Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
84 Cards in this Set
- Front
- Back
All wireless devices operate in the radio waves range of the |
electromagnetic spectrum. |
|
Wi-Fi systems are |
half-duplex. |
|
Wi-Fi systems can |
transmit and receive on the same radio channel, not simultaneously. |
|
Distributed Coordination Function (DCF) is a |
collision avoidance mechanism used for Wi-Fi systems. |
|
(DCF) ensures clients only transmit if the channel is |
clear. |
|
Wireless clients and Access Points use the |
RTS and CTS control frames to facilitate the actual data transfer. |
|
Wireless three-stage process: |
Discover new wireless AP. Authenticate with AP. Associate with AP. |
|
Modes Of Discovering APs: |
Passive mode Active mode |
|
Passive mode - The AP openly advertises its service by periodically sending |
broadcast beacon frames. |
|
Broadcast beacon frames include: |
SSID supported standards security settings. |
|
Active mode - The wireless client initiates the process by broadcasting a |
probe request frame. |
|
Probe request frame includes: |
SSID supported standards |
|
The response frame from the AP provides the |
security settings. |
|
Authentication types: |
Open authentication Shared key authentication |
|
Open authentication is a |
free pass to wireless network. |
|
Shared key authentication technique is based on a key that is |
pre-shared between the client and the AP. |
|
Shared key authentication process: |
Client authentication request. AP Challenge. Client encypts with key. AP decrypts the key. Authenticates if keys match. |
|
After a wireless client has been authenticated, the AP proceeds to the |
association stage. |
|
The wireless client forwards an Association Request frame that includes its |
MAC address. |
|
The AP responds with an Associate Response that includes the AP BSSID, which is the |
AP MAC address. |
|
The AP maps a logical port known as the association identifier (AID) to the |
wireless client. |
|
It is the responsibility of the International Telecommunication Union - Radiocommunication Sector (ITU-R) to |
regulate the allocation of the radio frequency (RF) spectrum. |
|
The radio waves range is subdivided into |
radio frequencies. microwave frequencies. |
|
WLANs connect clients to the network through a wireless |
access point (AP) or wireless router. |
|
Wireless LAN devices have transmitters and receivers tuned to specific |
frequencies of the radio waves range. |
|
Ranges of frequencies are called |
bands. |
|
Benefits of Wireless: |
Increased flexibility increased productivity reduced costs ability to grow and adapt |
|
Wireless Technologies: |
Wireless Personal-Area Networks (WPAN) Wireless LANs (WLANs) Wireless Wide-Area Networks (WWANs) |
|
Bluetooth |
IEEE 802.15 WPAN standard, distances up to 100m. |
|
Wi-Fi (wireless fidelity) |
IEEE 802.11 WLAN standard, distances up to 300m. |
|
WiMAX (Worldwide Interoperability for Microwave Access) |
IEEE 802.16 WWAN standard, access of up to 30 miles (50 km). |
|
Cellular broadband uses service provider cellular access to provide |
mobile connectivity. |
|
Satelite broadband provides network access to remote sites through the use of a |
directional satellite dish. |
|
2.4 GHz (UHF) |
802.11b/g/n/ad |
|
5 GHz (SHF) |
802.11a/n/ac/ad |
|
60 GHz (EHF) |
802.11ad |
|
802.11n can also use |
channel bonding. |
|
Channel bonding combines |
two 20 MHz channel into one 40 MHz channel. |
|
The three organizations influencing WLAN standards are: |
IEEE ITU-R Wi-Fi Alliance |
|
IEEE |
Specifies how RF is modulated to carry information. |
|
ITU-R |
Regulates the allocation of the RF spectrum and satellite orbits. |
|
Wi-Fi Alliance |
promotes the growth and acceptance of WLANs. |
|
Wireless clients use their wireless NIC to discover nearby APs advertising their |
SSID. |
|
Clients then attempt to |
associate and authenticate with an AP. |
|
Access Points can be categorized as either |
autonomous APs or controller-based APs. |
|
Autonomous APs are useful in situations where only a |
couple of APs are required in the network. |
|
Autonomous APs are configured and managed |
individually. (Unless clustered) |
|
Single Point Setup (SPS) is a form of clustering that makes autonomous AP deployment |
easier and faster. |
|
Cluster Conditions: |
Cluster mode enabled. Matching cluster name. Same network segment. Same radio mode. |
|
Controller-based APs are useful in situations where |
many APs are required in the network. |
|
Controller-based APs require no |
initial configuration. |
|
Controller-based are managed centrally from a controller in the |
cloud. |
|
The controller pushes management settings to the AP, such as |
firmware updates security settings wireless network SSIDs settings |
|
The Cisco Meraki cloud architecture is a management solution used to |
simplify the wireless deployment. |
|
Most business class APs require the use of |
external antennas. |
|
IEEE 802.11n/ac/ad use MIMO technology to |
increase available bandwidth. |
|
MIMO uses multiple antennas to |
exchange more data. |
|
Wireless Topology Modes: |
Ad hoc mode Infrastructure mode |
|
Ad hoc mode |
when two wireless devices communicate without using APs or wireless routers. |
|
Infrastructure mode |
clients interconnect via a wireless router or AP. |
|
Basic Service Set (BSS) - consists of a single AP interconnecting |
all associated wireless clients. |
|
Extended Service Set (ESS) |
two or more BSSs joined through a common distribution system (DS). |
|
If the demand for a specific channel is too high, that channel is likely to become |
oversaturated. |
|
The saturation of the wireless medium degrades the |
quality of the communication. |
|
Direct-sequence spread spectrum (DSSS) - is designed to spread a signal over a |
larger frequency band. |
|
The signal is multiplied by a “crafted noise” known as a |
spreading code. |
|
Frequency-hopping spread spectrum (FHSS) transmits radio signals by |
by rapidly switching a carrier signal. |
|
Orthogonal frequency-division multiplexing (OFDM) - a single channel utilizes |
multiple sub-channels on adjacent frequencies. |
|
A best practice for WLANs requiring multiple APs is to |
use non-overlapping channels. |
|
Wireless Threats: |
Wireless intruders Rogue APs Interception of data DoS attacks |
|
A rogue AP is an AP or wireless router that has either been connected to a corporate network without explicit |
authorization and against corporate policy. |
|
A rogue AP is an AP or wireless router that has been connected or enabled by an attacker to capture |
client data. |
|
A rogue AP is an AP or wireless router that has been connected or enabled by an attacker to gain access to |
network resources, or to launch man-in-the-middle attack. |
|
Wireless DoS attacks can be the result of: |
Improperly configured devices. intentionally interference Accidental interference |
|
Types of DoS attacks: |
A spoofed disconnect attack. A CTS flood. |
|
To mitigate many of these attacks, Cisco has developed a variety of solutions, including |
the Cisco Management Frame Protection (MFP) feature |
|
To address the threats of keeping wireless intruders out and protecting data, two early security features were used: |
SSID cloaking MAC addresses filtering |
|
Shared Key Authentication Methods: |
Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) (TKIP) IEEE 802.11i/WPA2 (AES) |
|
The IEEE 802.11i and the Wi-Fi Alliance WPA and WPA2 standards use the following encryption protocols: |
Temporal Key Integrity Protocol (TKIP) Advanced Encryption Standard (AES) |
|
Temporal Key Integrity Protocol (TKIP) |
used by WPA. |
|
Advanced Encryption Standard (AES) |
used by WPA2. |
|
WPA and WPA2 support two types of authentication: |
Personal - home or small office Enterprise - Intended for enterprise networks |
|
These fields are necessary to supply the AP with the required information to contact the AAA server: |
RADIUS Server IP address RADIUS port numbers Shared key |
|
Troubleshooting When the Network Is Slow: |
Upgrade your wireless clients Split the traffic |