Wireless Networks Flashcards

1
Q

Wireless Local Area Network (WLAN)?

A

▪ Allows users to roam within a coverage area
▪ Popularity has increased exponentially
▪ Convenient to use and expand network access throughout a room, floor,
or building
▪ IEEE 802.11 is the most common type
▪ Other wireless options exist (used for PAN)
● Bluetooth
● Infrared (IR)
● Near-Field Communications (NFC)
● Ant+
● Z-Wave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ad Hoc

A

Wireless devices communicate directly with
each other without the need for a centralized
access point
▪ Peer-to-Peer connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Infrastructure

A

Wireless devices communicate with other
wireless or wired devices through a wireless
router or access point
▪ Traditional WiFi in Home and Office networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wireless Access Point (AP or WAP)

A

▪ Expands wired LAN into the wireless domain
● Does not interconnect two networks
(not a router)
● Functions as a hub
▪ Connects wired LAN and wireless devices into the same subnet
▪ All clients on an access point are on a single collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless Router

A

Gateway device and base station for wireless devices to communicate
with each other and connect to the Internet
▪ Often combines many features into one device:
● Wireless Access Point (WAP or AP)
● Router
● Switch
● Firewall
● Fiber, Cable, or DSL modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

o Independent Basic Service Set (IBSS)

A

Contains only devices/clients with no APs(AD-HOC WLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Basic Service Set (BSS)

A

Only one AP connected to the network (SOHO network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Extended Service Set (ESS)

A

Contains multiple APs to provide coverage (College campus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mesh Topology

A

▪ May not use a centralized control
▪ Range of combined wireless defines network
▪ Uses WiFi, Microwave, Cellular, and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AP Placement

A

▪ Careful planning is required to
prevent the APs from interfering
with one another and still
maintaining the desired
coverage area in ESS
▪ Coverage should overlap
between APs to allow
uninterrupted roaming from one
cell to another but can’t use
overlapping frequencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AP Placement (2.4 Ghz)

A

Non-overlapping coverage cells
for 2.4 GHz band should have
10% to 15% coverage overlap in
coverage area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AP Placement (5 Ghz

A

▪ Identical channels should be separated by at least two cells instead of
one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Site Surveys

A

▪ Wireless survey to determine coverage areas
▪ Produces a heat map with coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless Range Extenders

A

▪ Specialized device that overcomes distance limitations of wireless
networks
▪ Amplifies the signal and extends reachability or a wireless cell
▪ Wireless repeater receives signal on one antenna and repeats it on other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Antennas

A

Coverage areas vary based on the type used
▪ Most SOHO wireless APs have fixed antennas
▪ Enterprise-class APs support different types
▪ Factors in antenna effectiveness
● Distance
● Pattern of Wireless Coverage
● Environment (indoor/outdoor)
● Avoiding Interference with other APs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Omnidirectional Antenna

A

Radiates power equally in all directions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unidirectional Antenna

A

Focuses Power in one direction for covering greater distances

18
Q

Spread Spectrum Wireless Transmissions

A

▪ Direct-Sequence Spread Spectrum (DSSS)
▪ Frequency-Hopping Spread Spectrum (FHSS)
▪ Orthogonal Frequency-Division Multiplexing (OFDM)
▪ Only DSS and OFDM are commonly utilized in today’s WLANs

19
Q

Direct-Sequence Spread Spectrum (DSSS)

A

Modulates data over an entire range of frequencies using a series of
signals known as chips
▪ More susceptible to environmental interference
▪ Uses entire frequency spectrum to transmit

20
Q

Frequency-Hopping Spread Spectrum (FHSS)

A

Devices hop between predetermined frequencies
▪ Increases security as hops occur based on a common timer

21
Q

Orthogonal Frequency Division Multiplexing (OFDM)

A

Uses slow modulation rate with simultaneous transmission of data over
52 data streams
▪ Allows for higher data rates while resisting interference between data
streams

22
Q

Frequencies and Channels

A

IEEE 802.11 standards are differentiated by their characteristics, such as
frequency range used:
● 2.4 GHz band
o 2.4 GHz to 2.5 GHz range
● 5 GHz band
o 5.75 GHz to 5.875 GHz range
▪ Each band has specific frequencies (or channels) to avoid overlapping
other signals
▪ Channels 1, 6, and 11 will avoid overlapping frequencies in 2.4 GHz band

23
Q

Channel Bonding

A

Allows you to create a wider channel by merging neighboring channels
into one

24
Q

Radio Frequency Interference (RFI)

A

▪ Caused by using similar frequencies to WLAN
▪ Common sources of interference:
● Other wifi devices (overlapping channels)
● Cordless phones and baby monitors (2.4 GHz)
● Microwave ovens (2.4 Ghz)
● Wireless security systems (2.4 GHz)
● Physical obstacles (Walls, appliances, cabinets)
● Signal strength (Configurable on some devices)

25
Carrier Sense Multiple Access/Collision (Avoidance/ Detection)
WLAN uses CSMA/CA to control access to medium, where wires Ethernet uses CSMA/CD ▪ Listens for transmission to determine if safe to transmit ● If channel is clear, transmits Request to Send (RTS) ● Device waits for acknowledgment ● If received an RTS, responds with Clear to Send (CTS) ● If not received, device starts random back off timer
26
Wireless Security
Wireless networks offer convenience, but also many security risks ▪ Encryption of data transferred is paramount to increasing security
27
Pre-Shared Key
Both AP and client uses same encryption key ▪ Problems: ● Scalability is difficult if key is compromised ● All clients must know the same password
28
Wired Equivalent Privacy
▪ Original 802.11 wireless security standard ● Claimed to be as secure as wired networks ▪ Static 40-bit pre-shared encryption key ● Upgraded to 64-bit and 128-bit key over time ▪ Uses 24-bit Initialization Vector (IV) ● Sent in clear text ▪ Brute Force Attack within minutes using AirCrack-ng and other tools
29
Wi-Fi Protected Access (WPA)
▪ Replaced WEP and its weaknesses ▪ Temporal Key Integrity Protocol (TKIP) ● 48-bit Initialization Vector (IV) instead of 24-bit IV ● Rivest Cipher 4 (RC4) used for encryption ▪ Uses Message Integrity Check (MIC) ● Confirms data was not modified in transit ▪ Enterprise Mode WPA ● Users can be required to authenticate before exchanging keys ● Keys between client and AP are temporary
30
Wi-Fi Protected Access 2 (WPA2)
▪ Created as part of IEEE 802.11i standard ● Requires stronger encryption and integrity checks ● Integrity checking through CCMP o Counter Mode with Cipher Block Chaining Message Authentication Code Protocol ▪ Uses Advanced Encryption Standard (AES) ● 128-bit key or above ▪ Supports two modes ● Personal mode with pre-shared keys ● Enterprise mode with centralized authentication
31
WEP and WPA/WPA2 Security Cracking
▪ Utilities can capture wireless packets and run mathematical algorithms to determine the pre-shared key
32
Network Authentication 802.1x
▪ Each wireless user authenticates with their own credentials ▪ Used also in wired networks
33
Extensible Authentication Protocol (EAP)
Authentication performed using 802.1x ▪ EAP-FAST ● Flexible Authentication via Secure Tunneling ▪ EAP-MD5 ▪ EAP-TLS
34
MAC Address Filtering
▪ Configures an AP with a listing of permitted MAC addresses (like an ACL) ▪ Problems: ● Knowledgeable users can falsify their MAC easily using freely available tools ● Examples: o MAC Address Changer (Windows) o MacDaddyX (OSX)
35
Network Admission Control (NAC)
▪ Permits or denies access to the network based on characteristics of the device instead of checking user credentials ▪ Conducts a posture assessment of client ● Checks the OS and antivirus version of client
36
Captive Portals
▪ Web page that appears before the user is able to access the network resources ▪ Webpage accepts the credentials of the user and presents them to the authentication server
37
Geofencing
GPS or RFID defines real-world boundaries ▪ Barriers can be active or passive ▪ Device can send alerts if it leaves area ▪ Network authentication can use it to determine access
38
Disable SSID Broadcast
Configures an AP to not broadcast the name of the wireless LAN ▪ Problem: ● Knowledgeable users can still easily find the SSID using wireless sniffing tools
39
Rogue Access Point
Malicious users set up an AP to lure legitimate users to connect to the AP ▪ Malicious users can then capture all the packets (data) going through the rogue access point
40
Unsecured Wireless Networks
War Driving ● Occurs when users perform reconnaissance looking for unsecured wireless networks ▪ War Chalking ● Occurs when users write symbols on a wall to notify others of AP characteristics
41