Chapter 7: Wireless

Chapter 7: Wireless
Chapter 7: Wireless
=========================================================
* What is 802.11a?
- Speed? Frequency band? Distance (range)?
- What is the advantage and disadvantage of 802.11a?

There are some important disadvantages to using the 5 GHz band.
– The first is that higher frequency radio waves are more easily absorbed by
obstacles such as walls, making 802.11a susceptible to poor performance
due to obstructions.
– The second is that this higher frequency band has slightly poorer range than
either 802.11b or g.
* What is 802.11b?
- Speed? Frequency band? Distance (range)?
- What is the advantage and disadvantage of 802.11b?
* What is 802.11g?
- Speed? Frequency band? Distance (range)?
- What is the advantage and disadvantage of 802.11g?
–
–
Advantages of using the 2.4 GHz band.
• Devices in the 2.4 GHz band will have better range than those in the
5GHz band.
• Transmissions in this band are not as easily obstructed as 802.11a.
Disadvantage to using the 2.4 GHz band.
• Many consumer devices also use the 2.4 GHz band and the devices to be
prone to interference.
– microwave ovens, Bluetooth devices, baby monitors and cordless
telephones.
* What is 802.11n?
- Speed? Frequency band? Distance (range)?
- What is the advantage and disadvantage of 802.11n?
–
–
The IEEE 802.11n draft standard is intended to improve WLAN data rates and
range without requiring additional power or RF band allocation.
802.11n uses multiple radios and antennae at endpoints, each broadcasting on
the same frequency to establish multiple streams.
* Before an 802.11 client can send data over a WLAN network, it goes through the
following three-stage process:
– Stage 1 - 802.11 probing
– Stage 2 - 802.11 authentication
– Stage 3 - 802.11 association
* What are some basic ways to control access to wireless LAN?
– SSID cloaking - Disable SSID broadcasts from access points
– MAC address filtering - Tables are manually constructed on the access point to
allow or disallow clients based on their physical hardware address
– WLAN security implementation - WPA or WPA2
* Wireless security?
 2 types of authentication with the original 802.11: open and shared WEP key
authentication.
– While open authentication is really "no authentication," (a client requests
authentication and the AP grants it),
– WEP authentication was supposed to provide privacy to a link. The flaws
with WEP shared key encryption were.
 Today, the standard in most enterprise networks is the 802.11i standard.
– This is similar to the Wi-Fi Alliance WPA2 standard.
– For enterprises, WPA2 includes a connection to a Remote Authentication
Dial In User Service (RADIUS) database.
* What is “man-in-the-middle” attack? How do you prevent it?
 Defeating an attack like a MITM attack, depends on the sophistication of your
WLAN infrastructure and your vigilance in monitoring activity on the network.
– The process begins with identifying legitimate devices on your WLAN.
– To do this, you must authenticate users on your WLAN.
– When all users are known, you then monitor the network for devices and
traffic that is not supposed to be there.
* What is BSS? What is ESS?
* What is CSMA/CA? What problem is CSMA/CA method is designed to solve?
* What is “rogue access point”?
• A rogue access point is an access point placed on a WLAN that is used to
interfere with normal network operation.
• A rogue access point also could be configured to provide unauthorized user’s
access.
* What is “site-survey”? * What is purpose of “site-survey”?
 A site evaluation involves inspecting the area with the goal of identifying potential
issues that could impact the network.
* When configure a wireless router, you need to know all the basic terminology?
- Network mode?
- Network name (SSID)?
- Radio band?
- Wide channel?
- Standard channel?
- SSID Broadcast?
* What are the known wireless security faults about the SSID?
- What is the problem with the default SSID name?
- Will disable the broadcast SSID completely prevent it from been discovered?
* What are the issues of channel overlapping?
 Interference can occur when there is overlap of channels.
 It is worse if the channels overlap close to the center frequencies,
* The Linksys WRT300N used is three devices in one box.
– First, there is the wireless access point, which performs the typical functions of
an access point.
– In essence, an access point converts the TCP/IP data packets from their
802.11 frame encapsulation format in the air to the 802.3 Ethernet frame
format on the wired Ethernet network.
– A built-in four-port, full-duplex, 10/100 switch provides connectivity to wired
devices.
– Finally, the router function provides a gateway for connecting to other network
infrastructures.
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement