| Wireless Networks | Wireless Communication |
| Wi-Fi | Bluetooth |
| Mobile Network | Cellular Network |
| LAN | WAN |
| The transmission of information between devices without the use of physical connections or cables. | A type of computer network that allows devices to connect and communicate wirelessly. |
| A wireless technology standard used for short-range communication between devices. | A technology that allows electronic devices to connect to a wireless local area network (WLAN) and access the internet. |
| A communication system dividing a geographic area into sections, each served by a base station for mobile connectivity. | A network that enables mobile devices to connect to the internet via wireless communication. |
| A network that covers a large geographical area to connect multiple smaller networks. | A network connecting devices within a limited geographic area, such as a home, office, or building. |
| Signal Strength | Roaming |
| Satellite Network | Mesh Network |
| Ad Hoc Network | NFC |
| Wifi | Router |
| The ability for a mobile device to maintain connectivity while moving between different wireless networks or cells. | The power level of a wireless signal, indicating the quality of communication between devices. |
| A decentralized wireless network where each node cooperates to distribute network data, often used for increased coverage and improved reliability. | A wireless network that uses satellites to provide coverage over large geographic areas, often used for communication in remote locations. |
| A very short-range wireless technology that enables communication between devices by bringing them close together. | A temporary and spontaneous wireless network formed between devices for a specific purpose without the need for a central infrastructure. |
| a device that forwards data packets between computer networks | a wireless networking technology that allows devices to connect to the internet via a router |
| Hotspot | SSID |
| Encryption | Bandwidth |
| Access Point | Authentication |
| Key | Vulnerability |
| a unique identifier for a wireless network | a physical location where people can access the internet, typically using Wi-Fi |
| the maximum amount of data that can be transmitted over a network | the process of encoding information to make it secure from unauthorized access |
| The process of verifying the identity of a user or device trying to connect to a network. | a device that allows wireless devices to connect to a wired network |
| A weakness or flaw in a system that can be exploited by attackers. | A secret value used by encryption algorithms to transform data into unreadable form and back. |
| Cracking | Internet Of Things |
| Sensors | Smart Home |
| Security | NAT |
| Private IP | Public IP |
| A network connecting physical objects with sensors and software to collect and exchange data. | The act of defeating network encryption to gain unauthorized access to data or systems. |
| A residence with connected devices and systems controlled remotely to improve comfort, convenience, and energy efficiency. | Devices that detect physical or environmental input such as temperature, pressure, motion, or light, and convert it into an electrical signal. |
| A process where a router or firewall modifies a packet's source IP address to another IP address. | The measures taken to protect connected devices, networks, and data from unauthorized access, data breaches, or other cyber threats. |
| A public IP address is an IP address that is used to identify a device on the public internet. | An IP address used inside a local network that cannot be accessed directly from the internet. |
| Gateway | IP Lease |
| Dhcp | DHCP Server |
| Integrity | Authentication Protocol |
| RFID | Tag |
| The period during which a DHCP server assigns an IP address to a device. | A network node providing access between different networks, often translating between distinct communication protocols. |
| A network component that provides IP addresses and other network configuration information to devices requesting them. | A network protocol that automatically assigns IP addresses and configuration settings to devices on a network. |
| A set of rules and procedures for verifying the identity of a user or system. | The assurance that data has not been altered or tampered with. |
| A small electronic device that communicates information to a reader through radio frequency. | A technology that uses radio waves for automatic identification and tracking of tags attached to objects. |
| Reader | Contactless Payment |
| Handshake | |
| A type of transaction that allows consumers to pay for goods or services without physical contact with a payment terminal. | A device that emits radio waves to communicate with tags and collect data from them. |
| The step where devices establish a connection and negotiate communication parameters. | |