Devices (wireless networking architecture)
An STA (station) is any device that is able to use the 802.11 protocol to communicate on a wireless network. Devices on a wireless network include:
Many wireless access points include ports (i.e., switches or routers) to connect the wireless network to the wired portion of the network.
Connection Method (wireless networking architecture): Explain the 2 types
Ad hoc
An ad hoc network works in peer-to-peer mode. The wireless NICs in each host communicate directly with one another. An ad hoc network is difficult to maintain for a large number of hosts because connections must be created between a host and every other host, and special configurations are required to reach wired networks. You will typically use an ad hoc network only to create a direct, temporary connection between two hosts.
Infrastructure
An infrastructure wireless network employs an access point that functions like a hub on an Ethernet network. With an infrastructure network, you can easily add hosts without increasing administrative efforts (scalable), and the access point can be easily connected to a wired network, allowing clients to access both wired and wireless hosts.
You should implement an infrastructure network for all but the smallest of wireless networks.
802.11 Specification Standards
The original 802.11 specification operated in the 2.4 GHz range and provided up to 2 Mbps. Additional IEEE subcommittees have further refined wireless networking, resulting in the following standards:
Specification
Standard
802.11a
802.11b
802.11g
802.11n
802.11ac
Frequency
5 GHz
(U-NII)
2.4 GHz (ISM) or 5 GHz
(U-NII)
5 GHz (U-NII)
Maximum speed
54 Mbps
11 Mbps
54 Mbps
600 Mbps
1.3 Gbps
Maximum distance
100 ft.
150 ft.
150 ft.
300 ft.
150 ft.
Channels
(non-overlapped)
23 (12)
11 (3)
11 (3)
2.4 GHz: 11 (3 or 1)
5 GHz: 23 (12 or 6)
Depends on configuration
Modulation technique
OFDM
DSSS, CCK, DQPSK, DBPSK
DSSS (and others) at lower data rates;
OFDM, QPSK, BPSK at higher data rates
OFDM (and others, depending on implementation)
OFDM
Backwards compatibility
N/A
None
Multiple-Input, Multiple-Output (MIMO) (802.11n Technologies)
MIMO increases bandwidth by using multiple antennas for both the transmitter and receiver.
A system is described by the number of sending and receiving antennas. The 802.11n specifications allow up to four sending and four receiving antennas. The benefit of adding additional antennas declines as the number increases; going above 3x3 provides a negligible performance increase.
Channel Bonding (802.11n Technologies)
Channel bonding combines two, non-overlapping 20 MHz channels into a single 40 MHz channel, resulting in slightly more than double the bandwidth.
Multi-User MIMO (MU-MIMO) (802.11ac Technologies)
MU-MIMO is an enhancement to MIMO that allows multiple users to use the same channel.
In addition to adding MU-MIMO, 802.11ac doubled the number of MIMO radio streams from four to eight.
What are the wireless network authentication methods?
Method
Description
Open
Open authentication requires that clients provide a MAC address in order to connect to the wireless network.
Because MAC addresses are easily spoofed, this provides little practical security.
Shared Key
With shared key authentication, clients and APs are configured with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.
Use 802.1x authentication on large, private networks. Users authenticate with unique usernames and passwords.
Wired Equivalent Privacy (WEP)
WEP is an optional component of the 802.11 specifications that were deployed in 1997. WEP has the following weaknesses:
Because of the inherent security flaws, avoid using WEP whenever possible. If using WEP cannot be avoided, implement it only using open authentication. Shared key authentication with WEP uses the same key for both encryption and authentication, exposing the key to additional attacks.
Wi-Fi Protected Access (WPA)
WPA is the implementation name for wireless security based on initial 802.11i drafts that was deployed in 2003. It was intended to be an intermediate measure to take the place of WEP while a fully secured system (802.11i) was prepared. WPA:
WPA keys can also be predicted by reconstructing the Message Integrity Check (MIC) of an intercepted packet, sending the packet to an AP, and observing whether the packet is accepted by the AP.
Wi-Fi Protected Access 2 (WPA2) or 802.11i
WPA2 is the implementation name for wireless security that adheres to the 802.11i specifications. It was deployed in 2005. It is built upon the idea of Robust Secure Networks (RSN). Like WPA, it resolves the weaknesses inherent in WEP. It is intended to eventually replace both WEP and WPA. WPA2:
Can use dynamic keys or pre-shared keys
Wi-Fi Protected Access 3 (WPA3)
WPA3 is a new authentication launched in 2018. It is a more resilient version of WPA2. WPA3:
Offers 192-bit cryptographic strength, giving additional protection for networks dealing with sensitive data
Infrared (IR) connection method
Infrared uses invisible light waves for communication. Infrared:
Infrared is typically used for remote control devices or for sending data between two devices. Most smart phones have integrated IR capabilities.
Bluetooth connection method
Bluetooth uses radio waves in the 2.4 GHz frequency range for communication.
Version
Speed
1.2
1 Mbps
2.0
3 Mbps
3.0
24 Mbps
Class
Distance
1
100 m
2
10 m
3
1 m
Bluetooth is also able to transmit audio and video data signals
Near Field Communication (NFC)
NFC enables communication between two devices that are in very close proximity with each other.
Even though NFC has slower transmission speeds than Bluetooth, it consumes much less power and sets up connections much faster
SOHO Characteristics
Most SOHO networks have the following characteristics:
A typical SOHO network uses what devices?
A typical SOHO network uses the following devices:
A SOHO network uses multiple devices that share a single internet connection. The connection to the internet is typically through an access point or router that includes switch ports and/or a wireless access point to connect devices to the local area network and the internet. The type of device you use depends on the internet connection type (DSL, cable, fiber, etc.).
What re the general steps you would take to configure a SOHO router and set up the network
Action
Description
Configure the Internet Connection
Begin by connecting the router to the internet connection using the device’s WAN port.
Many routers will automatically detect and configure the internet connection. If not, follow the ISP instructions for setting up the connection. This could include:
Configure the Router
Before setting up the network, some basic settings on the router need to be configured. Most important is to change the default administrator username and password. Default usernames and passwords are easily guessed or discovered by checking the device documentation. By changing the password, you protect the system from unauthorized access.
Enable NAT
Small networks use a single public IP address to connect to the internet. This IP address is shared by all devices on the private network. Network address translation (NAT) is a protocol that allows multiple computers to share a single public IP address used on the internet.
Secure the SOHO Network
Although the router should now be configured to connect hosts to the private network and provide internet access, the following steps should be taken to properly secure the network from external threats:
Create a Whitelist and Blacklist
When securing devices or navigation access, there are two options to create lists that either allow or deny access through the Firewall security:
Configure for a Network Environment
Depending on the implementation, it may be necessary to take the following steps in order to configure the SOHO router for a particular network environment:
If the SOHO router includes a wireless access point, or if a standalone wireless access point is being used, what are the configuration steps to configure and secure the wireless network?
Action
Description
Change the Default SSID
Many manufacturers use a default SSID that contains identifying information (such as device manufacturer and model number), so it is important to change the device’s SSID from the default. In addition to changing the default SSID, it is also possible to disable the SSID broadcast. This is known as SSID suppression or cloaking. With broadcasting disabled, the SSID needs to be manually entered into devices for them to connect to the network (the SSID will not show up in the list of available networks).
Even with the broadcast disabled, it’s relatively easy to identify the SSID of a network by using readily available applications. Because of this, SSID suppression should not be the only form of protection.
Configure the Wireless Protocol
If your access point supports multiple wireless protocols, select the protocols to support, such as 802.11n only or mixed mode (both 802.11n and 802.11g). Be aware that when using mixed mode, most access points will throttle all clients to the slowest connected protocol speeds (i.e. if a 802.11g client connects to the network, 802.11n clients will operate at 802.11g speeds).
Configure the Channel
The channel identifies the portion of the wireless frequency used by the access point and connected devices.
Configure Encryption and Authentication
Add authentication to allow only authorized devices to connect. Use encryption to protect wireless communications from eavesdropping.
Because WEP has several known security vulnerabilities and can be easily cracked, it should be used only as a last resort. When using WEP, never use shared key authentication; use only open authentication.
Enable MAC Address Filtering
By specifying which MAC addresses are allowed to connect to your network, you can prevent unauthorized devices from connecting to the access point. MAC address filtering can be implemented in one of two ways:
MAC address filtering is considered a cumbersome and weak form of security. Permitted MAC addresses can be very easily captured and spoofed by even casual attackers.
Disable DHCP for Wireless Clients
Disabling DHCP on the wireless access points allows only users with a valid, static IP address in the range to connect. An attacker would have to be able to discover or detect the IP address range, subnet mask, and default gateway information to connect to the access point.
Determine Best Access Point Placement
The location of the access point can affect signal strength and network access. Keep in mind the following recommendations:
Configure Wi-Fi Protected Setup (WPS)
The WPS security protocol makes it easier for WPS-enabled devices (e.g., a wireless printer) to connect to the wireless network. WPS can use several methods for connecting devices, including the PIN method and the push button method. The method used to connect devices must be supported by both the access point and the wireless device.
Because of the inherent security vulnerabilities with WPS, it is best to disable this feature on the access point.
Describe each network location profile and the situations in which they should be selected
Location
Description
Home Network
The Home network location is designed for use on networks where you know and trust each device on the network. With the Home network location:
Because this network location is the least secure, select this location only if you know all the devices and people that are connected to the network.
Work Network
The Work network location is designed to be used in a SOHO environment or other small business network. With the Work network location:
Public Network
The Public network location is designed for use on unknown or public networks (e.g., a coffee shop or other public Wi-Fi network). With the Public network location:
The Public network profile should be used when connecting to any unknown network location, such as a hotel’s Wi-Fi network.
Network
A network is a group of computers that can share information through their connections
A network is made up of what components?
A network is made up of the following components:
Protocols, rules or standards that describe how hosts communicate and exchange data
What do networks allow them to do that saves organizations money?
Despite the costs of implementation and maintenance, networks actually save organizations money by allowing them to:
Increase productivity and collaboration
Name 4 different network types and describe the classifications that fall under each.
Type
Classification
Description
Host Role
Peer-to-Peer
In a peer-to-peer network, each host can provide network resources to other hosts or access resources located on other hosts. Each host is in charge of controlling access to those resources. Advantages of peer-to-peer networks include the following:
Disadvantages of peer-to-peer networks include the following:
Client-Server
In a client-server network, hosts have specific roles. For example, some hosts are assigned server roles, which allow them to provide network resources to other hosts. Other hosts are assigned client roles, which allow them to consume network resources. Advantages of client-server networks include the following:
Disadvantages of client-server networks include the following:
Geography
Personal Area Network (PAN)
A personal area network is a very small network used for communication between personal devices. For example, a PAN may include a notebook computer, a wireless headset, a wireless printer, and a smartphone. A PAN is limited to a few feet in range. A PAN is typically created using Bluetooth wireless technologies.
Local Area Network (LAN)
A local area network is a network in a small geographic area, like an office. A LAN typically uses wires to connect systems together.
Wireless Local Area Network (WLAN)
A wireless LAN covers an area that is roughly the same size as a standard LAN. It uses radio signals to connect systems instead of wires.
Metropolitan Area Network (MAN)
A metropolitan area network is a network that covers an area as small as a few city blocks to as large as an entire metropolitan city. MANs are typically owned and managed by a city as a public utility. Be aware that many IT professionals do not differentiate between a wide area network and a MAN, as they use essentially the same network technologies.
Wide Area Network (WAN)
A wide area network is a group of LANs that are geographically isolated, but are connected to form a large internetwork.
Wireless Mesh Network (WMN)
A wireless mesh network (WMN) is a group of wireless mesh nodes that communicate with one another to share the network connection across a large area. They provide the ability to stream voice, data, and video between arbitrary pairs of devices. Each device in the WMN uses the others as relays to avoid the need for infrastructure.
Wireless Wide Area Network (WWAN)
A wireless wide area network (WWAN) covers a large geographical area by connecting separate areas wirelessly. WLAN and WWAN both connect to the internet wirelessly, but they use different technologies to do it. WWANs are often referred to as 3G, 4G, or LTE networks because they usually use cellular network technologies as connection types.
Management
Network
The term network often describes a computer system controlled by a single organization. This could be a local area network at a single location or a wide area network used by a single business or organization. If two companies connected their internal networks to share data, you could call it one network. In reality, however, it is two networks, because each network is managed by a different company.
Subnet
A subnet is a portion of a network with a common network address.
Internetwork
A network with geographically dispersed WAN connections that connect multiple LANs is often called an internetwork. Additionally, connecting two networks under different management is a form of internetworking because data must travel between two networks.
Participation
Internet
The internet is a large, world-wide, public network. The network is public because virtually anyone can connect to it, and users or organizations make services freely available on the internet.
Intranet
An intranet is a private network that uses internet technologies. Services on an intranet are only available to hosts that are connected to the private network. For example, your company might have a website that only employees can access.
Extranet
An extranet is a private network that uses internet technologies, but its resources are made available to external trusted users. For example, you might create a website on a private network that only users from a partner company can access.
Network-Attached Storage (NAS)
A NAS is a device that is optimized to provide a single service: file sharing. NAS devices range in price from several hundred to several thousand dollars. A NAS can be connected to a network and configured very easily. This makes them a great choice for most networks needing a file sharing service