Section 12 OBJ 2.3: Wireless Networks Flashcards
Direct Sequence Spread Spectrum (DSSS)
Modulates data over an entire range of frequencies using a series of signals known as chips.
chips are susceptible to EMI and environmental interference. Not used often because of this
Uses entire frequency of spectrum to transmit, which is suboptimal.
Frequency Hopping Spread Spectrum (FHSS)
Allows devices to hop between predetermined frequencies.
Slows down ability to use all the bandwidth and reduces spectrum available
least common of the three
Slows down network for better security
Orthogonal Frequency Division Multiplexing (OFDM)
Uses a slow modulation rate with simultaneous transmissions over 52 different data streams.
Most commonly used now.
2.4 GHz
Has specific frequencies/channels to avoid overlap
Has 11 or 14 channels depending on regulations
Each channel is 20 MHz wide
Channels frequently overlap
Channels 1, 6, and 11 used to avoid overlap if using wireless B, G, N
US: 11 channels | 2401-2473 MHz
Rest of the world: 13 channels | 2401-2483 MHz
Japan: 14 channels | 2401-2495 MHz
5 GHz
Has specific frequencies/channels to avoid overlap
Has 24 non-overlapping channels
Each channel is 20 MHz wide
Has option to make wider networks through channel bonding
Channel Bonding
Wireless N networks and wireless AC
Allows for the creation of a wider channel by merging neighboring ones
Risk of overlapping because number of non overlapping channels is reduced
Wireless N: 40 MHz
Wireless AC: 80 MHz, 160 MHz
Channel
a virtual medium through which wireless networks can send and receive data
basically a portion of the wireless frequencies
Exam Important
Standard channel size for 2.4 GHz and 5 GHz is 20 MHz
Channel bonding with 5 GHz can make them larger, but risk interference
802.11a
Band: 5 GHz
Bandwidth: 54 Mbps
802.11b
Band: 2.4 GHz
Bandwidth: 11 Mbps
802.11g
Band: 2.4 GHz
Bandwidth: 54 Mbps
802.11n (Wi-Fi 4)
Band: 2.4 and 5 GHz
Bandwidth: 150 Mbps/600 Mbps (MIMO)
802.11ac (Wi-Fi 5)
Band: 5 GHz
Bandwidth: 6.9 Gbps (MU-MIMO)
802.11ax (Wi-Fi 6)
Band: 2.4, 5, and 6 GHz
Bandwidth: 9.6 Gbps (MU-MIMO)
Multiple Input and Multiple Output (MIMO)
uses multiple antennas the send and receive more data than it could with a single antenna
Multiple User Multiple Input and Multiple Output (MU-MIMO)
Allows multiple users to access the wireless network and access point at the same time
Pre-Shared Key
Both the Access Point and client use the same encryption key
Like using same password on two devices
security is a concern, more so in large workplaces
Wired Equivalent Privacy (WEP)
REMEMBER: Initialization Vector (IV)
Original 802.11 wireless security standard which is an INSECURE security protocol
uses a preshared key
uses a 24-bit initialization vector (IV) that can be cracked easily
Wi-Fi Protected Access (WPA)
REMEMBER: TKIP and RC4
Replaced WEP and follows the Temporal Key Integrity Protocol (TKIP)
uses a 48-bit initialization vector
Rivest Cipher 4 (RC4) for encryption
Message Integrity Check (MIC) to confirm data not tampered with
Enterprise Mode to authenticate users before exchanging keys
Wi-Fi Protected Access 2 (WPA2)
REMEMBER: AES and CCMP
created as part of IEEE 802.11i standard and requires stronger encryption and integrity checking through CCMP
Advanced Encryption Standard (AES) - to provide additional security by using a 128-bit key or higher
MAC Address Filtering
configure the access point to only allow permitted MAC addresses, like an access control list
Disable SSID Broadcast
minor security help by configuring the access point to not broadcast the SSID
Wi-Fi (802.11)
creates point to point connections from one building to another over a relatively short distance
uses directional antennas
Cellular
uses a larger antenna and hotspot powered by a power outlet inside an office or home
Microwave
Creates point to point connection between two or more buildings that have longer distances
Satellite
a long range and fixed wireless solution that can go for miles
Near Field Communication (NFC)
Uses radio frequency to send electromagnetic charge containing the transaction data over a short distance
Radio Frequency Identification (RFID)
A form of radio frequency transmission modified for use in authentication system
uses tags and readers
Infrared Data (IrDA)
allows two devices to communicate using line of sight communication in the infrared spectrum
Bluetooth
creates a personal area network over 2.4 GHz to allow for wireless connectivity
Bluejacking
sending unsolicited messages to a bluetooth device
Bluesnarfing
making unauthorized access to a bluetooth device
BlueBorne
allows the attacker to gain complete control over a device without being connected to the target device