Wireless LAN and IEEE 802.11 Overview
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does WLAN stand for?

  • Wide Link Access Network
  • Wireless Link Access Network
  • Wireless Local Area Network (correct)
  • Wide Local Area Network

What technology is commonly synonymous with Wi-Fi?

  • Wireless Application Protocol
  • Bluetooth technology
  • Ethernet technology
  • IEEE 802.11 technology (correct)

Which of the following is NOT a type of transmission technology discussed in WLAN?

  • Fiber Optic Transmission (correct)
  • Microwave Transmission
  • Infrared Transmission
  • Spread Spectrum Transmission

What role do access points play in a WLAN?

<p>They act as central transmitters and receivers of WLAN radio signals. (D)</p> Signup and view all the answers

What networking protocol does WAP implement for content delivery?

<p>Wireless Application Protocol suite (C)</p> Signup and view all the answers

What does the term CSMA/CA refer to in the context of IEEE 802.11?

<p>Carrier Sense Multiple Access with Collision Avoidance (A)</p> Signup and view all the answers

Which of these devices can connect to a Wi-Fi network?

<p>Any Wi-Fi enabled device (D)</p> Signup and view all the answers

What does WLAN technology primarily provide?

<p>High-speed data communication in small areas (C)</p> Signup and view all the answers

What is the purpose of the authentication process in the 802.11 specification?

<p>To establish the identity of stations to each other (A)</p> Signup and view all the answers

Which statement accurately describes the SSID in an 802.11 network?

<p>The SSID can be up to 32 characters long and is visible to users. (C)</p> Signup and view all the answers

What does the term BSSID refer to in the context of an 802.11 network?

<p>Basic Service Set Identifier that uniquely identifies an access point (C)</p> Signup and view all the answers

Which of the following processes is NOT part of the layered protocol architecture defined by the 802.11 standard?

<p>Routing (A)</p> Signup and view all the answers

During which process is a mobile station allowed to transfer its current association to another access point?

<p>Re-association (D)</p> Signup and view all the answers

What identifies a basic service set in an 802.11 network?

<p>Basic Service Set Identifier (BSSID) (B)</p> Signup and view all the answers

What feature does the optional use of encryption in the 802.11 standard provide?

<p>Protection of message content from unauthorized access (B)</p> Signup and view all the answers

What is indicated by a BSSID that has a value of all 1s?

<p>A broadcast BSSID for probe requests (C)</p> Signup and view all the answers

Which frequency band does the microwave transmission technology primarily operate in?

<p>18 GHz (C)</p> Signup and view all the answers

What is the core mechanism of frequency hopping in spread spectrum transmission?

<p>Jumping between frequencies when a channel is busy (A)</p> Signup and view all the answers

Which transmission technology utilizes Code Division Multiple Access (CDMA)?

<p>Direct Sequence Modulation (B)</p> Signup and view all the answers

What is the maximum bandwidth of the 802.11b wireless LAN standard?

<p>11 Mbps (B)</p> Signup and view all the answers

What distinguishes directed point-to-point infrared transmission from other infrared methods?

<p>It provides the highest transmission speed. (A)</p> Signup and view all the answers

Which frequency range is NOT part of the ISM band?

<p>800-900 MHz (C)</p> Signup and view all the answers

Which wireless LAN standard is characterized by a high cost and short range?

<p>802.11a (C)</p> Signup and view all the answers

What is a significant security concern for wireless LANs compared to wired LANs?

<p>Open medium for communication (A)</p> Signup and view all the answers

What is a key characteristic of diffused infrared transmission?

<p>It fills an area with infrared light for broad reception. (C)</p> Signup and view all the answers

Which of the following wireless standards is still under development?

<p>802.11n (B)</p> Signup and view all the answers

Which component is NOT traditionally considered a part of the IEEE 802.11 architecture?

<p>Router (A)</p> Signup and view all the answers

What is the primary function of Access Points in wireless networks?

<p>To create hotspots for network access (A)</p> Signup and view all the answers

What type of infrared transmission is best suited for high-speed data transfer?

<p>Directed point-to-point infrared (D)</p> Signup and view all the answers

Which wireless standard operates at a frequency of 5.0 GHz?

<p>802.11a (D)</p> Signup and view all the answers

Which of the following is true about the 802.11g standard?

<p>It combines features of previous standards and is costly. (A)</p> Signup and view all the answers

What is a drawback of using WLANs compared to wired networks?

<p>WLANs have lower stability due to interference. (D)</p> Signup and view all the answers

What is the primary shortcoming of CRC in data integrity?

<p>It does not provide a strong data integrity guarantee. (D)</p> Signup and view all the answers

Which algorithm does WPA use for message integrity checking?

<p>Michael (A)</p> Signup and view all the answers

What does WPA2 introduce to enhance its security features?

<p>AES-based CCMP encryption (D)</p> Signup and view all the answers

What is the purpose of disabling SSID broadcasting in a wireless network?

<p>To make access points harder to identify. (A)</p> Signup and view all the answers

What is an important security practice for changing the default username and password of an access point?

<p>Use a long and complex combination of characters. (B)</p> Signup and view all the answers

How can DHCP service on access points pose a risk to network security?

<p>It can allow unauthorized users to obtain valid IP addresses. (C)</p> Signup and view all the answers

Which step is advisable for preventing unauthorized access to a network regarding MAC addresses?

<p>Implement MAC Filtering. (D)</p> Signup and view all the answers

Why is WPA2 considered to provide improved security over WPA?

<p>It uses a stronger encryption algorithm. (C)</p> Signup and view all the answers

What is the primary purpose of turning on a wireless network's encryption feature?

<p>To prevent unauthorized access and protect data integrity (B)</p> Signup and view all the answers

Which of the following is considered the least secure encryption method for wireless networks?

<p>Wired Equivalent Privacy (WEP) (D)</p> Signup and view all the answers

How does WPA improve security over WEP?

<p>By employing a per-packet key generation method (B)</p> Signup and view all the answers

Which statement best describes the relationship between WPA and its protocols?

<p>WPA uses TKIP as part of the IEEE 802.11i standard. (D)</p> Signup and view all the answers

What is the recommended practice for password management in a wireless network?

<p>Longer and more complex passwords provide better protection (B)</p> Signup and view all the answers

What is one limitation of WEP that makes it less secure?

<p>WEP requires manual entry of encryption keys (C)</p> Signup and view all the answers

What mechanism does WPA use to ensure the integrity of messages?

<p>Message Integrity Check (D)</p> Signup and view all the answers

How does WPA2 enhance security compared to WPA?

<p>By providing stronger encryption algorithms (D)</p> Signup and view all the answers

Flashcards

Wireless LAN

A local area network (LAN) with a wireless interface, allowing users to move within a given area while connected.

Wi-Fi

A wireless local area network (WLAN) technology, often used interchangeably with IEEE 802.11.

Access Point

A central node in a WLAN that transmits and receives radio signals.

IEEE 802.11

A set of standards defining the physical and data link layers for wireless LANs.

Signup and view all the flashcards

CSMA/CA

A media access control protocol used in wireless LANs (different from Ethernet's CSMA/CD).

Signup and view all the flashcards

WLAN Architecture

The structure and organization of a wireless local area network.

Signup and view all the flashcards

Microwave Transmission

A wireless transmission method utilizing radio waves within the microwave spectrum.

Signup and view all the flashcards

Spread Spectrum Transmission

A method of transmitting data using a wider range of frequencies.

Signup and view all the flashcards

Frequency Hopping

A method where the signal changes frequency within a range, often to avoid interference.

Signup and view all the flashcards

Direct Sequence Modulation

Method using a wide frequency band and coding to transmit data from different units.

Signup and view all the flashcards

Infrared Transmission

WLAN transmission method using infrared light to carry data.

Signup and view all the flashcards

Diffused Infrared Transmission

Infrared signal fills an area, allowing any receiver in that area to receive it.

Signup and view all the flashcards

WLAN Stations (STA)

Devices that connect to a wireless network, such as laptops or smartphones.

Signup and view all the flashcards

Access Point (AP)

A device that acts as a central point for wireless network communication.

Signup and view all the flashcards

802.11 Wireless LAN Collision Minimization

The 802.11 standard includes ways to reduce collisions between mobile devices and access points, even when devices are within range but not directly communicating.

Signup and view all the flashcards

Service Set Identifier (SSID)

A unique name identifying a particular 802.11 wireless network. Clients use it to find and join networks.

Signup and view all the flashcards

SSID Length

An 802.11 SSID can be up to 32 characters long, but it's not required to be human-readable.

Signup and view all the flashcards

Basic Service Set Identifier (BSSID)

A unique identifier for a Basic Service Set (BSS), which is a wireless LAN segment. A WAP acts as a bridge, and a randomly assigned address identifies individual LAN groups, ensuring unique identification.

Signup and view all the flashcards

Infrastructure BSS BSSID

In an infrastructure based network, the BSSID is the MAC address of the wireless access point (WAP).

Signup and view all the flashcards

IBSS BSSID

In an ad hoc mode network (IBSS), the BSSID is a locally generated MAC address, randomly allocated.

Signup and view all the flashcards

Broadcast BSSID

A special BSSID value (all 1s) used for broadcasting in probe requests. Used to find potential networks.

Signup and view all the flashcards

Association (WLAN)

Establishes an initial connection between a station (device) and an access point (bridge).

Signup and view all the flashcards

Wireless LAN Standards

Different sets of rules for how wireless devices communicate.

Signup and view all the flashcards

802.11b Standard

A standard for wireless networks, used for data transmission at 11 Mbps.

Signup and view all the flashcards

802.11g Standard

A wireless networking standard combining features of other standards( at 54 Mbps)

Signup and view all the flashcards

WLAN Security Concern

Wireless networks are more vulnerable to security threats compared to wired networks.

Signup and view all the flashcards

Wireless Security

Protecting wireless networks from unauthorized access.

Signup and view all the flashcards

Wired LAN Security

Wired networks are secured by physical cables.

Signup and view all the flashcards

Wireless Interference

Disruption of wireless network signals by other wireless devices or networks.

Signup and view all the flashcards

Wireless Network Security

Protecting wireless networks from unauthorized access and data interception.

Signup and view all the flashcards

WEP Encryption

Outdated wireless security algorithm, easily compromised and should not be used.

Signup and view all the flashcards

WPA/WPA2 Encryption

Stronger wireless security protocols than WEP.WPA/WPA2 use TKIP/AES algorithms for encryption.

Signup and view all the flashcards

TKIP

Temporal Key Integrity Protocol; a key-management method used in WPA to dynamically generate keys for each packet.

Signup and view all the flashcards

Message Integrity Check

A security feature in WPA that verifies data hasn't been tampered with.

Signup and view all the flashcards

Unauthorized Access

Gaining access to a wireless network without permission.

Signup and view all the flashcards

Encryption

The process of scrambling data to protect it from unauthorized access.

Signup and view all the flashcards

Data Confidentiality

Protecting data from unauthorized viewing while in transit or being stored.

Signup and view all the flashcards

CRC's Weakness

CRC (Cyclic Redundancy Check) is a simple data integrity check used in early wireless protocols like WEP. However, it proved insufficiently strong to guarantee data integrity, making it vulnerable to attacks.

Signup and view all the flashcards

Michael (WPA)

Michael is a message integrity check algorithm used in WPA to verify the integrity of data packets. It's an improvement over CRC, but still weaker than WPA2's algorithm.

Signup and view all the flashcards

SSID (Service Set Identifier)

The SSID is the name of a Wi-Fi network, broadcast by access points to allow clients to identify and connect.

Signup and view all the flashcards

Disabling SSID Broadcasting

By disabling SSID broadcasting, an access point becomes invisible to clients, making the network harder to detect and access.

Signup and view all the flashcards

Default AP Settings

Access points come with pre-configured default settings, including IP address, username, and password. These defaults are often easily guessable and should be changed for security.

Signup and view all the flashcards

DHCP Service in APs

DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network. Disabling DHCP on an AP can help prevent unauthorized users from gaining access.

Signup and view all the flashcards

MAC Filtering

MAC filtering is a security measure that allows only devices with specific MAC addresses (unique hardware addresses) to connect to the network, restricting unwanted access.

Signup and view all the flashcards

Study Notes

Wireless LAN Overview

  • Wireless LANs (WLANs) are similar to traditional LANs but use a wireless interface.
  • WLAN technology is popular due to small, portable devices like PDAs.
  • WLANs provide high-speed data communication in small areas (e.g., buildings, offices).
  • Wi-Fi is a synonym for IEEE 802.11 technology and is used for IP radio communication.
  • Access points (APs) are specialized nodes in WLANs acting as central transmitters/receivers.
  • APs support Wi-Fi communication standards and are found in home/small business networks.
  • WAP (Wireless Application Protocol) delivers content over wireless networks, using protocols similar to HTTP, TCP, and SSL.

IEEE 802.11 Layered Protocol Architecture

  • Association: Establishes initial station-access point connection.
  • Re-association: Transfers an existing connection to another access point.
  • Dis-association: Terminates an existing connection.
  • Authentication: Verifies station identity.
  • Privacy: Uses encryption to protect message content from unauthorized recipients.
  • SSID (Service Set Identifier): A name used to identify a 802.11 wireless LAN.

BSSID (Basic Service Set Identifier)

  • Uniquely identifies each Basic Service Set (BSS).
  • In infrastructure BSS, the BSSID is the MAC address of the wireless access point (WAP).
  • In an Independent BSS (IBSS),the BSSID is a locally generated MAC address.

Transmission Technologies

  • Microwave Transmission: Uses low-powered microwave radio signals (e.g., 18 GHz frequency).
  • Spread Spectrum Transmission: Uses two methods—frequency hopping and direct sequence modulation—for wider frequency use.
  • Infrared Transmission: Three types—diffused, directed, and directed point-to-point—use infrared light to carry information.

WLAN Architecture Components

  • WLAN Stations (STA): Connect to APs to access network resources.
  • Access Point (AP): Connects STAs to wired (distribution network).
  • Basic Service Set (BSS): A minimum BSS consists of two stations.
  • Independent Basic Service Set (IBSS): A standalone BSS that's not connected to a base.
  • Extended Service Set (ESS): Multiple interconnected BSSs forming a larger network.

WLAN Applications and Standards

  • Wireless LANs cover from small homes to large campuses and mobile networks (e.g., airplanes, trains).
  • Users can access internet through WLAN hotspots in public areas.
  • IEEE Wireless LAN standards specify frequencies, bandwidths, and performance.

Wireless LAN Security

  • Security is a significant concern in wireless networks due to open medium communication.
  • Access points (APs) create hot spots, enabling access without physical connection.
  • Appropriate security measures are vital to prevent unauthorized access for data security.
  • Encryption protocols (WEP, WPA, WPA2) scramble data, controlling network access.
  • MAC filtering controls access by managing a list of authorized MAC addresses.
  • Firewalls prevent unauthorized access to local services.

Wi-MAX

  • Wi-MAX (Worldwide Interoperability for Microwave Access) is a telecommunications technology.
  • It provides long-range wireless data transmission (up to 10 Mbps) using licensed/unlicensed spectrum.
  • Wi-MAX is suitable for broadband access for businesses and consumers.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Wireless LAN Chapter 6 PDF

Description

This quiz covers the fundamental concepts of Wireless LANs (WLANs) and the IEEE 802.11 layered protocol architecture. Learn about key components such as access points, authentication, and the significance of Wi-Fi technology in modern networking. Test your knowledge on the essentials of wireless communication and protocols.

More Like This

Wireless LAN Quiz
5 questions

Wireless LAN Quiz

EncouragingEuphoria avatar
EncouragingEuphoria
Wireless LAN Technology Overview
43 questions
Introduction to Wireless LANs and IEEE 802.11
8 questions
Use Quizgecko on...
Browser
Browser