Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

NETW206 Ch 07

Basic Wireless Concepts and Configuration

QuestionAnswer
Access Point (AP) A device that connects wireless communications devices to form a wireless network, analogous to a hub connecting wired devices to form a LAN.
Ad Hoc A WLAN topology, also called independent basic service set, where mobile clients connect directly without an intermediate access point. Referred to as IBSS by IEEE.
Advanced Encryption Standard (AES) AES replaced WEP as the most secure method of encrypting data. AES is an option for WPA2.
Association Identifier (AID) An access point maps a logical port, know as the association identifier (AID) to the WLAN client. The AID is equivalent to a port on a switch.
Association The state achieved when a properly configured wireless client is able to wirelessly communicate with an access point.
Attenuation Loss of communication signal energy.
Authentication, Authorization, and Accounting (AAA) A protocol, specified in RFC 2903, and several other RFCs, for specifying who can access a system or network, how they can access it, and what they did while they were connected.
Authentication The verification of the identity of a person or process.
Basic Server Area (BSA) The area of a radio frequency coverage provided by an access point. This area is also referred to as a microcell.
Basic Service Set (BSS) A WLAN infrastructure mode whereby mobile clients use a single access point for connectivity to each other or to a wired network resource.
Basic Service Set Identifier (BSSID) The MAC address of the access point server the BSS.
Beacons A wireless LAN packet that signals the availability and presence of the wireless device. Beacon packets are sent by access points and base stations; however, client radio cards send beacons when operating in ad hoc mode.
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) This media access method requires WLAN devices to sense the medium for energy levels and wait until the medium is free before sending.
Channel Consists of a range of frequencies. Used by wireless devices to hone in on a particular signal to differentiate it from wireless communications taking place at other frequencies. 2.4 Ghz band has 11 channels in N. America and 13 in Europe.
Cipher An algorithm for performing encryption and decryption. It consists of a series of well-defined steps that can be followed as a procedure.
Clear-to-Send (CTS) A mechanism used in wireless technology to indicate that a wireless device is ready to accept data. RTS/CTS is used to resolve device access to avoid the hidden node problem.
Common Distribution System (CDS) Allows multiple access points in an ESS to appear to be a single BSS. An ESS generally includes a common SSID to allow a user to roam from access point to access point.
Cracker One who breaks security on a system.
Direct-Sequence Spread Spectrum (DSSS) One of the modulation techniques set out in IEEE 802.11 and the one chosen by the 802.11 Working Group for IEEE 802.11b devices.
Distributed Coordination Function (DCF) When an AP sends an acknowledgment to the client that the data has been received; keeps the client from assuming that a collision occurred and prevents data retransmission by the client.
Ethical Hacker A computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit.
Extended Service Area (ESA) The coverage area of an ESS.
Extended Service Set (ESS) A WLAN infrastructure mode whereby 2 or more basic service sets are connected by a common distribution system. An ESS generally includes a common SSID to allow roaming from access point to access point without requiring client configuration.
Extensible Authentication Protocol (EAP) Universal authentication framework used in wireless networks. Can be used in wired LAN authentication too, but most often used in WLANs. WPA/2 adopted 5 EAP types for authentication mechanisms.
Firmware Software instructions set permanently or semi-permanently in ROM.
Global Positioning System (GPS) Enables a receiver to determine its location, speed, direction, and time.
Hacker A malicious intruder who enters systems as a criminal and steals data or deliberately harms systems. hackers are intent on doing harm and are able to exploit weak security measures.
Hidden Node Problem Occurs when 2 client stations connect to the same AP, but are on opposing ends of the range of the AP, resulting in simultaneous transmissions by the clients as a result of the incapability of one client to sense the presence of the other.
IEEE 802 LAN/MAN Standards Committee (LMSC) Chartered to oversee the various IEEE 802 working groups.
IEEE 802.11 A standard that defines how radio frequency in the ISM frequency bands is used for the physical layer and MAC sublayer of wireless links.
IEEE 802.11a A standard specifying wireless data communication at up to 54Mbps at the 5Ghz range using OFDM.
IEEE 802.11b A standard specifying wireless data communication at up to 11Mbps at the 2.4 Ghz range using DSSS.
IEEE 802.11g A standard specifying wireless data communication at up to 54Mbps at the 2.4Ghz range using DSSS.
IEEE 802.11i A standard specifying security mechanisms for wireless networks.
IEEE 802.11n A standard specifying wireless data communication at up to 248Mbps at an unspecified frequency range using MIMO.
IEEE 802.1x A standard for port-based network access control. Provides authentication to devices attached to a LAN port, establishing a PTP connection or preventing access from that port if authentication fails. Used for wireless APs and is based on EAP.
Independent BSS (IBSS) The IEEE terminology for an ad hoc topology.
Industrial, Scientific, and Mechanical (ISM) ISM radio bands were originally reserved internationally for the use of RF electromagnetic fields for industrial, scientific, and medical purposes other than communications. Communications equipment must accept any interference generated by ISM equipment.
Interference Unwanted communication noise.
International Telecommunications Union-Radio Communication Sector (ITU-R) One of the 3 sectors (divisions or units) of the International Telecommunication Union, and is responsible for radio communication.
Intrusion Prevention System (IPS) A device that monitors network activities for malicious behavior and can react in real-time to block those activities.
Man-in-the-Middle (MITM) An attack in which the attacker is able to read, insert, and modify at will messages between two endpoints without either party being aware that the data path has been compromised.
Manual Site Survey Site evaluation that involves inspecting the area w/ the goal of identifying potential issues that could impact the network. Specifically it involves the search for the presence of multiple WLANS, unique building structures, & high client usage variances
Message Integrity Check (MIC) Part of the 802.11i standard. Is an 8-byte field placed between the data portion of an IEEE 802.11 frame and the 4-byte ICV. Discourages replay attacks.
Modulation A technique for combining user information with a transmitter's carrier signal. It is a process by which the characteristics of electrical signals are transformed to represent information. Types of modulation include AM, FM, and PAM.
Multiple Input/Multiple Output (MIMO) Splits a high data-rate stream into multiple lower-rate streams & broadcasts them simultaneously over the available radios and antennae.
Orthogonal Frequency Division Multiplexing (OFDM) A modulation technique used with IEEE 802.11g and IEEE 802.11a.
Pre-Sharked Key (PSK) A key used in various encryption schemes whereby the opposing ends of a connection share the knowledge of a secret key used to encrypt and decrypt data. PSK is also an alternative method for authentication in a network that does not have a RADIUS server.
Probes IEEE 802.11 frames used by WLAN clients to find the networks they can associate with.
Radio Frequency (RF) A generic term referring to frequencies that correspond to radio transmissions. Cable TV, WLANS, and broadband networks use RF technology.
Radio Resource Management (RRM) monitors the RF band for activity and access point load. An access point that is busier than normal alerts the administrator of possible unauthorized traffic.
Remote Authentication Dial In User Service (RADIUS) Authentication protocol for controling access to network resources w/in an IEEE 802.1x framework. RADIUS is commonly used by ISPs, enterprise networks, & corporations managing access to Internet or internal networks across an array of access technologies.
Request to Send/Clear to Send (RTS/CTS) A feature used in the CSMA/CA media access method of WLANs to allow a negotiation between a client and an access point without collisions.
Rogue Access Point An AP, placed on a WLAN, which is used to interfere with normal network operation, capture client data, or gain access to servers. A rogue access point is an unauthorized AP accessing the WLAN.
Service Set Identifier (SSID) A code attached to all packets on a wireless network to identify each packet as part of that network. The code is a case-sensitive text string that consists of a maximum of 32 alphanumeric characters.
Site Survey The process of planning and designing a wireless network to provide a solution that will deliver the required coverage, data rates, network capacity, roaming capability, and QoS.
Temporal Key Integrity Protocol (TKIP) Designed as a solution to replace WEP without requiring the replacement of legacy hardware.
Transmit Power A measure of strength of the radio transmissions emanating from a wireless networking device.
Utility-assisted site survey Sophisticated site survey carried out w/ dedicated survey tool, such as AirMagnet. Often includes mounting APs on tripods & setting them in appropriate locations & in accordance w/the projected site plan.
War Driving The act of searching for WiFi wireless networks by a person in a moving vehicle using a WiFi equipped computer.
Wi-Fi Alliance Owns the trademark to Wi-Fi. Is a global, non-profit, industry trade association devoted to promoting the growth and acceptance of wireless technology.
Wi-Fi Protected Access /2 (WPA/2) A class of systems to secure wireless LANs. Created in response to WEP insecurities.WPA2 supports AES encryption while WPA does not.
Wired Equivalent Privacy (WEP) An algorithm used to secure IEEE 802.11 wireless networks. Very easy to crack.
Wireless LAN (WLAN) A LAN with access points, together with the devices supporting them and supported by them.
Wireless NIC The device that makes a client station capable of sending RF signals is a wireless NIC.
Created by: AZ4ME
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards