• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/84

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

84 Cards in this Set

  • Front
  • Back

All wireless devices operate in the radio waves range of the

electromagnetic spectrum.

Wi-Fi systems are

half-duplex.

Wi-Fi systems can

transmit and receive on the same radio channel, not simultaneously.

Distributed Coordination Function (DCF) is a

collision avoidance mechanism used for Wi-Fi systems.

(DCF) ensures clients only transmit if the channel is

clear.

Wireless clients and Access Points use the

RTS and CTS control frames to facilitate the actual data transfer.

Wireless three-stage process:

Discover new wireless AP.


Authenticate with AP.


Associate with AP.

Modes Of Discovering APs:

Passive mode


Active mode



Passive mode - The AP openly advertises its service by periodically sending

broadcast beacon frames.

Broadcast beacon frames include:

SSID


supported standards


security settings.



Active mode - The wireless client initiates the process by broadcasting a

probe request frame.

Probe request frame includes:

SSID


supported standards





The response frame from the AP provides the

security settings.

Authentication types:

Open authentication


Shared key authentication

Open authentication is a

free pass to wireless network.

Shared key authentication technique is based on a key that is

pre-shared between the client and the AP.

Shared key authentication process:

Client authentication request.


AP Challenge.


Client encypts with key.


AP decrypts the key.


Authenticates if keys match.

After a wireless client has been authenticated, the AP proceeds to the

association stage.

The wireless client forwards an Association Request frame that includes its

MAC address.

The AP responds with an Associate Response that includes the AP BSSID, which is the

AP MAC address.

The AP maps a logical port known as the association identifier (AID) to the

wireless client.

It is the responsibility of the International Telecommunication Union - Radiocommunication Sector (ITU-R) to

regulate the allocation of the radio frequency (RF) spectrum.

The radio waves range is subdivided into

radio frequencies.


microwave frequencies.

WLANs connect clients to the network through a wireless

access point (AP) or wireless router.

Wireless LAN devices have transmitters and receivers tuned to specific

frequencies of the radio waves range.

Ranges of frequencies are called

bands.

Benefits of Wireless:

Increased flexibility


increased productivity


reduced costs


ability to grow and adapt



Wireless Technologies:

Wireless Personal-Area Networks (WPAN)


Wireless LANs (WLANs)


Wireless Wide-Area Networks (WWANs)



Bluetooth

IEEE 802.15 WPAN standard, distances up to 100m.

Wi-Fi (wireless fidelity)

IEEE 802.11 WLAN standard, distances up to 300m.

WiMAX (Worldwide Interoperability for Microwave Access)

IEEE 802.16 WWAN standard, access of up to 30 miles (50 km).

Cellular broadband uses service provider cellular access to provide

mobile connectivity.

Satelite broadband provides network access to remote sites through the use of a

directional satellite dish.

2.4 GHz (UHF)

802.11b/g/n/ad

5 GHz (SHF)

802.11a/n/ac/ad

60 GHz (EHF)

802.11ad

802.11n can also use

channel bonding.

Channel bonding combines

two 20 MHz channel into one 40 MHz channel.

The three organizations influencing WLAN standards are:

IEEE


ITU-R


Wi-Fi Alliance

IEEE

Specifies how RF is modulated to carry information.

ITU-R

Regulates the allocation of the RF spectrum and satellite orbits.

Wi-Fi Alliance

promotes the growth and acceptance of WLANs.

Wireless clients use their wireless NIC to discover nearby APs advertising their

SSID.

Clients then attempt to

associate and authenticate with an AP.

Access Points can be categorized as either

autonomous APs or controller-based APs.

Autonomous APs are useful in situations where only a

couple of APs are required in the network.

Autonomous APs are configured and managed

individually. (Unless clustered)

Single Point Setup (SPS) is a form of clustering that makes autonomous AP deployment

easier and faster.

Cluster Conditions:

Cluster mode enabled.


Matching cluster name.


Same network segment.


Same radio mode.

Controller-based APs are useful in situations where

many APs are required in the network.

Controller-based APs require no

initial configuration.

Controller-based are managed centrally from a controller in the

cloud.

The controller pushes management settings to the AP, such as

firmware updates


security settings


wireless network


SSIDs settings



The Cisco Meraki cloud architecture is a management solution used to

simplify the wireless deployment.

Most business class APs require the use of

external antennas.

IEEE 802.11n/ac/ad use MIMO technology to

increase available bandwidth.

MIMO uses multiple antennas to

exchange more data.

Wireless Topology Modes:

Ad hoc mode


Infrastructure mode

Ad hoc mode

when two wireless devices communicate without using APs or wireless routers.

Infrastructure mode

clients interconnect via a wireless router or AP.

Basic Service Set (BSS) - consists of a single AP interconnecting

all associated wireless clients.

Extended Service Set (ESS)

two or more BSSs joined through a common distribution system (DS).

If the demand for a specific channel is too high, that channel is likely to become

oversaturated.

The saturation of the wireless medium degrades the

quality of the communication.

Direct-sequence spread spectrum (DSSS) - is designed to spread a signal over a

larger frequency band.

The signal is multiplied by a “crafted noise” known as a

spreading code.

Frequency-hopping spread spectrum (FHSS) transmits radio signals by

by rapidly switching a carrier signal.

Orthogonal frequency-division multiplexing (OFDM) - a single channel utilizes

multiple sub-channels on adjacent frequencies.

A best practice for WLANs requiring multiple APs is to

use non-overlapping channels.

Wireless Threats:

Wireless intruders


Rogue APs


Interception of data


DoS attacks

A rogue AP is an AP or wireless router that has either been connected to a corporate network without explicit

authorization and against corporate policy.

A rogue AP is an AP or wireless router that has been connected or enabled by an attacker to capture

client data.

A rogue AP is an AP or wireless router that has been connected or enabled by an attacker to gain access to

network resources, or to launch man-in-the-middle attack.

Wireless DoS attacks can be the result of:

Improperly configured devices.


intentionally interference


Accidental interference

Types of DoS attacks:

A spoofed disconnect attack.


A CTS flood.

To mitigate many of these attacks, Cisco has developed a variety of solutions, including

the Cisco Management Frame Protection (MFP) feature

To address the threats of keeping wireless intruders out and protecting data, two early security features were used:

SSID cloaking


MAC addresses filtering

Shared Key Authentication Methods:

Wired Equivalent Privacy (WEP)


Wi-Fi Protected Access (WPA) (TKIP)


IEEE 802.11i/WPA2 (AES)

The IEEE 802.11i and the Wi-Fi Alliance WPA and WPA2 standards use the following encryption protocols:

Temporal Key Integrity Protocol (TKIP)


Advanced Encryption Standard (AES)

Temporal Key Integrity Protocol (TKIP)

used by WPA.

Advanced Encryption Standard (AES)

used by WPA2.

WPA and WPA2 support two types of authentication:

Personal - home or small office


Enterprise - Intended for enterprise networks

These fields are necessary to supply the AP with the required information to contact the AAA server:

RADIUS Server IP address


RADIUS port numbers


Shared key

Troubleshooting When the Network Is Slow:

Upgrade your wireless clients


Split the traffic