Wireless LAN and Wi-Fi Basics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What frequency band does microwave transmission in WLAN products typically operate at?

  • 5.725 GHz
  • 2.4 GHz
  • 18 GHz (correct)
  • 900 MHz

Which method does spread spectrum transmission NOT utilize?

  • Packet switching (correct)
  • Frequency hopping
  • Code Division Multiple Access
  • Direct sequence modulation

In frequency hopping, what does the transmitter do if it detects that a channel is full?

  • Transmits at a lower power level
  • Stops all transmission
  • Continues to transmit until interrupted
  • Hops to another channel (correct)

What is the purpose of the code transmitted with each signal in Direct Sequence Modulation?

<p>To identify the appropriate signal for the receiver (C)</p> Signup and view all the answers

Which of the following describes directed infrared transmission?

<p>Infrared light is focused to increase transmission speed (A)</p> Signup and view all the answers

What is the highest transmission speed achieved in infrared transmission methods?

<p>Directed point-to-point infrared transmission (C)</p> Signup and view all the answers

Which component is NOT part of the IEEE 802.11 WLAN architecture?

<p>Core Network Switch (D)</p> Signup and view all the answers

What is the ISM band reserved for?

<p>Industrial, scientific, and medical devices (C)</p> Signup and view all the answers

What is the main function of the BSS Master in a WLAN setup?

<p>To connect wireless clients to a wired LAN (C)</p> Signup and view all the answers

What is necessary for BSS Clients to connect to a BSS?

<p>The same SSID (D)</p> Signup and view all the answers

What does an Extended Service Set (ESS) require for its BSSs?

<p>A common service set identifier (B)</p> Signup and view all the answers

Which technology allows a distribution system to connect access points in an ESS?

<p>WDS (Wireless Distribution System) or MESH protocols (D)</p> Signup and view all the answers

What happens to BSSs in an Extended Service Set from the perspective of the Logical Link Control layer?

<p>They appear as a single BSS (A)</p> Signup and view all the answers

In what type of environment can WLANs be used according to the provided information?

<p>From small home networks to large mobile networks (C)</p> Signup and view all the answers

What is one characteristic of the Service Set Identity (SSID)?

<p>It must be between 2 and 32 alphanumeric characters (B)</p> Signup and view all the answers

Which best describes a wireless LAN hotspot?

<p>A public access point often requiring no password (B)</p> Signup and view all the answers

Which wireless LAN standard operates at a frequency of 5.0 GHz?

<p>802.11a (B)</p> Signup and view all the answers

What is the primary concern regarding security in wireless LANs compared to wired LANs?

<p>They use a more open medium for communication. (A)</p> Signup and view all the answers

Which wireless LAN standard is considered obsolete due to its low performance?

<p>802.11 (C)</p> Signup and view all the answers

Which wireless LAN standard provides a performance of 108 Mbps but is not yet finalized?

<p>802.11n (B)</p> Signup and view all the answers

What is one of the significant issues with wireless LANs as mentioned in the content?

<p>They are affected by interference from other devices. (C)</p> Signup and view all the answers

What is one primary reason administrators should be vigilant with wireless networks?

<p>To prevent unauthorized access (D)</p> Signup and view all the answers

Which encryption standard should generally be avoided due to its numerous flaws?

<p>WEP (C)</p> Signup and view all the answers

Which of the following WLAN standards supports longer distances up to kilometers?

<p>802.16d (B)</p> Signup and view all the answers

How does WPA enhance security compared to WEP?

<p>By employing a per-packet key (D)</p> Signup and view all the answers

What is a common feature of Access Points (APs) in wireless networks?

<p>They create hot spot areas for wireless coverage. (C)</p> Signup and view all the answers

Which wireless LAN standard combines the features of previous standards but is more costly?

<p>802.11g (C)</p> Signup and view all the answers

What common feature is shared by both WPA and WPA2?

<p>Wireless network certification by the Wi-Fi Alliance (D)</p> Signup and view all the answers

What does TKIP stand for in relation to the WPA protocol?

<p>Temporary Key Integrity Protocol (D)</p> Signup and view all the answers

What is a drawback of the WEP encryption method?

<p>It employs static encryption keys (C)</p> Signup and view all the answers

Which of the following describes WPA2 in terms of security?

<p>Supports the same protocols as WPA (B)</p> Signup and view all the answers

Which key management approach distinguishes WPA from WEP?

<p>Dynamic key generation for each data packet (C)</p> Signup and view all the answers

What is the main flaw of CRC in comparison to Michael?

<p>CRC provides weaker data integrity guarantees. (D)</p> Signup and view all the answers

Which encryption mode is introduced by WPA2 for enhanced security?

<p>CCMP (A)</p> Signup and view all the answers

What security measure is considered the first step towards securing a wireless network?

<p>Disabling SSID broadcasting. (C)</p> Signup and view all the answers

Why is changing the default IP, username, and password on Access Points (APs) important?

<p>To prevent unauthorized access. (C)</p> Signup and view all the answers

What is the primary purpose of MAC filtering in wireless security?

<p>To prevent unauthorized access by specifying authorized MAC addresses (D)</p> Signup and view all the answers

Which of the following can help prevent unauthorized access to a network?

<p>Configuring a firewall on access points (B)</p> Signup and view all the answers

What issue may arise from leaving the DHCP service enabled on an Access Point?

<p>It allows unauthorized users access. (B)</p> Signup and view all the answers

Why should users avoid making important data transactions on public hotspots?

<p>Public hotspots typically do not implement any security measures (C)</p> Signup and view all the answers

What characterizes the MAC address in networking?

<p>It is a unique hardware address of 48 bits. (A)</p> Signup and view all the answers

Which aspect of WPA is notably weaker than that of WPA2?

<p>The message integrity check algorithm. (C)</p> Signup and view all the answers

What should a user verify before using a public Wi-Fi network for sensitive transactions?

<p>The legitimacy of the hotspot (B)</p> Signup and view all the answers

What is a key benefit of Wi-MAX technology?

<p>It provides high-speed broadband over long distances without cables (B)</p> Signup and view all the answers

How frequently should AP passwords ideally be changed?

<p>Every month. (B)</p> Signup and view all the answers

What is the IEEE standard associated with Wi-MAX technology?

<p>IEEE 802.16 (A)</p> Signup and view all the answers

Which of the following actions can enhance wireless network security for users?

<p>Using strong and complex passwords for the network (A)</p> Signup and view all the answers

What does the WiMAX Forum aim to promote?

<p>Interoperability and conformity of WiMAX standards (A)</p> Signup and view all the answers

What is the main flaw of the WEP encryption standard?

<p>It is vulnerable to numerous known exploits. (A)</p> Signup and view all the answers

Which encryption method provides the strongest security for wireless networks?

<p>WPA2 (D)</p> Signup and view all the answers

How does WPA achieve better security compared to WEP?

<p>Through the implementation of per-packet key generation. (D)</p> Signup and view all the answers

What is a characteristic feature of WPA and WPA2 protocols?

<p>They enable dynamic key generation per data packet. (C)</p> Signup and view all the answers

What distinguishes Wi-Fi from traditional wireless technologies?

<p>Wi-Fi supports high speed data communication via wireless protocols. (B)</p> Signup and view all the answers

What role does an access point serve in a WLAN?

<p>It acts as a central transmitter and receiver of WLAN signals. (D)</p> Signup and view all the answers

Which component of WPA helps prevent attackers from altering data packets?

<p>Message Integrity Check (A)</p> Signup and view all the answers

What is the primary reason to choose WPA2 over WPA?

<p>WPA2 supports enhanced encryption methods. (C)</p> Signup and view all the answers

Which statement accurately reflects the function of the IEEE 802.11 protocol?

<p>It uses Carrier Sense Multiple Access with Collision Avoidance for data handling. (A)</p> Signup and view all the answers

Which of the following best describes the Wireless Application Protocol (WAP)?

<p>WAP defines a network architecture for content delivery across multiple wireless technologies. (A)</p> Signup and view all the answers

Which aspect of wireless network security is recommended for all devices on the network?

<p>Using the same encryption scheme and password across devices. (B)</p> Signup and view all the answers

What is a common misconception about WEP?

<p>It provides strong encryption comparable to wired networks. (A)</p> Signup and view all the answers

What is a primary principle behind the CSMA/CA protocol used in IEEE 802.11?

<p>It requires devices to listen for signals before transmitting to avoid collisions. (C)</p> Signup and view all the answers

Which characteristic differentiates the WLAN from traditional LAN setups?

<p>WLANs enable users to remain connected while moving within a limited area. (D)</p> Signup and view all the answers

What is a significant risk associated with using public Wi-Fi networks?

<p>Users may inadvertently expose sensitive data to unauthorized parties. (C)</p> Signup and view all the answers

Which of the following characterizes the primary function of MAC filtering in WLAN security?

<p>To allow only specific devices to connect to the network. (D)</p> Signup and view all the answers

Which wireless LAN standard is NOT prominently used due to its performance limitations?

<p>802.11h &amp; j (C)</p> Signup and view all the answers

What key challenge does wireless LAN security face compared to wired LANs?

<p>Limited physical access control (C)</p> Signup and view all the answers

Which characteristic distinguishes the 802.11g standard from other WLAN standards?

<p>It combines features of previous standards but is the least cost-effective. (A)</p> Signup and view all the answers

Which factor significantly impacts the stability of wireless networks?

<p>Interference from other wireless devices (C)</p> Signup and view all the answers

What is the main advantage of using MAC filtering in network security?

<p>It prevents unauthorized devices from accessing the network. (B)</p> Signup and view all the answers

What is the bandwidth of the 802.11a wireless LAN standard?

<p>54 Mbps (C)</p> Signup and view all the answers

Which encryption protocol is known for its numerous vulnerabilities and should generally be avoided?

<p>Wired Equivalent Privacy (WEP) (B)</p> Signup and view all the answers

What is a primary security risk associated with Access Points (APs) in wireless networks?

<p>They can allow unauthorized access to the network. (D)</p> Signup and view all the answers

Why is it advised not to use public hotspots for sensitive transactions?

<p>Public hotspots often lack encryption and security measures. (A)</p> Signup and view all the answers

Which standard should generally be avoided for wireless security due to its flaws?

<p>WEP (C)</p> Signup and view all the answers

What defines Wi-MAX technology in terms of its capability?

<p>It can provide broadband speeds up to 10 Mbps over long distances. (C)</p> Signup and view all the answers

In terms of performance, which wireless LAN standard is considered obsolete?

<p>802.11b (B)</p> Signup and view all the answers

Which of the following actions can help prevent unauthorized access to a wireless network?

<p>Regularly changing your AP passwords. (B)</p> Signup and view all the answers

What essential verification should a user perform before engaging in sensitive transactions on a public Wi-Fi network?

<p>Verify the legitimacy of the hotspot being used. (D)</p> Signup and view all the answers

Which feature is typically emphasized in firewall settings for enhanced security in access points?

<p>Blocking unauthorized external access to local services. (A)</p> Signup and view all the answers

What transmission mode does Wi-MAX technology utilize for its long-range network capability?

<p>Point-to-multipoint connections. (C)</p> Signup and view all the answers

What is the primary reason for implementing CCMP in WPA2?

<p>To enhance encryption strength using AES (C)</p> Signup and view all the answers

How does disabling SSID broadcasting contribute to wireless security?

<p>It reduces the likelihood of detection by casual attackers (C)</p> Signup and view all the answers

What is a significant flaw associated with the Michael algorithm used in WPA?

<p>It allows key recovery through packet analysis (A)</p> Signup and view all the answers

Which security measure should be taken regarding DHCP services in Access Points?

<p>DHCP should be disabled to prevent unauthorized access (A)</p> Signup and view all the answers

What is the primary reason for regularly changing the default password of an Access Point (AP)?

<p>To prevent brute-force attacks from automated tools (B)</p> Signup and view all the answers

Why is it critical to implement strong encryption when providing public access to a wireless network?

<p>To protect sensitive information from unauthorized access (A)</p> Signup and view all the answers

What does MAC filtering specifically achieve in a secured wireless network?

<p>Restricts access based on unique hardware addresses (D)</p> Signup and view all the answers

Which aspect differentiates WPA2 from WPA in terms of security features?

<p>WPA2 implements mandatory elements of IEEE 802.11i (B)</p> Signup and view all the answers

What does the SSID help a client device to accomplish in a wireless LAN?

<p>Identify and select the correct access point to connect to (C)</p> Signup and view all the answers

What is the function of the BSSID in a wireless network?

<p>To uniquely identify each Basic Service Set within a LAN (C)</p> Signup and view all the answers

When a mobile station transfers its association from one access point to another, which process is utilized?

<p>Re-association (A)</p> Signup and view all the answers

Which statement best describes the privacy feature in the 802.11 standard?

<p>It allows for optional encryption to keep messages confidential between intended recipients (D)</p> Signup and view all the answers

What characteristic differentiates a BSSID from an SSID in a wireless network?

<p>BSSID uniquely identifies each BSS, whereas SSID is a shared name among multiple access points (B)</p> Signup and view all the answers

In terms of network management, why is the SSID significant?

<p>It facilitates the broadcasting of a network name to users and devices (A)</p> Signup and view all the answers

What is an indication that a broadcast BSSID is being utilized?

<p>The BSSID has a value that includes all 1s (D)</p> Signup and view all the answers

What is a key purpose of authentication in the context of the IEEE 802.11 standard?

<p>To verify the identity of stations connecting to the network (D)</p> Signup and view all the answers

Flashcards

Microwave Transmission

WLAN data transmission using low-powered microwave radio signals.

Spread Spectrum Transmission

WLAN transmission using frequency hopping or direct sequence modulation.

Frequency Hopping

Signal transmission that jumps between frequencies within a range.

Direct Sequence Modulation

WLAN method using a wide band and CDMA for transmission.

Signup and view all the flashcards

ISM band

Frequency band reserved for ISM devices, including WLAN.

Signup and view all the flashcards

Infrared Transmission

WLAN transmission using infrared light.

Signup and view all the flashcards

Diffused Infrared

Infrared light spreads out to cover a large area.

Signup and view all the flashcards

Directed Infrared

Infrared light focused for faster transmission.

Signup and view all the flashcards

Directed Point-to-Point Infrared

Infrared transmission with receiver aligned to sender for the highest speed.

Signup and view all the flashcards

WLAN Station (STA)

A device or component in an IEEE 802.11 network that sends or receives data.

Signup and view all the flashcards

Access Point (AP)

A central device enabling communication between WLAN stations.

Signup and view all the flashcards

BSS Master

An access point connected to a wired LAN, providing 802.11 functionality. It acts as a gateway between wireless clients and the wired network.

Signup and view all the flashcards

BSS Client

A wireless station that connects to the BSS Master using the same SSID.

Signup and view all the flashcards

SSID

Service Set Identifier; an alphanumeric, case-sensitive identifier (2-32 characters) that identifies a BSS.

Signup and view all the flashcards

Extended Service Set (ESS)

A set of interconnected BSSs that appear as one network to the logical link control layer. They use a common SSID.

Signup and view all the flashcards

Distribution System (DS)

Connects access points in an ESS, allowing for network expansion and roaming.

Signup and view all the flashcards

Wireless Distribution System (WDS)

A protocol that facilitates wireless distribution systems in an extended service set.

Signup and view all the flashcards

WLAN Applications

Wireless LAN applications range from individual networks to large, campus-sized ones, and also portable networks on airplanes and trains.

Signup and view all the flashcards

WLAN Security Concerns

Wireless LANs are more vulnerable to security threats than wired LANs due to the open nature of the communication medium and potential interference.

Signup and view all the flashcards

IEEE 802.11 Standards

A set of standards defining the technology used in Wireless LAN (WLAN) communication.

Signup and view all the flashcards

802.11b

A widely used Wireless LAN standard operating at 2.4 GHz with a data rate of 11 Mbps.

Signup and view all the flashcards

802.11g

A WLAN standard offering 54 Mbps data rate at 2.4 GHz, combining features of earlier standards.

Signup and view all the flashcards

Access Points (APs)

Central devices in WLANs that set up wireless coverage areas (hotspots) and enabling communication between wireless devices (stations)

Signup and view all the flashcards

Wireless LAN (WLAN)

A network that uses radio waves to connect devices without physical cables.

Signup and view all the flashcards

Wireless network security

Protecting wireless networks from unauthorized access and data breaches.

Signup and view all the flashcards

WEP

Outdated wireless security protocol with known vulnerabilities.

Signup and view all the flashcards

WPA

Improved wireless security protocol offering better protection than WEP.

Signup and view all the flashcards

WPA2

Stronger wireless security standard, highly recommended for maximum security.

Signup and view all the flashcards

Encryption

Method of scrambling data to protect it from unauthorized access.

Signup and view all the flashcards

Password complexity

Importance of using strong, long passwords to protect wireless networks.

Signup and view all the flashcards

Unauthorized access

Gaining access to a network without permission by the network owner.

Signup and view all the flashcards

Data Confidentiality

Keeping confidential data from being intercepted or read by unauthorized parties.

Signup and view all the flashcards

CRC Data Integrity

A method for checking data integrity that wasn't strong enough to prevent packet tampering.

Signup and view all the flashcards

WPA Message Integrity

A stronger method than CRC for verifying data integrity in packets.

Signup and view all the flashcards

WPA2

An upgrade to WPA, implementing strong AES-based encryption (CCMP) and stricter security.

Signup and view all the flashcards

SSID Broadcasting

Access points (APs) advertise their network names to clients.

Signup and view all the flashcards

SSID Broadcasting (Disabled)

Hiding the access point's name to make it harder to find.

Signup and view all the flashcards

Default AP Settings

Pre-set IP addresses, usernames, and passwords on access points.

Signup and view all the flashcards

Strong Password

Using complex combinations of upper-case, lower-case, numbers, and special characters for network security.

Signup and view all the flashcards

DHCP Service

A service that automatically assigns IP addresses to devices on a network.

Signup and view all the flashcards

MAC Filtering

A method that controls which devices are allowed to connect to a network based on their unique hardware addresses.

Signup and view all the flashcards

MAC Filtering

A security measure that allows only authorized wireless devices (based on their MAC addresses) to connect to a network.

Signup and view all the flashcards

Encryption Protocols (WEP, WPA)

Protocols that protect data transmitted over a Wi-Fi network by converting it into an unreadable format.

Signup and view all the flashcards

Firewall (Wireless)

A security feature on a wireless access point that blocks unauthorized external access to the network.

Signup and view all the flashcards

Public Hotspots

Public Wi-Fi networks that typically lack security measures.

Signup and view all the flashcards

Legitimate Hotspot

A verified Wi-Fi network, in contrast to a fake or unauthorized hotspot.

Signup and view all the flashcards

Software Firewall

A firewall program installed on a computer that protects it from security threats.

Signup and view all the flashcards

Wi-Fi Network Security

Measures taken to protect a wireless network from unauthorized access and data breaches.

Signup and view all the flashcards

Wi-MAX

A wireless broadband technology for long-range data transmission.

Signup and view all the flashcards

IEEE 802.16

The standard for Wi-MAX Technology

Signup and view all the flashcards

Wireless LAN

A network using radio waves to connect devices without cables.

Signup and view all the flashcards

Wi-Fi

A common type of wireless local area network (WLAN).

Signup and view all the flashcards

Access Point

A central device that transmits and receives wireless signals in a WLAN.

Signup and view all the flashcards

IEEE 802.11

A set of standards for wireless LAN technology.

Signup and view all the flashcards

WLAN Architecture

Structure and organization of wireless local area networks.

Signup and view all the flashcards

Microwave Transmission

Using low-powered microwave radio signals for WLAN data transmission.

Signup and view all the flashcards

Spread Spectrum Transmission

WLAN transmission using frequency hopping or direct sequence modulation.

Signup and view all the flashcards

Infrared Transmission

WLAN transmission using infrared light.

Signup and view all the flashcards

Wireless Security

Protecting wireless networks from unauthorized access and data breaches.

Signup and view all the flashcards

WLAN Applications

Wireless LAN uses span from small networks to large-scale ones.

Signup and view all the flashcards

802.11 Standards

Sets of standards defining wireless LAN communication technology.

Signup and view all the flashcards

802.11 collisions

Multiple devices are within range of a single access point, but not each other, potentially causing communication issues.

Signup and view all the flashcards

Association (WLAN)

Initial connection between a wireless station and an access point.

Signup and view all the flashcards

Re-association (WLAN)

Transferring a wireless connection from one access point to another.

Signup and view all the flashcards

Dis-association (WLAN)

Ending a wireless connection between a station and an access point.

Signup and view all the flashcards

Authentication (WLAN)

Verifying the identity of wireless devices.

Signup and view all the flashcards

Privacy (WLAN)

Protecting data transmitted over the network.

Signup and view all the flashcards

SSID

Network name for a wireless LAN, up to 32 characters long.

Signup and view all the flashcards

BSSID

Unique identifier for a Basic Service Set (BSS).

Signup and view all the flashcards

IBSS

Independent Basic Service Set (no access point).

Signup and view all the flashcards

Infrastructure BSS

Wireless network using access points as central hubs for communication.

Signup and view all the flashcards

Wireless LAN

A network that uses radio waves to connect devices without physical cables.

Signup and view all the flashcards

IEEE 802.11 Standards

A set of standards that defines wireless LAN communication technology.

Signup and view all the flashcards

802.11b

A widely used wireless LAN standard operating at 2.4 GHz with 11 Mbps data rate.

Signup and view all the flashcards

802.11g

A wireless LAN standard that offers 54 Mbps data rate at 2.4 GHz, combining features of earlier standards.

Signup and view all the flashcards

Access Point (AP)

A central device enabling communication between wireless devices (stations) in a WLAN.

Signup and view all the flashcards

WLAN Security Concerns

Wireless LANs are more vulnerable to security threats than wired LANs because of the open communication medium and potential interference.

Signup and view all the flashcards

Wireless network security

Protection of wireless networks from unauthorized access and data breaches.

Signup and view all the flashcards

WLAN Applications

Wireless LAN applications range from individual networks to large-scale, campus-sized networks, and even portable networks on airplanes and trains.

Signup and view all the flashcards

Wireless Network Security

Protecting wireless networks from unauthorized access and data breaches.

Signup and view all the flashcards

WEP

Outdated wireless security protocol with known vulnerabilities.

Signup and view all the flashcards

WPA

Improved wireless security protocol offering better protection than WEP.

Signup and view all the flashcards

WPA2

Stronger wireless security standard, highly recommended for maximum security.

Signup and view all the flashcards

Encryption

Method of scrambling data to protect from unauthorized access.

Signup and view all the flashcards

Unauthorized Access

Gaining access to a network without permission.

Signup and view all the flashcards

Data Confidentiality

Keeping private information private, keeping data from unauthorized parties.

Signup and view all the flashcards

Password Complexity

Using strong, long passwords to protect wireless networks.

Signup and view all the flashcards

Wireless Encryption

Scrambling data to control access and protect info traveling across a wireless network.

Signup and view all the flashcards

IEEE 802.11i

Standard that includes TKIP, and is used in WPA protocol.

Signup and view all the flashcards

TKIP

Key used in WPA to dynamically generate a new 128-bit key for each packet, preventing attacks on WEP.

Signup and view all the flashcards

CRC Data Integrity

A data integrity check method that was not strong enough to prevent tampered packets.

Signup and view all the flashcards

WPA Message Integrity

A stronger algorithm than CRC used in WPA to verify data integrity in the packets.

Signup and view all the flashcards

WPA2

An upgrade to WPA implementing AES-based encryption (CCMP) and stricter security measures.

Signup and view all the flashcards

SSID Broadcasting

Access points (APs) broadcast their network names for clients to see.

Signup and view all the flashcards

SSID Broadcasting (Disabled)

Hiding the access point's name to make it harder to identify.

Signup and view all the flashcards

Default AP Settings

Pre-configured IP addresses, usernames, and passwords that come with access points (APs).

Signup and view all the flashcards

Strong Password

Using complex passwords with a mixture of upper-case, lower-case, numbers, and special characters.

Signup and view all the flashcards

DHCP Service

A service that automatically assigns IP addresses to devices on a network.

Signup and view all the flashcards

MAC Filtering

A security measure allowing only specific devices (based on their unique hardware addresses) to connect to the network.

Signup and view all the flashcards

WPA

An improved wireless security protocol offering better protection than WEP.

Signup and view all the flashcards

MAC Filtering

A security method allowing only authorized devices (based on their unique hardware addresses) to connect to a network.

Signup and view all the flashcards

Encryption Protocols (WEP, WPA)

Protocols that encrypt data transmitted over a Wi-Fi network, preventing unauthorized access.

Signup and view all the flashcards

Firewall (Wireless)

A security feature on a wireless access point that blocks unauthorized external access to the network.

Signup and view all the flashcards

Public Hotspots

Public Wi-Fi networks often lacking strong security measures.

Signup and view all the flashcards

Legitimate Hotspot

A verified Wi-Fi network, unlike a counterfeit/unauthorized one.

Signup and view all the flashcards

Software Firewall

A firewall program on a computer that blocks unauthorized network access to it.

Signup and view all the flashcards

Wi-Fi Network Security

Measures to prevent unauthorized access and data breaches on a wireless network.

Signup and view all the flashcards

Wi-MAX

Wireless broadband technology designed for long-range data transmission, spanning miles or kilometers.

Signup and view all the flashcards

IEEE 802.16

The standard for Wi-MAX technology.

Signup and view all the flashcards

Wireless LAN

A network connecting devices wirelessly using radio waves.

Signup and view all the flashcards

Study Notes

Wireless LAN

  • Wireless LANs (WLANs) are similar to traditional LANs, but with a wireless interface.
  • WLAN technology is becoming popular due to the introduction of small, portable devices like PDAs.
  • WLANs provide high-speed data communication in small areas like buildings or offices.
  • Users can move around a confined area while staying connected to the network.
  • Wi-Fi is a synonym for IEEE 802.11 technology and IP Radio.

Wi-Fi and Access Points

  • Wi-Fi-enabled devices (e.g., computers, video game consoles, mobile phones) can connect to the internet when within range of a wireless network.
  • Access points are nodes in WLANs that act as central transmitters and receivers of radio signals.
  • Home or small business access points are small, dedicated hardware devices usually containing a network adapter, antenna, and radio transmitter.
  • Access points support Wi-Fi wireless communication standards.

Wireless Application Protocol (WAP)

  • WAP defines a network architecture for content delivery over wireless networks.
  • WAP implements protocols similar to well-known web protocols like HTTP, TCP, and SSL.
  • WAP enables global wireless communication across different wireless technologies (e.g., GSM, GPRS, UMTS, 3G).

IEEE 802.11 Layered Protocol Architecture

  • Association: Establishes an initial connection between a station and an access point.
  • Re-Association: Allows transferring an existing association from one access point to another.
  • Dis-association: Notifies termination of an existing association.
  • Authentication: Establishes the identity of a station.
  • Privacy: Prevents message content from being read by unauthorized recipients using encryption.

Service Set Identifier (SSID)

  • A name that identifies a specific 802.11 wireless LAN.
  • Client devices can receive broadcast messages from access points advertising their SSIDs.
  • SSIDs can be up to 32 characters long.
  • Multiple access points can share the same SSID if they provide access to the same network.

Basic Service Set Identifier (BSSID)

  • Uniquely identifies each Basic Service Set (BSS) in an infrastructure BSS.
  • The BSSID is the MAC address of the wireless access point (WAP).
  • In an Independent Basic Service Set (IBSS), the BSSID is a locally generated 48-bit random number with the individual/group bit set to 0 and the universal/local bit set to 1.
  • A BSSID with a value of all 1s indicates a broadcast BSSID.

Transmission Technology

  • Microwave: Uses low-power microwave radio signals at the 18GHz frequency band.
  • Spread Spectrum: Uses frequency hopping and direct sequence modulation to transmit data. The signal spreads over a wider frequency range.
  • Infrared: Diffused, directed, or directed point-to-point transmissions using infrared light.

WLAN Architecture

  • WLAN stations (STAs) and Access Points (APs) are the building blocks.
  • WLAN Stations: Locate and connect to access points to access network resources.
  • Access Points: Connect WLAN stations to a wired network.
  • Basic Service Set (BSS): The minimum BSS consists of two stations.
  • Independent Basic Service Set (IBSS) / Ad hoc network: Network of client devices without a controlling access point.
  • Extended Service Set (ESS): Interconnected BSSs that appear as a single BSS to the logical link control layer.
  • Distribution System (DS): Connects access points in an extended service set to increase network coverage.

WLAN Applications and Standards

  • WLANs have applications from small home networks to large campus networks, to mobile networks on airplanes and trains.
  • Users can access the internet, connect to 3G/4G networks, and can use public access points.
  • IEEE 802.11 standards define WLAN protocols and frequencies. Specific standards and their bandwidths and performance are described.

Wireless LAN Security

  • Security is a major concern due to the open nature of wireless communication.
  • Administrators and users should take precautions to prevent unauthorized access.
  • Security measures include encryption protocols (WEP, WPA, WPA2).
  • MAC filtering.
  • Firewall configuration is required for advanced security.

Wi-MAX

  • Wi-MAX (Worldwide Interoperability for Microwave Access) is a long range wireless technology using a variety of transmission modes.
  • It provides wireless broadband access and telecommunications services.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Wireless LAN Chapter 6 PDF

More Like This

LAB03: Business Wireless LAN Network Designs
9 questions
Wireless LAN Technology Overview
43 questions
Wireless LAN Overview
72 questions

Wireless LAN Overview

SolicitousOklahomaCity avatar
SolicitousOklahomaCity
Use Quizgecko on...
Browser
Browser