AP Notes, Outlines, Study Guides, Vocabulary, Practice Exams and more!

Net + Flashcards

Terms : Hide Images
4327901171Port 20FTP-Send/Recieve TCP0
4327906469Port 21FTP-Server Listening TCP1
4327908449Port 22SSH - Secure Shell TCP2
4327913623Port 23Telnet TCP3
4327916479Port 25SMTP TCP4
4327918648Port 53Domain Name System TCP/UDP5
4327926001Port 67DHCPv4 UDP Client to Server6
4327929047Port 68DHCPv4 UDP Server to Client7
4327933395Port 80HTTP TCP/UDP8
4327937160Port 161Simple network management protocol (SNMP) TCP/UDP9
4327943045Port 443HTTPS TCP10
4327946682Port 5060Session Initiation Protocol (SIP) UDP11
4327950234Port 5061SIP - Encrypted UDP12
4327954279H.323Signalling protocol for multimedia data13
4327957527MGCPMedia Gateway Control Protocol - used for multimedia data14
4327961946NetBIOS over TCP/IPProtocol allowing old applications to work on TCP/IP15
4327965583255.255.255.255Broadcast IPv416
43279688030.0.0.0Unassigned IPv417
4327970295127.0.0.1Loopback address for your own computer18
4327973138: : 1Loopback address in IPv619
4327988138ping -aICMP echo which tests name resolution and DNS functionality20
4327995268Ping -nspecifies number of pings to send21
4327997110Ping -6Ping for IPv622
4327999376ipconfig /releaseDisplays TCP/IP config info. Releases IP address when dynamic addressing is used23
4328010528ipconfig /release6Displays TCP/IP config info. Releases IP address when dynamic addressing is used for IPv624
4328012887ipconfig /renewDisplays TCP/IP config info. Leases new IP address from DHCP server25
4328020105ipconfig /displaydnsDisplays TCP/IP config info. Gives info about name resolutions that windows currently holds in DNS resolver cache26
4328027649ifconfigDisplays TCP/IP config info on UNIX/LINUX OS27
4328029856nslookup x.x.x.xdisplays DNS server name assigned to that address28
4328042858nslookup www.website.comDisplays IP address assigned to that DNS name29
4328053715Port Address Translation (PAT)Assigns a separate TCP port number to each ongoing session between local host and ISP30
4328065895Static Network Address Translation (SNAT)Gateway assigns same public IP to each host31
4328074542Dynamic Network Address Translation (DNAT)Gateway assigns a public IP to a local host out of a pool of available public addresses32
4328088860Unicast addressspecifies a single node on a network. 2 types: Global and Link local33
4328091352Global addresscan be routed on internet34
4328095468Link Local addressused for nodes on same link35
4328100206Multicast addressPackets delivered to all nodes targeted in a multicast group36
4328103827Anycast addressMultiple destinations specified with packets delivered to closest destination37
4328114912Layer 7Application38
4328114913Layer 6Presentation39
4328116891Layer 5Session40
4328118173Layer 4Transport41
4328118174Layer 3Network42
4328119989Layer 2Data Link43
4328119990Layer 1Physical44
4328123784Transmission Control Protocol (TCP)Used at Layer 4 (Transport Layer) Connection Oriented: Uses 3 way handshake Sequencing and Checksums Flow Control Called Segment45
4328133637User Datagram Protocol (UDP)Used at Layer 4 (transport) No error checking or sequencing More efficient than TCP Called Datagram46
4328138366Internet Protocol (IP)Used at Layer 3 (Network) Called Packet Connectionless No delivery gurantee47
4328154455Internet control message protocol (ICMP)Reports Success or Failure of data delivery48
4328161244Address Resolution Protocol (ARP)Discovers the MAC address of a host or node and maintains a database of IP to MAC address for its network49
4328174683Internet Group Management Protocol (IGMP)Manages multicast transmissions50
4328177326ICMPv6used by IPv6 to perform all functions that ICMPv4, IGMP, and ARP that are performed in IPv451
43281877944 Characteristics of RoutersConnect Dissimilar networks Interpret layer 3/4 addressing Determine best path from A to B Reroute traffic if path is down52
4328197697Interior RouterDirect data within same autonomous system53
4328199576Border Router (gateway router)Connects internal routers with outside networks54
4328204249Exterior RouterDirects data between autonomous systems55
4328213005Routing MetricsDetermines best path to destination: Hop Count Theoretical Bandwidth Delay/Latency Load Max Transmission Unit (MTU) Routing Cost Reliability Topology56
4328222923Looking Glass SitesRemotely Report network routing information on their network57
4328265372SMTPHandles outbound email58
4328272747IMAP4Allows user to read email stored on server59
4328274088POP3Downloads email to user computer60
4328278145Remote Desktopbuilt into windows to provide remote control and uses RDP secure protocol61
4328285850Active DirectoryContains user account info and security credentials for the group of computers on network62
4328293643Remote Desktop ServicesFeature allows techs to provide applications to users on Windows server 2008 and later63
4328307126Real Time Protocol (RTP)Session layer protocol for streaming live VTC64
4328353348A recordstores name to address mapping for host in DNS database65
4328356984AAAA recordstores name to address mapping for host in DNS database in IPv666
4328359027CNAME recordholds alternative names for a host in DNS database67
4328362693PTR (pointer) recordused for reverse lookup in DNS database68
4328366722MX (mail exchanger) recordIdentifies a mail server in DNS database69
4328379409DNS zone transferProcess where secondary DNS server requests a database update from primary DNS server70
4328389827Domain Name System (DNS)Associates computer name with IP address71
4328394937DNS namespaceentire collection of computer names and their associated IP addresses stored in databases72
4328399287DNS name servershold databases for names to IP73
4328409920DNS authoritative serversactually hold computer names and IP addresses for the computers in their domains74
4328413605Top Level Domain Servers (TLD)Hold info on authoritative servers within the domain (.com, .mil, .org, etc)75
4328429898Organizationally Unique Identifier (OUI)First 24 bits of MAC address specific to manufacturing company76
4328435074Device IDlast 24 bits of a MAC address specific to device77
4328452408OSPFIGP Link state protocol used on border and interior routers78
4328457157Intermediate System - Intermediate System (IS-IS)IGP Link State protocol designed for use on interior routers only. Not dependent upon IPv4 like OSPF79
4328495317BGPCurrently only EGP. Spans multiple autonomous systems and used by border and exterior routers across the internet.80
4328511065netstatDisplays all TCP/IP connections on machine including TCP, messages sent and received, IP address, and state of those connections81
4328525158netstat -nLists connections, including IP address and port number82
4328530649nbtstatdisplays machine NetBIOS name83
4328568818tracertuses ICMP echo requests to trace the path from one networked node to the other84
4328590065pathpingwindows utility like tracert that sends 100 pings to each hop and provides detailed report when complete. mtr on linux or unix85
4328620878Path MTU black holeerror where messages are lost mysteriously. Use ping with different size packets to test where error occurs86
4328661173Extended Unique Identifier (EUI)-64Takes 48 bit MAC address and makes 64 bit for IPv6 auto address config87
4334907908Dense Wavelength Division Multiplexing (DWDM)Modern fiber optic multiplexing with extraordinary capacity. Used for WAN88
4334922713Course Wavelength Division Multiplexing (CWDM)Cheaper alternative to DWDM with more space between channels89
4334944872CAT 3 Bandwidth10 Mbps90
4334946914CAT 5 Bandwidth100 Mbps91
4334948897CAT 5e Bandwidth1000 Mbps92
4334951442CAT 6 Bandwidth10 Gbps93
4334954787CAT 7 Bandwidth10 Gbps94
4334966902TIA/EIA 568A Cabling StandardGW G OW B BW O BW B95
4334972331TIA/EIA 568B Cabling standardOW O GW B BW G BW B96
4334978913Straight Through CableConnects unlike devices Pinout is the same on both sides97
4334981374Crossover CableConnects like devices Pinout has TX/RX wires reversed98
4334986710Rollover CableConsole cable or Yost cable Pinouts are mirrored between the two ends99
4335057625MT-RJ ConnectorMost common type of MM Fiber connection100
4335073846RegenerationProcess of retransmitting a signal101
4335102261NoiseDegrades and distorts signal. Most common source is EMI from motors, power lines, etc102
4335114365Cross TalkOccurs when a signal travelling on one wire infringes on the signal on an adjacent wire103
4335126542AttenuationLoss of signal strength as it travels104
4335140137LatencyDelay in travel time over media. Commonly measured by a packets Round Trip Time (RTT)105
4335157776Fiber type mismatchconnecting two fiber cables or adapters with different core size/type106
4335166224Wavelength mismatchSMF, MMF use different wavelengths and can be mixed accidentally107
4335205447Time Domain Reflectometer (TDR)issues a signal on a cable and measures signal bounce back in order to find bad connectors, crimps, bends, short circuits, and cable mismatches108
4335217132Optical Time Domain Reflectormeters (OTDR)Tests fiber optic cables to find breaks, bad splices and connections109
4335259869Baud RateMeasures throughput and bandwidth of analog transmissions110
4335265721BroadbandMultiple signals across a single media111
4335267953Basebandmedia is dedicated to a single signal112
4335453974AmplifierBoosts analog signal113
4335456089RepeaterBoosts digital signal114
4337689102OnboardingInstalling a specific program to device giving it trusted access to portions of network115
4337691482OffboardingRemoving programs that give devices special permission to network - often comes with feature to remote wipe in the event of device theft116
4345906450Reflectionwireless signal is bounced off surface117
4346647959Diffractionwireless signal splits and some continues through obstacle and some bounce118
4346672490ScatteringReflection in multiple different directions119
4346702095Unlicensed channels in 2.4 GHz band11120
4346702126Unlicensed channels in 5 GHz band and width of each24 channels, each 20 MHz121
4346710335Bluetooth radio band2.4 to 2.485 GHz122
4346720547WLANs work on _ LayerLayer 2, in order to maintain TCP/IP compatibility with wired networks123
4346734589802.11n special characteristicsFreq band: 2.4 AND 5 GHz Max throughput: 65-600 Mbps Up to 400m range with MIMO124
4346742682802.11ac characteristicsFreq band: 5 GHz Wave 1: 1.3 Gbps throughput: 3 data streams Wave 2: 3.47 Gbps throughput: 4 data streams Wave 3: 6.93 Gbps throughput: 8 data streams125
4346756423Carrier Sense Multiple Access with Collision Avoidence (CSMA/CA)required on 802.11 to check transmissions before transmitting data126
4346775636Active Scanningclient transmits probe to look for available wireless network AP127
4346779566Passive Scanningclient listens for beacon frame from available AP. Beacon frame includes SSID128
4346790331Basic Service Set (BSS)Group of stations sharing an AP129
4346795878Extended Service Set (ESS)Large WLAN with multiple APs. (same SSID for multiple points)130
4346818998802.11 MAC header componentsManagement Frames Control Frames: ACK, RTS/CTS Data Frames131
4346828707Multiple Input Multiple Output (MIMO)multiple antennas on a AP issues signals to more than one receiver at a time132
4346836302Channel Bonding2-8 adjacent 20MHz channels on the 5GHz band can be bound together to increase capacity133
4346869445Aggregated Mac Protocol Data Unit (A-MPDU)Frame aggregation technique used to combine frames into larger frames for transmission in order to reduce bandwidth. Starts on 802.11n Much larger frame size capacity than A-MSDU134
4346882458Aggregated Mac Protocol Data Unit (A-MSDU)Frame aggregation technique used to combine frames into larger frames for transmission in order to reduce bandwidth. Starts on 802.11n Much smaller frame size capacity than A-MPDU135
4346898517MAC FilteringSetting which prevents devices not on an access list to connect136
4346916977WPA/WPA2Protected Access to WiFi which dynamically assigns every transmission its own key. WPA2 has better encryption137
4346929514WPA/WPA2 EnterpriseWPA combined with RADIUS server138
4346960454Infrastructure as a Service (IaaS)Hardware services (servers virtual desktops) are provided remotely139
4352810188Platform as a Service (PaaS)Operating systems and runtime libraries for multiple OS available remotely, often used by developers140
4352816404Software as a Service (SaaS)Applications available remotely (gmail, drive, etc)141
4352822178Anything as a Service (XaaS)Any combination of hardware, software, or app that suits a clients needs142
4352824123Public CloudAvailable to anyone over public transmission lines143
4352827575Private CloudService established on an organizations own servers for private use by employees144
4352831322Community CloudMultiple organizations sharing a service which is not available publicly145
4352833620Hybrid CloudCombination of other models to form a total solution (company uses gmail but runs private cloud data)146
4352843799Serial Line Internet Protocol (SLIP)Data link layer Designed to connect point to point but with no encryption147
4352847535Point to Point Protocol (PPP)Data link layer Uses PPP header and trailer to form PPP frame to encapsulate packets to establish connection between two computers148
4352874223Routing and Remote Access Service (RRAS)Microsoft solution for VPN which can connect to multiple clients over any transmission path. Can work with DirectAccess to create always-on remote connections while also allowing VPN connections to the network149
4352885526VPN concentratorSpecial device made for organizations which require more than a few VPN connections at a time. It authenticates, establishes tunnels, and manages encryption. Also known as an encryption device150
4352892870Generic Routing Encapsulation (GRE)Tunneling protocol developed by Cisco Transmits PPP data after PPTP creates tunnel Does not encrypt, so IPsec is needed151
4352897110Point to Point Tunneling Protocol (PPTP)Microsoft Layer 2 protocol that masks PPP frames as IP traffic using TCP segments Can be used by any OS, despite being developed by Microsoft152
4352911852Layer 2 Tunneling Protocol (L2TP)VPN tunneling protocol developed by Cisco, similar to PPTP. Standard accepted by many vendors, so works across equipment types. Can connect many disparate devices/brands153
43529280283 Encryption assurancesConfidentiality: only viewed by intended user Integrity: Not modified during transit Availability: accessible to intended recipient (CIA)154
43529357743 Security TenetsUtility: Data arrives in useful form Authenticity: Data arrives in whole form; not forged Non-repudiation: Provides proof of delivery and proof of identity155
4352947383Private Key Encryptionencrypted by a single key held by sender and reciever Also known as symmetric encryption156
4352951315Public Key EncryptionUses two keys: Public Key: issued freely from sender or 3rd party Private Key: Associated with one user which is issued by a certificate authority (CA)157
4352962774Public Key Infrastructure (PKI)Use of certificate authorities to associate public keys with known users158
4352967878IPsecdefines rules for encryption, authentication, and key management for TCP/IP transmissions Works on IPv4 and 6 Works at network layer by adding security info to header of all IP packets159
4352976347Secure Socket Layer (SSL)Operates at Application Layer Used to encrypt TCP/IP transmissions between devices using Public Key encryption Uses 3 way handshake improved upon by TLS160
4352990805Transport Layer Security (TLS)Better form of SSL Uses 3 way handshake161
4353003514Tunneled Transport Layer Security (TTLS)Like TLS/SSL but only requires cert from server. Client is authenticated by password only162
4353036940Secure Shell (SSH)alternative to telnet which encrypts connections to provide secure connections May be encrypted by DES, triple DES, KERBEROS, or RSA Uses port 22163
4353044484Secure File Transport Protocol (SFTP)secure version of FTP. Can work on any port, but commonly listens on port 22164
4353055943HashingNot encryption Ensures data is not altered165
4353058248Secure Hash Algorithm (SHA) HashesSHA2 = 256 bit hash SHA-512 = 512 bit hash SHA3 = different version developed by private designers, still uses 252 and 512 bit hashes166
4353070458Authentication, Authorization, and Accounting (AAA)Protocol category containing: RADIUS and TACACS+167
4353077385RADIUSby far most popular AAA service application layer transported by UDP can be run as application or on a server Often combined with other services like a DHCP server Can be added to WPA to make WPA enterprise168
4353092189TACACS+Capable of separating access, authentication, and auditing capabilities Relies on TCP, NOT UDP typically on a router or switch, not server encrypts all info, not just password like RADIUS169
4353106618Challenge Handshake Authentication Protocol (CHAP)Authentication protocol that operates over PPP170
4353119619Extensible Authentication Protocol (EAP)extension to PPP Only provides framework for authenticating clients and servers Does not perform encryption or decryption Flexible and supported by every operating system Can be used with any encryption method171
4353129834802.1X (EAPoL)Grants access and dynamically generates and updates authentication keys for transmissions to a particular port Commonly used with RADIUS Primarily used on wireless networks172
4353144709KERBEROSauthentication protocol which uses key encryption to verify clients and securely exchange info Made up of: -Key Distribution Center (KDC) -Authentication Service (AS) -Tickets: ticket granting service (TGS) and ticket granting ticket (TGT) -Principal173
4353193691JammingAttack where a high volume of illegitimate wireless signals overwhelm a wireless network174
4353198470ARP cache poisoningAttack where fake ARP replies alter ARP tables making the network more vulnerable175
4353201433MAC floodingAttack where a switch is overloaded with ARP replies176
4353211912Banner-grabbing attackHacker transmits bogus requests for connections in order to receive information which guides further attack efforts177
4353218276Session Hijacking Attacksession key that is intercepted by an attacker so they can take control of the session One such attack is Man in the middle attack178
4353226027Buffer Overflowoverflow of temporary memory allocation that cause crash. Ping of Death is most common179
4353235886IP Spoofingobtaining an IP internal to a network in order to fool firewall into allowing access from outside180
4353237976FlashingAttacker who hijacks an internet chat session when a user remains logged in181
4353244201Distributed Denial of Service (DDoS)Use of a botnet or Zombie army of infected computers to magnify DoS attacks, coordinating attacks182
4353252066Distributed Reflector DoS (DRDoS)DDoS attack bounced off uninfected computers before being directed at a target, achieved by spoofing183
4353255275Smurf Attackoriginating source IP is spoofed to appear as a known host on a network, which sends a ping and receives responses from all computers on the network with all these responses being sent to the victim184
4353263049Permanent DoS attackattack which aims to damage firmware on devices beyond repair - "bricking" the device185
4353303999Network Access Control (NAC)employs policies or rules which determine level of access when a device joins a network It authenticates and authorizes devices186
4353312213Access Control List (ACL)Set of parameters which are checked by a router for in/outbound traffic to ensure traffic passes criteria If none of the criteria are met, the router will drop packet - Implicit Deny Rule187
4353320727Intrusion Detection System (IDS)Detects suspicious activity within a network Host based (HIDS): looks on one device Network Based (NIDS): looks over whole network from within DMZ188
4353334721Intrusion Prevention System (IPS)Stands between attacker and host to prevent traffic from reaching protected host Can be located in DMZ and in network Can be located on host (HIPS) or network (NIPS)189
4353349437Packet Filtering FirewallConfigured to accept or deny IP traffic based on: -Source and Destination IP address -Source and destination ports -Flags in TCP header -Transmissions using UDP or ICMP Can be host based (only on one host) or network based190
4353358655Stateful firewallinspects only new connection packets and automatically allows packets from existing connections191
4353364946Stateless firewallinspects every packet regardless of connection status192
4353369526Content Filtering Firewallblocks traffic based on application layer data contained within packets193
4353373312Unified Threat Management (UTM)security strategy which layers tech into a single safety net: IDS/IPS employed with firewalls, and Proxy servers194
4353379827Next Generation Firewall (NGFW)Application aware firewall which can be user aware and context aware (adapts to various apps, users, and devices)195
4353385909Proxy ServerApplication layer security which looks like an internal network server to the outside but actually filters all traffic going into a protected LAN. Allows a user to send a message to an internet user, but the message is re-packaged by proxy server to make it seem like the message originated from the proxy, protecting your IP address196
4353402083SIEMKeeps log and evaluates to identify threats197
4353410069Boot sector virusvirus which resides in boot files and is generally very hard to remove198
4353416191Macro Virusvirus spread by word processing or spreadsheet file, which seems harmless199
4353420683Wormprogram which spreads independently over any means and can be used to hide viruses200
4353435860Trojan HorseProgram which claims to do something useful to fool a host into allowing it to be installed, but really carries a payload of malicious software201
4384285948Network Management System (NMS)Central collection point which saves performance data202
4384357581Traffic Shapingmanipulates packets or connections to manage the type or amount of traffic across a network203
4384386083H.323 gatewayTranslates between network devices running H.323 and devices running other types of signalling204
4384394080H.323 gatekeeperAuthorize and authenticate terminals and gateways for H.323 networks It is optional205
4384408591Multipoint Control Unit (MCU)supports H.323 terminals and manages connections (VTC bridge)206
4384431347Session Initiated Protocol (SIP)Runs small VoIP networks Easier to maintain and set up than H.323 networks207
4384448423Media Gateway Control Protocol (MGCP)Older than MEGACO, used on multiservice networks which supports a large number of media gateways208
4384466149MEGACOPerforms same functions as MGCP but supports a broader range of network tech Contained in H.248 standard209
4384501579Real Time Transport Protocol (RTP)Provides more reliable transmission for multimedia devices RTCP provides feedback on the quality of call or VTC210
4384520717DiffServSimple QoS technique which assigns priority to different types of traffic211
4384528030Multiprotocol Label Switching (MPLS)enables types of layer 3 protocols to travel over different types of layer 2 protocols Used commonly by ISPs212
4384553682Class of Service (CoS)QoS specific to layer 2 Works by assigning a Priority Code Point from 0-7 to a VLAN tag213
4395810185Link aggregationUse of redundant NICs to act as one logical interface Requires an intelligent switch using LACP or static bonding214
4395843587Round robin DNSuse of multiple DNS servers who take turns handling requests215
4395848867Load balancerdevice that considers load on servers before assigning traffic to a certain server216
4396016871CARPCommon Address Redundancy Protocol Allows a pool of computers or interfaces to share one or more IP addresses This pool is known as a Group of Redundancy217
4396112550Virtual BridgesPort on a virtual switch connecting a vNIC with a network218
4396133897NAT ModevNIC can rely on physical machine to assign it an IP instead of needing a DHCP server219
4396176098VRRP / HSRPAssigns a virtual IP address to a group of routers. If that router fails, it will dynamically re-assign a standby router to become the master router220
4396267046DHCP Relay AgentRouter programmed to send specified DHCP traffic beyond a broadcast domain221
4396295124Spanning Tree Protocol (STP)prevents routing loops by sending BPDUs to all switching devices to calculate paths Root bridge is the basis for all STP calculations222
4396304047BPDU GuardPrevents BPDUs from being sent to non-switches, like workstations223
4396307452BPDU filterdisables STP on certain ports, like the one which connects to the outside world, to prevent spanning tree from getting confused on which network is yours224
4396325324TRILLmultipath link state protocol which is an updated version of STP225
4396337043LWAPPcentralized network management for wireless devices226
4396341706Thick APself contained AP which can do its job without higher level management device227
4396346419Thin APAP which requires management device228
4396356467VLAN PoolingDynamically assigning a WIRELESS client to a VLAN out of a pool of available VLANs229
4396394474T-1 (DS1) Facts1 T-1 = 24 Channels = 1.544 Mbps230
4396418322T-3 (DS3) Facts28 T-1s = 672 channels = 44.736 Mbps231
4396432518RJ-48Terminates T-1 over copper cable232
4396439618Smart JackWhere T-1 copper terminates at the customer building Monitors connection and looks for errors233
4396448918CSU/DSUCan be stand alone or on an interface card DSU Converts T carrier into frames for the LAN and vice versa (usually incorporates multiplexer) CSU provides termination for digital signal and ensures connection integrity234
4396503395SVC(Frame Relay) virtual circuit which sets up to TX/RX then disconnects235
4396509439PVC(Frame Relay) virtual circuit which are established and maintained according to the committed information rate (CIR) which is the minimum data rate agreed upon with the ISP236
4396527000asymmetrical DSLupstream and downstream data rates are different237
4396537742DSLAMmultiplexes multiple DSL lines and connects them to carriers CO238
4396545561DOCSISbroadband cable service 3.x is the newest version239
4396565455Hybrid Fiber Coax (HFC)broadband method of connecting customers with cable drops to the head end (CO)240
4396582862Broadband over power line (BPL)high speed internet over electrical grid241
4396596911Asynchronous Transfer Mode (ATM)Uses 53 byte cells for transmission Works on virtual circuits Scalable QoS for non-critical info to important Rarely used now242
4397357298LANEATM protocol which encapsulates Ethernet frames and converts them into 53 byte ATM cells243
4397364140SONETInteroperable WAN which uses double ring topography for fault tolerance Self healing Uses multiplexer which terminates ring at customer facility244
4397383061Optical Carrier (OC)Throughput of a SONET network OC-3 = 155.52 (large businesses) OC-12 = 622.08 (ISP WAN connections)245
4397414649Metro Ethernetvirtual Ethernet networks established over other types of networks (SONET, DSL, etc) Uses CET246
4397427574Carrier Ethernet Transport (CET)Ethernet transport solution to implement Ethernet outside the LAN environment, used by Metro Ethernet247
4397442809WiMAXFlexible long range wireless Can be LOS or not Includes QoS capability Uses MIMO Most US brands use 2.3, 2.5, 3.65 GHz bands WiMAX2 or 802.16m is latest version Considered a version of 4G Cellular248
43974683043G cellular dataup to 384Kbps249
43974716934G cellular DataAlso known as LTE All IP based voice and data network up to 100MBps for fast moving clients up to 1Mbps for slow moving clients250
4397488522EGPRSStandard which allows multiple transmissions based on time slots For Cellular Networks Requires a SIM card251
4397493035CDMALike EGPRS but spreads transmissions over wider bandwidth Also called "spread spectrum" Does not require a SIM card252

Need Help?

We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.

For general help, questions, and suggestions, try our dedicated support forums.

If you need to contact the Course-Notes.Org web experience team, please use our contact form.

Need Notes?

While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!