Awt Exam
Awt Exam
Awt Exam
- USE “COUNTDOWN TIMERS” that require them to wait for periods of time
Chap 4
IEEE 802.11i introduced what is known as the Robust Secure Network (RSN)
- The RSN must support Counter mode with Cipher-block chaining Message Authentication
code Protocol (CCMP)
- It also may support Temporal Key Integrity Protocol (TKIP)
• A dynamic rekeying mechanism to change encryption and integrity keys
• Message Integrity Check (MIC) to prevent forgery attacks
• Allowing backward compatibility with WEP
• Configuring a wireless network to use TKIP is usually a straightforward process, using
a web or command-line interface
Importance:
Limited Range: IBSS networks typically have a limited range since devices
need to be in close proximity to each other for communication.
Advantages:
Importance:
Managed and Controlled: BSS allows for better network management and
control by centralizing communication through the AP. This mode is ideal for
larger networks where devices need to connect to a centralized network
infrastructure.
Implementation:
1. Centralized Control: BSS networks offer centralized control through a central access
point (AP). This allows for better network management, security, and configuration.
2. Better Range: BSS networks generally provide better range and coverage compared
to IBSS, making them suitable for larger areas and more devices.
3. Improved Security: Centralized control in a BSS allows for stronger security
enforcement, including the use of encryption and authentication protocols.
Importance:
Implementation:
Multiple BSSs: An ESS consists of multiple BSSs, each with its own AP. These
BSSs share the same SSID and security settings, allowing devices to roam
between them seamlessly.
Common SSID: All BSSs within an ESS should have the same SSID and
security configuration to enable seamless roaming.
Advantages:
Importance:
Simplicity: Autonomous APs are standalone devices that operate independently without the
need for a central controller. They are easy to set up and manage, making them suitable for
small-scale deployments and locations with minimal IT support.
Differences:
Centralized Control: Autonomous APs lack centralized control and management. Each AP is
configured individually, making it more challenging to enforce consistent network policies
and security settings.
Limited Scalability: Managing a large number of Autonomous APs can become cumbersome,
as each AP must be configured and monitored separately.
Basic Features: Autonomous APs offer basic wireless connectivity and security features, such
as WPA/WPA2 encryption and SSID broadcasting.
Importance:
Scalability: They are suitable for larger and more complex deployments, where the ability to
scale and manage numerous APs efficiently is critical.
Differences:
Central Controller: Lightweight APs rely on a central controller for configuration, policy
enforcement, and coordination. This centralized approach simplifies network management
and enables consistent settings across all APs.
Advanced Features: Controller-based APs often support advanced features such as seamless
roaming, load balancing, and intrusion detection, enhancing network performance and
security.
Cost: Implementing a controller-based solution typically involves higher initial hardware and
licensing costs for the central controller but can be cost-effective for large-scale
deployments in the long run.
Importance:
Cooperative APs combine some elements of autonomous and controller-based APs, offering
a compromise between flexibility and centralized control.
They are used in networks where centralized control is desired but without the dependency
on a dedicated controller appliance.
Differences:
Centralized Control (Partial): Cooperative APs have some level of centralized control
through cooperative protocols, where neighboring APs collaborate to provide features like
seamless roaming and load balancing.
Hybrid Approach: These APs provide a balance between autonomous and controller-based
models, offering a level of flexibility while still benefiting from certain centralized
management capabilities.
Cost-Efficiency: Cooperative APs often have a lower initial cost compared to fully controller-
based solutions, making them attractive for mid-sized deployments that require some
centralized features but don't want to invest heavily in a dedicated controller.
ESS mode operation in Wireless LANs is typically used in scenarios where you need to extend the
coverage area of your wireless network beyond the reach of a single Access Point (AP). Here are
situations where ESS mode is advantageous:
1. Large Coverage Areas: ESS mode is essential when you need to cover a large physical area,
such as a campus, office building, or warehouse. A single Basic Service Set (BSS) provided by
a single AP may not provide sufficient coverage.
2. Seamless Roaming: ESS mode allows for seamless roaming as users move from one area to
another within the extended coverage. This is critical for organizations where users need to
maintain network connectivity while moving around.
3. Scalability: As the organization grows, it's easier to scale the wireless network by adding
more Access Points to the ESS. This approach ensures that additional users and devices can
be accommodated without major network redesign.
4. Redundancy: ESS networks can be designed with redundancy in mind. Multiple Access
Points can be strategically placed to ensure that if one AP fails, others can take over,
minimizing network downtime.
In ESS mode, multiple Basic Service Sets (BSSs) are interconnected to create a single logical network.
Here's how it works:
Each Access Point (AP) within the ESS has its own BSS with a unique BSSID (Basic Service Set
Identifier) but shares the same SSID (Service Set Identifier). This allows devices to see and
connect to the same network as they move through the coverage area.
The APs within the ESS communicate with each other through a distribution system, often a
wired Ethernet network. This allows devices to roam between APs while maintaining
network connectivity.
The ESS can provide a seamless and consistent wireless experience for users, as they can
move from one AP's coverage area to another without needing to reconnect manually.
Why Lightweight or Controller-Based Access Points Are Preferred for Large Organizations:
Large organizations often prefer lightweight or controller-based Access Points (APs) over
autonomous APs for several reasons:
2. Scalability: Controller-based APs are highly scalable. Adding new APs to the network is
streamlined, and configurations can be pushed out to all APs simultaneously, making it
easier to expand the network as the organization grows.
3. Advanced Features: Controller-based APs often support advanced features like seamless
roaming, load balancing, and quality of service (QoS). These features enhance network
performance, reliability, and user experience, which are crucial for large organizations with
high demands on their networks.
5. Monitoring and Reporting: Controller-based solutions typically offer better visibility into the
network, including real-time monitoring and reporting, which is essential for troubleshooting
and ensuring network health.
2. Antenna:
Functionality: The antenna is responsible for radiating the RF signal into space
during transmission and capturing RF signals from the space during reception. Its
functions include:
Importance: Antennas play a crucial role in ensuring that RF signals are efficiently
transmitted and received over the desired coverage area.
3. Receiver:
Signal Reception: The receiver captures the RF signal from the antenna and
converts it into an electrical signal.
Reducing Interference: Using the same polarization for both the transmitting and receiving
antennas helps reduce interference from other signals with different polarizations,
improving signal quality.
Dipole Antenna: Simple and widely used. Omnidirectional radiation pattern. Used in
applications like Wi-Fi routers.
Yagi-Uda Antenna: Directional antenna with high gain. Common for TV reception and point-
to-point communication.
Patch Antenna: Compact and flat design, often used in wireless communication devices.
Typically has a directional radiation pattern.
Parabolic Dish Antenna: Highly directional with very high gain. Used in long-distance
communication and satellite reception.
Frequency-Hopping Spread Spectrum (FHSS): In FHSS, the transmitter and receiver rapidly
switch between multiple frequencies within a specified frequency band. This hopping
pattern is synchronized between the sender and receiver. FHSS is resistant to narrowband
interference and offers some level of security due to frequency agility.
Direct-Sequence Spread Spectrum (DSSS): DSSS spreads the signal across a wider bandwidth
by modulating the data with a spreading code. The receiver uses the same code to
demodulate the signal, effectively reducing the impact of interference. DSSS provides better
data integrity and can recover from interference.
Efficient Spectrum Use: OFDM efficiently uses the available spectrum, allowing high
data rates without excessive interference.
Implementation: OFDM splits the data into multiple parallel streams, modulates each
stream separately, and combines them for transmission. It's commonly used in Wi-Fi and
4G/5G cellular networks.
Increasing Data Rates: MIMO improves data rates by transmitting multiple data
streams simultaneously on different spatial channels.
Enhancing Signal Reliability: MIMO can mitigate signal fading and interference,
improving signal reliability in challenging environments.
Implementation: MIMO systems utilize smart algorithms to process and transmit multiple
streams of data over the air. This technology is prevalent in modern Wi-Fi routers and
cellular networks, improving overall wireless performance.
1. Enhancements in TKIP for WPA Certification:
Temporal Key Integrity Protocol (TKIP) was introduced as part of the Wi-Fi Protected Access (WPA)
certification to address vulnerabilities found in the original Wired Equivalent Privacy (WEP) protocol.
Key enhancements in TKIP include:
Dynamic Encryption Keys: TKIP uses dynamic keys, making it significantly more secure than
WEP's static keys. TKIP automatically generates a new encryption key for each packet,
preventing the reuse of keys.
Key Mixing: TKIP combines the static WEP key with the sender's MAC address and a packet
sequence number to create unique per-packet keys. This ensures that even if an attacker
captures multiple packets, they cannot decrypt future packets.
Message Integrity Check (MIC): TKIP includes a MIC in each packet to detect any tampering
or modification of data during transmission. If a packet is altered, the MIC will fail, and the
packet is discarded.
Rekeying: TKIP enforces key rekeying, changing the encryption keys periodically to reduce
the window of opportunity for attackers.
WPA-PSK: WPA introduced a Pre-Shared Key (PSK) mode, simplifying key management for
home and small office users.
Client Authentication: When a wireless client attempts to connect to a WLAN, the access
point (AP) requests authentication credentials from the client.
EAP Framework: EAP provides a framework for various authentication methods, such as
EAP-TLS, EAP-PEAP, or EAP-TTLS. The client and authentication server agree on an EAP
method to use.
Secure Exchange: The client and authentication server engage in a secure exchange of
authentication information. This often includes digital certificates, username/password
combinations, or other credentials.
Session Key Generation: Once authenticated, a session key is generated, which is used to
encrypt and protect data transmitted between the client and the WLAN.
Dynamic User Authentication: 802.1x/EAP allows for dynamic user authentication, ensuring
that only authorized users with valid credentials can access the network. It also provides a
more secure authentication process than shared keys (e.g., WEP keys).
Layer 1 (Physical Layer) Audit: The purpose of a Layer 1 audit is to assess the physical
aspects of the WLAN infrastructure, including:
Layer 2 (Data Link Layer) Audit: The Layer 2 audit focuses on data link layer components,
including: