Chapter 22 Wireless Networking
What is WPA2
An upgraded version of WPA that is the most secure service, using Advanced Encryption Standard (AES) and other improvements.
What is Z-Wave?
Another standard for home automation using 900mhz
Jim wants to be able to access his favorite website wirelessly with his new laptop from anywhere. What would he need to install/configure to allow him to do so?
Cellular card
Wireless NIC
Connects a computer to a network using radio frequencies.
BSS (Basic Service Set)
In IEEE terminology, a group of stations that share an access point.
What does zigbee have against its peers
Longer connection than Bluetooth and less power consumption than WiFi
What type of wireless network is being used when several personal Devices are sharing files?
PAN
802.11b
Wireless networking standard that operates in the 2.4-GHz band with a theoretical maximum throughput of 11 Mbps.
802.11ac
Wireless networking standard that operates in the 5-GHz band and uses multiple in/multiple out (MIMO) and multi-user MIMO (MU-MIMO) to achieve a theoretical maximum throughput of 1 Gbps and a max rang of 300ft
What is a proxy server?
a server that caches and filters content Middle man
How many channels are available with IEEE 802.11?
11
What port does the radio server always use?
1812
What wireless standard is backwards compatible with 802.11b?
802.11g
What wireless standard is backwards compatible with 802.11g
802.11n devices are backward compatible with it
Transmit Beamforming
A multiple-antenna technology in 802.11n WAPs that helps get rid of dead spots.
Infrastructure mode
A wireless configuration that uses one or more WAPs to connect wireless workstations to the cable backbone.
802.11n
A wireless network standard that defines speeds of up to 600 Mbps. It is downward-compatible with 802.11a, 802.11b, and 802.11g. And a 300ft range and more.
What is the standard encryption method used in WAP2
AES
Higher frequencies tend to do what
Absorb other objects
What is it called when several computers are sharing files without WAP?
Ad-Hoc mode
What is WPS used for?
Ease of configuration of and connection to wireless networks.
The rooms on the west side of a house do not get enough wireless signal to allow use of the wireless network. What can you do to fix this?
Install a second WAP to extend range of wireless network
What is ZigBee?
It is a open standard IEEE 802.15.4 alternative to Bluetooth and WiFi And at ISM band it communicates at 900mhz and 2.4Ghz
What is CSMA/CA
It's a standard in which the wireless node listens to see if another node is broadcasting data. If so, it waits a random time and retries.
Which technology improves the gain when using wireless technology
MIMO
What are printing protocols ?
SMB IPP Internet Printing Protocol LPD Line Printer Daemon
What is the most basic form of security in wireless network?
SSID
802.11
The IEEE standard for wireless networking.
Gain
The ratio of the signal level at the output of an audio device to the signal level at its input. Expressed in decibels (db).
What is IBSS
Two or more wireless nodes communicating in ad-hoc mode
802.11g
Uses the 2.4-GHz frequency band and provides a maximum theoretical throughput of 54 Mbps and max range of 300ft. Compatible with b and g
WPS
WiFi Protected Setup
What is WAP used for
Wireless Application Protocol
802.11a
Wireless networking standard that operates in the 5-GHz band with a theoretical maximum throughput of 54 Mbps.
Dead spots
areas of destructive interference
Wireless Access Point (WAP)
enables devices to connect to a wireless network to communicate with each other
What is EBSS
is a set of one or more infrastructure basic service sets on a common logical network segment
What is Personal area network
is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
What is IrDA
provides specifications for a complete set of protocols for wireless infrared communications, and the name "IrDA" also refers to that set of protocols.
Dipole Atenna
simplest and most widely used class of antenna
RFID
technology that uses radio waves to passively identify a tagged object.
What is WPA
uses the temporal key integrity protocol (TKIP), which dynamically changes the key that the systems use.
what is WEP (Wired Equivalent Privacy)
was often the first security choice presented to users by router configuration tools.
A user reports that he/she is unable to see computers when he open opens the network window. Which is the first step to take? A).Ask client to ping another PC C).Ask client to verify DHCP is working D).Determine if any other are have troubles B).Ask client to run ipconfig
D
ad hoc mode
Decentralized wireless network mode, otherwise known as peer-to-peer mode, where each wireless node is in meshed contact with every other node.
What is the wireless framework authentication?
EAP
IEEE
Institute of Electrical and Electronics Engineers