Wireless Networking Flashcards
IBSS
Independent Basic Service Set used in Ad Hoc peer to peer network mode
802.11 3 standard broadcasting methods
- DSSS
- FHSS
- OFDM
DSSS
Direct sequence Spread spectrum; Sends data out on different frequencies at the same time
FHSS
Frequency Hopping spread spectrum; sends data out on one frequency at a time
OFDM
Orthogonal frequency division Multiplexing; better at dealing with interference and is used on all but the earliest 802.11 networks.
Channels that WAPs can use
1-11, default channels like 1,6 and 11 are used because they do not overlap
CSMA/CA
Carrier sense multiple access with collision avoidance; each sending node detects the collision and responds by generating a random timeout period for itself, during which it doesn’t try to send any more data on the network which is called a backoff.
DCF
Distributed Coordination Function; specifies rules for sending data onto the network media.
802.11b
Data throughput: 11Mbps
Range: Up to 300ft
Frequency: 2.4GHz
Spectrum: DSSS
802.11a
Data Throughput: 54Mbps
Range: Up to 150 Feet
Frequency: 5.0GHz
Spectrum: OFDM
802.11g
Data Throughput: 54Mpbs
Range: Up to 300 Feet
Frequency: 2.4GHz
Spectrum: OFDM
802.11n
Data Throughput: 100+ Mbps
Range: Up to 300 Feet
Frequency: 2.4GHz also supports dual band
Spectrum: OFDM (QAM)
MIMI
Multiple In/Multiple Out; which enables the devices to make multiple simultaneous connections called streams
Transmit Beamforming
A Multipole Antenna tech that helps get rid of dead spots.
802.11ac
Data Throughput: Up to 1Gbps
Range: Up to 300 Feet
Frequency: 5 GHz
Spectrum: OFDM (QAM)
802.11i
First standard security encryption for wireless networks that used the 802.1X standard to enable you to setup a network with secure authentication using RADIUS server and passwords encrypted with EAP.
EAP
Extensible Authentication Protocol. which is a PPP wrapping that EAP compliant applications can use to accept one of many types of authentication.
EAP-PSK
EAP-Pre Shared Key, is nothing more than a shared secret code thats stored on both the wireless access point and the wireless client encrypted using AES encryption.
EAP-TLS
EAP with transport Layer Security defines the use of a RADIUS server as well as mutual authentication. Requiring certificates on both the server and client.
EAP-TTLS
EAP Tunneled TLS is similar to EAP-TLS but only uses single server side certificate.
EAP-MS-CHAPv2
More commonly known as PEAP (Protected EAP) uses a password function based on CHAPv2 with the addition of an encrypted TLS tunnel. Most common implementation of EAP.
EAP-MD5
Very simple version of EAP that uses only MD5 hashes for transfer of auth credentials. Is weak and the least used of all the version of EAP
LEAP
Lightweight EAP is a proprietary EAP auth used almost exclusively by Cisco Wireless products. Combination of MS-CHAP and RADIUS server
EAP-FAST
EAP Flexible Authentication via secure tunneling is ciscos replacement for LEAP.
802.1x
A port based auth network acccess control mechanism for networks.
WEP
Wired Equivalent Privacy, uses 64 bit or 128 bit encryption algorithm to scramble data frames.
WPA
Wifi Protected Access. Offered security enhancements such as dynamic encryption key generation and encryption key integrity frame checking feature.
TKIP
Temporal Key Integrity Protocol. Still used RC4 for cipher
WPA2
Wifi protected access 2, used the AES full 802.11i standard.
WPA2-Enterprise
Just adds enterprise class wireless equipment
LWAPP
Lightweight Access Point Protocol
VLAN Pooling
Creating a pool of VLAN for a single SSID and randomly assigning wireless clients to one of the VLANs.