Wireless Networks Flashcards
Wireless Access Point
Expands wired LAN into wireless domain
Does NOT interconnect two networks
Functions as a hub
Connects wired LAN & wireless devices into the same subnet
All clients on an access point are on a single collision domain
IBSS
Independent Basic Service Set
Contains only devices/clients with no APs
(Ad-hoc WLAN)
BSS
Basic Service Set
Only one AP connected to the network
(SOHO network)
ESS
Extended Service Set
Contains multiple APs to provide coverage
(College campus)
Mesh Topology
May not use a centralized control
Range of combined wireless defines network
Uses Wifi, Microwave, Cellular, & more
AP Placement (2.4GHz)
Non-overlapping coverage cells for 2.4GHz band should have 10-15% coverage overlap in coverage area
AP Placement (5GHz)
Identical channels should be separated by at least two cells instead of one
Site Surveys
Wireless survey to determine coverage areas
Produces a heat map with coverage
Wireless Range Extenders
Specialized device that overcomes distance limitations of wireless networks
Amplifies the signal & extends reachability of a wireless cell
Wireless repeater receives signal on one antenna & repeats on the other
RFI
Radio Frequency Interference
Caused by using similar frequencies to WLAN
Common sources:
Other Wifi devices, Baby monitors, Microwave ovens, Wireless security systems, appliances/walls/cabinets, signal strength
CSMA/CA
Carrier Sense Multiple Access/Collision Avoidance
WLAN uses CSMA/CA, ethernet uses CSMA/CD
Listens for transmission to determine if safe to transmit
If clear, sends RTS (request to send) & waits
If received an RTS, responds with CTS (clear to send)
If not receive, device starts random back off timer
Pre-Shared Key
Both AP & client use the same encryption key
Scalability is difficult if key is compromised
All clients must know the same password
WEP
Wired Equivalent Privacy
Original 802.11 wireless security standard
Static 40-bit pre-shared key
(Upgraded to 64-bit, and then 128-bit over time)
24-bit IV (Initialization Vector) - Sent in clear text
Very insecure, easily brute forced
WPA
Wi-Fi Protected Access
Replaced WEP & its weaknesses
TKIP (Temporal Key Integrity Protocol)
48-bit IV, RC4 (Rivest Cipher 4) encryption
Uses MIC (Message Integrity Check)
Enterprise Mode
Users can be required to authenticate before key exchange
Keys between AP & client are temporary
WPA2
Wi-Fi Protected Access 2
Part of 802.11i standard
Requires stronger encryption and integrity checks
CCMP integrity check
AES 128-bit Encryption (Advanced Encryption Standard)
Two modes
Personal - Pre-shared keys
Enterprise - Centralized authentication