Chapter 11 - 01 - Understand Wireless Network Fundamentals - 02_ocred.pdf

Full Transcript

Certified Cybersecurity Technician Wireless Network Security -~ Exam 212-82 Wireless Technologies ‘V,—-r — og - In a wireless network, data transmission occurs by means of electromagnetic waves that carry signals over the communication path 2 ;(-’ n£ Types of Wireless Technologies ©) O It uses radio...

Certified Cybersecurity Technician Wireless Network Security -~ Exam 212-82 Wireless Technologies ‘V,—-r — og - In a wireless network, data transmission occurs by means of electromagnetic waves that carry signals over the communication path 2 ;(-’ n£ Types of Wireless Technologies ©) O It uses radio waves or microwaves to allow electronic devices to exchange data or connect to the Internet O Using Bluetooth technology, data is transmitted between cell phones, computers, and other networking devices overs ‘ O 1t uses radio frequer (RF) electromagnetic waves to transfer data for automatic identification and for ing t: attached to objects Q Ituses! 1ce wireless networking and 1-S| and belongs to the IEEE 802.16 family of wireless networking standards Wireless Technologies In a wireless network, data transmission occurs by means of electromagnetic waves that carry signals over the communication path. Types of Wireless Technologies = Wi-Fi Wireless fidelity (Wi-Fi) is a part of the Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of wireless networking standards. This technology uses radio waves or microwaves to allow electronic devices to exchange data or connect to the Internet. Many devices such as personal computers, laptops, digital cameras, smartphones, etc., support Wi-Fi technology. Wi-Fi operates in the frequency band between 2.4 GHz and 5 GHz. A Wi-Fi network uses radio waves to transmit the signals across the network. For this purpose, a computer should have a wireless adapter to translate the data into radio signals and pass them through an antenna and router. This is where the message is decoded, and the data is sent to the internet or through another network. Hotspots are areas that have Wi-Fi availability, where users can enable Wi-Fi on their devices and connect to the internet through a hotspot. = Bluetooth In the Bluetooth technology, data is transmitted between cell phones, computers, and other networking devices over short distances. Signals transmitted via Bluetooth cover short distances of up to 10 m as compared to other modes of wireless communication. Bluetooth transfers the data at a speed of less than 1 Mbps and operates in the frequency range of 2.4 GHz. This technology comes under IEEE 802.15 and uses a radio technology called FHSS for transferring data to other Bluetooth-enabled devices. Module 11 Page 1406 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security = Exam 212-82 RFID The radio-frequency identification (RFID) technology uses radio frequency (RF) electromagnetic waves to transfer data for automatic identification and for tracking tags attached to objects. RFID devices work within a small range of up to 20 ft. = WiMAX The worldwide interoperability for microwave access (WiMAX) technology uses long distance wireless networking and high-speed Internet. It belongs to the IEEE 802.16 family of wireless networking standards. WiMAX signals can function over a distance of several miles with data rates reaching up to 75 Mbps. It uses a fixed wireless application and mobile stations to provide high-speed data, voice, video calls, and internet connectivity to users. The WiMAX forum developed WiMAX and states that nearly 135 countries have deployed over 455 WiMAX networks. Module 11 Page 1407 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Wired vs. Wireless Networks Wired Networks Wireless Networks High bandwidth Low bandwidth Low bandwidth variation High bandwidth variation Low error rates High error rates More secure Less secure Less equipment dependent More equipment dependent Symmetric connectivity Possible asymmetric connectivity High-power machines Low-power machines High-resource machines Low-resource machines Low delay High delay Connected operation Disconnected operation Copyright © by Wired vs. Wireless EC-{ el All Rights Reserved. Reproductionis Strictly Prohibited. Networks The differences between a wired and a wireless network are as follows: Wired Networks Wireless Networks High bandwidth Low bandwidth Low bandwidth variation High bandwidth variation Low error rates High error rates More Less secure secure Less equipment dependent More equipment dependent Symmetric connectivity Possible asymmetric connectivity High-power machines Low-power machines High-resource machines Low-resource machines Low delay High delay Connected operation Disconnected operation Table 11.1: Differences Between a Wired and a Wireless Network Module 11 Page 1408 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Wireless Standards Protocol Frequency Bandwidth Stream data rate Modulation 802.11 24 22 1,2 DSSS, FHSS 6,9, 12, 18, 24, 36, 48, 54 OFDM G | @ | (Wi-F) > 802.11a 20 G 3.7 02.1b 802.11d s 22 1,2,55,11 DSSS oo Range 20 (m ouioor 100 35 120 - 5000 35 140 J Itis an enhanced version of 802.11a and 802.11b that enables global portability by allowing variation in frequencies, power levels, and bandwidth 802.11e It provides guidance for prioritization of data, voice, and video transmissions by enabling quality of service (QoS) 802.11g 6,9, 12, 18, 24, 36, 48, 54 OFDM Copyright © by EC- CiL All Rights Reserved. Reproductionis Strictly Prohibited Wireless Standards (Cont’d) Protocol o 802.11n FLGEIELEY || ERLCLIE (GHz) (MHz) ge (m) |indoor | Outdoor This is a standard for WLANS that provides improved encryption for networks that use the 802.11a, 802.11b, and 802.11g standards 2 = 24 40 = o o 2280 Stream data rate (Mbits/s) | Modulation 5 80 160 802.11ax 2.4/5/6 7.2,14.4,21.7, 28.9, 43.3, 57.8, 65, 72.2 15, 30, 45, 60, 90, 120, 135, 150 MIMO-OFDM 7.2,14.4,21.7,28.9, 43.3, 57.8, 65, 72.2, 86.7, 96.3 126325 gs,zg, 90, 120, 135, L 32.5, 65, 97.5, 130, 195, 260, 292.5, 325, 390, 433.3 MIMO-OFDM 585, 650, 780, 866.7 Upto 22941 80 Upto 4803¢! = 70 150 s - 65, 130, 195, 260, 390, 520, 40 ol 35 3% MIMO-OFDM 30 120 Up to 10530 Copyright © by Module 11 Page 1409 EC-Council Al Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Wireless Standards (Cont’d) Protocol 802.11ad Frequency et (GHz) 60 Bandwidth (MHz) Stream data rate (Mbits/s) Modulation 2160 6.75 Gbit/s OFDM, single carrier, low-power single carrier Indoor Range (m) Outdoor 60 100 802.12 This standard defines the demand priority and media access control protocol for increasing the Ethernet data rate to 100 Mbps 802.15 This standard defines the communication specifications for wireless personal area networks (WPANs) 802.15.1 (Bluetooth) 2.4 802.15.4 (Zigbee) 2.4 802.15.5 802.16 1-3 Mbps 10 868, 900 A standard for mesh networks with enhanced reliability via route redundancy A group of broadband wireless communication standards for metropolitan area networks (MANSs) Copyright © by EC IL All Rights Reserved. Reproductionis Strictly Prohibited. Wireless Standards The IEEE standards correspond to the various wireless networking transmission methods. They are as follows: = 802.11 (Wi-Fi): This standard corresponds to WLANs and uses FHSS or DSSS as the frequency hopping spectrum. It allows an electronic device to connect to the internet using a wireless connection that is established in any network. = 802.11a: This standard is the second extension to the original 802.11 standard. It operates in the 5 GHz frequency band and supports a bandwidth of up to 54 Mbps by using OFDM. It has a fast maximum speed but is more sensitive to walls and other obstacles. = 802.11b: IEEE expanded the 802.11 standard by creating the 802.11b specifications in 1999. This standard operates in the 2.4 GHz industrial, scientific, and medical (ISM) radio band and supports a bandwidth of up to 11 Mbps by using DSSS modulation. = 802.11d: This standard is an enhanced version of the 802.11a and 802.11b standards. It supports the regulatory domains. The particulars of this standard can be set at the media access control (MAC) layer. = 802.11e: This standard defines the quality of service (QoS) for wireless applications. The enhanced service is modified using the MAC layer. This standard maintains the quality of video and audio streaming, real-time online applications, voice over internet protocol (VolP), etc. = 802.11g: This standard is an extension of the 802.11 standard. It supports a maximum bandwidth of 54 Mbps using the OFDM technology and uses the same 2.4 GHz band as Module 11 Page 1410 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security Exam 212-82 802.11b. It is compatible with the 802.11b standard, which implies that 802.11b devices can work directly with an 802.11g access point. = 802.11i: This standard is used as a standard encryption for networks. 802.11i requires new encryption standard (AES). = for WLANs and provides improved protocols such as TKIP and advanced 802.11n: This standard was developed in 2009. It aims to improve the 802.11g standard in terms of the bandwidth. It operates on both the 2.4 and 5 GHz bands and supports a maximum data rate up to 300 Mbps. It uses multiple transmitters and receiver antennas (MIMO) to allow a maximum data rate along with security improvements. = 802.11ac: This standard provides a high throughput network at the frequency of 5 GHz. It is faster and more reliable than the 802.11n standard. It involves gigabit networking which provides an instantaneous data transfer experience. = 802.11ax: 802.11axalso known as Wi-Fi 6. Itis the sixth generation of the Wi-Fi standard. It is designed to operate in all ISM bands between 1 and 6 GHz. = = 802.11ad: 802.11ad involves the inclusion of a new physical layer for 802.11 networks. This standard works on the 60 GHz spectrum. The data propagation speed in this standard is significantly different from the bands operating at 2.4 GHz and 5 GHz. With a very high frequency spectrum, the transfer speed is much higher than that of 802.11n. 802.12: This standard dominates media utilization by working on the demand priority protocol. Based on this standard, the ethernet speed increases to 100 Mbps. It is compatible with the 802.3 and 802.5 standards. Users currently on these standards can directly upgrade to the 802.12 standard. = 802.15: This defines the standards for a wireless personal area network (WPAN). = 802.15.1 (Bluetooth): Bluetooth is mainly used for exchanging data between fixed and describes the specification for wireless connectivity with fixed or portable devices. It mobile devices over short distances. * 802.15.4 (Zigbee): The 802.15.4 standard has a low data rate and complexity. Zigbee is the specification used in the 802.15.4 standard. It transmits long distance data through a mesh network. This specification handles applications operating at a low data rate, but longer battery life. Its data rate is 250 kbits/s. = 802.15.5: This standard deploys itself on a full mesh or a half mesh topology. It includes network initialization, addressing, and unicasting. = |EEE 802.16: This standard broadband wireless metropolitan multipoint architecture. Module 11 Page 1411 is also known access as WiMAX networks and is a specification for fixed (MANs) that use a point-to- Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser