Chapter 5. Flashcards

1
Q

How did 8.2.11b radios achieve faster radio transmission rates?

A

By using spreading/coding techniques called CCK (Complementary Code Keying), a modulation method using the phase properties of the RF signal.

It used a spread tech called Barker code. Resulting in 1,2,5.5, and 11 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The IEEE specifically define 802.11 technologies at what 2 layers?

A

The physical layer and the MAC sublayer of the data-link layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The WMM is a mirror of what 802.11 standard?

A

The 802.11e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VoWiFi requires a handoff less than how long to avoid degradation of voice?

A

100 milliseconds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What 2 wireless frames are country code information stored in?

A

Beacons and Probe Responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

????

What are the 3 main components of security in the original 802.11 standard?

A

Data Privacy, (Encryption, Data integrity (Protection from modification), and authentication (identity verification).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 5 things an AP can do to remain DFS compliant?

A

AP can quiet a channel to test for the presence of radar.
An AP may test a channel for the presence of radar before using the channel.
An AP can detect radar on the current channel and other channels
An AP can cease operations after radar detection to avoid interference.
An AP once radar is detected may choose a different channel to transmit on and inform all the associated stations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What did the 802.11i amendment bring to the table in terms of authentication?

A

Two methods. PSK (Pre-Shared Keys) and 802.1X/EAP (extensible authentication protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What did the 802.11i amendment bring to the table in terms of data integrity? What was included in the header.

A

CCMP uses an integrity checker called MIC (Message Integrity Check). The trailer of all 802.11 frames are a 32 bit CRC value called a frame check sequence which protects the entire frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What did the 802.11i amendment bring to the table in terms of data privacy?

A

Used a stronger encryption method called Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What did the 802.11i amendment do?

A

The 802.11i amendment, which was ratified and published as IEEE Std 802.11i-2004, defined stronger encryption and better authentication methods. The 802.11i amendment defined a robust security network (RSN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does data rate mean? How does this compare to throughput and why?

A

A data rate is the number of bits per second the Physical layer carries during a single-frame transmission, normally stated as a number of millions of bits per second (Mbps).

Throughput is about half of the data rate, due to medium contention and access methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does it mean to be spread spectrum? What clause was this known for?

A

Spread spectrum means that bandwidth is wider that what is required to carry the data.

This was known by clause 14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does it mean when an 802.11G AP is in B/G Mode? Why can this mode suffer in performance?

A

This is the default state, called Mixed Mode. Support for older legacy devices are enabled.

However, if an older phy client is detected the AP issues a protection mode order to all clients, requiring RTS/CTS. This can drop the throughput from 54 Mbps to 20-8 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does it mean when an 802.11G AP is in B-Only mode?

A

The access point turns into a B mode only AP, allowing support for legacy devices using DSS, HR-DSSS and ERP-DSSS/CCK tech.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does it mean when an 802.11G AP is in G-Only Mode?

A

Support for older legacy devices is turned off. Only ERP-OFDM tech is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the 802.11y amendment do?

A

Allowed devices to operate in both the licensed and unlicensed spectrums. This means that content-based protocol mechanisms are needed to avoid interference between devices. To accommodate this, DSE (Dynamic STA Enabled), was used which forces 802.11 radios broadcast their actual location as a unique identifier in order to help resolve interference with non 802.11 radios in the same frequency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the transmit power control (TPC) service provide for the following?

A

Client stations can associate with an AP based on their transmit power.
Designation of the maximum transmit power levels permitted on a channel, as permitted by regulations.
An AP can specify the transmit power of any or all stations that are associated with the AP.
An AP can change transmission power on stations based on factors of the physical RF environment such as path loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a mesh access point?

A

A device that provides both mesh functionalities and AP functionality at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a mesh point portal?

A

A device that acts as a gateway to one or more external networks such as an 802.3 wired backbone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a mesh point?

A

A mesh point (MP) is capable of using a mandatory mesh routing protocol called Hybrid Wireless Mesh Protocol (HWMP) that uses a default path selection metric.

22
Q

What is an 802.11 Study Group?

A

They are in charge of investigating the possibility of putting new features and capabilities into the 802.11 standard.

23
Q

What is CCK (Complementary Code Keying)?

A

CCK is a modulation method using the phase properties of the RF signal.

24
Q

What is DSSS? What clause was this known by?

A

Direct Sequence Spread Spectrum, another spread spectrum tech that uses fixed channels.

It used clause 16.

25
Q

What is robust management frames? What are action frames? What is used with unicast?

A

Management frames can be protected by the management frame protection service and include disassociation, deauthentication, and robust action frames.

Action frames are used to request a station to take action on behalf of another station, and not all action frames are robust.

CCMP is used for unicast.

Broadcast and multicast frames are protected using Broadcast/multicast integrity protocol. This is encrypted using AES-128.

26
Q

What is the difference between OFDM and ERP-OFDM?

A

The only difference is transmit frequency. OFDM refers to 802.11a devices that transmit in the U-NII-1, U-NII-2, and U-NII-3 bands. ERP-OFDM refers to 802.11g devices in the ISM band.

27
Q

What is the goal of 802.11G protection mechanisms?

A

To prevent older 802.11b HR-DSSS or 802.11 DSSS radio cards from transmitting at the same time as 802.11g radios, because older 802.11b devices can’t understand OFDM frames and simply see them as noise.

28
Q

What massive improvements did 802.11ac-2013 bring? What frequency does it operate in?

A

The 802.11ac-2013 amendment defines Very High Throughput (VHT) enhancements below 6 GHz.

Operates only in 5 GHz.

Wide channels : Can have 40, 80, or 160 MHz wide channels.

New Modulation : Provides 256 QAM modulation, which has the potential to provide a 30% increase in speed. Requires very high signal to noise.

Spatial streams : Can have up to 8 spatial streams.

Improved MIMO and Beamforming. Created MU-MIMO which allows an AP to communicate with more than 1 client at a time.

29
Q

What the purpose behind 802.11p?

A

To define enhancements to the 802.11 standard to support Intelligent Transportation Systems, applications. Communication between roadside infrastructure is supported. This was designed for vehicle communication between roadside infrastructure.

30
Q

What type of frame are DFS and TPC information located?

A

Inside of management frames.

31
Q

What was the 802.11r known for? How did it solve the speed issue with authentication while roaming?

A

Creating Fast Roaming. Used for VoIP and WMM.

To establish a QoS stream and set up a security association with a new access point in an efficient manner that allows bypassing
802.1X authentication when roaming to a new access point. The client station is able to achieve these tasks either over the wire via the original access point or through the air. Eventually, the client station will complete the roaming process and move to the new access point.

32
Q

What was the benefits of the 802.11n amendment?

A

To increase throughput of both the 2.4 GHz and the 5.0 GHz bands.
Amendment defined a new standard called HT or high throughput which provides PHY and MAC enhancements to support data rates of up to 600 MBps.
MIMO tech in unison with OFDM. Used multiple send and receive antenna and capitalized the effects of multipath.

33
Q

What was the main goal of G and the task group assigned to it? What was the 2 mandatory phy layers and 2 optional techs?

A

To achieve higher data rates and remain compatible with the 802.11 MAC.

2 mandatory are ERP-OFDM and ERP-DSSS/CCK

Optional was ERP-PBCC and DSSS-ODFM

34
Q

What was the name of the 5 GHz band that originally was created in 1999 amendment? How many channels where available? What was the name of the 3 sub bands?

A

U-NII.
12 channels where available.

U-N11-1, U-N11-2, U-N11-3

35
Q

What was the original 802.11d-2001 amendment?

A

The original specifications only had the compliance and regulatory domains of US, Japan, Canada and Europe. The amendment allowed 802.11 WLAN to operate in areas not served by the original standard.

36
Q

What was the PHY created with 802.11 G that allowed it to be backward compatible with b networks?

A

A phy tech called Extended Rate Physical DSSS was used to support data rates of 1 2 5.5 and 11.

37
Q

What was the PHY used in G to achieve higher data rates? What where those rates?

A

The PHY ERP-OFDM was used with G. 6 9 12 18 24 36 48 54

38
Q

What was the primary goal of 802.11j?

A

Obtain japanese regulatory approval by enhancing the 802.11 MAC and 802.11a PHY to operate in Japanese 4.9 and 5 GHz bands.

39
Q

What was the primary purpose of 802.11e?
What did it do?
What methods can an 802.11 radio use to gain control of the half-duplex medium?
Default mode and the new enhanced mode?

A

To enhance QOS for Voice and other media applications.

The 802.11e amendment defines the layer 2 MAC methods needed to meet the QOS requirements for time-sensitive applications over IEEE 802.11 WLANS.

The default method used to control the medium was called DCF or distributed coordination function, is a contention based method determining who gets to transmit on the wireless medium next.

The 802.11e amendment defines enhanced medium access methods to support QoS
requirements. Hybrid Coordination Function (HCF) is an additional coordination function that is applied in an 802.11e QoS wireless network. HCF has two access mechanisms to provide QoS. Enhanced Distributed Channel Access (EDCA) is an extension to DCF.
The EDCA medium access method will provide for the “prioritization of frames” based on upper-layer protocols. Application traffic, such as voice or video, will be transmitted in a timely fashion on the 802.11 wireless medium, meeting the necessary latency requirements.

40
Q

What was the purpose behind 802.11ae amendment? What was its primary goal?

A

Specifies enhancements to QoS management. A quality of service management frame service can be enabled, allowing some of the management frames to be transmitted using a QoS access category that is different that the access category that is assigned to voice traffic.

To improve the quality of service of other streams.

41
Q

What was the purpose behind 802.11s?

A

Access points can act as portable devices to a wireless distribution system. The 802.11s amendment proposes the use of a protocol for adaptive, auto configuring systems that support broadcast, multicast, and unicast traffic over a multihop mesh WDS. They improved the MAC/PHY layers to handle this.

Created a new networking routing protocol called Hybrid Wireless Mesh Protocol that uses a default path selection metric. These were created from Mesh Points. Created a mesh network, that created a wireless network between access points and didn’t need 802.3 access.

42
Q

What was the purpose behind 802.11v? What did it create, what is it used for, how did it work.

A

(Not complete)

Defines methods of retrieving information from client stations.

Eases the configuration of client stations wirelessly from a central point of management.

This created WNM (Wireless Network Management), which gives stations the ability to exchange info for the purpose of improving the performance of the overall wireless network.

Access points and client stations use WNM protocols to exchange operational data so that each station is aware of the network conditions, allowing stations to be more cognizant of the topology and state of the network.

Also provides support for the multiple BSSID capability, and offer a new WNM sleep mode in which a client station can sleep for long periods of time without receiving frames from the AP.

43
Q

What was the purpose behind the 802.11aa? What did it improve?

A

Specifies QoS enhancements to the 802.11 Media Access Control (MAC) for robust audio and video streaming for both consumer and enterprise applications.

Provides improved management, increased link reliability, and increased application performance.

44
Q

What was the purpose of 802.11h? What else did it do?

A

Amendment defines mechanisms for DFS or dynamic frequency selection and transmit power control. It was originally used to satisfy regulatory requirements in Europe and to detect and avoid radar. Ensured that radio transmissions will not cause interference with 5 GHz satellite and radar transmissions.

It created the U-NII-Extended band. This created 11 more channels. Radar detection is required on UNII-2 Extended Bands.

45
Q

What was the purpose of 802.11k?
What does it call for?
What was it required to report on?
How does a client request before roaming using this tech?

A

To provide a means of radio resource measurement (RRM).
The amendment calls for measurable client statistical information in the form of requests and reports for the physical layer 1 and the MAC sublayer of the data-link layer2.

Physical layer information - SNR, Signal strength, data rates. MAC info such as frame transmissions, retries and errors.

Channel statistics - Clients may gather noise floor info based on any RF energy in the background of the channel and report this info back to the AP. Channel load info as well.

Neighbor Reports - 802.11k gives client stations the ability to learn from access points or controllers about other access points and where the client stations might potentially roam.

The client station asks for a neighbor report detailing available access points from best to worst. Before a station roams, it will request the neighbor report from the current AP or controller and then decide whether to roam to one of the access points on the neighbor report. The client can now make a better roaming decision.

46
Q

What was the purpose of 802.11w?

A

To prevent deauth attacks. It was common for a DoS attack on layer 2 to take out a wireless network. Layer 2 management frames where spoofed and send back to the AP, deauthing it and all its clients. The 802.11w amendment provides protection for unicast, broadcast, and multicast management frames. They used robust management frames.

47
Q

What was the purpose of 802.11z?

A

To establish and standardize Direct Link Setup (DLS) mechanism to allow operation with non DLS capable access points.

Most WLAN has client stations that are associated to the same access point must pass through the access point. DLS allows client stations to bypass the access point and communicate with direct frame exchanges.

48
Q

What was the purpose of the 802.11u? What was it the basis for?

A

To address interworking issues between an IEEE 802.11 access network and any external network to which it is connected.

Defines functions and procedures for aiding network discovery and selection by STA’s, information transfer from external networks using QoS mapping, and a general mechanism for provision of emergency services.

Was the basic for Hotspot 2.0

49
Q

What was the reason behind 802.11ad-2012? What are the pros and cons? What else did this create to enhance security?

A

This is a new amendment that defines Very High Throughput (VHT) enhancements using the much higher unlicensed frequency band of 60 GHz.

Can have throughput as high as 7 Gbps. Downside is the effective distance. Line of site only.

It also created a new encryption mechanism because CCMP was too slow to handle this kind of data rate. Created a new encryption called Galois/Counter Mode Protocol, GCMP which also uses AES cryptography.

50
Q

What are the supported data rates of 802.11a?

A

6 12 24 and 54

51
Q

What was the spread tech called that generated data rates of 5.5 and 11

A

HR-DSSS