Podcast
Questions and Answers
In WLAN operation, the ______ mode is used to connect clients in a peer-to-peer manner without an AP.
In WLAN operation, the ______ mode is used to connect clients in a peer-to-peer manner without an AP.
ad hoc
Infrastructure mode is used to connect clients to the network using an ______.
Infrastructure mode is used to connect clients to the network using an ______.
AP
Tethering is a variation of the ad hoc topology where a smart phone or tablet creates a personal ______.
Tethering is a variation of the ad hoc topology where a smart phone or tablet creates a personal ______.
hotspot
A Basic Service Set (BSS) uses a single AP to interconnect all associated ______.
A Basic Service Set (BSS) uses a single AP to interconnect all associated ______.
Clients in different BSSs cannot ______.
Clients in different BSSs cannot ______.
An Extended Service Set (ESS) is a union of two or more BSSs interconnected by a wired ______.
An Extended Service Set (ESS) is a union of two or more BSSs interconnected by a wired ______.
Clients in each BSS can communicate through the ______.
Clients in each BSS can communicate through the ______.
Carrier Sense Multiple Access Collision Avoidance, abbreviated as ______, is a protocol used in wireless communications.
Carrier Sense Multiple Access Collision Avoidance, abbreviated as ______, is a protocol used in wireless communications.
To achieve successful association, a wireless client and an AP must agree on specific parameters such as SSID, password, network mode, and security ______.
To achieve successful association, a wireless client and an AP must agree on specific parameters such as SSID, password, network mode, and security ______.
Wireless clients connect to the AP using a passive or active scanning (probing) ______.
Wireless clients connect to the AP using a passive or active scanning (probing) ______.
In passive mode, the AP openly advertises its service by periodically sending broadcast beacon frames containing the ______, supported standards, and security settings.
In passive mode, the AP openly advertises its service by periodically sending broadcast beacon frames containing the ______, supported standards, and security settings.
Active mode requires wireless clients to know the name of the ______.
Active mode requires wireless clients to know the name of the ______.
The wireless client initiates the active scanning process by broadcasting a probe ______ frame on multiple channels.
The wireless client initiates the active scanning process by broadcasting a probe ______ frame on multiple channels.
Passive mode allows the AP to provide essential information such as the ______ settings to clients.
Passive mode allows the AP to provide essential information such as the ______ settings to clients.
One key difference between passive and active mode is that passive mode does not require clients to actively ______ for the AP.
One key difference between passive and active mode is that passive mode does not require clients to actively ______ for the AP.
In passive mode, the AP sends out beacon frames containing the SSID, supported ______, and security settings.
In passive mode, the AP sends out beacon frames containing the SSID, supported ______, and security settings.
Wireless clients must receive the ______ settings from the AP in order to successfully connect.
Wireless clients must receive the ______ settings from the AP in order to successfully connect.
Successful association between wireless clients and APs depends on various parameters including channel ______ and band frequency.
Successful association between wireless clients and APs depends on various parameters including channel ______ and band frequency.
The CAPWAP split MAC concept distributes functions between two components: the AP and the ______.
The CAPWAP split MAC concept distributes functions between two components: the AP and the ______.
AP MAC functions include beacons and ______ responses.
AP MAC functions include beacons and ______ responses.
One of the WLC MAC functions is the authentication of ______.
One of the WLC MAC functions is the authentication of ______.
DTLS provides security between the ______ and the WLC.
DTLS provides security between the ______ and the WLC.
Data encryption is ______ by default and requires a license on the WLC.
Data encryption is ______ by default and requires a license on the WLC.
The CAPWAP control channel is secured by enabling ______.
The CAPWAP control channel is secured by enabling ______.
Packet acknowledgements and retransmissions are functions performed by the ______.
Packet acknowledgements and retransmissions are functions performed by the ______.
Frame translation to other protocols is a function of the ______.
Frame translation to other protocols is a function of the ______.
MAC layer data encryption and decryption is an ______ function.
MAC layer data encryption and decryption is an ______ function.
Termination of 802.11 traffic on a wired interface occurs at the ______.
Termination of 802.11 traffic on a wired interface occurs at the ______.
WPA3 – Personal thwarts brute force attacks by using Simultaneous Authentication of ______.
WPA3 – Personal thwarts brute force attacks by using Simultaneous Authentication of ______.
WPA3 – Enterprise requires the use of a ______-bit cryptographic suite.
WPA3 – Enterprise requires the use of a ______-bit cryptographic suite.
Open Networks use Opportunistic Wireless ______ to encrypt all wireless traffic.
Open Networks use Opportunistic Wireless ______ to encrypt all wireless traffic.
IoT Onboarding utilizes Device Provisioning ______ to quickly onboard IoT devices.
IoT Onboarding utilizes Device Provisioning ______ to quickly onboard IoT devices.
Wireless LANs operate in the ______ GHz frequency band and the 5 GHz band.
Wireless LANs operate in the ______ GHz frequency band and the 5 GHz band.
In FlexConnect, if the WLC is unreachable, the FlexConnect AP switches to ______ mode.
In FlexConnect, if the WLC is unreachable, the FlexConnect AP switches to ______ mode.
The WLC performs all CAPWAP functions in ______ mode.
The WLC performs all CAPWAP functions in ______ mode.
Channel saturation can be mitigated using techniques that use the channels more ______.
Channel saturation can be mitigated using techniques that use the channels more ______.
Direct-Sequence Spread Spectrum (DSSS) is used by ______ devices to avoid interference.
Direct-Sequence Spread Spectrum (DSSS) is used by ______ devices to avoid interference.
Frequency-Hopping Spread Spectrum (FHSS) requires sender and receiver to be ______ to know which channel to jump to.
Frequency-Hopping Spread Spectrum (FHSS) requires sender and receiver to be ______ to know which channel to jump to.
Orthogonal Frequency-Division Multiplexing (OFDM) allows a single channel to use multiple ______.
Orthogonal Frequency-Division Multiplexing (OFDM) allows a single channel to use multiple ______.
A specific wireless channel may become ______ if the demand for it is too high.
A specific wireless channel may become ______ if the demand for it is too high.
In FlexConnect, client data traffic can be switched locally in ______ mode.
In FlexConnect, client data traffic can be switched locally in ______ mode.
The original 802.11 standard uses ______ to transmit radio signals by rapidly switching frequencies.
The original 802.11 standard uses ______ to transmit radio signals by rapidly switching frequencies.
The process of spreading a signal over a larger frequency band is known as ______.
The process of spreading a signal over a larger frequency band is known as ______.
Flashcards are hidden until you start studying
Study Notes
WLAN Operation Overview
- Explores modes of WLAN operation: Infrastructure Mode, Ad hoc Mode, Tethering, BSS, ESS, 802.11 Frame Structure, CSMA/CA, Client AP Association, and Delivery Modes.
WLAN Topology Modes
- Ad Hoc Mode: Connects clients in a peer-to-peer manner without an access point (AP).
- Infrastructure Mode: Connects clients to a network using an AP.
- Tethering: A variation of ad hoc that allows devices like smartphones or tablets to create personal hotspots.
BSS and ESS
- Basic Service Set (BSS): A single AP interconnecting all associated wireless clients; clients in different BSS cannot communicate.
- Extended Service Set (ESS): A union of multiple BSSs interconnected by a wired system, enabling communication among clients in different BSSs.
Wireless Client and AP Association
- Successful association requires agreement on:
- SSID: Network name.
- Password: For client authentication.
- Network Mode: Specifies the 802.11 standard.
- Security Mode: Settings such as WEP, WPA, or WPA2.
- Channel Settings: Frequency bands in use.
Passive and Active Discovery Modes
- Passive Mode: AP advertises services via periodic broadcast beacon frames that include SSID and supported standards.
- Active Mode: Wireless clients broadcast probe request frames to search for APs, requiring knowledge of the SSID.
CAPWAP Operation
- Split MAC Architecture: Functions are divided between AP and WLC, enhancing performance and management.
- AP Functions: Beacons, probe responses, acknowledgements, transmission, and encryption.
- WLC Functions: Authentication, client association, packet translation, and traffic termination.
DTLS Encryption
- DTLS secures the CAPWAP control channel and encrypts traffic between AP and WLC.
- Data encryption is off by default; a DTLS license is required for activation.
FlexConnect APs
- Connected Mode: WLC is reachable; performs all CAPWAP functions.
- Standalone Mode: WLC is unreachable; AP can handle local client data traffic and authentication independently.
Channel Management
- Frequency Channel Saturation: High demand for a channel can degrade communication quality; it's mitigated using techniques like:
- DSSS: Spreads signals over frequency bands, used by 802.11b.
- FHSS: Rapidly switches carrier signals; requires synchronization.
- OFDM: Uses multiple sub-channels within a frequency to enhance capacity.
WPA3 Security Features
- WPA3 Personal: Prevents brute force attacks using Simultaneous Authentication of Equals (SAE).
- WPA3 Enterprise: Relies on 802.1X/EAP authentication with a 192-bit cryptographic suite.
- Open Networks: No authentication but uses Opportunistic Wireless Encryption (OWE) for traffic encryption.
- IoT Onboarding: Employs Device Provisioning Protocol (DPP) for quick integration of IoT devices.
Key Components in WLAN Technology
- WLANs are based on IEEE standards and can be classified into four types: WPAN, WLAN, WMAN, and WWAN.
- Operate primarily in 2.4 GHz and 5 GHz frequency bands.
- Governed by organizations like ITU-R, IEEE, and Wi-Fi Alliance.
- CAPWAP protocol enables centralized management of multiple APs.
- DTLS ensures secure communication between APs and WLC.
- The 802.11b/g/n standards function within the 2.4 GHz to 2.5 GHz spectrum.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.