3 Wireless Networking Flashcards
3.1.12
Outline the advantages of wireless networking
- Users can connect to the network from various locations within the coverage area, enabling mobility
- It could be more cost effective as it does not require extensive cabling
- It is much more flexible and scalable as it is adaptable to changing environments and configurations (don’t have to rearange cabling and it is easy to add access points)
- Lack of cabling means people won’t trip and get hurt from cables
3.1.12
Outline the disadvantages of wireless networking
- They are subject to environmental interference from physical obstacles or electronic devices. This makes wireless networks less consistent than wired networks.
- wireless networks typically have lower bandwidth and data transmission speeds than wired cables due to packet loss, environmental interference, and because wireless mediums need to share bandwidth compared to cables.
- There is a limited physical range or coverage area, and signal strength decreases with distance from the access point.
- If not properly secured, it could be vulnerable to unauthorised access and data interception.
3.1.13
Describe NICs
They are hardware components installed in devices which allow them to connect to a network. It allows the device to send and receive data over the network.
3.1.13
Describe wireless access points
Allows wireless devices to connect to a network.
3.1.13
Describe wireless routers
A wireless router serves as a central hub for multiple devices to connect and communicate within a network. It also manages data traffic within a network, forwarding and routing data packets.
3.1.13
Describe the software components of a wireless network
Antivirus software: Detects and removes viruses that can compromise the network.
Firewall software: Monitors and filters incoming and outgoing network traffic, ensuring that only data which meets its set of rules get to access the network.
WLAN protocols: Defines the rules and standards for wireless communication. They specify how data is transmitted, received, and organized into packets.
3.1.14
Describe WiMAX
WiMAX stands for Worldwide Interoperability for Microwave Access. It is a wireless communication technology which uses microwave radio waves to provide access to the internet. It is designed as a cheap method which covers a large area. However, it is slower than Wi-Fi.
3.1.14
Describe 3G mobile networking
3G (third generation) mobile networking is a mobile networking standard for data transmission. It is rather slow.
3.1.14
Describe 4G mobile networking
4G (fourth generation) mobile networking is a mobile networking standard which is an upgrade to 3G. With 4G, people could easily watch videos, make videos, and use apps that needed a lot of data.
3.1.15
Describe three factor authentication
Three factor authentication typically falls into three categories:
Something you know (Knowledge-based): Passwords, PIN (personal identification number), Security questions (e.g. What is your son in law’s middle name?)
Something you have (possession-based): Keys, identity cards, authentication code sent to mobile device
Something you are (biometric-based): fingerprints, facial recognition, iris scan
It is often used to ensure people accessing networks are authorised.
3.1.15
Describe firewalls
Firewalls are hardware or software (or both) which monitors and filters incoming and out-going network traffic (data packets). They do so by implementing a set of rules and policies that determine which data packets are allowed to pass through and which should be blocked or filtered.
3.1.15
Describe MAC addresses
Media Access Control (MAC) addresses are unique identifiers assigned to network devices. With MAC addresses, network administators can create Access Control Lists (ACLs) that allow or deny network access for specific devices.
3.1.15
Describe physical security as a method of network security
You can protect network infrastructure with locked doors, security guards, reinforced rooms, CCTV, etc.
3.1.15
Describe encryption
Encryption is the process of converting data into a coded format to prevent unauthorized access, making it readable only to those with the proper decryption key or algorithm.
3.1.16
Evaluate encryption
Advantages:
* Encryption prevents data from being read by unauthorised individuals
* Encryption ensures data integrity
Disadvantages:
* If different systems or applications use different encryption methods, compatibility issues may arise. This could be an issue in business mergers.
* Losing encryption keys can result in permanent data loss