CWNA 107 Flashcards
802.11 Security Basics
Five major security components are required:
- Data privacy and integrity
- AAA (Authentication, Authorization, and Accounting)
- Segmentation
- Monitoring
- Policy
AAA is a key computer security concept that defines the protection of network resources
What are the two data forwarding methods when using a WLAN controller?
- Centralized Data Forwarding
This process is where all data is forwarded from the AP to the WLAN controller for processing - Distributed Data Forwarding
This is where the AP performs data forwarding locally. Distributed local data forwarding is also used to avoid high latency WAN links
All Band Interference
- The term “All Band Interference” is typically associated with FHSS
- This interference occurred on the 2.4GHz range
Adjacent Channel Interference
Most WiFi vendors use this term to refer to degradation of performance resulting from overlapping frequency space
Channel Bonding
- Channel bonding is a recent type of technology
- With channel bonding you can take 2 20MHz channels and create 1 40MHz channel to double the amount of data you can send across that channel
Load Balancing
This is the method to manipulate MAC sublayer to balance clients between multiple access points
Telecommunication networks are defined as what?
Telecommunication networks are defined as 3 logical planes of operations:
- Management Plane
- Control Plane
- Data Plane (User Plane)
Data Plane
- The data plane is where administrators focus on forwarding data
- The data plane is the decision maker on how to move traffic it receives
- The data plane can be handled within an access point or WLAN controller
Band Steering
- This is the process of directing wireless devices to connect to 5GHz over 2.4Ghz
- 5GHz offers more channels & faster throughput rates
802.11 Coverage Considerations
When designing an 802.11 WLAN, most vendors recommend 15%-30% overlap of -70 dBm coverage cells
Layer 2 Retransmissions
- Unicast 802.11 frames MUST be acknowledged
- If a collision occurs or any portion of a unicast frame is corrupted, the CRC will fail
- Retransmissions cause more overhead and less throughput
Last-Mile Delivery
- The term “last-mile” is often used by ISP companies to refer to the last segment of their service that connect a subscriber to their network
- Typically can be the most difficult and costly to run due to a cable needs to be run individually to the subscriber
Control Plane
- Control plane is defined by protocols that provide the intelligence and interaction between equipment in a network
- Examples of Control plane intelligence
Dynamic RF
Roaming Mechanisms
Client Load Balancing
Mesh Protocols
What considerations should you have in mind when deploying WLAN solutions?
- Always remember business needs are first
- Always look at the protocols that are being implemented
- Have awareness of what applications would be supported
Management Plane
The functions of the management plane are as follows:
- WLAN configuration of SSIDs, security, WMM, channel and power settings
- WLAN monitoring & reporting of Layer 2 statistics like ACKs, client associations, re-associations, and data rates occurring in the management plane
Wavelength
- Wavelength is the distance between similar points (peaks) on two back-to-back waves
- Typically measured from the peaks of the two back-to-back waves
- Wavelength is measured in meters
Amplitude
- Amplitude is the height, force, or power of the wave
- Amplitude is also referred to as either Transmit amplitude or Received amplitude
Reflection
- A wave that can bounce off a flat smooth surface that is larger than the wave
- Reflection will change the direction of the wave
- There are two major types of reflection:
Skywave reflection
Microwave reflection
Frequency
- Frequency describes the behavior of waves
- Can also be described as how many waves are generated over a 1 second period of time
- Frequency has an inverse relationship to wavelength
WiFi Direct
- WiFi Direct enabled WiFi devices to connect directly without the use of an AP
- WiFi Direct is ideal for mobile phones, cameras, printer, and PCs
- Uses WPA2 security
The WiFi Alliance is responsible for what certification program?
- WiFi Multimedia (WMM)
- Voice Personal
Which organization’s website would be best to use for research to a document titled “RFC 3935”?
Internet Engineer Task Force (IETF)
IBSS with WiFi Protected Setup
- IBSS w/ protected setup provides easy configuration and strong security for ad-hoc (peer-to-peer) WiFi networks
- This would be used with devices that have a limited user interface
- WiFi Vendors refer to IBSS as either peer-to-peer or an ad hoc network
Modulation
The method of adjusting the signal to create the carrier signal