Wireless Networks

studied byStudied by 2 people
0.0(0)
get a hint
hint

Wireless Networks

1 / 97

Tags and Description

CompTIA+ Network Learning

98 Terms

1

Wireless Networks

Networks that extend the physical network into the wireless domain, allowing users to connect and access the internet wirelessly.

New cards
2

WLANs

Stands for Wireless Local Area Networks, which are wireless networks that cover a specific area, such as a campus, building, or outdoor space.

New cards
3

802.11 or WiFi

The standard for wireless networking, which includes various standards such as 802.11a, b, g, n, ac, and ax.

New cards
4

Ad-Hoc Mode

A wireless network configuration where devices communicate directly with each other without the need for a centralized access point.

New cards
5

Infrastructure Mode

A wireless network configuration where devices communicate through a centralized access point or router, resembling a star topology.

New cards
6

Wireless Access Point (WAP)

A device used to extend a wired network into the wireless domain, allowing wireless devices to connect to the network.

New cards
7

Wireless Router

A combination device that acts as a wireless access point and a router, providing gateway and base station functions for wireless networks.

New cards
8

Ad Hoc Mode (IBSS)

A wireless network configuration where devices form an independent basic service set, communicating in a peer-to-peer manner without access to the internet or local area network.

New cards
9

Basic Service Set (BSS)

A wireless network configuration where devices connect to a wireless access point, enabling access to the internet and local area network.

New cards
10

Extended Service Set (ESS)

A wireless network configuration where multiple access points work together to provide coverage over a larger area, allowing seamless connectivity throughout the network.

New cards
11

Extended Service Set (ESS)

A network configuration that uses multiple access points to provide good coverage across a large area, such as a building or college campus.

New cards
12

Mesh Topology

A network configuration that combines multiple wireless technologies, such as microwave, cellular, and Wi-Fi, to create a single coherent network.

New cards
13

Access Point Placement

The careful planning and placement of access points in order to ensure proper coverage and avoid interference in a wireless network.

New cards
14

Channel Overlapping

The practice of ensuring that adjacent access points in a wireless network do not use the same channel frequency to prevent interference and signal drops.

New cards
15

Heat Map

A visual representation of wireless coverage areas in a building or area, showing areas of strong and weak signal strength.

New cards
16

Range Extender

A device that amplifies and extends the reach of a wireless signal, allowing for increased coverage in areas with distance limitations.

New cards
17

Antenna Selection

The process of choosing the appropriate antenna for a wireless network based on factors such as coverage distance, coverage pattern, and environmental conditions.

New cards
18

Omnidirectional Antenna

A type of antenna that radiates power equally in all directions, providing coverage in a 360-degree pattern.

New cards
19

Omnidirectional antenna

An antenna that radiates and receives signals in all directions, providing full coverage to a specific area.

New cards
20

Unidirectional antenna

An antenna that focuses all its power in one particular direction, allowing for longer distance connections between buildings or sites.

New cards
21

Yagi antenna

A type of unidirectional antenna commonly used to connect buildings or sites over a longer distance by pointing directly at the target location.

New cards
22

Directional antenna

An antenna that shapes the direction of the wireless signal, allowing for focused coverage in a specific area and preventing signal leakage.

New cards
23

Floor plan

A visual representation of a building's layout, used to determine the placement of antennas for optimal coverage.

New cards
24

Omnidirectional antenna in wireless access points

An internal antenna that sends and receives data in all directions, providing equal power in all directions for connecting to wireless devices.

New cards
25

External antenna

An antenna that can be replaced or changed to increase signal strength and coverage area.

New cards
26

Parabolic antenna

A type of unidirectional antenna with a curved dish shape, often used for microwave and satellite TV signals to focus the energy towards the target location.

New cards
27

UHF antenna

An antenna designed for the UHF frequency band, commonly used for TV signals and capable of providing a further reach for the signal.

New cards
28

Patch antenna

A small, circular dish antenna that attaches to the side of a building and can be used for directional connections between buildings or sites.

New cards
29

Spread Spectrum Wireless Transmission

A method of transmitting data over a range of frequencies using different techniques such as direct sequence spread spectrum (DSSS), frequency hopping spread spectrum (FHSS), and orthogonal frequency division multiplexing (OFDM).

New cards
30

Direct Sequence Spread Spectrum (DSSS)

A spread spectrum technique that modulates data over the entire range of frequencies using a series of signals called chips. It is less commonly used due to slower bandwidth and susceptibility to interference.

New cards
31

Frequency Hopping Spread Spectrum (FHSS)

A spread spectrum technique that allows devices to hop between predetermined frequencies, making it harder to guess the frequency. It is not commonly used in commercial wireless networks due to slower bandwidth and reduced available spectrum.

New cards
32

Orthogonal Frequency Division Multiplexing (OFDM)

A spread spectrum technique that uses a slow modulation rate with simultaneous transmissions over multiple data streams. It provides higher data rates and resistance to interference.

New cards
33

Frequencies and Channels

Wireless networks operate in specific frequency bands, such as 2.4 GHz and 5 GHz. Channels are virtual pipes that transmit information over the wireless networks. In the 2.4 GHz spectrum, there are 11 channels (or 14 channels depending on the region), while in the 5 GHz spectrum, there are 24 non-overlapping channels. Channel bonding allows for wider channels and increased data transmission but increases the risk of interference.

New cards
34

2.4 GHz spectrum

The frequency range commonly used by Wi-Fi devices, including wireless B, G, N, and AX networks. It is also used by other household devices such as security cameras, walkie-talkies, and baby monitors.

New cards
35

A, B, G, N, AC, AX

The different types of Wi-Fi networks that should be memorized for the exam. A refers to 802.11a, B refers to 802.11b, G refers to 802.11g, N refers to 802.11n, AC refers to 802.11ac, and AX refers to 802.11ax.

New cards
36

802.11a

Wireless A operates in the 5 GHz spectrum and has a speed of 54 megabits per second. It was primarily used by business users due to its high cost.

New cards
37

802.11b

Wireless B operates in the 2.4 GHz spectrum and has a speed of 11 megabits per second. It became widely adopted due to its low cost and compatibility with various devices.

New cards
38

802.11g

Wireless G operates in the 2.4 GHz spectrum and has a speed of 54 megabits per second. It was introduced as a replacement for wireless B to provide faster networks.

New cards
39

802.11n

Wireless N operates in either the 2.4 GHz or 5 GHz spectrum and has speeds ranging from 300 to 600 megabits per second. It introduced MIMO technology for faster and more efficient data transfer.

New cards
40

802.11ac

Wireless AC operates exclusively in the 5 GHz spectrum and can reach speeds up to three gigabits per second. It uses MU-MIMO technology for multiple users to access the network simultaneously.

New cards
41

802.11ax

Wireless AX, also known as Wi-Fi 6, operates in the 2.4 GHz and 5 GHz spectrum. It can reach speeds up to 9.6 gigabits per second and is fully backwards compatible with all previous Wi-Fi standards.

New cards
42

MU-MIMO

Multiple User, Multiple Input, Multiple Output is a technology used in 802.11ac and 802.11ax networks. It allows multiple users to access the wireless network simultaneously, improving efficiency and avoiding congestion.

New cards
43

Radio Frequency Interference (RFI)

Interference caused by other devices operating on similar frequencies as Wi-Fi networks. This can impact the performance and reliability of wireless networks.

New cards
44

2.4 GHz frequency

The frequency band commonly used by wireless networks that can be interfered with by devices operating in the same frequency range, such as microwaves.

New cards
45

Physical interference

Obstacles or objects, such as walls, cabinets, or appliances, that can block or weaken wireless signals, causing signal strength issues.

New cards
46

Attenuation

The decrease in signal strength or quality due to interference or obstacles, which can result in blocked or weakened signals.

New cards
47

Signal-to-noise ratio

The ratio of the desired signal (data) to background noise or interference in a wireless network, which affects the network's performance and can lead to retransmissions and slower speeds.

New cards
48

CSMA/CA

Carrier sense multiple access with collision avoidance, a protocol used in wireless networks to prevent collisions by listening to the frequency and sending RTS (Request To Send) and CTS (Clear To Send) packets before transmitting data.

New cards
49

Pre-Shared Key

A shared encryption key used in wireless networks, where both the access point and client devices have the same key to create an encrypted connection.

New cards
50

WEP

Wired Equivalent Privacy, an insecure wireless security protocol that uses a static Pre-Shared Key and a weak encryption algorithm, making it vulnerable to attacks.

New cards
51

WPA

Wi-Fi Protected Access, a wireless security protocol that replaced WEP and introduced TKIP (Temporal Key Integrity Protocol) and MIC (Message Integrity Check) to enhance security and integrity of data transmission.

New cards
52

WPA2

Wi-Fi Protected Access 2, the current standard for wireless security that uses stronger authentication, encryption, and integrity checks, including CCMP (Countermode with Cipher Blockchaining Message authentication code protocol) and AES (Advanced Encryption System).

New cards
53

AES

Advanced Encryption System, a strong encryption algorithm used in WPA2 that uses a 128-bit or higher key length to ensure confidentiality of data transmitted over a wireless network.

New cards
54

Password Attacks

Methods used by hackers to crack passwords, such as brute force attacks or dictionary attacks.

New cards
55

WPA2

A wireless security protocol that supports two modes:Personal Mode (Pre-Shared Key) and Enterprise Mode (central authentication server).

New cards
56

Open Network

A wireless network that has no security or password protection.

New cards
57

WEP

A weak wireless security protocol that uses Initialization Vectors and is vulnerable to attacks.

New cards
58

WPA

A wireless security protocol that uses TKIP and RC4 for encryption, considered weak and not recommended.

New cards
59

WPA2

A wireless security protocol that uses CCMP for integrity and AES for encryption, considered more secure than WPA.

New cards
60

Aircrack-ng

A popular tool used for capturing wireless packets and cracking Pre-Shared Keys.

New cards
61

802.1x

A network authentication protocol used for wired and wireless networks, allowing individual user authentication.

New cards
62

EAP

Extensible Authentication Protocol, part of 802.1x, used for network authentication with different modes like EAP-FAST, EAP-MD5, and EAP-TLS.

New cards
63

MAC Address Filtering

A security measure that allows or denies access to a network based on the device's MAC address.

New cards
64

Network Access Control (NAC)

A security mechanism that permits or denies network access based on device characteristics rather than user credentials.

New cards
65

Captive Portal

A webpage that requires authentication or acceptance of terms and conditions before granting access to a network.

New cards
66

Geofencing

Using GPS and RFID to define boundaries for devices, allowing or restricting access based on location.

New cards
67

Disabling SSID Broadcast

Hiding the Service Set Identifier (SSID) of a wireless network, requiring manual entry of the network name to connect.

New cards
68

Rogue Access Point

A maliciously set up access point that tricks users into connecting, allowing the attacker to intercept and steal data.

New cards
69

Rogue Access Point

A malicious access point that impersonates a legitimate network, allowing hackers to intercept and capture users' data.

New cards
70

Unsecured network

A network that lacks proper security measures, making it vulnerable to attacks and data interception.

New cards
71

War Driving

The act of driving around to identify and locate open or unsecured wireless networks.

New cards
72

War Chalking

The practice of marking symbols or codes on physical surfaces to indicate the presence of a wireless network, often used to share information about open networks.

New cards
73

MAC Filtering

A security feature that allows only specific devices with pre-approved MAC addresses to connect to a wireless network.

New cards
74

SSID Broadcast

The feature that allows a wireless access point to broadcast its network name, enabling devices to easily discover and connect to it.

New cards
75

WPA2

Wi-Fi Protected Access 2, a security protocol that provides stronger encryption and authentication for wireless networks compared to WPA or WEP.

New cards
76

Wireless Isolation

A feature that isolates each wireless device on a network, preventing them from communicating directly with each other.

New cards
77

Guest Network

A separate network within a wireless router that allows guests to connect to the internet without accessing the main network and its devices.

New cards
78

MAC Address

A unique identifier assigned to network interface controllers (NICs) for communication on a network.

New cards
79

WPS (Wi-Fi Protected Setup)

A feature in routers that allows for easy pairing and secure connection between devices by sharing a router PIN.

New cards
80

Remote Management

A feature that allows for remote access to a device's web-based graphical interface over the internet.

New cards
81

WPA2 (Wi-Fi Protected Access 2)

A wireless security protocol that provides stronger encryption and security compared to WEP.

New cards
82

SSID Broadcast

The act of broadcasting the network name (SSID) publicly, which can be disabled to make the wireless network harder to detect.

New cards
83

Wireless Isolation

A feature that isolates channels and frequencies in a wireless network, making it act more like a switch and less like a hub.

New cards
84

MAC Filtering

A security feature that allows or denies network access based on the MAC address of a device.

New cards
85

Initialization Vector Attack

A method of attacking WEP-protected access points by exploiting the weak 24-bit initialization vector used in WEP encryption.

New cards
86

WEP (Wired Equivalent Privacy)

An outdated and insecure wireless security protocol that should be replaced with WPA2.

New cards
87

Airodump-ng

A command-line tool used for capturing and analyzing wireless network packets.

New cards
88

Fake Authentication

A technique used to authenticate to a wireless network without using the correct credentials.

New cards
89

Passcode

The sequence of characters used to gain access to a device or network.

New cards
90

Cracked

Successfully deciphered or decoded.

New cards
91

IP address

A unique numerical label assigned to each device connected to a computer network.

New cards
92

Network

A group of interconnected devices or systems that can communicate with each other.

New cards
93

Join

To connect or become a part of a network or group.

New cards
94

Pull

To retrieve or obtain information or data.

New cards
95

Access point

A device that allows wireless devices to connect to a network.

New cards
96

BSSID

Basic Service Set Identifier, a unique identifier assigned to a wireless access point.

New cards
97

WirelessHacking

Refers to the act of gaining unauthorized access to a wireless network.

New cards
98

Hack

An unauthorized intrusion into a computer network or system.

New cards

Explore top notes

note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 33 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 71 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12565 people
Updated ... ago
4.7 Stars(41)

Explore top flashcards

flashcards Flashcard47 terms
studied byStudied by 22 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard129 terms
studied byStudied by 39 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard73 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard85 terms
studied byStudied by 78 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard43 terms
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard36 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard67 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard81 terms
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)