What does CSMA/CA stand for?
Carrier Sense Multiple Access with Collision Avoidance
It is a wireless protocol used to manage how devices communicate over a network.
In CSMA/CA, what must the channel be before a device can send a message?
Idle
This means that there is no other communication taking place on the channel.
What is the first step in the CSMA/CA process?
Listen to the frequency band
This step checks for the presence of any other signals before sending a message.
What happens if a device detects an existing transmission on the channel in CSMA/CA?
Wait for a random amount of time
This is part of the collision avoidance strategy.
What must the sender receive after transmitting data in CSMA/CA?
Acknowledgement message
This verifies that the data was received successfully.
What is the hidden node problem in wireless networks?
Interference with data transmission due to devices being out of range of each other’s broadcasts
This can lead to data collisions when multiple devices send data simultaneously.
What are the two optional methods used to alleviate the hidden node problem?
These methods help manage communication and reduce collisions but may introduce additional overhead.
What is sent after determining the channel is idle in the RTS/CTS method?
Request to Send (RTS)
This signal indicates that a device wants to send data.
What does the device send back in response to an RTS signal?
Clear to Send (CTS)
This reply allows the original sender to transmit its message without interference.
In the RTS/CTS process, what happens if a CTS is not received?
The sender does not transmit data
This ensures that the channel remains clear for the intended transmission.
What is the purpose of WiFi?
To enable wireless communication between devices using radio waves
WiFi revolutionised interconnecting devices without dedicated cabling.
What are the two most common frequencies for WiFi radio signals?
Each frequency has different speed capabilities and coverage ranges.
What is a wireless access point (WAP)?
A device that allows devices to connect to a WiFi network
WAPs typically connect to the internet via a cabled connection.
What happens when a WiFi channel becomes crowded?
Network speed slows down
The router can be set to another channel to alleviate the issue.
What is the primary security concern with WiFi networks?
Data can be intercepted by eavesdroppers
This is due to the nature of radio wave transmission.
What does encryption do in a WiFi network?
Scrambles data to make it unreadable to unintended recipients
This is a key security measure for protecting data.
What are the three main types of WiFi encryption?
Each type offers varying levels of security.
What does WEP stand for?
Wired Equivalent Privacy
WEP was designed to provide security comparable to wired networks.
What is a key feature of WPA compared to WEP?
Introduces key management with a new encryption key for each data packet
This enhances security against potential intruders.
What is the improvement of WPA2 over WPA?
Provides an even stronger encryption algorithm
Each message is encrypted several times based on key size.
What is a Service Set Identifier (SSID)?
A string of alphanumeric characters used to differentiate wireless networks
SSIDs are case sensitive and can include spaces and underscores.
True or false: An SSID is always broadcast for all to see.
TRUE
However, SSIDs can be hidden for added security, though this is not foolproof.
What is a limitation of wired networks compared to WiFi?
Limited by the length of cable used
Ethernet is often restricted to cable runs of 100m due to interference.
What is one benefit of WiFi over wired connections?
Allows devices to be moved wherever is convenient
This flexibility enhances network usability.