CNT120 CHAP 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

WPA

encryption that dynamically assigns every transmission its own key

WEP

encryption that uses a static key to authenticate and encrypt the clients data - use of the shared key makes it more susceptible to discovery - has been replaced by WPA/WPA2

management frame

frame involved in association and reassociation - such as probe and beacon

data frames

frames involved in carrying the data between stations

active scanning

the station transmits a special frame, known as a probe, on all available channels within its frequency range

CSMA/CD

IEEE 802.3 Wired Ethernet Networks

True

Most WLANs utilize frequencies around 2.4 GHz or 5 GHz to send and receive wireless signals.

WLANs

Networks that transmit signals through the air via radio frequency (RF) waves are known as ____________.

BSS

a group of nodes that share an access point

Frame Aggregation

-Combine multiple frames into one larger frame -Reduces Overhead

attenuation

After a signal is transmitted, the farther it moves away from the transmission source, the more it weakens. Similar to wired transmission, wireless signals can be amplified by increasing the power of the transmission or extended by repeating the signal from a closer broadcast point called a wireless range extender.

True

Collectively the IEEE 802.11 standards and their amendments, extensions, and corrections are known as Wi-Fi, which stands for Wireless Fidelity.

DSSS

Data streams are divided and encoded into small chunks, which are spread over all available frequencies within one of three, wide channels, all at the same time.

CSMA/CA

IEEE 802.11 Wireless Ethernet Networks

3

Wired and Wireless signals share many similarities, including the use of the same Layer _____ and above protocols.

RFID

________ uses electromagnetic fields to store data on a small chip in an ________ tag, which includes an antenna that can both transmit and receive, and possibly a battery. The tag holds 1 to 8 KB of data, such as serial number, credit card info, or medical data, which can transmit to a nearby reader.

spectrum analyzer

a device that can assess the quality of the wireless signal - helps with identifying where interference is greatest

heat map

a map of Wi-Fi signals and noise in your location

captive portal

the first page a new wireless client sees in the browser when connecting to a guest network

passive scanning

the station listens on all channels within its frequency range for a special signal, known as a beacon frame, issued from an access point

SSID

The ______ is a unique character string used to identify an access point.

more overhead

The use of ACK packets to verify every transmission means that 802.11 networks require __________________ than 802.3 networks.

1 and 2

WLANs work at OSI Layers ______. They support the same TCP/IP higher-layer OSI protocols and operating systems (Windows, Unix, Linux, Apple) as wired LANs.

diffraction

When a wireless signal is split into secondary waves when it encounters an obstruction. The waves appear to "bend around an obstacle". This is caused by objects with sharp edges including corners of walls or desks.

reflection

When waves encounter an obstacle and the signals "bounce off". This is usually caused by large flat surfaces - walls, ceilings, floors, etc...

off-boarding

Removing the app or agent that gave devices special permissions on the network

MIMO

-Multiple antennas on access points and client devices process incoming and outgoing data simultaneously -Increases network's throughput, access point's range -First Available in 802.11n Access Points

Channel Bonding

-Two adjacent 20-MHz channels bonded to make 40-MHz channel -Doubles the bandwidth available in single 20-MHz channel

MU-MIMO

-that allows multiple antennas to service multiple clients simultaneously -Reduces congestion and contributes to faster data transmission -Available with WAVE 2 802.11ac products

War Driving

A hacker searches for unprotected wireless networks by driving around with a laptop configured to receive and capture wireless data transmissions

WPAN

A mini version of a LAN is a PAN, and the purely wireless version is a ________, as defined by the IEEE 802.15 specifications.

Evil Twin

A rogue AP planted in a network's geological area to pose as an authorized AP

FHSS

Short bursts of data are transmitted on a particular frequency within the band and the next burst goes to the next frequency in the sequence.

less

A wireless network with a theoretical maximum throughput of 10 Mbps will, in fact, transmit _________ data per second than a wired Ethernet network with the same theoretical maximum throughput of 10 Mbps.

IoT

All sorts of things can be connected to a network, from toasters, refrigerators, bathrooms scales, and garage doors to watches, lamps, cars and even the kitchen sink. This _____ is made up of any device that can be connected to the Internet - that is any sensor, computer or wearable device that talks to other devices over a network.

wireless spectrum

All wireless signals are carried through the air by electromagnetic waves. The ______________, commonly called the airwaves, is the frequency range of electromagnetic waves used for data and voice communications.

radiation pattern

An antenna's ___________________ describes the relative strength over a three-dimensional area of all the electromagnetic energy the antenna sends or receives.

rogue access point

An unauthorized wireless access point is called a(n) _____________.

fading

As a signal runs into various obstacles, its energy will gradually fade, which causes the strength of the signal that reaches the receiver to be lower than the transmitted signal's strength.

refraction

As waves travel into and through a different transmission medium, such as traveling through glass or other solids, the wave's direction, speed, and wavelength are altered, or "bent".

ESSID

BSSes that belong to the same ESS share a special identifier

ZigBee

Based on the IEEE 802.15.4 standard, _______ is a low-powered, battery-conserving wireless technology. It is designed to handle small amounts of data and is therefore ideal for use in ISM sensors. _____ is also used for IoT devices for purposes of building automation, HVAC control, AMR, and fleet management.

Wireless USB

Certified ______ products mimic wired USB 2.0 connections with similar speeds, security, ease of use and compatibility. _________ radios transmit in the range between 3.1 and 10.6 GHz.

interference

Electromagnetic waves in the atmosphere can interfere with wireless communications similar to how EMI affects wired transmissions.

802.11b

Freq Band - 2.4 GHz Max Throughput - 11 Mbps Effective Throughput - 5 Mbps Average Range - 100m

802.11g

Freq Band - 2.4 GHz Max Throughput - 54 Mbps Effective Throughput - 20-25 Mbps Average Range - 100m

802.11n

Freq Band - 2.4 GHz or 5 GHz Max Throughput - 600 Mbps Effective Throughput - 65-500 Mbps Average Range - Indoor 70m - Outdoor 250m

802.11ac

Freq Band - 5 GHz Max Throughput - 1.3 Gbps - 6.9 Gbps Effective Throughput - 561 Mbps per client Average Range - Indoor 70m - Outdoor 250m

802.11a

Freq Band - 5 GHz Max Throughput - 54 Mbps Effective Throughput - 11-18 Mbps Average Range - 50m

War Chalking

Hackers draw symbols with chalk on the sidewalk or wall near a vulnerable AP ... to make it known to other hackers

FCC

In the United States, the collection of frequencies available for communication - known as "the airwaves" - is considered a natural resource available for public use. The ____ grants organizations in different locations exclusive rights to use each frequency.

on-boarding

Installing a specific app or agent onto a device to give it trusted access to certain portions of the network

WPA Attacks

Involves an interception of the network keys communicated between stations and APs

site survey

Larger WLANs warrant a more systematic approach to access point placement. Before placing APs in every data room, it's wise to conduct a(n) __________. A(n) ___________ assesses client requirements, facility characteristics, and coverage areas to determine an AP arrangement that will ensure reliable wireless connectivity within a given area.

Address 1 & Address 4 fields

MAC address of sending node and MAC address of receiving node

ITU

The _____ is a United Nations agency that sets standards for international wireless services, including frequency allocation, signaling and protocols used by wireless devices; wireless transmission and reception equipment; satellite orbits and so on.

IEEE 802.11

The __________ data frame carries significant overhead - that is, it includes a large quantity of fields in addition to the data field.

9 kHz and 300 GHz

The wireless spectrum (as defined by the FCC) spans frequencies between _____ and _______.

RTS, CTS

WLANs can use the optional RTS/CTS protocol. The source node sends a ________ signal to the access point requesting the exclusive opportunity to transmit. If the access point agrees to the request it will respond with a ______ and will temporarily suspend communication through the access point and wait for the source node to complete transmission.

scattering

When a wireless signal encounters an object that has small dimensions compared with the signal's wavelength, it's diffused or "broken into pieces" into multiple directions. This is usually caused by rough surfaces. Indoors this can be caused by books, chairs, computers. Outdoors this can be caused by rain, mist, hail, and snow.

NFC

_____ is a form of RFID and transfers data wirelessly over very short distances (usually 10cm or less). A tiny antenna embedded in the device sends its radio signal at a fixed frequency of 13.56 MHz. The signal can also be transmitted one way by an _____ tag, or smart tag, such as when employees need to access a secure area of a building.

IR - Infrared

______ technology has found a new life in the world of IoT. ____ sensors are used to collect information such as: -presence or level of liquid -variations in reflections from skin caused by variations in blood flow which can be used to monitor heart rate -proximity to the device, which can trigger an action like steering a vehicle away from an object -commands from a control device

Z-Wave

_______ is a smart home protocol that provides 2 basic types of functions: signaling to manage wireless connections, and control, to transmit data and commands between devices. A ________ network controller, called a hub, receives commands from a smartphone or computer and relays the commands to various smart devices on its network.

Bluetooth

_______, defined by the IEEE 802.15.1 specifications, is named after a medieval king of Denmark. Like its namesake, ___________ technology unities separate entities - it unites mobile devices, PCs, and accessories under a single communication standard. Most ________ devices require close proximity to form a connection.

ANT+

________ technology is an ad-hoc wireless protocol operating at about 2.4 GHz. While _____ is a proprietary Garmin protocol, it is also open-source and therefore used by many manufacturers in addition to Garmin. ______ gathers and tracks information from sensors that are typically embedded in heart rate monitors, GPS devices, and other activity monitoring devices. _______ can also synch data from multiple devices for the same activity, such as a smartwatch, smartphone, bicycle computer, or fitness equipment.

ESS

a group of access points connected to the same LAN

Infrastructure WLAN

an intervening connectivity device (access point) accepts the signals from the nodes and re-transmits them to the rest of the network

control frame

frames related to medium access and data delivery - such as ACK and RTS/CTS

dead zone

gaps in Wi-Fi coverage at your location

frame control field

holds information about the protocol in use, the type of frame being transmitted, whether the frame is part of a larger, fragmented packet, whether the frame is one that was reissued, what type of security the frame uses, etc....

MAC filtering

method to prevent an AP from authenticating any device whose MAC address is not listed by network admin

authentication

process of comparing and matching a client's credentials with the credentials in a client database to enable the client to log on to the network

guest network

smart security precaution - gives guests access to Internet through an open network without opening doors to entire LAN on the router

wireless analyzer (Wi-Fi analyzer)

software that can evaluate Wi-Fi network availability, optimize Wi-Fi signal settings, and help identify Wi-Fi security threats

Address 2 & Address 3 fields

the MAC address of the access points or intermediary device on the wireless network

BSSID

the identifier for the group of nodes that share the same access point

encryption

use of an algorithm to scramble data into a format that can be read only by reversing the algorithm - purpose is to keep information private

sequence control field

used to indicate how a large packet is fragmented for more reliable delivery

unidirectional antenna

used when a source needs to communicate with one destination - point-to-point link

omnidirectional antenna

used when many different receivers must be able to pick up the signal - point-to-multipoint links

Ad Hoc WLAN

wireless nodes transmit directly to each other via wireless NICs without and intervening connectivity device


Set pelajaran terkait

Block 10 Module 9 Iggy Questions: ED/Trauma/Burns

View Set

Micro Chapter 13: Viruses, Viroids, and Prions

View Set

Business Computer Applications: 1305

View Set

Chapter 11 Pain Management Prep U 40 questions

View Set

Chapter 15: Respiratory Emergencies

View Set

6.1 Production in the short run: the law of diminishing returns

View Set

Hematology lab testing- Hemoglobin

View Set