3.3 Wireless Networking Flashcards
What is good about wireless networking? [4]
- (doesn’t cost anything) -don’t have to buy a bandwidth license.
- LANs can be set up without cabling.
- Wi-Fi can support roaming between access points so people can automatically switch between routers.
- Setup costs are minimal (and there are various affordable options on the market.
What are the disadvantages of Wireless networking?
- Interference (sometimes steel can cause blockages)
- Limited Range (depending on routers)
- WEP - not very difficult to hack encryption.
- Access points can be used to steal data.
- Health concerns (people believe it can cause cancer or ruin sleep patterns.
When should you use wireless networking?
Singular building not across buildings e.g. office building.
What is wi-fi?
- Also called wireless LAN (WLAN)
- Used to connect wirelessly to a home network
When is often wifi used?
Most preferred network for homes
What is good about wifi?
Backwards Compatible with most older Wi-Fi standards.
What is bad about wifi?
Small transmitting radius.
What is WiMax? [1]
Worldwide Interoperability for Microwave Access
And why do people use wiMax? [3]
- Designed for large distance high speed.
- Relatively cheap method, suited for poorer countries.
- Can be used as a wireless variant of DSL phone transmission lines.
What is 3G?
Primary way to access internet using mobile phones.
Why is 3G good?
- Allows the tunnelling of phone lines. (Don’t have to switch back to phone network to receive a call)
- Fast.
What is the parts of Wireless security?
CIA Triad
1. Confidentiality
2. Integrity
3. Avalibality
Why are security systems hard? [4]
- Cannot plan for every eventuality
- The “arms race”
- Systems can unravel from a weak point.
- Users messing it up.
What is the three types of authentication?
- One factor authentication. - something you know (password)
- Two factor authentication. - something you have (card) + above
- Three factor authentication. - something you are (finger print) + above + above
What are firewalls and what do they do?
- Hardware or Software (or hybrid)
- Controls incoming and outgoing network traffic.
- Analyse data packets based on pre-determined yes and nos.