Ch 19: Understanding Wireless Roaming and Location Services Flashcards

1
Q
  1. When a client moves its association from one autonomous AP to another, it is actually leaving and joining which one of the following?
    a. SSID
    b. BSS
    c. ESS
    d. DS
A

2.

The client must associate with a BSS offered by an AP.

BSS: The basic service set (BSS) is a set of all stations that can communicate with each other at PHY layer. Every BSS has an identification (ID) called the BSSID, which is the MAC address of the access point servicing the BSS. There are two types of BSS:

  • Independent BSS (also referred to as IBSS)
  • infrastructure BSS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which one of the following makes the decision for a device to roam from one AP to another?

  1. The client device
  2. The original AP
  3. The candidate AP
  4. The wireless LAN controller
A

1.

The client device is in complete control of the roaming decision, based on its own roaming algorithm. It uses active scanning and probing to discover other candidate APs that it might roam to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ten lightweight APs are joined to a wireless LAN controller. If a client roams from one of the APs to another, which one of the following correctly describes the roam?

  1. Autonomous roaming
  2. Intercontroller roaming
  3. Intracontroller roaming
  4. Indirect roaming
A

3.

Because a single controller is involved, the roam occurs in an intracontroller fashion. Even though the client thinks it is associating with APs, the associations actually occur at the controller, thanks to the split-MAC architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following provides the most efficient means for roaming, as measured by the time to complete the roam?

  1. Layer 2 intercontroller roaming
  2. Layer 3 intercontroller roaming
  3. Intracontroller roaming
  4. All of the above; they all take equal amounts of time.
A

3.

Intracontroller roaming is the most efficient because the reassociation and client authentication occur within a single controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is used to cache authentication key information to make roaming more efficient?

a. PGP
b. CCNA
c. CCKM
d. EoIP

A

3.

Cisco Centralized Key Management (CCKM) is used to cache key information between a client and an AP. The cached information is then used as a quick check when a client roams to a different AP.

for reference…

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications.

EoIP (Ethernet Over IP): Transporting Ethernet frames within IP packets in order to link LANs or tunnel traffic in an IP network. Normally, IP packets ride over Ethernet frames; however, EOIP flips the process, placing layer 2 frames inside layer 3 packets. See transparent LAN service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In a Layer 2 intercontroller roam, what mechanism is used to tunnel client data between the two controllers?

  1. GRE tunnel
  2. EoIP tunnel
  3. CAPWAP tunnel
  4. None of these answers
A

4.

In a Layer 2 roam, the client’s IP subnet does not change as it moves between controllers. Therefore, there is no need to tunnel the client data between the controllers; instead, the client simply gets handed off to the new controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A client roams from controller A to controller B. If it undergoes a Layer 3 roam, which one of the following best describes the role of controller A?

  1. Foreign controller
  2. Host controller
  3. Master controller
  4. Anchor controller
A

4.

The anchor controller, where the client starts, maintains the client’s state and builds a tunnel to the foreign controller, to which the client has now roamed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network consists of four controllers: A, B, C, and D. Mobility group 1 consists of controllers A and B, while mobility group 2 consists of controllers C and D. Which one of the following answers describes what happens when a client tries to roam between controllers B and C?

  1. Roaming is seamless and efficient.
  2. Roaming is not possible.
  3. Roaming is possible, but CCKM and key caching do not work.
  4. Only Layer 3 roaming is possible.
A

3.

Controllers A and B are listed in each other’s mobility list, so they are known to each other. However, they are configured with different mobility group names. Clients may roam between the two controllers, but CCKM and PKC information will not be exchanged.

for reference… both of these provide fast roaming.

Cisco Centralized Key Management (CCKM) is used to cache key information between a client and an AP. The cached information is then used as a quick check when a client roams to a different AP.

Proactive Key Caching (PKC): It was designed as an extension to the 802.11i IEEE standard. PKC is a feature enabled in Cisco WLCs which permits properly equipped wireless clients to roam without full re-authentication with an AAA server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following parameters is useful for computing a client device’s location with respect to an AP?

a. BSS
b. GPS
c. RSS
d. Channel

A

C.

The client’s received signal strength (RSS) can be used to calculate an approximate distance from the AP based on the free space path loss attenuation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A wireless client must associate and authenticate with an AP before it can use the AP’s __________ to access the network

A

A wireless client must associate and authenticate with an AP before it can use the AP’s BSS to access the network.

A client can also move from one BSS to another by roaming between APs. A client continuously evaluates the quality of its wireless connection, whether it is moving around or not. If the signal quality degrades, perhaps as the client moves away from the AP, the client will begin looking for a different AP that can offer a better signal.

BSS: Basic service sets are a subgroup of devices within a service set (SSID) which are additionally also operating with the same physical layer medium access characteristics (i.e. radio frequency, modulation scheme, security settings etc.) such that they are wirelessly networked. Devices within basic service sets are identified by BSSIDs (basic service set identifiers), which are 48-bit labels that conform to MAC-48 conventions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

T/F: When a client wants to roam from one lightweight AP to another, the controller handles the roaming process, rather than the APs, because of the split-MAC architecture.

A

True.

The controller handles the roaming process, rather than the APs, because of the split-MAC architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is “intracontroller roaming”?

A

When a wireless client starts moving, it eventually roams to another AP. Not much changes except that the controller updates the client association from AP 1 to AP 2. Because both APs are bound to the same controller, the roam occurs entirely within the controller. This is known as intracontroller roaming.

Figure 19-4 shows a two-AP scenario where both APs connect to a single controller. Client 1 is associated to AP-1, which has a Control and Provisioning of Wireless Access Points (CAPWAP) tunnel to controller WLC 1. The controller maintains a client database that contains detailed information about how to reach and support each client.

For simplicity, Figure 19-4 shows the database as a list of the controller’s APs, associated clients, and the wireless LAN (WLAN) being used. The actual database also contains client MAC and IP addresses, quality of service (QoS) parameters, and other information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How long does a controller take to update the client association table so it knows which CAPWAP tunnel to use to reach a roaming client when it changes AP associations?

A

If both APs involved in a client roam are bound to the same controller, the roaming process is simple and efficient. The controller has to update its client association table so that it knows which CAPWAP tunnel to use to reach the client. Thanks to the simplicity, an intracontroller roam takes less than 10 ms to complete—the amount of processing time needed for the controller to switch the client entry from AP 1 to AP 2.

From the client’s perspective, an intracontroller roam is no different from any other roam. The client has no knowledge that the two APs are communicating with a controller over CAPWAP tunnels; it simply decides to roam between two APs based on its own signal analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What decides that a client should change AP associations?

  1. WLC
  2. AP
  3. Client
A

The client decides.

The client has no knowledge that the two APs are communicating with a controller over CAPWAP tunnels; it simply decides to roam between two APs based on its own signal analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Along with the client reassociation, what other processes may occur?

A

Along with the client reassociation, a couple other processes can occur:

  1. DHCP: The client may be programmed to renew the DHCP lease on its IP address or to request a new address.
  2. Client authentication: The controller might be configured to use an 802.1x method to authenticate each client on a WLAN.

To achieve efficient roaming, both of these processes should be streamlined as much as possible. For instance, if a client roams and tries to renew its IP address, it is essentially cut off from the network until the Dynamic Host Configuration Protocol (DHCP) server responds.

The client authentication process presents the biggest challenge because the dialog between a controller and a RADIUS server, in addition to the cryptographic keys that need to be generated and exchanged between the client and an AP or controller, can take a considerable amount of time to accomplish. Cisco controllers offer three techniques to minimize the time and effort spent on key exchanges during roams:

  1. Cisco Centralized Key Management (CCKM):
  2. Key caching (PKC),(proactive key caching)
  3. 802.11r
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is CCKM?

A

Cisco controllers offer three techniques to minimize the time and effort spent on key exchanges during roams:

  1. Cisco Centralized Key Management (CCKM): One controller maintains a database of clients and keys on behalf of its APs and provides them to other controllers and their APs as needed during client roams. CCKM requires Cisco Compatible Extensions (CCX) support from clients.
  2. Key caching
  3. 802.11r
17
Q

What is “Key Caching”?

A

Cisco controllers offer three techniques to minimize the time and effort spent on key exchanges during roams:

  1. Cisco Centralized Key Management (CCKM)
  2. Key caching: Each client maintains a list of keys used with prior AP associations and presents them as it roams. The destination AP must be present in this list, which is limited to eight AP/key entries.
  3. 802.11r
18
Q

What is 802.11r?

A

Cisco controllers offer three techniques to minimize the time and effort spent on key exchanges during roams:

  1. Cisco Centralized Key Management (CCKM)
  2. Key caching:
  3. 802.11r: This 802.11 amendment addresses fast roaming or fast BSS transition; a client can cache a portion of the authentication server’s key and present that to future APs as it roams. The client can also maintain its QoS parameters as it roams.
19
Q

T/F: When a client roams to a new AP and a new WLC it will get a new IP address.

A

False.

When the client roams to a different AP, it can try to continue using its existing IP address or work with a DHCP server to either renew or request an address.

Figure 19-7 shows the client roaming to AP 2, where WLAN Staff is also bound to the same VLAN 100 and 192.168.100.0/24 subnet. Because the client has roamed between APs but stayed on the same VLAN and subnet, it has made a Layer 2 intercontroller roam.

Layer 2 roams (commonly called local-to-local roams) are nice for two reasons: The client can keep its same IP address, and the roam is fast (usually less than 20 ms).

20
Q

What is a “local to foreign” roam?

A

When a client initiates an intercontroller roam, the two controllers involved can compare the VLAN numbers that are assigned to their respective WLAN interfaces. If the VLAN IDs are the same, nothing special needs to happen; the client undergoes a Layer 2 intercontroller roam and can continue to use its original IP address on the new controller.

If the two VLAN IDs differ, the controllers arrange a Layer 3 roam (also known as a local-to-foreign roam) that will allow the client to keep using its IP address.

A Layer 3 intercontroller roam consists of an extra tunnel that is built between the client’s original controller and the controller it has roamed to. The tunnel carries data to and from the client as if it is still associated with the original controller and IP subnet.

Figure 19-9 shows the results of a Layer 3 roam. The original controller (WLC 1) is called the anchor controller, and the controller with the roamed client is called the foreign controller. Think of the client being anchored to the original controller no matter where it roams later. When the client roams away from its anchor, it moves into foreign territory.

21
Q

What is RTLS?

A

The components of a wireless network can be coupled with additional resources to provide real-time location services (RTLS). Cisco APs and WLCs can integrate with management platforms like Cisco Prime Infrastructure or DNA Center, along with location servers like Cisco Mobility Services Engine (MSE), Cisco Connected Mobile Experiences (CMX), or Cisco DNA Spaces to gather location information in real time and present that information in a relevant way.