Wireless Network Technology: Key Concepts and Security
Classified in Computers
Written at on English with a size of 3.85 KB.
1. Why Can IEEE 802.11 Transmit Further Than Bluetooth?
IEEE 802.11 (Wi-Fi) has a higher power output than Bluetooth.
2. Three Advantages of Wireless Over Wired Technology
- Anytime, anywhere connectivity
- Easy and inexpensive to install
- Ease of adding additional devices
3. Two Benefits of Wireless Networks Over Wired Networks
- Mobility
- Reduced installation time
4. Factors Affecting the Number of Access Points Needed
Three factors that affect the number of access points needed for wireless connectivity are:
- The size of the building
- The number of solid interior walls in the building
- The presence of microwave ovens in various offices
5. Why is Security Important in Wireless Networks?
Security is crucial because wireless networks broadcast data over a medium that allows easy access.
6. What Does the Wi-Fi Logo Indicate?
The Wi-Fi logo indicates that the device is interoperable with other devices that also carry the Wi-Fi logo.
7. Wireless Bridges
Wireless bridges connect two networks with a wireless link.
8. What is an STA?
In a WLAN, an STA is commonly referred to as a wireless client.
9. Ad-Hoc Wireless Networks
An ad-hoc wireless network is created by connecting wireless clients in a peer-to-peer network.
10. Mixed Network Option on a Linksys Router
The "mixed" network option on a Linksys integrated router means that the router supports 802.11b, 802.11g, and 802.11n devices.
11. SSID Broadcasting on a Linksys Router
On a Linksys wireless router, the configuration option that allows the presence of the access point to be known to nearby clients is SSID Broadcasting.
12. Service Set Identifier (SSID)
Two true statements about an SSID:
- It indicates the WLAN to which a device belongs.
- All wireless devices on the same WLAN must have the same SSID.
13. Wireless Network Security
Two statements that characterize wireless network security:
- With SSID broadcast disabled, an attacker must know the SSID to connect.
- Using the default IP address on an access point makes hacking easier.
14. Default Authentication Type for Access Points
The default authentication type for access points is Open.
15. Open Authentication
When open authentication is enabled on an access point, it does not require authentication.
16. Authentication Methods for Access Points
Two authentication methods that an access point could use are:
- EAP
- Pre-shared keys
17. Open Authentication vs. Pre-Shared Keys
Pre-shared keys require an encrypted secret word, while open authentication does not.
18. Wireless Data Encryption
The term that describes the encoding of wireless data to prevent unauthorized access is encryption.
19. Access Point Feature for Data Control
The access point feature that allows a network administrator to define what data can enter the wireless network is traffic filtering.
20. WEP Key Lengths
The two WEP key lengths are:
- 64-bit
- 128-bit
21. WEP and EAP in Wireless Networks
WEP is used to encrypt, and EAP is used to authenticate users on wireless networks.