Wireless Networks Flashcards
What is the difference between home network devices and corporate network devices?
Home devices are bundled into one device, while corporate devices are separate for specific functions.
What are WiFi channels?
Subdivisions of the frequency bands used for wireless communication.
Are all channels available and allowed internationally?
Channels vary by country due to regulatory impacts.
What are regulatory impacts?
Rules or regulations set by governmental or international bodies that govern the use of wireless frequencies.
What is frequency?
A specific part of the electromagnetic spectrum used for WiFi.
What are typical frequencies we use?
2.4 GHz and 5 GHz bands.
Why do frequencies vary in the amount of channels they have?
Certain frequencies can be broken down into more channels than others.
What is channel width?
The frequency span of a wireless channel.
What do wider channels offer?
More bandwidth.
What are the frequency options in wireless networking?
2.4 GHz, 5 GHz, 6 GHz
What are non-overlapping channels?
Channels that do not interfere with each other.
In what environments are non-overlapping channels crucial?
In environments with multiple wireless access points.
Which channels do not overlap in the 2.4 GHz frequency band?
1, 6, and 11 in the US.
Which frequency band is widely used for wireless networking offering a good balance between range and bandwidth?
2.4 GHz.
What does the long range for the 2.4 GHz band do better?
Penetrates through barriers better.
What are two cons of the 2.4 GHz frequency band?
- Slower data rates
- Higher rate of interference due to longer range
What two things can the 5 GHz frequency band provide?
- Faster data rates at shorter distances
- Less interference from other household devices
Does short range or long range penetrate barriers better?
Long range.
What does the 6 GHz band do to the bandwidth for wireless networks?
Expands it by doubling the spectrum available.
What type of situation and environment is the 6 GHz ideal for?
High-demand applications and environments.
What WiFi technologies is 6 GHz beneficial for?
WiFi 6E.
What does band steering do?
Automatically detects devices capable of dual-band operations and steers them to less congested bands.
What is band steering?
Network management technology.
What does band steering do to wireless networks in high network density areas?
Enhances the efficiency and reliability of wireless networks.
What does the 802.11h standard enhance compared to the 802.11?
Dynamic frequency selection (DFS) and Transmit Power Control (TPC).
What does DFS help with?
Avoiding interference with radar systems and other devices using the 5 GHz band.
What does TPC manage?
Power output of devices to reduce interference.
What does basic service set (BSS) refer to?
A group of wireless devices operating with the same AP
AP stands for Access Point.
What is the BSSID?
The physical MAC address of the AP
BSSID stands for Basic Service Set Identifier.
Where is the BSSID included into?
The packets
How is the extended service set (ESS) created?
By adding more APs to one service set
What is the service set identifier (SSID) also known as?
The network name used to identify an AP
What is the network name for the extended set?
Extended service set identifier (ESSID)
What do all the APs in an ESS broadcast?
The same SSID to users
What is the wireless networks interface card required for?
To connect to a wireless network or host
What standards does a wireless network interface card support?
802.11a/b/g/n/ac/ax/axe
Does a wireless network interface card support wireless encryption?
Yes
Do all devices have an integrated NIC?
Most but not all
What topology does an AP create?
Star topology
What frequency type does an AP use to provide connections for wireless hosts?
RF(Radio frequency)
What domains does an AP create?
A single broadcast and collision domain
How does an AP manage collisions?
With CSMA/CA
What information does an AP require for configuration and administration?
An IP address
How does an autonomous access point operate?
Independently, managing all aspects of networking
In what environment is the autonomous AP ideal?
Straightforward and smaller networks
How is the lightweight AP (LAP) managed?
Via a wireless LAN controller (WLC)
How is the LAP used?
To increase coverage, availability, and performance
Can a LAP be managed directly?
No
In what direction does an omni-directional antenna transmit?
In all directions
Which wireless antenna is most common in consumer and business wireless devices?
Omni-directional
Does the omni-directional antenna or directional antenna have the short range?
Omni-directional
Where does a directional antenna transmit a signal?
In one direction
How far does the Yagi-Uda antenna focus a wireless signal?
Up to a mile
Which antenna focuses a wireless signal up to 8 miles?
Parabolic antenna
Where is a point-to-point network commonly used?
Linking two locations in a WAN or to provide consistent and reliable connectivity
Point-to-point networks are often utilized in scenarios where a direct connection is needed for efficient communication.
What do mesh networks consist of?
Nodes that connect directly and dynamically to as many other nodes as possible
This connectivity allows for flexible and robust network structures.
What does a mesh configuration create?
Multiple pathways for data to travel between points
These pathways enhance the overall functionality of the network.
What do the multiple pathways in mesh networks enhance?
Reliability and redundancy
This feature is crucial for maintaining network performance during failures.
What are two characteristics of mesh networks?
Self-healing and scalable
These characteristics make mesh networks adaptable to various conditions.
Where are mesh networks ideal?
Smart cities and IoT applications
Their ability to handle numerous devices and connections makes them suitable for these environments.
How do nodes in an ad hoc network communicate?
Directly without the use of a router or a network server
This direct communication can facilitate quick connections.
What structure do ad hoc networks use?
Decentralized without relying on pre-existing infrastructure
This allows for flexibility in network creation and management.
In what situation is an ad hoc network suitable?
For temporary setups such as emergency responses or military operations
These scenarios benefit from the quick deployment capabilities of ad hoc networks.
What is the most common type of network?
Infrastructure networks
Infrastructure networks are prevalent in both business and home environments.
What do Infrastructure networks rely on?
Fixed routers or APs that manage traffic to and from wireless devices
This reliance on fixed hardware differentiates them from other network types.
Which setup is infrastructure networks used for?
Commercial and residential setups
Infrastructure networks provide essential connectivity in these settings.
What is WPA2?
A security protocol developed to secure wireless computer networks
WPA2 stands for Wi-Fi Protected Access 2 and is an improvement over the original WPA.
What kind of authentication is used in WPA2?
Alpha numeric passphrase (PSK) via CCMP
CCMP stands for Counter Mode with Cipher Block Chaining Message Authentication Code Protocol.
How is WPA2 encrypted?
AES (Advance encryption standard)
AES is a symmetric encryption standard widely used across the globe.
What is the latest and more secure security protocol for wireless networks?
WPA3
WPA3 offers enhanced security features compared to WPA2.
Why was WPA3 introduced?
To address vulnerabilities found in WPA2
WPA2 had several security vulnerabilities that WPA3 aims to mitigate.
How does a user authenticate with WPA3?
Simultaneous authentication of equals (SAE)
SAE provides a more secure method of password-based authentication.
What does WPA3 use to encrypt?
AES
WPA3 continues to use AES for encryption, maintaining high security standards.
What is a pre-shared key? (PSK)
A single, shared key known to all users of the network
PSK is a simple way for users to access a network without needing complex credentials.
What does a PSK offer home and small office environments?
Ease of setup but lower security
PSKs are user-friendly but can be vulnerable if not managed properly.
How do enterprises authenticate?
Employing a RADIUS server
RADIUS stands for Remote Authentication Dial-In User Service.
What does a RADIUS server manage for enterprise networks?
Each user’s authentication individually
This allows for centralized management of user credentials and access control.
What are guest networks?
Separate access networks allowing limited internet access without exposing the main network
Guest networks help maintain security by isolating guest traffic.
Why are guest networks used?
Isolate guest user traffic from critical internal resources
This helps protect sensitive information and resources from unauthorized access.
How are captive portals used when a user connects to a public or semi-public WiFi network?
Automatic web page that requires certain interactions before network access is granted
Captive portals are commonly used in hotels, airports, and cafes.
What interactions can be asked from captive portals?
Authentication, terms of service agreements, or payment information
These interactions can vary based on the network’s security requirements.