Cluster 6
Cluster 6
Wireless Personal-Area Networks (WPAN) - Uses low powered transmitters for a short-
range network, usually 20 to 30 ft. (6 to 9 meters). Bluetooth and ZigBee based devices are
commonly used in WPANs. WPANs are based on the 802.15 standard and a 2.4-GHz radio
frequency.
Wireless MANs (WMAN) - Uses transmitters to provide wireless service over a larger
geographic area. WMANs are suitable for providing wireless access to a metropolitan city
or specific district. Wireless Metropolitan Area Network (WMAN) technology based on
the IEEE 802.16 set of standards. It is deployed in a variety of spectrum bands: 2.3GHz,
2.5GHz, 3.5GHz, and 5.8GHz.
2. Based on the distance coverage, what are the various types of wireless networks
available?
Ans:
Same as above
Compiled by KVS
backward compatible with 802.11b with reduced bandwidth
capacity
802.11n 2.4 GHz 5 data rates range from 150 Mbps to 600 Mbps with a distance
GHz range of up to 70 m (230 feet)
APs and wireless clients require multiple antennas using
MIMO technology
backward compatible with 802.11a/b/g devices with limiting
data rates
802.11ac 5 GHz provides data rates ranging from 450 Mbps to 1.3 Gbps (1300
Mbps) using MIMO technology
Up to eight antennas can be supported
backwards compatible with 802.11a/n devices with limiting
data rates
802.11ax 2.4 GHz 5 latest standard released in 2019
GHz also known as Wi-Fi 6 or High-Efficiency Wireless (HEW)
provides improved power efficiency, higher data rates,
increased capacity, and handles many connected devices
currently operates using 2.4 GHz and 5 GHz but will use 1
GHz and 7 GHz when those frequencies become available
Search the internet for Wi-Fi Generation 6 for more
information
4. Give the list of different 802.11 wireless LAN standards along with their data rates.
Ans:
Same as above
5. Explain autonomous and controller-based access points with the help of a neat
diagram.
Ans:
Autonomous Aps:
Compiled by KVS
These are standalone devices configured using a command line interface or a GUI, as
shown in the figure. Autonomous APs are useful in situations where only a couple of APs
are required in the organization. A home router is an example of an autonomous AP because
the entire AP configuration resides on the device. If the wireless demands increase, more
APs would be required. Each AP would operate independent of other APs and each AP
would require manual configuration and management. This would become overwhelming
if many APs were needed.
Controller-based APs
These devices require no initial configuration and are often called lightweight APs (LAPs).
LAPs use the Lightweight Access Point Protocol (LWAPP) to communicate with a WLAN
controller (WLC), as shown in the next figure. Controller-based APs are useful in situations
where many APs are required in the network. As more APs are added, each AP is
automatically configured and managed by the WLC.
Notice in the figure that the WLC has four ports connected to the switching infrastructure.
These four ports are configured as a link aggregation group (LAG) to bundle them together.
Much like how EtherChannel operates, LAG provides redundancy and load-balancing. All
the ports on the switch that are connected to the WLC need to be trunking and configured
with EtherChannel on. However, LAG does not operate exactly like EtherChannel. The
WLC does not support Port Aggregation Protocol (PaGP) or Link Aggregation Control
Protocol (LACP).
Compiled by KVS
Infrastructure mode defines two topology building blocks: A Basic Service Set (BSS) and
an Extended Service Set (ESS).
A BSS consists of a single AP interconnecting all associated wireless clients. Two BSSs
are shown in the figure. The circles depict the coverage area for the BSS, which is called
the Basic Service Area (BSA). If a wireless client moves out of its BSA, it can no longer
directly communicate with other wireless clients within the BSA.
The Layer 2 MAC address of the AP is used to uniquely identify each BSS, which is called
the Basic Service Set Identifier (BSSID). Therefore, the BSSID is the formal name of the
BSS and is always associated with only one AP.
Compiled by KVS
When a single BSS provides insufficient coverage, two or more BSSs can be joined through
a common distribution system (DS) into an ESS. An ESS is the union of two or more BSSs
interconnected by a wired DS. Each ESS is identified by a SSID and each BSS is identified
by its BSSID.
Wireless clients in one BSA can now communicate with wireless clients in another BSA
within the same ESS. Roaming mobile wireless clients may move from one BSA to another
(within the same ESS) and seamlessly connect.
The rectangular area in the figure depicts the coverage area within which members of an
ESS may communicate. This area is called the Extended Service Area (ESA).
8. Discuss about BSS and ESS in wireless networks with a neat diagram.
Ans:
Same as above
9. Explain the CSMA/CA protocol.
Ans:
WLANs are half-duplex, shared media configurations. Half-duplex means that only one
client can transmit or receive at any given moment. Shared media means that wireless
clients can all transmit and receive on the same radio channel. This creates a problem
because a wireless client cannot hear while it is sending, which makes it impossible to
detect a collision.
To resolve this problem, WLANs use carrier sense multiple access with collision avoidance
(CSMA/CA) as the method to determine how and when to send data on the network. A
wireless client does the following:
1. Listens to the channel to see if it is idle, which means that is senses no other traffic
is currently on the channel. The channel is also called the carrier.
2. Sends a request to send (RTS) message to the AP to request dedicated access to the
network.
3. Receives a clear to send (CTS) message from the AP granting access to send.
4. If the wireless client does not receive a CTS message, it waits a random amount of
time before restarting the process.
5. After it receives the CTS, it transmits the data.
6. All transmissions are acknowledged. If a wireless client does not receive an
acknowledgment, it assumes a collision occurred and restarts the process.
Compiled by KVS
Recovery CSMA/CA minimizes the risk CSMA/CD reduces the recovery time.
Time of collision.
Conflict CSMA/CA initially transmits CSMA/CD resends the data frame in
Management the intent to send the data. case a conflict occurs during
Once an acknowledgment is transmission.
received, the sender sends the
data.
IEEE CSMA/CA is part of the IEEE CSMA/CD is part of the IEEE 802.3
Standards 802.11 standard. standard.
Efficiency CSMA/CA is similar in CSMA/CD is more efficient than
efficiency as CSMA. CSMA.
Recovery It reduces the possibility of a It cuts down the recovery time
time collision.
11. Explain about passive and active discover modes in access points.
Ans:
Wireless devices must discover and connect to an AP or wireless router. Wireless clients
connect to the AP using a scanning (probing) process. This process can be passive or active.
Passive Mode:
In passive mode, the AP openly advertises its service by periodically sending broadcast
beacon frames containing the Service Set IDentifier (SSID), supported standards, and
security settings. The primary purpose of the beacon is to allow wireless clients to learn
which networks and APs are available in a given area. This allows the wireless clients to
choose which network and AP to use.
Active Mode:
In active mode, wireless clients must know the name of the SSID. The wireless client
initiates the process by broadcasting a probe request frame on multiple channels. The probe
request includes the SSID name and standards supported. APs configured with the SSID
will send a probe response that includes the SSID, supported standards, and security
Compiled by KVS
settings. Active mode may be required if an AP or wireless router is configured to not
broadcast beacon frames.
12. List and describe the discover modes in wireless access points.
Ans:
Same as above
13. How is an association established between a wireless client and the Access Point? To
achieve successful association, a wireless client and an AP must agree on specific
parameters, what are they?
Ans:
For wireless devices to communicate over a network, they must first associate with an AP
or wireless router.
Wireless devices complete the following three stage process:
1. Discover a wireless AP
2. Authenticate with the AP
3. Associate with the AP
Compiled by KVS
• Password – This is required for the client to authenticate to the AP.
• Network mode – The 802.11 standard in use.
• Security mode – The security parameter settings, i.e. WEP, WPA, or WPA2.
• Channel settings – The frequency bands in use.
14. Define FlexConnect AP. Describe the two modes of operation for the FlexConnect AP.
Ans:
FlexConnect enables the configuration and control of APs over a WAN link.
Standalone mode – The WLC is unreachable. The FlexConnect AP has lost CAPWAP
connectivity with the WLC. The FlexConnect AP can assume some of the WLC functions
such as switching client data traffic locally and performing client authentication locally.
15. Discuss about CAPWAP and clearly identify the AP MAC functions and WLC MAC
functions.
Ans:
• Control and Provisioning of Wireless Access Points (CAPWAP) is an IEEE
standard protocol that enables a WLC to manage multiple APs and WLANs.
• Based on Light Weight Access Point Protocol (LWAPP) but adds additional
security with Datagram Transport Layer Security (DLTS).
• Encapsulates and forwards WLAN client traffic between an AP and a WLC over
tunnels using UDP ports 5246 and 5247.
• Operates over both IPv4 and IPv6. IPv4 uses IP protocol 17 and IPv6 uses IP
protocol 136.
Compiled by KVS
The CAPWAP split MAC concept does all the functions normally performed by
individual APs and distributes them between two functional components:
• AP MAC Functions
• WLC MAC Functions
AP MAC Functions WLC MAC Functions
Beacons and probe responses Authentication
Packet acknowledgements and Association and re-association of roaming
retransmissions clients
Frame queueing and packet Frame translation to other protocols
prioritization
MAC layer data encryption and Termination of 802.11 traffic on a wired
decryption interface
• Datagram Transport Layer Security (DTLS) provides security between the AP and
the WLC.
Compiled by KVS
• It is enabled by default to secure the Control and Provisioning of Wireless Access
Points (CAPWAP) control channel and encrypt all management and control traffic
between AP and WLC.
• Data encryption is disabled by default and requires a DTLS license to be installed
on the WLC before it can be enabled on the AP.
4 Marks Questions
1. List and state the purpose of wireless standard organizations.
Ans:
Three International organizations influencing WLAN standards. They are:
Wi-Fi Alliance
– Promotes the growth and acceptance of WLANs. It is an association of vendors
whose objective is to improve the interoperability of products that are based on the
802.11 standard
Compiled by KVS
Omnidirectional
– Provide 360-degree coverage. Ideal in houses and office areas.
Directional
– Focus the radio signal in a specific direction. Examples are the Yagi-Uda and
parabolic dish.
Multiple Input Multiple Output (MIMO)
– Uses multiple antennas (Up to eight) to increase bandwidth.
Compiled by KVS
The 802.11 frame format is similar to the Ethernet frame format, except that it contains
more fields.
All 802.11 wireless frames contain the following fields:
Frame Control - This identifies the type of wireless frame and contains subfields for
protocol version, frame type, address type, power management, and security settings.
Duration - This is typically used to indicate the remaining duration needed to receive the
next frame transmission.
From a wireless device:
• Address 1 Receiver Address - MAC address of the AP.
• Address 2 Transmitter Address - MAC address of the sender.
• Address 3 SA/DA/BSSID - MAC address of the destination which could be a
wireless device or wired device.
From the AP:
• Address 1 Receiver Address - MAC address of the sender.
• Address 2 Transmitter Address - MAC address of the AP.
• Address 3 SA/DA/BSSID - MAC address of the wireless destination.
• Sequence Control - This contains information to control sequencing and
fragmented frames.
• Address4 - This usually missing because it is used only in ad hoc mode.
• Payload - This contains the data for transmission.
• FCS - This is used for Layer 2 error control.
9. On what factors does the number of users supported by a WLAN depends on?
Ans:
The number of users supported by a WLAN depends on the following:
• The geographical layout of the facility
• The number of bodies and devices that can fit in a space
• The data rates users expect
• The use of non-overlapping channels by multiple APs and transmit power settings
When planning the location of APs, the approximate circular coverage area is important.
10. With the help of a diagram, show an example for non-overlapping channels in wireless
frequencies.
Ans:
A best practice for WLANs requiring multiple APs is to use non-overlapping channels. For
example, the 802.11b/g/n standards operate in the 2.4 GHz to 2.5 GHz spectrum. The 2.4
GHz band is subdivided into multiple channels. Each channel is allotted 22 MHz bandwidth
and is separated from the next channel by 5 MHz. The 802.11b standard identifies 11
channels for North America, as shown in the figure (13 in Europe and 14 in Japan).
Compiled by KVS
Interference occurs when one signal overlaps a channel reserved for another signal,
causing possible distortion. The best practice for 2.4 GHz WLANs that require multiple
APs is to use non-overlapping channels, although most modern APs will do this
automatically. If there are three adjacent APs, use channels 1, 6, and 11, as shown in
the figure.
11. Define channel saturation. Which modulation techniques can help to mitigate channel
saturation?
Ans:
If the demand for a specific wireless channel is too high, the channel may become
oversaturated, degrading the quality of the communication.
Channel saturation can be mitigated using techniques that use the channels more efficiently.
• Direct-Sequence Spread Spectrum (DSSS) - A modulation technique designed to
spread a signal over a larger frequency band. Used by 802.11b devices to avoid
interference from other devices using the same 2.4 GHz frequency.
• Frequency-Hopping Spread Spectrum (FHSS) - Transmits radio signals by
rapidly switching a carrier signal among many frequency channels. Sender and
receiver must be synchronized to “know” which channel to jump to. Used by the
original 802.11 standard.
Compiled by KVS
• Orthogonal Frequency-Division Multiplexing (OFDM) - A subset of frequency
division multiplexing in which a single channel uses multiple sub-channels on
adjacent frequencies. OFDM is used by a number of communication systems
including 802.11a/g/n/ac.
Or
Wireless networks are susceptible to various security threats, and the four major types of
wireless threats are:
1. Interception of Data: Wireless communications can be intercepted by unauthorized
individuals using techniques like eavesdropping. This means that sensitive data
transmitted over the wireless network, such as login credentials or confidential files,
can be captured by malicious actors.
2. Wireless Intruders: Unauthorized users may gain access to the wireless network,
either by cracking encryption keys or exploiting vulnerabilities. Once inside, they can
snoop on network traffic, launch attacks, or compromise the security of the network.
3. Denial of Service (DoS) Attacks: Attackers can flood a wireless network with an
overwhelming amount of traffic, rendering it unusable for legitimate users. This
disrupts network operations and can lead to significant downtime.
Compiled by KVS
4. Rogue Access Points: Unauthorized access points (APs) set up by employees or
malicious actors can pose a threat to network security. These rogue APs may have weak
or no security measures, creating an entry point for attackers.
16. Define wireless DoS attacks and how can you mitigate it.
Ans:
The attacks which are directed at disabling the service (making the target not available) or
degrading its performance (lowering the availability) lands under the umbrella of Denial of
Service (DoS) attacks.
Monitor the WLAN for any accidental interference problems and address them as they
appear. Because the 2.4 GHz band is used by other devices types, the 5 GHz should be used
in areas prone to interference.
2 Marks Questions
1. Identify the benefits of WLAN.
Ans:
Benefits of WLAN ate:
• A Wireless LAN (WLAN) is a type of wireless network that is commonly used in
homes, offices, and campus environments.
• WLANs make mobility possible within the home and business environments.
• WLAN are often useful in disasters situation e.g. earthquake and fire. A wireless
network can connect people in any disaster
• Wireless infrastructures adapt to rapidly changing needs and technologies.
• It’s a reliable sort of communication.
• As WLAN reduces physical wires so it’s a versatile way of communication.
Compiled by KVS
• WLAN also reduces the value of ownership.
Compiled by KVS
7. Where is SSID Cloaking used?
Ans:
It is used to address the threats of keeping wireless intruders out and protecting data.
Many organizations use SSID cloaking as a mechanism to add a layer of security to the
WLAN. This technique requires that all users have knowledge of the SSID to connect to
the wireless network.
SSID Cloaking:
• APs and some wireless routers allow the SSID beacon frame to be disabled.
• Wireless clients must be manually configured with the SSID to connect to the
network.
Compiled by KVS
03. It provides wireless security It provides wireless security through the
through the use of an encryption use of a password.
key.
04. The original 802.11 specification A Wi-Fi Alliance standard that uses
designed to secure the data using WEP but secures the data with the much
the Rivest Cipher 4 (RC4) stronger Temporal Key Integrity
encryption method with a static Protocol (TKIP) encryption algorithm.
key. WEP is no longer TKIP changes the key for each packet,
recommended and should never be making it much more difficult to hack.
used.
05. It uses 40 bit key and 24 bit random WPA key is 256 bit key.
number.
06. Key management is not provided in Key management is provided through 4
WEP. way handshaking mechanism.
11. List the four shared key authentication techniques available in Wi-Fi networks.
Ans:
Four shared key authentication Techniques available in Wi-Fi networks are:
• Wired Equivalent Privacy (WEP)
• Wi-Fi Protected Access (WPA)
• WPA2
• WPA3
Personal - Intended for home or small office networks, users authenticate using a pre-
shared key (PSK). Wireless clients authenticate with the wireless router using a pre-shared
password. No special authentication server is required.
Enterprise - Intended for enterprise networks but requires a Remote Authentication Dial-
In User Service (RADIUS) authentication server. Although more complicated to set up, it
provides additional security.
13. WPA and WPA2 include two encryption protocols. Identify them.
Ans:
WPA: It includes Temporal Key Integrity Protocol (TKIP) encryption algorithm
WPA2: It includes Advanced Encryption Standard (AES) for encryption.
14. Give the abbreviations for the following: WEP, WPA, TKIP, AES
Ans:
WEP: Wired Equivalent Privacy
WPA: Wi-Fi Protected Access
TKIP: Temporal Key Integrity Protocol
AES: Advanced Encryption Standard
Compiled by KVS
15. List the four features provided by WPA3.
Ans:
Four new features in WPA3 are designed to improve on WPA2.
They are:
More secure handshake
– Simultaneous Authentication of Equals (SAE) protocol (aka the Dragonfly
handshake)
Replacement of wi-fi protected setup (WPS)
– a simpler way to securely add new devices to a network using the Wi-Fi Device
Provisioning Protocol (DPP), which allows you to securely add new devices to a
network using a QR code or a password.
Unauthenticated encryption
– Better protection when using public hotspots using Wi-Fi Enhanced Open which
provides unauthenticated encryption, a standard called Opportunistic Wireless
Encryption (OWE).
Bigger session key sizes
– WPA3-Enterprise will support key sizes the equivalent of 192-bit security during
the authentication stage, which will be harder to crack.
Typically, the wireless router is assigned a publicly routable address by the ISP and uses a
private network address for addressing on the LAN.
• To allow hosts on the LAN to communicate with the outside world, the router will
use a process called Network Address Translation (NAT).
• NAT translates a private (local) source IPv4 address to a public (global) address
(the process is reversed for incoming packets).
• NAT makes sharing one public IPv4 address possible by tracking the source port
numbers for every session established by a device.
Compiled by KVS