Lesson 12 Flashcards
Ad hoc wireless network
Offers equal sharing between devices without the use of a wireless access point (WAP).
Basic service set (BSS)
A group of computers connected with a WAP and share the same SSID.
CSMA/CA
Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) is the transmission type used with wireless networks. CSMA/CA prevents collisions, whereas CSMA/CD contends with the collision after it happens.
CSMA/CD
Carrier Sense Multiple Access/Collision Detection (CSMA/CD) defines the rules for network communication on an Ethernet LAN. It detects collisions and dictates how data is resent after a collision.
Extended service set (ESS)
An ESS is an extension of a basic service set (BSS). It connects multiple BSSs together using more than one WAP as wireless repeaters.
IEEE 802.1a
A wireless standard that uses a frequency of 5 GHz and supports speeds as high as 54 Mbps.
IEEE 802.1b
A wireless standard that uses a frequency of 2.4 GHz and supports speeds as high as 11 Mbps.
IEEE 802.1g
A wireless standard that uses a frequency of 2.4 GHz and supports speeds as high as 54 Mbps.
IEEE 802.1n
A wireless standard that uses frequencies of 2.4 GHz and 5 GHz and supports speeds as high as 300 Mbps.
IEEE 802.1x
A group of technologies that increases security with a network. It ensures that clients are authenticated before granting access to a network. WPA2 Enterprise mode uses an 802.1x server for authentication.
Institute of Electrical and Electronics Engineers (IEEE)
A professional association that creates standards for networking. It created the IEEE 802.3 standard used for Ethernet and the IEEE 802.11 standard used for wireless.
Point-to-point (P2P) wireless
Technology used to bridge wired networks in two buildings with wireless methods. A P2P bridge is useful when a wired connection is not feasible or affordable.
Service set identifier (SSID)
The SSID is the logical name of the wireless network. All wireless devices must be in the same SSID to communicate.
War driving
The act of driving a car through an area and scanning for wireless networks. Attackers war drive to locate wireless networks and tap into wireless networks with weak security.
Wi-Fi Protected Access (WPA)
WPA was introduced as an interim replacement for WEP until WPA2 could be finalized. WPA offers significantly improved security over WEP without requiring additional hardware. WPA can be used in WPA Personal mode with a preshared key or WPA Enterprise mode with an 802.1x server.
Wi-Fi Protected Access version 2 (WPA2)
WPA2 provides a permanent fix for the security problems of WEP and is standardized as IEEE 802.11i. WPA2 requires different hardware than that used by WEP and uses the Advanced Encrypted Standard (AES) encryption method. WPA2 can be used in WPA Personal mode with a preshared key or WPA2 Enterprise mode with an 802.1x server.
Wired Equivalent Privacy (WEP)
WEP was the first encryption model offered for wireless network. It is insecure and should be used only in current wireless networks as a last resort.
Wireless Access Point (WAP)
A WAP is a device that is located between a wired LAN and a group of wireless clients. It bridges the wireless devices to the wired LAN.
Which of the following statements about the service set identifier (SSID) are true?
The SSID is an alphanumeric information field with a maximum value of 32 bits.
The SSID is a logical network name for a wireless network.
Which of the following is used by wireless devices to connect to a network?
Wireless access point
What frequency does an 802.11n network use?
5 GHz
2.4 MHz
Your company is planning to lease a second building, which is about 2 miles away. You’re asked how the networks between the two buildings can be connected. What would you suggest?
Connect the buildings with a P2P bridge.