Wireless Notes
Wireless Notes
Wireless Notes
com
Wireless notes
We know about wired (LAN) and wireless (WLANs) networks.Whats the main
difference between them ? Wired networks are connected to each other using
wires and here in wireless networks we don‟t use cables but we are using radio
waves to transmit out data
Unlike a wired network which operates at full-duplex (send and receive at the
same time), a wireless network operates at half-duplex(send or receive at a
time)We can get collisions if we use wireless networks but it’s rather hard to
detect whether there have been 2 wireless signals that bumped into each other
somewhere in the air.We know LAN use CSMA/CD (Carrier Sense Mutli
Access/Collision Detection).But here in wireless network its impossible to
detect collision if it happen.So wireless LAN use CSMA/CA ( Carrier Sense
Multi Access / Collision Avoidance).CSMA/CA Algorithmassign specific
time slots for each clients attached to the network.Wlans use RF (Radio
Frequency) waves to communicate.A WAP (wireless access point) broadcast
RF signals to air and clients use same frequency to communicate.
Shabeer Ibm http://SysnetNotes.blogspot.com
Below are the main three factors effecting our wireless networks
Reflection is when your wireless signal bounces off the material. Metal is a
very good
example of this. It‟s very hard to get your wireless signal through a metal
ceiling or elevator since the signal just bounces off. So now you know why you
cant get wi-fi in your elivator.right ?
Scattering means your wireless signal hits a surface and “breaks” apart in
multiple pieces leaving the original signal far weaker.
Absorption happens when material absorbs our wireless signal. Examples of
absorption are water and the human body…absorption is terrible for your
wireless signal since there‟s not much left after passing through this material!
What standards do we have? There‟s 802.11a, 802.11b, 802.11g and 802.11n.
What are
the differences? First let me show you this table:
Security of our data have to take care of well while using wireless
network.Its hard to protect data in in WLANs than Lan network.Basic
three security measures we use in WLANs are
If you hide your SSID its only disabled in the beacon. It‟s still in the probe
request andprobe response in clear-text ready to be sniffed by a wireless hacker.
WEP encryption is unsafe. WEP networks can be hacked in 5-10 minutes no
matter if you use a 64,128 or 256-bit key. The next protocol in line is WPA
(version 1). WPA uses the same encryption (RC4) as WEP but a lot has changed
to increase security. WEP uses static keys where WPA uses TKIP (Temporal
Key Integrity Protocol) as the input for RC4.Since WEP and WPA both use
RC4 encryption all old hardware that only supported WEP can be upgraded to
use WPA but not WPA 2. WPA 2 is completely redesigned. Instead of using the
RC4 encryption algorithm it works by using AES. AES is the most secure
encryption algorithm up-to-date.
Using a Preshared key is easy but you don‟t have any control. You don‟t know
who has your key and it‟s easy to share it. It‟s also being saved in clear-text in
your Windows registry. If you have a strong Preshared key it‟s impossible to
break it
The most secure method is by using 802.1X also known as port-based control.
This is something you can do for wireless but also for wired networks. The idea
behind it is that users need to authenticate themselves before they get any access
to the network. You don‟t even receive an IP address from the DHCP
server…the only thing you are allowed to do is send authentication information.
Basic Terminologies
WiMAX : Worldwide Interoperability for Microwave Access (WiMax) is
defined by the WiMax forum and standardized by the IEEE 802.16 suite.
The most current standard is 802.16e.
Basic Service Set (BSS) : A group of stations that share an access point are
said to be part of one BSS.
Extended Service Set (ESS) : Some WLANs are large enough to require
multiple access points. A group of access points connected to the same
WLAN are known as an ESS. Within an ESS, a client can associate with
any one of many access points that use the same Extended service set
identifier (ESSID). That allows users to roam about an office without losing
wireless connection.
Temporary Key Integrity Protocol (TKIP) is a short-term solution that
fixes all WEP weaknesses.
Counter Mode with CBC-MAC Protocol (CCMP) is a new protocol . It
uses AES as its cryptographic algorithm, and, since this is more CPU
intensive thanRC4 (used in WEP and TKIP)
802.1X : Port-Based Network Access Control
WAP : Wireless Access Points
AES : AES stands for Advanced Encryption Standard and is a totally
separate cipher system. It is a 128-bit, 192-bit, or 256-bit block cipher and
is considered the gold standard of encryption systems today. Used in WPA2
Shabeer Ibm http://SysnetNotes.blogspot.com
Make sure that you have prepared the answers for the below questions
before your interview
What is Wi-Fi?
What is a Wi Fi Hotspot?
What is IBSS,BSS and ESS ?
Why WPA encryption is preferred over WEP?
What is 802.1x and EAP ?
Name two devices can interfere with the operation of a wireless network
because they operate on similar frequencies?
What are three basic parameters to configure on a wireless access point?
What is the maximum data rate specified for IEEE 802.11b WLANs?
Which encryption type does WPA2 uses ?
When two laptops directly directed wirelessly,what type of topology has
been created ?
Which Spread spectrum technology does the 802.11b standard define for
operation ?
which two wireless encryption method are based on RC4 encryption
algorithm ?
which is the minimum parameter need on the access point inorder to allow a
wireless client to operate on it ?
What is the frequency range of the IEEE 802.11g standard?
What is the maximum data rate for the 802.11a standard?
What is the maximum data rate for the 802.11g standard?