🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 11 - 01 - Understand Wireless Network Fundamentals - 02_ocred_fax_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Certified Cybersecurity Technician Exam 212-82 Wireless Network Security -~ ‘V,—-r — Wireless Technologies...

Certified Cybersecurity Technician Exam 212-82 Wireless Network Security -~ ‘V,—-r — Wireless Technologies - og In a wireless network, data transmission occurs by means of electromagnetic waves that carry signals over the communication path 2 ;(-’ n£ Types of Wireless Technologies ©) ‘ O It uses radio waves O Using Bluetooth O 1t uses radio frequer Q Ituses! 1ce or microwaves to technology, data is (RF) electromagnetic wireless networking and allow electronic transmitted between cell waves to transfer data for 1-S| and devices to exchange phones, computers, and automatic identification belongs to the IEEE data or connect to other networking devices and for ing t: 802.16 family of wireless the Internet overs attached to objects networking standards Wireless Technologies In a wireless network, data transmission occurs by means of electromagnetic waves that carry signals over the communication path. Types of Wireless Technologies = Wi-Fi Wireless fidelity (Wi-Fi) is a part of the Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of wireless networking standards. This technology uses radio waves or microwaves to allow electronic devices to exchange data or connect to the Internet. Many devices such as personal computers, laptops, digital cameras, smartphones, etc., support Wi-Fi technology. Wi-Fi operates in the frequency band between 2.4 GHz and 5 GHz. A Wi-Fi network uses radio waves to transmit the signals across the network. For this purpose, a computer should have a wireless adapter to translate the data into radio signals and pass them through an antenna and router. This is where the message is decoded, and the data is sent to the internet or through another network. Hotspots are areas that have Wi-Fi availability, where users can enable Wi-Fi on their devices and connect to the internet through a hotspot. = Bluetooth In the Bluetooth technology, data is transmitted between cell phones, computers, and other networking devices over short distances. Signals transmitted via Bluetooth cover short distances of up to 10 m as compared to other modes of wireless communication. Bluetooth transfers the data at a speed of less than 1 Mbps and operates in the frequency range of 2.4 GHz. This technology comes under IEEE 802.15 and uses a radio technology called FHSS for transferring data to other Bluetooth-enabled devices. Module 11 Page 1406 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Wireless Network Security = RFID The radio-frequency identification (RFID) technology uses radio frequency (RF) electromagnetic waves to transfer data for automatic identification and for tracking tags attached to objects. RFID devices work within a small range of up to 20 ft. = WiMAX The worldwide interoperability for microwave access (WiMAX) technology uses long distance wireless networking and high-speed Internet. It belongs to the IEEE 802.16 family of wireless networking standards. WiMAX signals can function over a distance of several miles with data rates reaching up to 75 Mbps. It uses a fixed wireless application and mobile stations to provide high-speed data, voice, video calls, and internet connectivity to users. The WiMAX forum developed WiMAX and states that nearly 135 countries have deployed over 455 WiMAX networks. Module 11 Page 1407 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Wireless Network Security Wired vs. Wireless Networks Wired Networks Wireless Networks High bandwidth Low bandwidth Low bandwidth variation High bandwidth variation Low error rates High error rates More secure Less secure Less equipment dependent More equipment dependent Symmetric connectivity Possible asymmetric connectivity High-power machines Low-power machines High-resource machines Low-resource machines Low delay High delay Connected operation Disconnected operation Copyright © by EC-{ el All Rights Reserved. Reproductionis Strictly Prohibited. Wired vs. Wireless Networks The differences between a wired and a wireless network are as follows: Wired Networks Wireless Networks High bandwidth Low bandwidth Low bandwidth variation High bandwidth variation Low error rates High error rates More secure Less secure Less equipment dependent More equipment dependent Symmetric connectivity Possible asymmetric connectivity High-power machines Low-power machines High-resource machines Low-resource machines Low delay High delay Connected operation Disconnected operation Table 11.1: Differences Between a Wired and a Wireless Network Module 11 Page 1408 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Wireless Network Security Wireless Standards Protocol Frequency Bandwidth Stream data rate Modulation Range (m Protocol 802.11 G | @ | (GHz) (MHz) G (Mbits/s) Modulation oo ouioor (Wi-F) (Wi-Fi) 24 24 22 1,2 DSSS, FHSS 20 100 5> 35 35 120 120 802.11a 20 6,9, 12, 18, 24, 36, 48, 54 OFDM _ 5000 3.7 3.7 - 5000 02.1b 22D s = 22 1,2,5.5,11 1,2,55,11 DSSS 35 140 140 J 802.11d Itis an enhanced version of 802.11a and 802.11b that enables global portability by allowing variation in frequencies, power levels, and bandwidth 802.11e It provides guidance for prioritization of data, voice, and video transmissions by enabling quality of service (QoS) 802.11g 24 20 6,9, 12, 18, 24, 36, 48, 54 OFDM Copyright ©© by EC- CiLiL All Rights Reserved. Reproductionis Strictly Prohibited. Prohibited Wireless Standards (Cont’d) Protocol (GH) | (MHz) (GHz) () FLGEIELEY |||| LR LG ERLCLIE This is a standard for WLANs Stream data rate (Mbits/s) | Modulation “indoor | outaoor | |indoor | Outdoor WLANS that provides improved encryption for networks that use the 802.11a, 802.11b, and ge (m) Oo 802.11g standards 7.2,14.4,21.7, 28.9, 43.3, 2> = 57.8, 65, 72.2 ol70 150 = 802.11n 802.11n MIMO-OFDM MIMO-OFDM » 24 o 40 15, 30, 15, 30, 45, 45, 60, 60, 90, 90, 120, 120, 135, 135, — 70 - 150 150 150 7.2,14.4,21.7, 7.2,14.4,21.7,28.9, 28.9, 43.3, 43.3, -= 57.8, 65, 72.2, 86.7, 96.3 s o o. 12,03(1);3 gs,zg, 126325 85'2 gg, 90, 120, 135, --~ B 2280 5 L e MIMO-OFDM o 80 32.5, 65, 32.5, 65, 97.5, 97.5, 130, 130, 195, 260, 195, 260,.35 292.5, 325, 292.5, 325, 390, 433.3 390, 433.3 65, 130, 195, 260, 390, 520, sl 160 585, 650, 780, 585, 650, 780, 866.7 866.7 =3% 802.11ax 40 Up Up toto 229412 22941 2.4/5/6 2.4/5/6 80 80 Upto 4803¢! Upto ago3t! MIMO-OFDM MIMO-OFDM 30 30 120 120 Up to 10530 Copyright Copyright ©© by EC-Council EC-Council All Al Rights Reserved. Reserved. Reproduction Reproduction isis Strictly Prohibited Prohibited. Module 11 Page 1409 Certified Cybersecurity Technician Copyright © by EG-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Wireless Network Security Wireless Standards (Cont’d) Frequency Bandwidth Stream data rate Range (m) Protocol et Modulation (GHz) (MHz) (Mbits/s) Indoor Outdoor OFDM, single carrier, 802.11ad 60 2160 6.75 Gbit/s low-power single 60 100 carrier This standard defines the demand priority and media access control protocol for increasing the Ethernet data 802.12 rate to 100 Mbps 802.15 This standard defines the communication specifications for wireless personal area networks (WPANs) 802.15.1 (Bluetooth) 2.4 1-3 Mbps 10 802.15.4 (Zigbee) 2.4 868, 900 802.15.5 A standard for mesh networks with enhanced reliability via route redundancy 802.16 A group of broadband wireless communication standards for metropolitan area networks (MANSs) Copyright © by EC IL All Rights Reserved. Reproductionis Strictly Prohibited. Wireless Standards The IEEE standards correspond to the various wireless networking transmission methods. They are as follows: = 802.11 (Wi-Fi): This standard corresponds to WLANs and uses FHSS or DSSS as the frequency hopping spectrum. It allows an electronic device to connect to the internet using a wireless connection that is established in any network. = 802.11a: This standard is the second extension to the original 802.11 standard. It operates in the 5 GHz frequency band and supports a bandwidth of up to 54 Mbps by using OFDM. It has a fast maximum speed but is more sensitive to walls and other obstacles. = 802.11b: IEEE expanded the 802.11 standard by creating the 802.11b specifications in 1999. This standard operates in the 2.4 GHz industrial, scientific, and medical (ISM) radio band and supports a bandwidth of up to 11 Mbps by using DSSS modulation. = 802.11d: This standard is an enhanced version of the 802.11a and 802.11b standards. It supports the regulatory domains. The particulars of this standard can be set at the media access control (MAC) layer. = 802.11e: This standard defines the quality of service (QoS) for wireless applications. The enhanced service is modified using the MAC layer. This standard maintains the quality of video and audio streaming, real-time online applications, voice over internet protocol (VolP), etc. = 802.11g: This standard is an extension of the 802.11 standard. It supports a maximum bandwidth of 54 Mbps using the OFDM technology and uses the same 2.4 GHz band as Module 11 Page 1410 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Wireless Network Security 802.11b. It is compatible with the 802.11b standard, which implies that 802.11b devices can work directly with an 802.11g access point. = 802.11i: This standard is used as a standard for WLANs and provides improved encryption for networks. 802.11i requires new protocols such as TKIP and advanced encryption standard (AES). = 802.11n: This standard was developed in 2009. It aims to improve the 802.11g standard in terms of the bandwidth. It operates on both the 2.4 and 5 GHz bands and supports a maximum data rate up to 300 Mbps. It uses multiple transmitters and receiver antennas (MIMO) to allow a maximum data rate along with security improvements. = 802.11ac: This standard provides a high throughput network at the frequency of 5 GHz. It is faster and more reliable than the 802.11n standard. It involves gigabit networking which provides an instantaneous data transfer experience. = 802.11ax: 802.11axalso known as Wi-Fi 6. Itis the sixth generation of the Wi-Fi standard. It is designed to operate in all ISM bands between 1 and 6 GHz. = 802.11ad: 802.11ad involves the inclusion of a new physical layer for 802.11 networks. This standard works on the 60 GHz spectrum. The data propagation speed in this standard is significantly different from the bands operating at 2.4 GHz and 5 GHz. With a very high frequency spectrum, the transfer speed is much higher than that of 802.11n. = 802.12: This standard dominates media utilization by working on the demand priority protocol. Based on this standard, the ethernet speed increases to 100 Mbps. It is compatible with the 802.3 and 802.5 standards. Users currently on these standards can directly upgrade to the 802.12 standard. = 802.15: This defines the standards for a wireless personal area network (WPAN). It describes the specification for wireless connectivity with fixed or portable devices. = 802.15.1 (Bluetooth): Bluetooth is mainly used for exchanging data between fixed and mobile devices over short distances. * 802.15.4 (Zigbee): The 802.15.4 standard has a low data rate and complexity. Zigbee is the specification used in the 802.15.4 standard. It transmits long distance data through a mesh network. This specification handles applications operating at a low data rate, but longer battery life. Its data rate is 250 kbits/s. = 802.15.5: This standard deploys itself on a full mesh or a half mesh topology. It includes network initialization, addressing, and unicasting. = |EEE 802.16: This standard is also known as WiMAX and is a specification for fixed broadband wireless metropolitan access networks (MANs) that use a point-to- multipoint architecture. Module 11 Page 1411 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser