Chapter 14 Wireless Networking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What channels does WAP like?

1,6,11, because they are non overlapping channels

how many channels on the 2.4Ghz network?

14 channels at 120 MHz

What frequencies where originally used for 802.11 standard?

2.4 Ghz 5 Gz

How many channels are available on 5 Ghz network?

40

greenfield mode

802.11n devices only WAP will only accept 802.11n frames everything else is dropped

legacy mode

802.11n that transmits separate packets just for legacy devices. it is a fall back if other methods don't work

Transmit Beamforming (TxBF)

A method that allows a MIMO transmitter using multiple antennas to adjust the phase and amplitude of the outgoing transmission in a coordinated method. eliminates dead spots

MAC address filtering

A method that enables you to limit access to your network based on the physical addresses of wireless NICs.

802.11n

A wireless network standard that defines speeds of up to 600 Mbps. It is downward-compatible with 802.11a, 802.11b, and 802.11g. (13) range 300ft ODFM (QAM) spectrum

802.11i

A wireless standard that added security features. authentication and encryption

SSID broadcast

An access point's broadcasting of the network name, this is how you are able to see networks in your area

wireless network

Any type of computer network that is not connected by cables of any kind. uses radio frequency RF to enable devices to communicate with one another

aside from the layer 1 difference between wired and wireless connections, what is the major difference between the two?

Both send data encapsulated but wired connections use electrical impulses while wireless uses radio waves to send packets

What are the two ways CSMA/CA avoids collisions?

DFC and RTS/CTS(ready to send clear to send

802.11 spread-spectrum broadcasting methods

DSSS direct sequence spread specturm FHSS Frequency hopping sporead spectrum OFDM orthogonal frequency-division multiplexing

802.11 standard for collision avoaidance

Distributed Coordination Function DCF (only one implemented currently) Point Coordination Function PCF

What standard makes sure that all of this communication is encrypted?

EAP

EAP-TLS

EAP with Transport Layer Security defines the use of a RADIUS server as well as mutual authentication, requiring certificates on both the server and every client. Client side, a smart card may be used in lieu of a certificate. Very robust, and the most secure wireless networks use EAP-TLS.

EAP-FAST

EAP-Flexible Authentication via Secure Tunneling--Designed by Cisco to replace LEAP. all current running systems support it

ESS

Extended Service Set

what is a network called that has more than one WAP?

Extended service set

EAP-TTLS

Extensible Authentication Protocol-Tunneled Transport Layer Security similar to EAP-TYL but it only uses a singe server side certificate common in more secure wireless networks

mixed mode

I am a wireless access point setting. I would utilize this mode if I have different wireless standards on my network.

what was the original wifi standard?

IEEE 802.11 1997

What security is provided between the RADIUS and the NAS?

IPsec

IBSS

Independent Basic Service Set basic unit of organization in wireless networks

How does a wireless network detect collisions?

It is a lot like a wired network, except it is not csma/cd it is now carrier sense multiple access collision avoidance csma/ca

What is the security like with WPS?

It is not very good. If you use WPS be aware that it is easily hijackable since the PINs aren't usually very long

LEAP

Lightweight Extensible Authentication Protocol proprietary to CISCO combo of MS-CHAP authentication btwn client and RADIUS server

BSSID

MAC address of an access point basic service set identifyer

MU-MIMO

Multi-user Multiple-input Multiple-output gives WAP the ability to broadcast to multiple users silumtaneously

802.11n and 802.11ac devices use a special version of _______ called ________.

OFDM QAM quadruple amplitutde amodulated

OFDM

Orthogonal Frequency Division Multiplexing newest member to 802.11 on all networks today outside of some of the earliest networks

What security is provided between the supplicant and the NAS?

PPP

whitelist

Permitting nothing unless it appears on the list.

RADIUS

Remote Authentication Dial-In User Service

SSID

Service Set Identifier aka network name 32bit id string that's inserted into the header of each frame processed by WAP

802.1X

The IEEE standard that defines port-based security for wireless network access control puts EAP info inside Ethernet frame.

EAP-MD5

Very simple version of EAP which uses only MD5 hashes for transfer and authentication credentials. It is weak and the least used of all versions of EAP.

In an ESS, every ___ connects to a central _________ to become part of a single _______

WAP broadcast domain switch or switches

Infrastructure uses one or more ___ to create a ____ topology called a ______.

WAP star WLAN

What purpose does a wireless access point serve?

WAP is a device designed to interconnect wireless network nodes with wired networks. It acts as sort of a hub for wifi.

WPS

WiFi Protected Setup

IEEE 802.11

Wireless Ethernet standard more commonly known as Wi-Fi. defines how devices communicate and how to secure that connection

WPA

Wireless Protected Access, 802.1i standard for encryption dynamic encryption key generation issued per session uses TKIP and RC4 ciphers

802.11b

Wireless networking standard that operates in the 2.4-GHz band with a theoretical maximum throughput of 11 Mbps. 300 ft

802.11g

Wireless networking standard that operates in the 2.4-GHz band with a theoretical maximum throughput of 54 Mbps and is backward compatible with 802.11b. 300 foot range OFDM

802.11ac

Wireless networking standard that operates in the 5-GHz band and uses multiple in/multiple out (MIMO) and multi-user MIMO (MU-MIMO) to achieve a theoretical maximum throughput of 1 Gbps. 300ft range

802.11a

Wireless networking standard that operates in the 5-GHz band with a theoretical maximum throughput of 54 Mbps. 150ft range

Does a shared network require authentication or authorization?

Yes it requires both

channel bonding

____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel.

What are the two modes for wireless connectivity?

ad hoc infrastructure

How can you extend the service area in a infrastructure method of 802.11?

adding more acces points, called ESS

mixed mode

aka high throughput mode, 802.11a-htl, 802.11g-ht has a higher bandwidth

BSS

basic service set area of one WAP

What types of systems benefit from infrastructure methodology?

big businesses and larger networks that share dedicated resources like internet and databases

supplicant

client wireless computer

access control

controls access to the network itself

What are three solutions in place to improve wifi security?

data encryption MAC address filtering authentication

What two kinds of software are needed for wireless?

device driver for wireless NIC configuration utility

What is the biggest problem with Wifi security?

devices right out the box have no security. what prevents another piece of hardware from grabbing the radiowaves out of the air and using them?

DSSS

direct secure spread spectrum sends data out on different frequencies at the same time capable of greater data throughput

How does encryption in wireless networks work?

electronically scrambled data packets and locks them with an encryption key before transmitting then onto the wireless network the receiving pc unscrambles the packet and processes the data WPA2

What exactly is EAP?

even though it says it is a protocol it is more of a PPP wrapper

FHSS

frequency hopping spread spectrum sends data on one frequency at a time constantly hopping between different frequencies

the actual number of usable bits per second is called

goodput

signal strength

how well your wireless device is connecting to other devices

native mode

if all devices on 802.11g network are 802.11g devices then they will have 54mbps OFDM spectrum

802.11X

increased security abilities of wireless networks. encryption authentication using a RADIUS server passwords encrypted with Extensible Authentication Protocol EAP

What needs to happen for backwards compatibility on the 802.11n standard?

just encapsulate 802.11n frame inside the previous version's frame, what adds even more overhead and latency to the system

What modes can WAPs transmit in?

legacy mode mixed mode greenfield mode

blacklist

list of things you do not grant access to on the network period

what does a connection type of 802.11g-ht mean?

means that it is connecting to an 802.11n WAP running mixed mode

Ad hoc uses a ____ topology instead of a ____.

mesh WAP

EAP-MS-CHAPv2

more commonly known as PEAP uses pw function based on MS-CHAPv2 with the addition of an encrypted TLS tunnel. MOST COMMON IMPLEMENTATION

MIMO

multiple in multiple out enabl,es devices to make multiple simultaneous connections called streams used in systems with lots of antennae

NAS

network access server the WAP

Does an open network require authentication or authorization?

no

Is MAC address filtering completely effective?

no because of MAC spoofing. someone saying they are a specific MAC that isn't. even this wont stop them from taking it out the air. If you are really concerned you should make sure your network is wired to provide the best protection

Asymetric Encryption

parties use public and private keys

channel

portion of the spectrum that's available

What is one of the biggest issues with wireless networks, and how is it addressed?

potential interference may cause a problem, but allowing different devices to function on different frequencies fixes this problem

EAP-PSK

preshared key, both ends have a preshared secretcode stored on both sides

Downside to 802.11b?

prone to interference on 2.4 GHz

What modes does WPS work in?

push button mode (like on xbox you push a button and it connects) PIN method you have to use the pin located on the WAP box to connect

How do ad hoc networks participate in BSSID when they have no WAP?

random 448 bit string that looks like MAC and that BSSID goes into every frame

What types of groups benefit from ad hoc?

small groups of computers that need to transfer files or print usually.

DFC

specifies rules for sending data onto the network media. sends out data until there is an ACK

How do you connect in a 802.11X?

supplicant contacts NAS, which sends UN and PW to RADIUS server, RADIUS sends packet to supplicant through WAP w access accept code and authenticator section that proves the packet came from RADIUS server.

What is good to remember when thinking about setting up a WAP?

the range is not accurate, cut it in half. range on packaging describes an ideal environment

Every device on the wifi network must share

the same SSID

symmetric encryption

the same key is used to encode and decode

What happens to frames that don't have the right MAC address?

they get dropped

ad hoc

two or more devices comunicate directly without any other hardware

infrastructure

use a WAP that acts as a hub for all wireless clients

Problems with WEP

uses cipher called RC4 uses code called intitialization vector of 24 bits leaving 40 or 104 bits left for encryption encryption key is static and doesnt change no user authentication dont use it, outdated and unsafe

roaming

when you travel in between WAPs and the transitions is seamless

link state

whether your device is connected

WEP encryption

wired equivalent privacy 802.11a and 802.11b 64 128 256bit easy to crack due to how keys are produced

how do you know the network name in ESS network?

you use the ssid but it is called essid when in ess network


Set pelajaran terkait

Ch.57: Drugs Affecting GI secretions

View Set

Principles of Macroeconomics Ch. 18 Open-Economy Basic Concepts

View Set

American History: Cinderella Man Movie Questions

View Set

Life Policy Provisions, Riders, and Options

View Set

Chapter 20 - Antimicrobial Drugs

View Set