Chapter 6.2 CENG Wireless Networking Flashcards

1
Q

What do wireless networks enable?

A

Wireless networks enable a number of healthcare applications, including biomedical devices, voice communications, real-time location-based services, guest access, and clinical access. Each of these applications provides benefits to the healthcare systems; however, some create new considerations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do patients who need to use monitoring devices no longer tethered by cables?

A

These devices communicate wirelessly and thus enable those patients to be mobile.

For example: Patients can have a heart monitor put on in the hospital and then go home, all while having their hearts continuously monitored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the concern of wireless monitoring devices compared to using a cable?

A

Unlike the cable, where the possibility of having an interruption in the transmission of data is unlikely, a patient leaving a hospital and going home will traverse any number of networks: an 802.11 network in the hospital, a cellular network in the car, and then a Wi-Fi network attached to the Internet at home.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the biomedical system have to deal with when handoffs to each of the different network occur?

A

As handoffs to each of the different networks occur, the biomedical system has to deal with possible data interruptions and synchronization problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do wireless technologies increase health practitioner productivity?

A

By enhancing voice communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are examples of enhanced voice communications? (3 examples)

A

1) Make it possible to immediately contact a doctor through the use of cellular phones or voice-enabled smartphones.

2) Determine the availability of staff through presence technology.

3) Facilitate collaboration through conferencing technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the disadvantage of wireless technologies?

A

Wireless technologies, which are in the unlicensed band, are susceptible to interference and need to coexist seamlessly with legacy systems such as high-quality voice and nurse call systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do wireless technologies enable?

A

It enables real-time location services for hospitals by using 802.11-configured devices or RFID tags.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the benefit of using 802.11-configured devices or RFID tags? (Can locate…)

A

Hospitals can locate things such as lost heart rate monitors or staff members who are urgently needed and not responding to their cellular phones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is guest access?

A

The provision of Internet connectivity to patients or to a patient’s associates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can guest access do?

A

It makes it possible to connect at a time when it is especially critical to have access to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the considerations Guest access brings? (4 considerations)

A
  1. Authentication
  2. Resource control
  3. Logging
  4. Control of access infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is 802.11 Standards?

A

The 802.11 set of standards define how wireless LANs are to be implemented, their modulation techniques, and protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do the 802.11 Standards work? (Bands)

A

They work in the 2.4 GHz band and in the 5 GHz band (Also called the Industrial, Scientific and Medical (ISM) band)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the 802.11 Standards use? (Modulation Techniques)

A

These standards use direct-sequence spread spectrum (DSSS) and orthogonal frequency-division multiplexing (OFDM) modulation techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the media access control mechanism?

A

The media access control mechanism is Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)?

A

Rather than sending out a message and sensing if a collision occurred, the transmitter waits for a signal from the Access Point (AP) that it is clear to send a signal before it sends the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of the sample network?
(Connect different departments of a..?)

A

Fundamentally, networks connect things. The sample network (in Figure 6.2) connects different departments of a hospital to a data centre, the Internet, and a cloud service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Examples of how sample network connect different departments of a hospital to a data centre, the Internet, and a cloud service:

A
  • A pharmacy and a gift shop are connected to applications in a data centre.
  • A surgical ward is connected to the network.
  • In the clinic, a server, a terminal, and a phone are connected to applications in the data centre.
  • A wireless access point in the emergency ward connects patients and members of families of patients to a wireless network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the several network components in the sample network to focus? (4 components)

A
  1. Ethernet hub
  2. Network switches
  3. Routers
  4. Firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the purpose of Ethernet Hubs?

A

The purpose of an Ethernet hub, also commonly known as a hub, is to distribute information (packets) from all devices and to all devices connected to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does a hub work? (What mode?)

A

A hub is said to work in broadcast mode, meaning it copies the information sent into one of its ports to all of the other ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does a hub also act as?

A

A hub also acts as a repeater and cleans up the physical digital signal sent to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the purpose of Network Switches?

A

The purpose of a network switch, also commonly known as a switch, is to forward traffic destined from a device connected to one of its ports to one or more ports of that switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What do hub and switch share in common?

A

Hub and Switch are both network connecting devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is main objective of Hub?

A

Hub main objective is to transmit the signal to port to respond where the signal was received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the main objective of Switch?

A

Switch enables connection setting and terminating based on need.

28
Q

What layer does Hub work in?

A

Hub works in Physical Layer.

29
Q

What layer does Switch work in?

A

Switch works in Data Link Layer.

30
Q

What transmission type does Hub use?

A

Hub uses broadcast type transmission.

31
Q

What transmission type does Switch use?

A

Switch uses unicast, multicast as well as broadcast type transmission.

32
Q

How many ports can a Hub have?

A

Hub can have maximum 4 ports.

33
Q

How many ports can a Switch have?

A

Switch can have 24 to 28 ports.

34
Q

How many collision domain does a Hub have?

A

Hub has a single collision domain.

35
Q

How many collision domain does a Switch have?

A

In Switch, each port has their own collision domain.

36
Q

Does Hub provide packet filtering?

A

Hub does not provide packet filtering.

37
Q

Does Switch provide packet filtering?

A

Switch provides packet filtering.

38
Q

What transmission mode does a Hub use?

A

Hub uses half duplex transmission mode.

39
Q

What transmission mode does a Switch use?

A

Switch uses full duplex transmission mode.

40
Q

What is the purpose of a Router?
(To forward..?)

A

The purpose of a router is to forward data packets to networks it is connected to and to interconnect and terminate LANs.

41
Q

What are Routers also known as? (Fundamental..?)

A

Routers are also fundamental building blocks of the Internet.

42
Q

What layer does Router work at?

A

Routers work at layer 3, the network layer: they collectively move packets from a source to a destination in the network.

43
Q

What do Routers create?

A

Routers create a routing table that contains information on routes that packets can take through the network.

44
Q

How do Routers forward packets?

A

They do this by comparing the network address part of the destination IP address of the transiting IP packet to the list of network addresses in the routing table.

45
Q

What is the purpose of a Firewall?

A

The purpose of a firewall is to protect an enterprise’s internal network by limiting access to that network from the external network.

46
Q

What is Firewall usually protecting?

A

Usually the firewall is protecting the internal network from the public internet.

47
Q

Other than protecting the internal network from the public internet, what can Firewall protect as well?

A

Firewall could also be protecting internal networks from each other.

48
Q

How can wireless networks be accessed? (By..?)

A

Wireless networks can be accessed by anyone who is within range of the wireless signal.

49
Q

Do wireless networks need to be secure?

A

Yes, it needs to be secured, especially if they happen to be carrying sensitive patient data.

50
Q

What are the two less secure way of securing a wireless network?

A
  1. Not broadcasting the Service Set Identifier (SSID)
  2. MAC filtering
51
Q

Why is not broadcasting the Service Set Identifier (SSID) a less secure way of securing a wireless network?

A

Simply, it is just hiding the SSID

52
Q

Why is MAC filtering a less secure way of securing the LAN?

A

When MAC filtering is used, only a specified set of MAC addresses are given access to the network.

The reason it is less secure is that a hacker sniffing frames on a wireless network can read a MAC address and then use that MAC address to gain entry to the network.

53
Q

What is WEP?

A

Wired Equivalent Privacy

54
Q

What is Wired Equivalent Privacy (WEP) originally used for?

A

Wired Equivalent Privacy (WEP) was the original security mechanism associated with 802.11.

55
Q

How does Wired Equivalent Privacy (WEP) work? (Requires user to..?)

A

It required the user to manually enter a key, which would be used to encrypt transmitted data. Manual key entry limits scale and exposes WLANs to security breaches (keys being stored on sticky notes).

56
Q

What was Wired Equivalent Privacy (WEP) replaced with?

A

WEP was replaced by Wi-Fi Protected Access (WPA) and then WPA2 (also known as 802.11i).

57
Q

What is WPA?

A

Wi-Fi Protected Access

58
Q

What is WPA2 and what is it also known as?

A

Wi-Fi Protected Access 2, also known as 802.11i

59
Q

What does 802.11i use?

A

802.11i uses the Advanced Encryption Standard (AES) and is considered a more secure way of securing wireless LANs.

60
Q

What is AES?

A

Advanced Encryption Standard, a more secure way of securing wireless LANs.

61
Q

What are other security measures for wireless networks? (3 examples)

A

1) Antenna and signal gain design that limits the WLAN footprint to the true usage perimeter.

2) Avoiding meaningful names for the WLAN SSID since this provides readily accessible information to hackers.

3) Implementing intrusion detection methods on the WLAN. For example, the issuance of multiple incorrect SSID frames could trigger an event.

62
Q

What is different about wireless networks versus wired networks?

A

Wireless networks use radio waves to communicate.

63
Q

Which of the following is not a security task that should be performed on a new WAP?

a) Enable backward compatibility.
b) Change administrator account and password.
c) Disable SSID broadcast.
d) Enable encryption.

A

a) Enable backward compatibility.

64
Q

What does ad-hoc mode describe?

A

Wireless network comprised only of peer computers.

65
Q

Identify the correct statement: An ethernet hub ______________

a) is a repeater that cleans up the digital signal.
b) is another term for a network switch.
c) replaced switches as a network element.
d) cannot be used to distribute a digital communication.

A

a) is a repeater that cleans up the digital signal.

66
Q

Which term best describes the process of scouting for Wi-Fi networks that may be vulnerable?

A

War driving