16 - Understanding Wireless Roaming and Location Services Flashcards

1
Q

Moving from one access point to another is called ____.

A

roaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are common situations that typically cause roaming?

A
  • Maximum data retry count is exceeded – excessive numbers of data retries
  • Low RSSI – when the received signal strength drops below a threshold
  • Low SNR – when the difference between the received signal strength and noise floor drops below a threshold
  • Proprietary load-balancing schemes – schemes in which clients roam to more evenly balanced client traffic across multiple APs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This occurs when a client changes it’s 802.11 radio to the channel that is being scanned, broadcasts a probe request, then waits to hear any probe responses from AP’s on that channel.

A

active scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A client sends probe request to specific destination SSID, only APs with a matching SSID reply with a probe response.

A

directed probe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A client sends a broadcast SSID (actually a null SSID) in the probe request, all APs receiving the probe request respond with a response

A

broadcast probe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is performed by changing to 802.11 radio of the client to the channel that is being scanned and waiting for a periodic beacon from any ap’s on that channel. By default, APs send beacons approx. every 100 ms

A

passive scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

During a channel scan, the client is unable to transmit or receive client data traffic. Clients take various approaches to minimise this impact to their data traffic. What are these approaches?

A
  • Background scanning

* On-roam scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Clients can scan available channels before they need to roam. This scan builds on the knowledge of the RF environment and available APs so clients can roam faster if necessary

A

background scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In contract to background scanning, ___ occurs when a roam is necessary. Each vendor/ device can implement its own algorithms to minimise the roam latency and the impact on data traffic.

A

on-roam scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ___ is a collection of mobility controllers (MCs) across which roaming needs to be supported. A ___ can consist of up to 24 WLCs that share the context and state of client devices and WLC loading information. The WLCs of a ___ forward data traffic among the group, which enables intercontroller WLAN roaming and WLC redundancy.

A

mobility group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A wireless client can roam between any AP in a mobility group without being required to ___ to the network.

A

re-authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A controller can recognise controllers that belong to another mobility group. When this occurs, the controllers are said to be in the same ___.

A

mobility domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

For two controllers to be in the same mobility domain, they must know each other, which means that the built in ______of each controller must be entered in to the other controller.

A

mac address and management IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If a client moves from one controller to another in a different mobility domain (that is, to a controller that is not known by the controller that the client leaves), the client will have to ___, ___ and ___.

A

re-authenticate, re-associate and get new IP information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To ensure fast secure roaming, all controllers between which roaming should occur should be in the same ___.

A

mobility group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Controllers in a MG must all have these characteristics in common:

A
  • Mobility domain name
  • Version of controller code
  • CAPWAP mode
  • ACLs
  • WLANs (SSIDs)
17
Q

There are two types of roaming…

A
  • Layer 2 roaming

* Layer 3 roaming

18
Q

__ roaming occurs when the client moves from one AP to another and is maintained in the same client subnet/VLAN.

A

L2

19
Q

L2 roaming occurs in two ways:

A
  • Intracontroller roaming

* Intercontroller roaming (layer 2)

20
Q

• ___ roaming
o when a client moves from location t1 to t2, it asks for reauthentication on a new AP.
o this authentication is done by a query that is sent to the controller to which the AP is connected.
o If the controller is the same one to which the AP that the client is leaving was associated, the controller simply updates the client database with the newly associated AP.

A

intracontroller roaming

21
Q

• ___ roaming
o In this process, a client roams from an AP that is joined to one controller and roams to an AP that is joined to a different controller
o When a client at location t2 moves to t3, it associates to an AP that is joined to the new controller, the new controller exchanges mobility messages with the original controller and the client database entry is copied to the new controller.

A

intercontroller roaming (L2)

22
Q

Intercontroller L2 roaming remains transparent to the user unless:

A
  • Client sends a DHCP discover request

* The session timeout is exceeded

23
Q

__ roaming occurs when the client moves from an SSID on one AP (that is associated with one VLAN and respective IP subnet) to the same SSID on a different AP (that is associated with a different VLAN and IP subnet).

A

L3

24
Q

L3 roaming can occurring the following way:

A

Intercontroller Roaming (layer 3)

25
Q

• ___ Roaming
o Inter-subnet roaming is similar to intercontroller roaming in that the controllers exchange mobility messages on the client roam. However, instead of moving the client DB entry to the new controller, the original controller marks the client with an anchor entry in its own client DB. The DB entry is copied to the new controller client DB and marked with a foreign entry in the new controller. The roam remains transparent to the wireless client and maintains its original IP address.

A

Intercontroller Roaming (layer 3)

26
Q

___, also referred to as guest tunnelling, is a subset of a mobility group in which all the client traffic that belongs to a WLAN (typically the Guest WLAN) is tunnelled to a predefined WLC or set of controllers that are configured as an anchor for that specific WLAN. This feature helps to restrict clients to specific subnet and have more control over user traffic.

A

auto-anchor mobility

27
Q

What are the features of auto-anchor mobility?

A
  • Limit guest access to corp network by first passing through the corporate firewall
  • Implement a geographic access policy that can restrain client traffic to a specific subnetwork
  • Change roaming characteristics if a firewall prevents L3 roaming from functioning properly.
28
Q

___ are used to perform network analytics, providing the ability to collect meaningful data about the wireless aspect of the network

A

Location-based services

29
Q

___ is about collecting data, correlating the collected data, and presenting it in a way that allows you to discover things that you might not have noticed. __ is also about extracting actionable data.

A

Analytics

30
Q

____ is a tool that provides leveraged analytics to understand mobile device patterns. ___ allows your wireless network to deliver dynamic and relevant content to mobile end users. Once the consumer connects to the network, the network provides the organisation with many different ways to engage the consumer.

A

Cisco Connected Mobile Experiences (CMX)

31
Q

There are 3 features of Cisco CMX:

A

Detect
o Can provide either a presence or location-based detection using the wifi signal.
o Presence is for smaller locations where you may only have one or two APs, however you still want to determine the number of vistors
Connect
o Provides a customised portal for guests to log in to the network
o Can be customised to provide splash screen when guests associate with the network
Engage
o Provide context to guests
o For example. If a guest enters the venue and is a recurring guest, you may send a coupon of some type.

32
Q

What are two Cisco CMX analytics tools?

A

Presence analytics
o Deals with counting devices.
o Number of guests can be counted by floor, or by building

Location Analytics
o Heatmaps provide a visual representation of total activity on a floor map in real time, but also can be views as a playback over time
o Useful to understand the space utilisation and popularity of different sections of a location.

33
Q

When you deploy APs to support location-based services, you need to consider the following guidelines.

A
  • At least 3 APS must be used with no less that -75dBm signal strength on the same floor
  • A good general principle is one AP per 2500 square feet
  • APs should be installed along the perimeter walls. For high-density applications, it is recommended to add APs in the middle of dense areas
  • Stagger the APs so you cover perimeter, and try and design so at least 4 APs are within line of sight
  • There should be 20 percent cell overlap for optimised roaming and location calculations.
34
Q

How precise you are at locating your mobile devices depend upon the manner in which the devices are found. What are the 4 different methods of locating a mobile device?

A

o Presence (accurate to 20m)
o Basic location (accurate to 7 m)
o Enhanced location (accurate to 5m)
o Hyperlocation (accurate to 1m)