Wireless_chp6_Communication for wireless Networking
OFDM 6, 9, 12, 18, 24, 36, 48 Mbps
802.11a uses what type of technology? What are the data rates?
VHT-OFDM up to 6.93Gbps
802.11ac uses what type of technology? what are the data rates?
HR/DSSS 1, 2, 5.5, 11 Mbps
802.11b uses what type of Technology? What are the data rates?
ERP-OFDM 6, 9, 12, 18, 24, 36, 48 Mbps
802.11g uses what type of technology? What are the data rates?
false, max limit of 32 characters
True or False? The SSID is case sensitive, must consist of at least one ASCII character, and has a maximum limit of 16 characters
False, must be on the same channel
True or false? IBSS can communicate with devices on alternate channels.
authentication & success
Two authentication frames are sent during this process. It is not a request and response situation; it is ____ and ____.
extended service set (ESS)
Two basic service sets connected by a common distribution system, make an ___ ____ ____.
C. 802.11a client devices
WLAN devices in an 802.11a peer-to-peer network will connect to which device(s)? A. An access point B. 802.11g client devices C. 802.11a client devices D. A wireless switch
Easy to configure No AP needed
What are some of the advantages of IBSS network?
Limited RF Range & Interference No Centralized Administration Capability Not Scalable Difficult to Secure
What are some of the disadvantages of IBSS network?
Incurs additional hardware costs compared to IBSS. Usually will require a site survey Must be connected to a network infrastructure Requires additional knowledge for configuration and deployment.
What are some of the disadvantages of using BSS network?
Uses Intelligent devices Useful in all scaling SOHO to large business Centralized administration and control
What are the advantages of using BSS?
SSID RF Channel Security configuration
What are the three common parameters set on devices that belong to the same IBSS?
Control frames
What frame is used to request data from the access point after returning from a power save state?
Management Frames
What frames never crosses the Data Link Layer (Layer2)?
Wireless mesh DS
What type of DS is in this image?
Passive scanning
What type of scanning method is in this image?
BSS
What type of set is provided in this image? IBSS BSS ESS
B. Passive scanning
When a WLAN device listens for beacon frames, it is participating in which phase? A. Power save B. Passive scanning C. Active scanning D. Authentication
FHSS & DSSS 1&2 Mbps
802.11 uses what technology? What are the data rates?
HT-OFDM Up to 600 mbps
802.11n uses what type of technology? what are the data rates?
translational bridge
A ____ ____ is defined as a device used to connect two or more dissimilar types of LANs together, such as wireless (IEEE 802.11) and ethernet (IEEE 802.3).
B. At least one
A basic service set (BSS) consists of how many access points? A. Zero B. At least one C. At least two D. At least four
A. AP radio
A basic service set identifier (BSSID) is the unique identifying MAC address of the _____. . A. AP radio B. AP Ethernet port C. Router D. Client
C. Management
A beacon frame advertises information about the wireless network. A beacon frame is what type of frame? A. Data B. Control C. Management D. Detail
C. 32
A service set identifier (SSID) has a maximum limit of how many characters or octets? A. 8 B. 16 C. 32 D. 128
A. One or more
According to the IEEE 802.11 standard, an extended service set (ESS) consists of how many interconnected basic service sets? A. One or more B. Two or more C. Three or more D. Four or more
Independent basic service set (IBSS) Ad Hoc Peer-to-peer
An IBSS is usually identified by what three terms?
IBSS
An ____ network is also known as an ad hoc or peer-to-peer network.
beacon
An example of a management frame that works in the discovery phase or passive scanning is a ____ frame.
A. 0
An independent basic service set (IBSS) consists of how many access points? A. 0 B. 1 C. 2 D. 4
A. Data rate decreases
As a device moves away from an access point, which of the following is true regarding dynamic rate switching? A. Data rate decreases B. Output power decreases C. Data rate increases D. Output power increases
10
By default, beacons for most access points broadcast at about ____ times a second.
4
How many authentication frames are used in shared-key authentication?
association
IEEE 802.11 _____ takes place after a wireless device has been successfully 802.11 authenticated either by open system authentication or by shared-key authentication.
robust security network (RSN).
IEEE 802.11 open system authentication is the only valid authentication process allowed with newer WLAN security amendments and interoperability certifications for the network to be considered a ____ ____ ____
ad hoc or infrastructure mode
IEEE 802.11 wireless LANs (WLANs) can be configured in one of two operation methods/modes: ____ or ____
6,933.3 / 6.93
IEEE 802.11ac access point advertises a maximum aggregate signaling rate of up to ____ Mbps (____ Gbps)
distribution system (DS)
In WLAN technology, the ____ ____ is the common network infrastructure to which wireless access points are connected; it can be wired or wireless mesh.
probe
In active scanning, WLAN devices wishing to connect to a network send out a management frame known as a ____ request.
B. Authenticate, associate
In order for a wireless client to become completely part of the basic service set, it must first _____ and then _____. A. Associate, authenticate B. Authenticate, associate C. Deauthenticate, authenticate D. Disassociate, authenticate
A. SSID & C. Channel
In order to set up an ad hoc network, a user must know which two parameters? (Choose two.) A. SSID B. BSSID C. Channel D. MAC address E. Protection mode
8.1
Microsoft Windows operating systems after version _____ no longer allow for an ad hoc network to be created from the graphical user interface.
No coverage after pg239
No coverage after pg239
closed network
SSID hiding is also known as a _____ _____
A. Authentication
The IEEE 802.11 association process happens after which phase? A. Authentication B. Distribution C. Deauthentication D. Reauthentication
antenna & RF
The RF area of coverage, known as the basic service area (BSA), depends on several factors, such as the ____ gain and ____ output power settings.
distribution System (DS)
The ____ ____ is a network segment that consists of one or more connected basic service sets.
service set identifier (SSID)
The ____ _____ _____ is a common parameter used in all WLAN operation configurations.
BSSID
The ____ is defined as the unique identifier, Media Access Control (MAC) address of the basic service set.
SSID
The ____ is the logical name of the service set used to identify the wireless network.
distribution system (DS)
The access points are connected by a common medium known as the ____ _____.
B. Mismatched SSID
The building has an ESS network with five 802.11ac access points. The customer claims that when they move from their office to a conference room using the 802.11ac network they lose their connection and cannot connect to the access point in the conference room. Which is the most likely cause for this user to lose their connection when they roam on the wireless network? A. Different RF channel B. Mismatched SSID C. Different BSSID D. Mismatched association
passive
The first part of the discovery phase in IEEE 802.11 wireless networking is known as ____ scanning.
frames
The information traveling through the air is organized into what are known as _____.
C. Active mode
The notebook computer is plugged into an AC power source and rarely used on battery. Which mode would you recommend her to set on the wireless adapter? A. Power save mode B. Association mode C. Active mode D. Passive mode
B. Two
The open system authentication process uses how many frames? A. One B. Two C. Three D. Four
B. Roaming
The process in which a WLAN client connection moves from one access point to another is called _____ . A. Reauthentication B. Roaming C. Rebuilding D. Roving
data rate
The speed at which wireless devices are designed to exchange information is known as the _____ _____.
QoS
There is also a variant of the null frame called the ____ null frame,
Management Frame
These are all examples of what type of frame? ■■ Beacon ■■ Probe request ■■ Probe response ■■ Authentication ■■ Association request ■■ Association response
Data Frame
These are all examples of what type of frame? ■■ Data ■■ QoS data ■■ Null data
Control Frame
These are all examples of what type of frame? ■■ RTS ■■ CTS ■■ CTS to Self ■■ PS-Poll ■■ ACK
Deauthentication & Disassociation
These are notifications, NOT request.
IBSS
This WLAN operation mode uses no access points and consists of only wireless devices or client computers.
Basic Service Set (BSS)
This mode consists of an access point connected to a network infrastructure and its associated wireless devices.
True
True or False? Because WEP is mandatory with IEEE 802.11 shared-key authentication, it makes a system vulnerable to intrusion.
True
True or False? For infrastructure devices such as access points, the SSID parameter is manually set on the access point.
True
True or False? Some devices allow for multiple SSIDs, which use multiple BSSIDs for a single radio.
True
True or False? The BSS consisting of one access point is a common implementation in many homes, SOHO, or small to medium businesses (SMBs).
True
True or False? The IEEE 802.11 standard requires all access points to respond to a broadcast probe request that contains a null SSID value.
B. Independent
When an IEEE 802.11g WLAN consists only of wireless client stations, the network is operating as which type of basic service set? A. Active B. Independent C. Passive D. Infrastructure
A. 32 characters maximum C. Is case sensitive
Which items describe a service set identifier (SSID)? (Choose two.) A. 32 characters maximum B. 64 characters maximum C. Is case sensitive D. Is not case sensitive
centralized control & security management
With IBSS networks, there is no ____ ____ and no ____ _____ features.
BSS
With a ____ setup, each access point is connected to a distribution system.
C. ERP protection
You are a help desk support technician at a retail department store, and you receive a call from a manager in the administrative offices. He complains that the performance of his 802.11g/n notebook computer decreases several times throughout the day. Upon visiting the customer, you realize several people are performing inventory using 802.11b barcode scanners in the adjacent room. What is most likely the cause of the poor performance for the manager's notebook computer? A. Association B. Authentication C. ERP protection D. HT protection
C. Dynamic rate switching
You are a sales engineer connected to an IEEE 802.11ac access point with a mobile computer. As you move away from the access point, the connection speed slows to the next lowest supported data rate. The change in data rate is described by which term? A. Dynamic frequency selection B. Transmit power control C. Dynamic rate switching D. Transmit save mode
Data
____ frames are used to carry data payload or Layer 3 information between wireless devices.
Control
____ frames are used to control access to the wireless medium by allowing devices to the medium and acknowledge data.
Management
____ frames are used to manage the network.
Authentication
____ in general is defined as verifying or confirming an identity.
Deauthentication
____ occurs when an existing authentication is no longer valid.
Wireless network discovery
_____ _____ _____ is the process of a client device scanning for wireless networks and identifying the parameters of the network, including the SSID, supported data rates, and security settings.
Disassociation
_____ occurs when an association to an access point is terminated.
Independent basic service set (IBSS) Basic service set (BSS) Extended service set (ESS)
ad hoc mode and infrastructure mode can be broken down into the what three different configuration sets?
Extended Service Set (ESS)
set of one or more interconnected basic service sets (BSSs) that appears as a single BSS to the Logical Link Control (LLC) layer at any station (STA) associated with one of those BSSs.