expand for answer

Frequency hopping

Repeated switching of frequencies during radio transmission according to a specified algorithm, to minimize unauthorized interception or jamming of telecommunications.


Similar items:
The emerging layer 3 switching technology integrates routing with switching to yield very high routing throughput rates in the millionsofpacketspersecond range. The movement to layer 3 switching is designed to address the downsides of the current generation of layer 2 switches, which are functionally equivalent to bridges. These downsides for a large, flat network include being subject to broadcast storms, spanning tree loops, and address limitations that drove the injection of routers into bridged networks in the late 1980s. Currently, layer 3 switching is represented by a number of approaches in the industry.
[view]
Highspeed switch that forwards packets between datalink segments. Most LAN switches forward traffic based on MAC addresses. This variety of LAN switch is sometimes called a frame switch. LAN switches are often categorized according to the method they use to forward traffic: cutthrough packet switching or storeandforward packet switching. Multilayer switches are an intelligent subset of LAN switches. Compare with multilayer switch. See also cutthrough packet switching, storeandforward packet switching.
[view]
A technical measure that facilitates the interception of telecommunications traffic pursuant to the relevant national laws and regulations.
[view]
Another term for sniffing. However, eavesdropping can include more than just capturing and recording network traffic. Eavesdropping also includes recording or listening to audio communications, faxes, radio signals, and so on. The unauthorized interception of informationbearing emanations through methods other than wiretapping.
[view]
A technology that uses electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum to identify a specific device. Each RFID tag includes a unique identifier, so that when a nearby antenna/transceiver actives the tag, it transmits that identifier back to the antenna where that value is recorded or used to trigger some kind of action. For example, most modern toll-road systems use RFID devices that drivers attach to the windshield of their car, and each time a device is “read” by an antenna, the vehicle owner’s toll balance is incremented by the cost of that transit. RFID devices may also be used to track individuals (carrying tags), equipment (bearing tags), and so forth, within the premises of an enterprise for security monitoring.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in