801 Unit 11

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

802.11a Less than 54Mbps. 5GHz. Outdoor distance 30M. No interference, not compatible with 802.11b.

802.11a notes

802.11b. Less than 11 Mbps. 2.4 GHz. Outdoor distance 300M. Has interference.

802.11b notes

802.11g More than 20Mbps, ad. to 54Mbps. 2.4GHz. Outdoor distance 90M. Has interference, compatible with 802.11b.

802.11g notes

802.11n Less than 600Mbps. 2.4 or 5 GHz. Outdoor distance 250M. No interference, compatible 802.11g, b, & a.

802.11n notes

Ad Hoc Mode: allow all wireless devices within range to discover and communicate with one another without a central access point.

Ad Hoc Mode

Class A: 10.0.0.0-10.255.255.255 Class B: 172.16.0.0-172.31.255.255 Class C: 192.168.0.0-192.168.255.255

Address Ranges for Intranet

Availability of Addresses - The American Registry for Internet Numbers (ARIN) regulates and assigns IP addresses that can be used directly on the Internet. Companies must apply and pay for the use of address ranges, and typically must justify the addresses they request. Rather than going through the trouble for every new block of network devices they add, companies use a private range of addresses within their network.

Availability of Addresses

Bluetooth stats. 10M range. Works in the 2.4GHz range, is easy to configure, and is useful for short-range connections, and personal area networks (PANs). Connecting is called pairing with Bluetooth.

Bluetooth stats

Configuration Options: Encryption. Firmware Updates. Change default administrator accounts. Change default SSID. Disable SSID. Disable DHCP. MAC filtering. WPS. QoS.

Configuration Options

Creating a plan. 1) Determine business requirements. 2) Review the current infrastructure. 3) Review new and existing techs. 4) Determine the appropriate infrastructure requirements. 5) Document the design. 6) Review the documentation with the appropriate personnel.

Creating a plan for a SOHO

Demilitarized Zone: an area between the private network (intranet) . It isn't a direct part of either network but is, instead, an additional network between the other two networks.

DMZ

"WEP authentication attempts to perform an IEEE 802.11 shared key authentication if the network adapter has been preconfigured with a WEP shared key; otherwise; the network adapter reverts to the open system authentication".

Default Setting Used by Wireless Zero Configuration concerning WEP Authentication

"Infrastructure before ad hoc mode, and computer authentication before user authentication".

Default Settings used by Wireless Zero Configuration Concerning Infrastructure Mode

Infrastructure Mode: typically uses an access point to connect the wireless network to the wired network. It typically requires authentication in which the computer identifies itself to the authenticating server before the user credentials are sent.

Infrastructure Mode

Intranet: an organization's private network. Fully controlled and trusted by the company.

Intranet

Intranets use private address spaces. The following address ranges are reserved. (See next card).

Intranet private address ranges/spaces

Network Address Translation (NAT) devices correlate internal and external addresses. Internal addresses often private, external are public. Protects internal devices.

NAT

Port Address Translation: a device such as a router or firewall, performs NAT services using port numbers to differentiate between internal computers sharing the single public address.

Port Address Translation

Port Triggering : allows connections through a firewall by opening a connection to a specific internal computer that has communicated with a with an Internet host using a specific port, called a trigger port.

Port Triggering

Quality of Service (QoS) settings on the network can be used to ensure that specific types of network traffic receive priority over other types, thereby helping to reduce or eliminate jitters and other types of interference.

QoS

Securing Your Access Point. 1) Set the most secure transmission encryption method compatible with your clients. 2) Update the access point's firmware version. 3) Change default administrator accounts and passwords for the access point. 4) Change the default SSIDs. 5) Disable SSID broadcasts. 6) Disable DHCP within the wireless network to keep tighter control over users. 7) Enable MAC address filtering on access points to limit unauthorized wireless NICs. 8) Wi-Fi Protected Setup (WPS)

Securing Your Access Point Steps

Security: by using private internal addresses in a company, network administrators make it more difficult for hackers and automated malware on the Internet to discover and compromise internal systems.

Security

Security Zones divide the network into area of similar levels of security (trusted, semi-trusted, and untrusted). You create the security zones by putting all your publicly accessed servers in one zone, putting restricted-access servers in another zone, and then using firewalls to separate both zones from external networks such as the internet.

Security Zones

Service Set Identifier (SSID): essentially a name for your wireless network. The default name is usually the name of the router or WAP manufacturer. Can be up to 32 characters long.

Service Set Identifier

Wired Equivalent Privacy (WEP) is easy to crack. Uses a 64-bit or 128-bit encryption cipher. Is the least secure of transmission encryption methods. Is the only option for 802.11b or older.

WEP

Wi-Fi Protected Access Personal (WPA Personal and WPA2 Personal) was developed to overcome the weaknesses in WEP, 128-bit key, uses a "pre-shared key", the full encryption key changes for each packet.

WPA & WPA2 notes

WPA2 uses an AES. AES randomized things a little bit so people couldn't use algorithms to spot algorithms. AES = Advanced Encryption System.

WPA2 notes

Wi-Fi Protected Setup (WPS): An automated setup provides an easy way to create a secured connection between wireless devices.

WPS

Wireless Auto Configuration also known as Wireless Zero Configuration, dynamically selects the wireless network to which a connection attempt is made, based on configured preferences or default settings.

Wireless Zero Configuration

Access Point: a device that functions as a transparent bridge between the wireless clients and the wired network. Lets you connect wireless devices to a wired network.

access point

Bluetooth: is a standard for short-range wireless communication and data synchronization between devices.

bluetooth

Firewall: a device that that controls traffic between a public network and a private internal network. Controls traffic, blocks or permits traffic based on rules.

firewall

Firewalls protect networks by using some combo of the following techniques: Network Address Translation (NAT), Basic packet filtering, Stateful packet inspection (SPI), Access control lists (ACLs).

firewall techniques

In a formal site survey, you use field strength measuring equipment.

formal site survey

Implementing a Plan. 1) Purchase equipment. 2) Install necessary network media. 3) Connect your networking devices. 4) Connect your computers to the network.

implementing a plan for a SOHO

In an informal site survey, you temporarily set up the WAP's at the locations you're considering for permanent placement.

informal site survey

Major Wireless standards: 802.11a, 802.11b, 802.11g, 802.11n.

major wireless standards

A perimeter network is kept separate from the regular zone, also called a demilitarized zone.

perimeter network

Port: the address of an application at a particular IP address.

port

SOHO Network Plan. It provides: a method for verifying that all business requirements are met, a method for verifying that all technical requirements are met, a roadmap for implementing the network, documentation of the network design for future reference.

soho network plan

Transmission Encryption both limits which clients can connect to your AP and protects data from potential eavesdropping during transmission. Products certified by the Wi-Fi Alliance as Wi-Fi compatible must support at least the WPA Personal level of encryption.

transmission encryption

A wireless access point connects a WLAN to a wired Ethernet network. The access point (AP) contains the following: at least one interface for connecting to the wired network (typically called the WAN port); transmitting equipment for connecting with the wireless clients; and software to act as a bridge between the wireless and wired network. For SOHO networks, this connection is often to a broadband router.

wireless AP notes

To establish a wireless LAN, you need wireless network cards in your computers and a wireless router or wireless access point (WAP) device on the network.

wireless LAN

Wireless Networks operate according to the specifications of the IEEE 802.11 standards. The 802.11 standard is the most widely used wireless technology. Operates in the 2.4 - 2.5GHz band.

wireless networks note


Kaugnay na mga set ng pag-aaral

Insurance Test Final Chapter pt 2

View Set

American Indians of the East Coast

View Set

Financial Accounting Multiple Choice Questions

View Set

Chapter 4: Conditionals and Loops

View Set

Injections/ Eye and Ear procedures

View Set

RHIT Practice Exam 2 - 150 Questions

View Set

1.2 Hematology: Normocytic and Normochromic Anemias

View Set