yup next test 2 Flashcards

1
Q

Wireless Local Area Network (WLAN)

A
  • radiate Radio Frequencies (RF) across small area via antennas which create Radio Waves
  • A node that has a Wireless Network Interface Card (WNIC) can detect these radio waves and establish a connection with a Wireless Access Point (Wireless AP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless Local Area Network (WLAN)
advantages and disadvantages

A

advantages
-ability for nodes on a computer network to move around as necessary.

-WLANs cost much less to install

disadvantages
- security
- Performance can suffer. Radio waves susceptible to interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

two primary pieces of network equipment

A
  • Wireless Access Point (Wireless AP) – provides access to user nodes on a wireless computer network. (inside or outside)
  • WLAN Controller - used as a centralized point for a wireless computer network (provide bulk management, layers of sec by baseline configuration of wireless equipment one centralized location.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IEEE 802.11 Standards
(wireless Ethernet)

A
  • 802 .11n - Wi-Fi4 - Multiple-Input Multiple-Output (MIMO)= allows for multiple data signals to be transmitted over a single radio frequency (2.4 GHz + 5 GHz with speeds up to 600 megabits per second.
    allows for 4 x 4 : 4
  • 802.11ac: WiFi 5 - 5 GHz range with speeds up to 1 gigabit per second. This standard allows for 4 x 4 : 8

-802.11ax: WiFi 6- 2.4, 5, +6 GHz. Speeds 11 gigabits per second / allows for 4 x 4: 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

wireless security protocols

A
  • Wired Equivalency Privacy (WEP) : “weak encryption protocol” uses encryption Rivest Cypher 4 (RC4)
  • Wi-Fi Protected Access (WPA) : superseded WEP. utilizes RC4 + Temporal Key Integrity Protocol (TKIP) to further encrypt wireless packets.
  • Wi-Fi Protected Access 2 (WPA2): superseded WPA :Advanced Encryption Standard (AES) to encrypt wireless packets
  • Wi-Fi Protected Access 3 (WPA3): strongest protocol + Simultaneous Authentication Equals (SAE) to encrypt wireless packets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

wireless access points

A

wireless switch bc a wireless AP operates at the data-link layer + maintains a local MAC address table for forwarding frames.

  • bridge : translating 802.11 -> 802.3 Ethernet frame before transmission on a type of physical media (can do opposite direction as well)
  • broadcasts SSID (service set identifier) advertise presence in an area and allow nodes to identify and connect to their wireless computer network
    An SSID is also how WLANs differentiate from each other
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

wireless channels

A

overlapping : when multiple wireless APs operate in the same geographic area and transmit at the same time resulting in a collision and frame loss. (wi-fi frequency bands)

  • channels: a smaller frequency band within the primary Wi Fi frequency band. Channels can vary in length between 20 MHz, 40 MHz, 80MHz , and 160 MHz in width.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

wireless access points nodes

A
  • local - default mode
    (allows for dedicated transmission of frames between nodes)
  • monitoring - a dedicated monitor to present statistics
    (total number of clients in the coverage area, interference, and utilization of the channel used in wireless communication)
  • sniffer - collect data for more in-depth analysis of it.
  • will collect wireless frame data and redirect it to a specified management station
    (Packet Sniffing can be accomplished via a Network Protocol Analyzer) used for examining traffic)
  • rouge detector: detect unmanaged and possibly malicious wireless APs operating on the same frequency in an area with wireless coverage

Wireless APs that fall outside the management of a wireless computer network are considered Rogue Wireless Access Points (Rogue APs). Rouge APs can be either malicious or simply unmanaged and belonging to another organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly