WLANs Flashcards
Ad-Hoc Mode
no access to the internet or local area network; just connecting together
Mesh Topology
Uses a combination of different wireless networks such as wifi, microwave, cellular, and more
Site Survey
Wireless survey used to determine coverage areas and produce a coverage heat map
Range Extender
Specialized device that overcomes distance limitations of wireless networks
Omnidirectional Antenna
Radiates power equally in all directions (circle)
Unidirectional
Focuses power in one direction for covering greater distances
Yagi Antenna
Antenna from building to building
Parabolic Antenna
Like a satellite antenna
Direct-Sequence Spread Spectrum (DSSS)
Modulates data over an entire range of frequencies using a series of signals known as chips
Orthogonal Frequency Division Multiplexing (OFDM)
Uses a slow modulation rate with simultaneous transmissions over 52 different data streams
Channel
A virtual medium through which wireless networks can send and receive data
how many channels on 2.4 frequency?
11 or 14
What channels to prevent interference?
1, 6 and 11
how many channels for 5 ghz band?
24 non-overlapping channels
Channel Bonding
Allows for the creation of a wider channel by merging neighboring channels into one
802.11a
5 Ghz
54 Mbps
802.11b
2.4 ghz
11 mbps
802.11g
2.4 ghz
54 mbps
802.11n (Wifi 4)
2.4 and 5 Ghz
150 mbps/600 mbps (MIMO)
802.11ac (Wifi 5)
5 ghz
3 Gbps (MU-MIMO)
802.11ax (Wifi 6)
2.4, 5 and 6 Ghz
9.6 Gbps (MU-MIMO)
Pre-Shared Key
Both the access point and the client use the same encryption key
WEP
Original 802.11 wireless security standard which is an insecure security protocol
WPA
Replaced WEP and follows the Temporal Key Integrity Protocol (TKIP) added RC4
WPA2
Created as port of 802.11i standard and requires stronger encryption and integrity checking through CCMP; uses AES
Extensible Authentication Protocol (EAP)
also known as 802.1x; EAP is part of 802.1x
MAC Address Filtering
Configures an access point with a listing of permitted MAC addresses (like an ACL)
Network Access Control (NAC)
Permit or deny access to the network based on a device’s characteristics
Captive Portal
This is the splash page at a coffee shop to get on wifi
Geofencing
Uses GPS and RFID to define real world boundaries for devices
Rogue Access Point
a fake access point set up to lure legitimate users to connect to it