Chapter 11.5 Wireless Networking

¡Supera tus tareas y exámenes ahora con Quizwiz!

Bluetooth Versions

- 1.0: Operates at a range of 10 meters and speeds up to 1 Mbps. - 2.0: Operates at a range up to 30 meters and speeds up to 1 Mbps. A special mode called Enhanced Data Rate (EDR) enables transfer rates up to 3 Mbps. - 3.0: Operates at a range up to 30 meters and speeds up to 1 Mbps. A special mode known as High Speed (HS) allows the Bluetooth device to use a nearby 802.11 link to achieve speeds up to 24 Mbps. - 4.0: Operates at a range up to 60 meters and speeds up to 1 Mbps (24 Mbps when using High Speed mode). - 5.0: Operates at a range up to 240 meters and speeds up to 2 Mbps (48 Mbps when using High Speed mode).

IEEE 802.11 Standards

- 802.11 a - 802.11 b - 802.11 g - 802.11 n - 802.11ac (Wi-Fi 5) - 802.11 ax (Wi-Fi 6)

802.11 b

- Frequency: 2.4 GHz - Maximum Speed: 11 Mbps - Maximum Distance: 150 ft. - Channels (non-overlapped): 11 (3) - Backwards Compatibility: None

802.11 g

- Frequency: 2.4 GHz - Maximum Speed: 54 Mbps - Maximum Distance: 150 ft. - Channels (non-overlapped): 11 (3) - Backwards Compatibility: 802.11 b

802.11 ax (Wi-Fi 6)

- Frequency: 2.4 GHz or 5 GHz - Maximum Speed: 14 Gbps - Maximum Distance: 300 ft. - Channels (non-overlapped): Depends on configuration. - Backwards Compatibility: 802.11 b/g/n/ac

802.11 n

- Frequency: 2.4 GHz or 5 GHz - Maximum Speed: 600 Mbps - Maximum Distance: 300 ft. - Channels (non-overlapped): 2.4 GHz : 11 (3 or 1) ; 5 GHz: 23 (12 or 6) - Backwards Compatibility: 802.11 a/b/g, depending on implementation.

802.11ac (Wi-Fi 5)

- Frequency: 5 GHz - Maximum Speed: 3.46 Gbps - Maximum Distance: 300 ft. - Channels (non-overlapped): Depends on configuration. - Backwards Compatibility: 802.11 b/g/n

802.11 a

- Frequency: 5 GHz - Maximum Speed: 54 Mbps - Maximum Distance: 100 ft. - Channels (non-overlapped): 23 (12) - Backwards Compatibility: N/A

Authentication Protocols that offer AAA Protection?

- RADIUS - TACACS+

Wireless Network Authentication Protocols are:

- RADIUS - TACACS+ - Kerberos

Wireless Network encryption algorithms are

- TKIP - AES

A customer is experiencing a sporadic interruption of their Wi-Fi network in one area of their building. A technician investigates and discovers signal interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased. Which of the following Wi-Fi standards should the replacement device support to BEST fulfill the customer's needs?

802.11 ac

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions should you recommend?

802.11 g

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard works BEST in this situation?

802.11 n

Bluetooth Classes

A Bluetooth Range is determined by it's class: - Class 1: devices can transmit up to 100 meters - Class 2: devices can transmit up to 10 meters - Class 3: devices transmit at a range less than 10 meters.

Channel Bonding

A Method that combines channels into one to increase bandwidth. - The 5 GHz range has a total of 23 channels, with 12 non-overlapping. This allows for a maximum of six non-overlapping bonded (combined) channels. - The 2.4 GHz range has a total of 11 channels, with three non-overlapping. This allows for a maximum of one non-overlapping bonded channel.

Wireless Channel

A method that allows the frequency of the wireless network to be fine-tuned. Each channel is approximately 20 MHz wide.

AAA Protocols

A protocol that provides: - Authentication: proves the user's identity. - Authorization: defines what the user can access. - Accounting: logs what the user accessed while on the network.

You have recently purchased a toll pass for a bridge that you cross each day on your way to work. Which of the following wireless technologies is MOST likely being used for this pass?

Active RFID

AES

Advanced Encryption Standard; based on the Rijndael algorithm. - AES keys can be either 128, 192, or 256 bits and encrypts data in 128-bit chunks. - AES is typically combined with the Counter Mode with Cipher Block Chaining Message Authentication (CCMP) to enhance the security of the wireless network. - AES is considered one of the strongest encryption protocols and is used in more than just wireless networks.

WPA2 Personal

Also known as WPA2-PSK. This version uses a pre-shared key (passphrase) to protect the network. - WPA2-PSK uses Advanced Encryption Standard-Counter Mode with Cipher Block Chaining Message Authentication Code (AES-CCMP) to encrypt all data. AES is the encryption algorithm. AES-CCMP uses a 128-bit key and a 128-bit block size. - When a device connects to the access point, a 4-way handshake occurs to authenticate the device. ** this does have vulnerabilities that a hacker can use to intercept the data and perform offline password attacks.

2.4GHz Wireless Signal

Are wider, but shorter. This means they can travel further, but transmit data at a slower rate.

Captive Portal

Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which of the following is the BEST choice for this wireless connection?

Bluetooth

Bluetooth Class 3

Devices transmit at a range less than 10 meters

Bluetooth Class 2

Devices transmit up to 10 meters

Bluetooth Class 1

Devices transmit up to 100 meters

Wi-Fi Protected Access

Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.

802.11

IEEE designation for all wireless networking standards.

MU-MIMO

Multi-user Multiple-input Multiple-output; An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.

MIMO

Multiple Input Multiple Output; An enhancement that allows multiple antennas to use the same radio frequency. - A system is described by the number of sending and receiving antennas. The 802.11n specifications allow up to four sending and four receiving antennas - MIMO relies on beamforming to deliver better speeds. Beamforming focuses the signal to a specific receiving device which results in a higher quality signal.

A user pays for a retail purchase by placing a smartphone next to the merchant's reader. Which of the following wireless mobile device connections is this?

NFC

Which of the following wireless communication technologies can be described as follows? - It has a limited transmission range of less than two inches. - It is used with credit cards and passports. - It is slower than other wireless technologies. - It constantly emits a signal.

NFC

NFC

Near Field Communication; A communication method that allows two-way communication between two devices within a few centimeters of each other.

Bluetooth Version 1.0

Operates at a range of 10 meters and speeds up to 1 Mbps.

Bluetooth Version 5.0

Operates at a range up to 240 meters and speeds up to 2 Mbps (48 Mbps when using High Speed mode).

Bluetooth Version 2.0

Operates at a range up to 30 meters and speeds up to 1 Mbps. A special mode called Enhanced Data Rate (EDR) enables transfer rates up to 3 Mbps.

Bluetooth Version 3.0

Operates at a range up to 30 meters and speeds up to 1 Mbps. A special mode known as High Speed (HS) allows the Bluetooth device to use a nearby 802.11 link to achieve speeds up to 24 Mbps.

Bluetooth Version 4.0

Operates at a range up to 60 meters and speeds up to 1 Mbps (24 Mbps when using High Speed mode).

PSK

Pre-Shared Key; Wireless authentication method that uses a passphrase to authenticate users.

RFID

Radio Frequency Identification; A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.

Unbounded Medium

Radio waves because they are not encased in a sheath like a Fiber Optic cable or a STP/UTP.

RADIUS

Remote Authentication Dial-In User Service; an open standard protocol used to authenticate users onto a network. - Sends a user's credentials over UDP. - Encrypts only the password. The username is sent in cleartext. - Uses port 1812 for authentication and authorization. - Uses port 1813 for accounting.

802.1x Authentication

Secure authentication method for wired and wireless networks.There are three components in a wireless 802.1x setup: - Supplicant - The wireless client. - Authenticator - This device responsible for handling the communications between the supplicant and authentication server. - Authentication server - The server that contains the centralized database for user authentication. **802.1x implementations on wireless networks often use Remote Authentication Dial-In Service (RADIUS).

TKIP

Temporal Key Integrity Protocol; developed to address the security flaws that were prevalent in the Wired Equivalent Privacy (WEP) wireless security standard.With TKIP, each packet has a unique encryption key. TKIP accomplishes this by mixing: - A base key. - The MAC address of the wireless access point. - A packet serial number.

TACACS+

Terminal Access Controller Access Control System Plus; developed by Cisco to address security concerns in RADIUS. - used only in CISCO Devices - Sends a user's credentials over TCP - Encrypts all data packets including usernames and passwords - uses port 49 for all communications.

WPA2 Enterprise

This version uses a RADIUS server to authenticate users to the network.

Which of the following authentication methods allows you to securely connect a printer to the wireless network with the least amount of effort?

WPS

WPA2

Wireless Protected Access 2; is the implementation name for wireless security that adheres to the 802.11i specifications. It was introduced in 2004 and is still heavily used in today's networks. There are two version of WPA2 available: - WPA2 Personal - WPA2 Enterprise

Wi-Fi Protected Setup

Wireless authentication method that allows for automatic connection between a device and the wireless access point. **Wi-Fi Protected Setup works only on a network that uses a PSK and an appropriate encryption protocol, such as Wi-Fi Protected Access 2 (WPA2) or Wi-Fi Protected Access 3 (WPA3).

Bluetooth

Wireless communication technology that allows two devices to connect to each other over a short distance.

Open Network

Wireless network that requires no authentication. It allows anyone to connect to the network. This access method should be used only in public places that want to offer free wireless access.

Passive RFID

are not powered and rely on the energy transferred by the scanner to transmit data. ID badges, credit cards, and similar devices use these tags.

5GHz Wireless signal

are thinner, but taller. This means they do not travel as far, but can transmit data at a faster rate.

Kerberos

developed at MIT and is a key component of Windows Active Directory. Kerberos has three main components: - Client - Authentication server (typically the Active Directory server) - Trusted Key Distribution Center (KDC)

WPA3

introduced in 2018 to address the vulnerabilities inherent in the WPA2 handshake and to support newer technologies. Instead of using the pre-shared key, WPA3 implements the Simultaneous Authentication of Equals (SAE) standard. - SAE uses a 128-bit key and perfect forward secrecy to authenticate users. - Perfect forward secrecy is a cryptography method that generates a new key for every transmission. This makes the handshake much more secure from hackers. If any portion of the handshake is intercepted, the key is still unable to be cracked.

Active RFID

tags have on-board batteries and can send signals over a long distance. Toll passes in vehicles use active RFID

What is Wireless Ethernet Network used For?

used to transfer data, not to connect devices.


Conjuntos de estudio relacionados

Portfolio Management Theory, Portfolio Development, and Asset Allocation

View Set

Leadership Chapter 1 Quiz (Mindtap)

View Set

Module 3 Unit 3 Supply and Demand

View Set

Civil War and Reconstruction - Why did the Civil War last four years?

View Set

Chapter 33: Coronary Artery Disease and Acute Coronary Syndrome

View Set

Ch. 60 Airbags and Pretentioner Circuits

View Set