slides09 Flashcards
why is collision detection difficult on wifi
But detecting another host’s radio signal can be very difficult as it can be a tiny fraction of the power of yours, and your signal will drown out the colliding signal and make it undetectable
RTS/CTS handshaking
asking if free, response, everyone sees response and know how much to wait until communication ends
when is it good and bad to have RTS/CTS
good for large or busy networks, good if restricted to large packets only, bad if small network, bad if small packets
802.11ac
MU-MIMO (a set of users or wireless terminals, each with one or more antennas, communicate with each other), 160MHz channel width support, support for more 5GHz channels, and four spatial streams
802.11ax
OFDMA (This allows simultaneous low-data-rate transmission from several users), QAM (It conveys two analog message signals, or two digital bit streams, by changing (modulating) the amplitudes of two carrier waves)
37% more data rate ac, x4 user throughput
describe wifi p2point
Each host communicates directly with each other without an access point
Basic Service Set
More common is Infrastructure or Basic Service Set (BSS), where a central hub (access point) relays traffic between hosts
This is more expensive to set up (as you have to buy an AP), but covers a larger area
Also the AP can connect into a wired network and so the rest of the Internet
Extended Service Set
Extended Service Set (ESS) connects several APs by a wired network
what is WEP
Wired Equivalent Privacy: Both ends of a communication share a secret key that is used to encrypt the traffic between them
how is WPA different from WEP
This introduced better secret key management (Temporal Key Integrity Protocol (TKIP), with RC4) and has a different key with each packet
WPA2 broken, how?
Essentially, KRACK breaks the WPA2 protocol by “forcing nonce reuse in encryption algorithms” used by Wi-Fi. In cryptography, a nonce is an arbitrary number that may only be used once. It is often a random or pseudo-random number issued in the public key component of an authentication protocol to ensure that old communications cannot be reused. As it turns out, the random numbers used on WPA2 aren’t quite random enough, allowing the protocol to be broken.
wpa3 features
Higher Security for Government, Defense, and Industrial Applications
An Easier Connection Process for Devices Without Displays
Protection Against Brute-Force Attacks
Privacy on Public Wi-Fi Networks
what is CCMP AND AES
CCMP is Counter Cipher Mode with Block Chaining Message Authentication Code Protocol
AES is the Advanced Encryption Standard
RADIUS
RADIUS is a networking protocol, operating on port 1812[1] that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service
is The frame layout different from ethernet? if yes, how?
no :P