Wireless Internet Broadband Technologies

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What does wireless technology use to transmit data?

  • Fiber optic cables
  • Infrared waves
  • Unlicensed radio spectrum (correct)
  • Licensed radio spectrum

What is a typical limitation of early wireless access?

  • Ability to connect without a wireless router
  • Unlimited range
  • High cost of equipment
  • Requirement to be within a certain range of a router (correct)

What is the purpose of municipal Wi-Fi networks?

  • Monitor citizen's online activities
  • Offer high-speed internet access for free or at a reduced cost (correct)
  • Limit internet access to certain websites
  • Provide exclusive access to government employees

What does a subscriber typically need to connect to a municipal Wi-Fi network?

<p>A wireless modem with a stronger antenna (D)</p> Signup and view all the answers

What is cellular service primarily used for?

<p>Connecting users and remote locations where other WAN access isn't available (C)</p> Signup and view all the answers

What do 3G, 4G, and 5G stand for in wireless technology?

<p>Generation mobile wireless technologies (A)</p> Signup and view all the answers

What is the maximum download bandwidth typically supported by 4G standards?

<p>450 Mbps (D)</p> Signup and view all the answers

What download bandwidth should the emerging 5G standard support?

<p>100 Mbps to 10 Gbps and beyond (D)</p> Signup and view all the answers

What does LTE stand for?

<p>Long-Term Evolution (D)</p> Signup and view all the answers

Where is satellite internet typically used?

<p>Rural areas and remote locations (A)</p> Signup and view all the answers

What equipment is needed to access satellite internet?

<p>A satellite dish, two modems, and coaxial cables (A)</p> Signup and view all the answers

What is the primary installation requirement for satellite internet?

<p>A clear view toward the equator (B)</p> Signup and view all the answers

What range of download speeds can satellite internet provide?

<p>5 to 25 Mbps (D)</p> Signup and view all the answers

What does WiMAX provide?

<p>High-speed broadband service with wireless access (D)</p> Signup and view all the answers

What are WiMAX towers like?

<p>Like cell phone towers (C)</p> Signup and view all the answers

What has WiMAX largely been replaced by?

<p>LTE (Long-Term Evolution) (C)</p> Signup and view all the answers

What happens to security when teleworkers use a broadband service to access a corporate WAN over the internet?

<p>Security risks are incurred (C)</p> Signup and view all the answers

What do broadband services provide to address security concerns?

<p>Virtual Private Networks (VPN) (D)</p> Signup and view all the answers

What is a VPN?

<p>An encrypted connection over a public network (A)</p> Signup and view all the answers

What are VPN connections to a network?

<p>VPN tunnels (D)</p> Signup and view all the answers

What do VPNs enable organizations to use for connecting remote offices?

<p>The global internet (B)</p> Signup and view all the answers

What level of security do VPNs provide?

<p>The highest level of security (A)</p> Signup and view all the answers

What is a benefit of VPNs in terms of scalability?

<p>Easy to add new users (D)</p> Signup and view all the answers

What types of broadband technology are VPNs compatible with?

<p>DSL and cable (B)</p> Signup and view all the answers

In which VPN implementation are VPN settings configured on routers?

<p>Site-to-site VPN (B)</p> Signup and view all the answers

Which VPN implementation requires the user to initiate the remote access connection?

<p>Remote Access VPN (D)</p> Signup and view all the answers

When is single-homed ISP connectivity typically used?

<p>When internet access is not crucial (A)</p> Signup and view all the answers

What is a primary disadvantage of single-homed ISP connectivity?

<p>No redundancy (B)</p> Signup and view all the answers

What benefit does dual-homed ISP connectivity provide?

<p>Redundancy and load balancing (A)</p> Signup and view all the answers

What happens in a dual-homed ISP setup if one link fails?

<p>The other link carries the traffic (A)</p> Signup and view all the answers

What is a characteristic of a multihomed ISP connectivity?

<p>It connects to two different ISPs (B)</p> Signup and view all the answers

What is a potential drawback of multihomed ISP connectivity?

<p>It can be expensive (A)</p> Signup and view all the answers

Which type of ISP topology is the most resilient?

<p>Dual-multihomed (D)</p> Signup and view all the answers

What is the trade-off for the high redundancy offered by dual-multihomed topology?

<p>Higher cost (A)</p> Signup and view all the answers

What is a disadvantage of cable internet service?

<p>Bandwidth is shared by many users (C)</p> Signup and view all the answers

What characteristic of DSL is related to ISP Central Office?

<p>Distance (B)</p> Signup and view all the answers

What is a key requirement of Fiber-to-the-Home internet?

<p>Fiber installation directly to the home (C)</p> Signup and view all the answers

What is a limitation of cellular/mobile internet options?

<p>Unreliable coverage (D)</p> Signup and view all the answers

What is a trade-off associated with satellite internet?

<p>High cost and limited capacity (B)</p> Signup and view all the answers

What is the purpose of a Virtual Private Network (VPN)?

<p>To secure network traffic (D)</p> Signup and view all the answers

How does a VPN ensure privacy?

<p>Encrypting traffic (D)</p> Signup and view all the answers

What is needed to access a WiMAX network?

<p>A subscription to an ISP with a WiMAX tower within 30 miles and a WiMAX receiver (D)</p> Signup and view all the answers

What is a key advantage of using VPNs for organizations?

<p>They allow the use of the global internet for connecting remote offices, reducing costs (D)</p> Signup and view all the answers

What is the most basic characteristic of single-homed ISP connectivity?

<p>It uses only one link for internet access (D)</p> Signup and view all the answers

What is a primary benefit of dual-homed ISP connectivity?

<p>It offers increased redundancy and load balancing (A)</p> Signup and view all the answers

What is the purpose of the GRE protocol in GRE over IPsec VPNs?

<p>To encapsulate various network layer protocols and support multicast traffic (A)</p> Signup and view all the answers

Flashcards

Wireless Technology

Utilizes unlicensed radio spectrum for sending and receiving data.

Municipal Wi-Fi

Internet access provided by cities, either free or at reduced costs.

Cellular Service

Wireless tech connecting users in areas with unavailable WAN access tech.

3G/4G/5G Wireless

Refers to 3rd, 4th, and 5th generation mobile wireless technologies enabling internet access.

Signup and view all the flashcards

Long-Term Evolution (LTE)

Faster tech, part of 4G, speeds mobile data.

Signup and view all the flashcards

Satellite Internet

Internet access in rural areas using dish, modems and coaxial cables.

Signup and view all the flashcards

WiMAX

Tech providing broadband wirelessly with coverage like cell networks.

Signup and view all the flashcards

VPN Technology

Tech for teleworkers using broadband to securely access corporate WAN.

Signup and view all the flashcards

Virtual Private Network (VPN)

Encrypted connection for private networks over a public network.

Signup and view all the flashcards

VPN Cost Savings

VPNs allow use of global internet for remote offices, reducing WAN costs.

Signup and view all the flashcards

VPN Security

VPNs ensure data security via advanced encryption and authentication protocols.

Signup and view all the flashcards

VPN Scalability

VPNs use internet infrastructure, making it easy to add capacity and users.

Signup and view all the flashcards

VPN Compatibility

VPNs are supported by services like DSL/cable, aiding remote workers.

Signup and view all the flashcards

Site-to-Site VPN

VPN configured on routers; clients unaware of data encryption.

Signup and view all the flashcards

Remote Access VPN

User initiates secure remote access, like HTTPS to a bank.

Signup and view all the flashcards

Single-homed ISP connectivity

Topology where the client connects to the ISP.

Signup and view all the flashcards

Dual-homed ISP connectivity

Client connects to one ISP with two links for redundancy and balancing.

Signup and view all the flashcards

Multihomed ISP connectivity

Client connects to two separate ISPs for increased redundancy and balancing.

Signup and view all the flashcards

Dual-multihomed connectivity

Client uses redundant links to multiple ISPs, highest redundancy.

Signup and view all the flashcards

Cable broadband

Upstream is slow during usage due to shared bandwidth.

Signup and view all the flashcards

DSL broadband

Bandwidth limited and distant-sensitive.

Signup and view all the flashcards

Fiber-to-the-Home

Requires direct fiber Installation.

Signup and view all the flashcards

Cellular/Mobile broadband

Coverage can be limited, bandwidth is limited.

Signup and view all the flashcards

Municipal Wi-Fi

May not be available, can be viable option if available

Signup and view all the flashcards

Satellite broadband

Expensive and has limited capacity.

Signup and view all the flashcards

Virtual Private Networks

Creates secure connections to sites and users.

Signup and view all the flashcards

VPN Encryption

Keeps data confidential while being transported public.

Signup and view all the flashcards

Cisco AnyConnect

Remote workers will authenticate through a Cisco AnyConnect platform.

Signup and view all the flashcards

Cost savings

Use VPN to decrease connectivity prices while increasing bandwidth.

Signup and view all the flashcards

Security

VPN advanced encryption and authentication provide security.

Signup and view all the flashcards

Scalability

Uses internet to add users.

Signup and view all the flashcards

Compatibility

Remote workers can gain secure access to their corporate networks.

Signup and view all the flashcards

Site to Site VPN

Only encrypted traffic occurs between VPN devices.

Signup and view all the flashcards

Remote Access VPN

VPN establishes a secure connection.

Signup and view all the flashcards

Remote-Access VPNs

Secures connectivity for mobile users.

Signup and view all the flashcards

Clientless VPN connection

Secured by using a web browser SSL connection to protect HTTP traffic.

Signup and view all the flashcards

Client-based VPN connection

VPN client software must be installed on the remote end user's device.

Signup and view all the flashcards

SSL VPNs

Connects through TLS, which is a newer version of SSL.

Signup and view all the flashcards

Applications Suported

All IP-based applications are supported.

Signup and view all the flashcards

Authentication Strength

Uses a two-way authentication.

Signup and view all the flashcards

Encryption strength

Uses lengths from 56 bits to 256 bits.

Signup and view all the flashcards

VPN option - Extensive

Device with web browser can connect.

Signup and view all the flashcards

Site-to-Site IPsec VPNs

VPNs are used to connect networks across networks.

Signup and view all the flashcards

GRE over IPsec

Encapsulates various network layer protocols.

Signup and view all the flashcards

Passenger protocol

Original packet is encapsulated by GRE.

Signup and view all the flashcards

Carrier Protocol

Protocol that encapsulates the original passenger packet.

Signup and view all the flashcards

Study Notes

Wireless Internet-Based Broadband

  • Wireless technology uses the unlicensed radio spectrum for sending and receiving data.
  • The unlicensed spectrum is accessible with a wireless router and applicable technology.
  • A limitation of wireless access is proximity to a wireless router or modem, typically within 100 feet with a wired internet connection.

Municipal Wi-Fi

  • Many cities provide free or low-cost municipal wireless networks.
  • City-only networks are used by police, fire departments, and city employees for remote work.
  • Connecting to municipal Wi-Fi usually requires a wireless modem with a higher-strength radio and directional antenna versus standard wireless adapters.
  • Service providers may supply necessary equipment for free or for a fee, similar to DSL or cable modems.

Cellular WAN Technology

  • Cellular service serves many users with smartphones and tablets can use cellular data for email, web browsing, app downloads, and video streaming.
  • Cellular technology lets phones, tablets, laptops, and some routers connect to the internet through radio waves and mobile phone towers, using a small device antenna and a larger provider antenna.

3G/4G/5G Wireless

  • These are abbreviations for 3rd, 4th, and 5th generation mobile wireless technologies.
  • 4G supports bandwidths up to 450 Mbps download and 100 Mbps upload.
  • 5G is emerging and should support speeds from 100 Mbps to 10 Gbps and beyond.

Long-Term Evolution (LTE)

  • LTE refers to newer, faster 4G technology.

Satellite Internet

  • Intended for rural or remote locations lacking cable and DSL.
  • Users need a satellite dish, two modems (uplink and downlink) and coaxial cables to access it.
  • A router connects to a satellite dish directed at a service provider satellite in geosynchronous orbit.
  • Signals travel about 35,786 kilometers (22,236 miles) to the satellite and back.
  • A clear view toward the equator is required for the antenna, it is where most satellites are orbiting, trees and heavy rains can affect signal reception.
  • Satellite internet offers two-way data communications at upload speeds around one-tenth of download speed, with downloads ranging from 5 Mbps to 25 Mbps.

WiMAX (Worldwide Interoperability for Microwave Access)

  • WiMAX is a newer technology outlined in IEEE standard 802.16.
  • It delivers high-speed broadband with wireless access and a wide range of coverage comparable to a cell phone network, instead of small Wi-Fi hotspots.
  • It resembles Wi-Fi but has higher speeds and greater distances, for more users, and it makes use of a network of cell phone-like towers.
  • Accessing a WiMAX network requires subscribing to an ISP with a tower within 30 miles and a special WiMAX receiver with an encryption code.
  • WiMAX has been largely replaced by LTE for mobile access, or cable/DSL for fixed access.

VPN (Virtual Private Network) Technology

  • VPNs address risks from teleworkers or remote office workers who use broadband to access a corporate WAN over the internet.
  • Broadband services offer VPNs, with connections through a network device at the corporate site.
  • A VPN is an encrypted connection between private networks over a public network.
  • Instead of dedicated Layer 2 connections, VPNs use virtual connections called VPN tunnels.
  • VPN tunnels are routed through the internet, from the company's private network to the remote sites or employee host.

Benefits of VPN

  • Cost savings: VPNs allow businesses to use the internet to connect remote offices and connect users to the main corporate site, eliminating costly dedicated WAN links and modem banks.
  • Security: VPNs employ advanced encryption and authentication for data protection.
  • Scalability: VPNs use the internet infrastructure for adding capacity and new users, which reduces infrastructure costs.
  • Compatibility: VPN technology supports broadband service providers like DSL and cable, and allows workers to access their corporate network from home.

VPN Implementations

  • Site-to-site VPNs: VPN settings are configured on routers, and client data is automatically encrypted.
  • Remote Access: Users initiate remote access connection, such as with HTTPS or VPN client software.

Single-Homed

  • This is used when internet access isn't crucial, and the client directly connects to one ISP.
  • Single-homed connection provides no redundancy and is the least expensive of all connectivity solutions

Dual-Homed

  • A Dual-homed connections are used when internet access is important for operation.
  • The client connects to the same ISP by two links, offering redundancy and load balancing.
  • When one link fails, the other one carries the traffic; when both work, traffic is distributed.
  • The dual-homed system loses connectivity if the ISP has an outage.

Multi-Homed

  • Used when internet access is crucial for operation.
  • The client connects to two different ISPs for added redundancy and load balancing.
  • This solution can prove to be expensive.

Dual-Multi-Homed

  • This is the most reliable setup of the four
  • The client connects via diverse links to multiple ISPs
  • It has the most reliable redundancy, and is also the most expensive.

Broadband Solution Comparison

  • It includes advantages and disadvantages.
  • An Ideal Solution Includes a Fiber-optic cable directly connected to the client network
  • Some locations only have one choice, such as cable or DSL, some locations only have wireless broadband.
  • Bandwidth of Cable is shared by many users so upstream data rates can be slow whenever usage is high because of over-subscription.
  • DSL has limited Bandwidth because of distance restrictions with relation to the ISP's central office, upload speeds can also be proportionally lower than download speeds.
  • Fiber-to-the-Home needs direct Fiber installation to the home/Office.
  • Cellular or mobile option suffers from coverage problems at some small home or office, bandwidth would also be limited.
  • A municipal WiFi does not have a mesh WiFi deployed, and becomes a viable option when available and also in range.
  • Satellite Is used whenever there is no other option, is expensive and provides limited capacity for each subscriber.

Virtual Private Network

  • Virtual Private Networks or VPNs are used to help secure the network traffic between users and sites, these create end-to-end connections that are private.
  • While VPNs are virtual, they carry data within a private network and is actually transported publicly, and are private because the data is encrypted and kept confidential and it traverses a public network.
  • ASA or Cisco Adaptive Security Appliance provides a firewall which helps organizations create high performing and secure connectivity along with VPNs and access to remote branches and mobile users at all times.
  • VPN Enabled routers inside a SOHO also provide VPN Connectivity to the main corporate network.

VPN Benefits

  • Software such as Ciso Anyconnect is utilized by remote workers so that they can perform and create client-based VPN connections to the network.
  • Modern VPNs are now providing features such as encryption which would include IPsec or Internet Protocol Security along with VPNs or Secure Sockets Layer which are used to help secure all of the network traffic from various locations.
  • Some benefits would include cost savings because Organizations have the capability to reduce overall costs of Connectivity by simultaneously increasing the bandwidth for remote connections by using cost-effective and high-bandwidth technologies.
  • The VPNs often provide a level of security by using encryptions with authentication methods to protect the data from any unauthorized access.
  • Compatibility is a feature available to remote workers in which connections with various speeds have the capability of gaining Secure Access whenever connecting to corporate networks.
  • The Scalability in VPN allow various organizations to use internet whenever adding new users and without any need to include significant infrastructure.

Types of Virtual Private Networks (VPNs)

  • A site-to-site connection is created by pre-configuring various terminating devices such as various VPN gateways, its primary traffic is only encrypted when it is between those devices, and not to be known by internal hosts.
  • The remote-access in a VPN is dynamically created so that connections betweeen the client and any VPN Terminating device would stay secure.
  • Enterprise VPNs, which are commonly used, also provide a solution in securing enterprise wide traffic that travels on the internet, and utilizes SSL or IPsec.
  • Service Provider VPNs are often made and managed on a type of network for a provider, and with MPLS or Multiprotocol Label Switching there can be secure channels created on either Layer 2 or layer 3 to create secure paths.

Types of VPNs

  • Remote-access VPNs create an encrypted tunnel for secure enterprise connectivity for remote and mobile users.
  • Remote-access VPNs maintain enterprise-level security for email and network applications, and they also limit access for contractors and partners to certain web pages, files, or servers to improve security without impacting productivity.
  • In clientless VPN connections, the connection is secured using a web browser SSL connection and mostly encrypt HTTP traffic using HTTPS protocols
  • With client-based connections, client software such as Cisco AnyConnect Secure Mobility Client must be installed on devices that are used to remotely connect, and authentication will be necessary.

SSL VPNs

  • When the client negotiates and connects with a VPN gateway, it connects by using TLS or Transport Layer Security, which is a newer form of SSL.
  • SSL utilizes digital certificates with a public key framework for authenticating peers.
  • In case security is of concern, IPsec is superior, if support and ease of deployment is a concern, consider SSL.

IPsec VPNs

  • IPsec has Extensive Support , since Applications are supported with the usage of a key in both a shared form of digital certificates.
  • Encryption Strength is high since, it is of long length ranging from 56 Bits to 256Bits.
  • Since VPN is Pre-installed medium complexity is Required.
  • With only a web browser and a compatible connection over VPN could be created and installed.
  • It can be used on networks similar to the internet.
  • In instances where it is a site-to-site network, then the hosts would receive all TCP/IP traffic without any type of VPN.
  • Whenever shown by, the ASA firewall is a firewall created as a way to combine.

GRE over IPsec

  • GRE is a VPN protocol that is used as a non-secure site to site tunneling environment
  • It includes encapsulation and also the capability of supporting Broadcast Traffic that can be made available whenever organization desires the utilization with routing protocols.
  • GRE also does not support default encryptions with any traffic that passes throughout and a secure VPN connection can never be available.
  • GRE tunnels can not exchange information with the routing or routing over unicast, but these encapsulation can support carrier and transit of the protocol.
  • The is usually a original packet whenever encapsulated by transit

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Cellular Respiration Overview
22 questions

Cellular Respiration Overview

RevolutionaryDulcimer avatar
RevolutionaryDulcimer
Pathoma Flashcards - Cellular Adaptations
99 questions
Use Quizgecko on...
Browser
Browser