Wireless Networks | Wireless Communication |
Wi-Fi | Bluetooth |
Mobile Network | Cellular Network |
LAN | WAN |
The transmission of information between devices without the use of physical connections or cables. | A type of computer network that allows devices to connect and communicate wirelessly. |
A wireless technology standard used for short-range communication between devices. | A technology that allows electronic devices to connect to a wireless local area network (WLAN) and access the internet. |
A network composed of interconnected cells that provide coverage for mobile communication. | A network that enables mobile devices to connect to the internet via wireless communication. |
A wide area network that extends over a large geographical area to connect multiple smaller networks. | A local area network that provides network connectivity to devices within a limited area. |
Signal Strength | Roaming |
Satellite Network | Mesh Network |
Ad Hoc Network | NFC |
Wifi | Router |
The ability for a mobile device to maintain connectivity while moving between different wireless networks or cells. | The power level of a wireless signal, indicating the quality of communication between devices. |
A decentralized wireless network where each node cooperates to distribute network data, often used for increased coverage and improved reliability. | A wireless network that uses satellites to provide coverage over large geographic areas, often used for communication in remote locations. |
A very short-range wireless technology that enables communication between devices by bringing them close together. | A temporary and spontaneous wireless network formed between devices for a specific purpose without the need for a central infrastructure. |
a device that forwards data packets between computer networks | a wireless networking technology that allows devices to connect to the internet via a router |
Hotspot | SSID |
Encryption | Bandwidth |
Access Point | Authentication |
Key | Vulnerability |
a unique identifier for a wireless network | a physical location where people can access the internet, typically using Wi-Fi |
the maximum amount of data that can be transmitted over a network | the process of encoding information to make it secure from unauthorized access |
The process of verifying the identity of a user or device trying to connect to a network. | a device that allows wireless devices to connect to a wired network |
A weakness or flaw in a system that can be exploited by attackers. | A secret code used by the encryption algorithm to encrypt and decrypt data. |
Cracking | Internet Of Things |
Sensors | Smart Home |
Security | NAT |
Private IP | Public IP |
A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity that enables them to collect and exchange data. | The process of breaking the encryption of a network to gain unauthorized access. |
A residence that has connected devices and systems which can be remotely controlled and automated to enhance comfort, convenience, and energy efficiency. | Devices that detect physical or environmental input such as temperature, pressure, motion, or light, and convert it into an electrical signal. |
A process where a router or firewall rewrites the source IP address of a packet to a different IP address. | The measures taken to protect connected devices, networks, and data from unauthorized access, data breaches, or other cyber threats. |
A public IP address is an IP address that is used to identify a device on the public internet. | A private IP address is an IP address that is used within a private network and is not directly accessible from the internet. |
Gateway | IP Lease |
Dhcp | DHCP Server |
Integrity | Authentication Protocol |
IP lease refers to the period of time for which an IP address is assigned to a device using DHCP. | A gateway is a network node that acts as an access point to another network, often involving translation between different network protocols. |
A network component that provides IP addresses and other network configuration information to devices requesting them. | Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to automatically assign IP addresses and other network configuration parameters to devices on a network. |
A set of rules and procedures for verifying the identity of a user or system. | The assurance that data has not been altered or tampered with. |