: Application, Presentation, Session, Transport, Network, Data Link, and Physical.
- Wi-Fi operates at Layer 1 and the MAC sublayer at Layer 2.
- Wi-Fi technology is typically used at the access layer networking technology.
- Wireless bridging between buildings is an example of wireless technology being used at the distribution layer in networking.
- Wi-Fi operates in half-duplex mode, allowing both devices to transmit and receive, but only one device can transmit at a time.
- The IEEE 802.11-2012 standard defines mechanisms at the Physical layer and MAC sublayer of the Data-Link layer.
- In wireless networking, the Core layer is the high-speed backbone, the Distribution layer routes traffic between VLANs and subnets, and the Access layer delivers traffic to end users.
- In wireless communications, amplitude, wavelength, frequency, and phase are key concepts used to describe carrier signals.
- Keying methods such as Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK), and Phase Shift Keying (PSK) are used to represent data in wireless networks.
- Amplitude-Shift Keying (ASK) uses the amplitude of a signal to represent binary data, while Frequency-Shift Keying (FSK) varies the frequency of the wave to represent binary data.
- Phase-Shift Keying (PSK) varies the phase of the wave to represent binary data, and Multiple Phase-Shift Keying (M-PSK) can encode multiple bits per symbol using four phases.
Wireless Network Fundamentals and OSI Model
- Open Systems Interconnection (OSI) model was created by ISO as a standard reference for data communications between computers in the late 1970s.
- The OSI model consists of 7 layers: Application, Presentation, Session, Transport, Network, Data Link, and Physical.
- Wi-Fi operates at Layer 1 and the MAC sublayer at Layer 2.
- Wi-Fi technology is typically used at the access layer networking technology.
- Wireless bridging between buildings is an example of wireless technology being used at the distribution layer in networking.
- Wi-Fi operates in half-duplex mode, allowing both devices to transmit and receive, but only one device can transmit at a time.
- The IEEE 802.11-2012 standard defines mechanisms at the Physical layer and MAC sublayer of the Data-Link layer.
- In wireless networking, the Core layer is the high-speed backbone, the Distribution layer routes traffic between VLANs and subnets, and the Access layer delivers traffic to end users.
- In wireless communications, amplitude, wavelength, frequency, and phase are key concepts used to describe carrier signals.
- Keying methods such as Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK), and Phase Shift Keying (PSK) are used to represent data in wireless networks.
- Amplitude-Shift Keying (ASK) uses the amplitude of a signal to represent binary data, while Frequency-Shift Keying (FSK) varies the frequency of the wave to represent binary data.
- Phase-Shift Keying (PSK) varies the phase of the wave to represent binary data, and Multiple Phase-Shift Keying (M-PSK) can encode multiple bits per symbol using four phases.
Wireless Network Fundamentals and OSI Model
- Open Systems Interconnection (OSI) model was created by ISO as a standard reference for data communications between computers in the late 1970s.
- The OSI model consists of 7 layers: Application, Presentation, Session, Transport, Network, Data Link, and Physical.
- Wi-Fi operates at Layer 1 and the MAC sublayer at Layer 2.
- Wi-Fi technology is typically used at the access layer networking technology.
- Wireless bridging between buildings is an example of wireless technology being used at the distribution layer in networking.
- Wi-Fi operates in half-duplex mode, allowing both devices to transmit and receive, but only one device can transmit at a time.
- The IEEE 802.11-2012 standard defines mechanisms at the Physical layer and MAC sublayer of the Data-Link layer.
- In wireless networking, the Core layer is the high-speed backbone, the Distribution layer routes traffic between VLANs and subnets, and the Access layer delivers traffic to end users.
- In wireless communications, amplitude, wavelength, frequency, and phase are key concepts used to describe carrier signals.
- Keying methods such as Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK), and Phase Shift Keying (PSK) are used to represent data in wireless networks.
- Amplitude-Shift Keying (ASK) uses the amplitude of a signal to represent binary data, while Frequency-Shift Keying (FSK) varies the frequency of the wave to represent binary data.
- Phase-Shift Keying (PSK) varies the phase of the wave to represent binary data, and Multiple Phase-Shift Keying (M-PSK) can encode multiple bits per symbol using four phases.
Wireless Network Fundamentals and OSI Model
- Open Systems Interconnection (OSI) model was created by ISO as a standard reference for data communications between computers in the late 1970s.
- The OSI model consists of 7 layers: Application, Presentation, Session, Transport, Network, Data Link, and Physical.
- Wi-Fi operates at Layer 1 and the MAC sublayer at Layer 2.
- Wi-Fi technology is typically used at the access layer networking technology.
- Wireless bridging between buildings is an example of wireless technology being used at the distribution layer in networking.
- Wi-Fi operates in half-duplex mode, allowing both devices to transmit and receive, but only one device can transmit at a time.
- The IEEE 802.11-2012 standard defines mechanisms at the Physical layer and MAC sublayer of the Data-Link layer.
- In wireless networking, the Core layer is the high-speed backbone, the Distribution layer routes traffic between VLANs and subnets, and the Access layer delivers traffic to end users.
- In wireless communications, amplitude, wavelength, frequency, and phase are key concepts used to describe carrier signals.
- Keying methods such as Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK), and Phase Shift Keying (PSK) are used to represent data in wireless networks.
- Amplitude-Shift Keying (ASK) uses the amplitude of a signal to represent binary data, while Frequency-Shift Keying (FSK) varies the frequency of the wave to represent binary data.
- Phase-Shift Keying (PSK) varies the phase of the wave to represent binary data, and Multiple Phase-Shift Keying (M-PSK) can encode multiple bits per symbol using four phases.
Test your knowledge of wireless network fundamentals and the OSI model with this quiz. Explore topics such as OSI layers, Wi-Fi technology, wireless networking layers, and key concepts in wireless communications.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free