• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/55

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

55 Cards in this Set

  • Front
  • Back
IEEE standards for wireless

802.3 is for ethernet
802.11a, 802.11b, 802.11g
WLANs (wireless LAN)
uses radio freq instead of cables and MAC sub-layer of the Data Link Layer.
RF characteristics
-does not have limitations such as the limits of a wire in a sheath.
-RF is unprotected from outside signals.
-RF transmission can have interference from radio
-RF bands are regulated differently in different countires.
difference between ethernet and wireless

802.3
physical layer - cable
media access - collision detection
availability - cable connection
signal interference - not really
regulation - IEEE standards
802.11
- physical layer - RF
media access - collision avoidance
availability - radio nic in range of an access point
signal interference - yes
regulation - depends on the area
WLAN connection
is through Access point instead of an ethernet switch
data rates for different WLAN standards
a and g can support 54Mb/s
b supports 11Mb/s
802.11n is not yet set.
what affects data rates
modulation : a way of combining user information with the carrier signal
modulation types
DSSS - Direct Sequence Spread Spectrum
OFDM - Orthogonal Frequency Dvision Multiplexing
802.11a
uses OFDM and uses 5GHz band
-less likely to get interferences with devices that operate in 2.4GHz band.
-higher frequency allows for smaller antennas.
-higher frequency is more succeptible to obstacles such as walls.
-smaller range than b or g.
802.11b
uses data rates of 1, 2, 5.5 and 11Mb/s in the 2.4 GHz band using DSSS
802.11g
uses OFDM
-gets higher data rates
-uses DSSS for backward compatibility
-OFDM rates are 6, 9, 12, 18, 24, 48 and 54Mb/s
advantages to using the2.4GHz band
better range than 5GHz.
transmissions are not easily obstructed.
802.11n
uses mutliple radios and antennae at endpoints
access points
wireless clients don't talk to each other directly, they go through the AP.
-converts the TCP/IP data packets from their 802.11 frame encapsulation format in the air to the 802.3 ethernet fram format on the wired ethernet network
CSMA/CA
Carrier sense Multiple Access with Collision avoidance.

The devices on a WLAN must sense the medium for energy (RF stimulation above a certain threshold) and wait until the medium is free before sending.
data transfer from client to AP
if an AP receives data from a client, it sens an ack to the client.
-the ack informs the client that the data was successful.
The hidden Node problem
if two devices are at the maximum range to reach the access point and at opposite sides of each other, they cannot sense each other. They might end up transmitting simultaneously.
RTS/CTS
-request to send/clear to send
-to solve the hidden node proble
-negotiate between client and AP.
-access points allocate the medium to the requesting station for as long is required to complete the transmission. When the request is complete, other clients can request the channel.
wireless router
performs the role of access point, switch and router.
wireless network mode
refers to the protocols, a, b, g and n
when b and g are both used, it's in a mixed mode.
SSID
shared service set identifier
a client uses this to distinguish between multiple wireless networks.
channels
2.4GHz band is broken to 11 channels for North America and 13 for Europe.
-they have a fequency separation of 5MHz and total of 22 MHz channel bandwidth.
-separate out access point 5 MHz apart so that they don't overlap
Basic service set
is a group of stations that communicate with each other.
IBSS
independent basic service set
-ad hoc networks without access points
ESS
extended service sets
-when one BSS doesn't have enough RF coverage, one or more can be joined thorugh ESS. A BSS is identified by the BSSID which is the MAC address of the AP.
Beacons
framed used by the WLAN network to advertise its presence
probes
frames used by the WLAN clients to find their networks.
authentication
a process left over from the original 802.11 standard.
Association
process of establishing the data link between an access point and a WLAN client.
802.11 join process
-client searches for a network by sending out a probe request on multiple channels
Beacons
framed used by the WLAN network to advertise its presence
probes
frames used by the WLAN clients to find their networks.
authentication
a process left over from the original 802.11 standard.
Association
process of establishing the data link between an access point and a WLAN client.
802.11 join process
-client searches for a network by sending out a probe request on multiple channels
-probe request has the SSID and bit rates.
802.11 join process step2
authentication
-WEP key that is shared between client and AP.
-clients sends an authentication request, AP sends a challenge test to the client.
-client sends the shared key in an encrypted text back to the AP.
-AP validates the key.
step 3

association
-finalizes the security and bit rate options
-establishes the link between WLAN client and the AP.
-client learns the BSSID, which is the AP's MAC,
-access point maps a logical port know as association id to the client.
802.11 join process step2
authentication
-WEP key that is shared between client and AP.
-clients sends an authentication request, AP sends a challenge test to the client.
-client sends the shared key in an encrypted text back to the AP.
-AP validates the key.
step 3

association
-finalizes the security and bit rate options
-establishes the link between WLAN client and the AP.
-client learns the BSSID, which is the AP's MAC,
-access point maps a logical port know as association id to the client.
war drivers
find open networks and use them for internet access
hackers
exploit weak privacy measures to view sensitive WLAN information and even break into WLANs
employees
plug APs or gateways to company ports to create their own WLANs
rogue AP
is placed on aWLAN to interfere with normal network operation.
man in the middle attacks
select a host as a target and position themselves between the target and the router or gateway.
Dos
using a PC as an access point, can flood the BSS with clear to send messages. The acces spoints in tern can flood the BSS with simultaneous traffic.
authentiation
SSID - no encryption, basic authentication,
WEP - no strong encryption, static breakable keys
WPA - standardized and improved encryption, strong user based authentication.
WPA2 - AES encryption authentication. Dynamic key management.
EAP
extensible authentication protocol
framework fo authenticating network access.
EAP process
802.11 association creates a virtual port for each WLAn client
-AP blocks all data frames except for 802.1x based traffic
-802.1x carry the EAP authentication packets via access point to the server that maintains the credentials.
-if authentication is successful, the serves sends a EAP success message to the AP.
TKIP (Temporal Key Integrity Key)
encryption mechanism
-encrypts by adding increasingly complex bit coding to each packet
-based on same cipher as WEP.
-carries out a message integrity check in the encrypted packet.
AES (Advanced Encryption standard)
-based on tKIP with additional features to enhance the level of provided security
SSID cloaking
disable SSID broadcasts from teh access points
MAC address filtering
tables are manually constructed on the access point to allow or disallow clients based on their physical hardware address
WLAN security implementation
WPA or WPA2
configure a wireless access point
1. verify local wired operation (DHCP and Internet access)
2. Install the access point
3. configure the access point - SSID
4. instaall one wireless client
5. vierfy network operation
6. configure wireless security
7. verify wireless network operation.
basic wireless settings
network mode
network name or SSID
SSID broadcast
Radio band
wide channel
standard cahnnel