____________________________ Name ____________________________ Date CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES STUDY GUIDE 7.1.1 Client/Server Relationships 1. What do wireless technologies use to carry information between devices? 2. What are the most common wave lengths used for public wireless communication? 3. Which wavelength is relatively low energy and cannot penetrate through walls or other obstacles? 4. Which wavelength has the greatest range? 5. What ranges can be used with very few restrictions? 6. What are the ranges with the fewest restrictions called? 7. What has made Bluetooth technology the preferred method for connection computer peripherals? 7.1.1.4 Activity 7.1.2 Benefits and Limitations of Wireless Technology 8. What is one of the main advantages of wireless technology? 9. What is a hotspot? 10. What are the benefits of wireless LAN technology? 11. What are the limitations of wireless LAN technology? CCNA Discovery 1 Mod 7 Study Guide Page 1 Electromagnetic waves Infrared (IR) Radio Frequency (RF) IR RF 900 MHz, 2.4 GHZ, 5 GHz Industrial, Scientific, and Medical (ISM) One-to-many communications The ability to provide anytime, anywhere connectivity The implementation of wireless in public locations 1. mobility 2. scalability 3. flexibility 4. cost savings 5. reduce installation time 6. reliability in harsh environments 1. interference 2. network and data security 3. technology 12. What two techniques have been Encryption and authentication developed to help secure wireless transmissions? 7.1.3 Types of Wireless Networks and Their Boundaries 13. What are the three major WPAN – Wireless Personal Area categories of wireless networks? Network WLAN – Wireless Local Area Network WWAN – Wireless Wide Area Network 14. What is the smallest wireless WPAN network, which is used to connect various peripheral devices? 15. What does an access point do? Provides a connection between wireless hosts and hosts on an Ethernet wired network 16. What technologies does the Code Division Multiple Access WWAN use? (CDMA) or Global System for Mobile Communications (GSM) 17. What is a good example of a Cell phone network WWAN? 7.1.3.3 Activity 7.2.1 Wireless LAN Standards 18. What do wireless standards Specify the RF spectrum used, ensure? data rates, and how the information is transmitted 19. What is the main organization IEEE responsible for the creation of wireless technical standards? 20. What IEEE standard governs the 802.11 WLAN environment? 21. What are the current standards for 802.11a, 802.11b, 802.11g, the WLAN environment? 802.11n 22. What organization is responsible WI-FI Alliance for testing wireless LAN devices from different manufacturers? 23. What does the Wi-Fi logo on a The equipment meets standards device mean? and should interoperate with other devices of the same standard 7.2.1.2 24. Complete the Common IEEE WLAN Standards Chart 7.2.2 Wireless LAN Components 25. What is a STA? A wireless client/station 26. What do antennas do? 1. increase output signal CCNA Discovery 1 Mod 7 Study Guide Page 2 27. 28. What is an increase in signal strength from an antenna known as? How are antenna classified? 29. What is the difference between a directional antenna and an omnidirectional antenna? 30. Which antenna type can achieve greater transmission distances? 7.2.2.3 Activity 7.2.3 WLANS and the SSID 31. How do you ensure that wireless components connect to the appropriate WLAN? 32. What is a case-sensitive, alphanumeric string that can be up to 32 characters? 33. What is the SSID used for? strength from a wireless device 2. receives wireless signals from other devices gain According to the way they radiate the signal Directional antenna concentrate signal strength in one direction; omni-directional emit equally in all directions directional SSID – Service Set Identifier SSID To tell wireless devices which LAN they belong to and with which other devices they can communicate 7.2.3 34. 35. 36. 37. 38. 39. 40. What are the two basic forms of WLAN installations? What is the simplest form of a wireless network? How is an ad-hoc network created? Ad hoc Infrastructure mode Ad-hoc Connecting two or more wireless clients together in a peer-to-peer network Infrastructure What is the mode of wireless communication most often used in the home and business environment? What controls all communications Access Point and ensures that all STAs have equal access to the media on infrastructure mode? What is the area covered by a Basic Service Set (BSS) single access point known as? What is the smallest building BSS CCNA Discovery 1 Mod 7 Study Guide Page 3 41. 42. block of a WLAN? What is an Extended Service Set (ESS)? In order to allow movement between the cells without the loss of signal, how much must BSS’s overlap? 7.2.3.4 Activity 7.2.4 Wireless Channels 43. How are the conversations between sender and receiver controlled? 44. What does Wireless technology use to avoid collisions? 45. What is a CTS (Clear to Send)? 46. What is an ACK (acknowledgement)? 47. Who receives the ACK? 7.2.4.3 Activity 7.2.5 Configuring the Access Point 48. When should basic configuration tasks be conducted? 49. What does the type of mode enabled on the access point depend on? 50. What happens if you select mixed mode? 51. What must adjacent BSSs use in order to optimize throughput? 7.2.5.3 Lab Activity 7.2.6 Configuring the Wireless Client 52. What is a wireless host? 53. 54. What is basic management software that can control most wireless client configurations? What are some of the features available with stand-alone CCNA Discovery 1 Mod 7 Study Guide Page 4 Multiple access points in separate BSS 10% Through channels CSMA/CA – Carrier Sense Multiple access with Collision Avoidance A message indicating that the device may transmit on the channel A transmission control character that confirms a transmitted message was received uncorrupted or without errors or that the receiving station is ready to accept transmissions All devices within the BSS Before the access point is connected to a live network The type of host connecting to it Network performance will decrease Non-overlapping channels Any device that contains a wireless NIC and wireless client software Windows XP wireless client software Link information, profiles, site survey wireless utility software? 55. Is it possible for wireless utility software and Windows XP client software to manage the wireless connection at the same time 56. What feature displays the current signal strength and quality of the wireless signal? 57. What is one of the most common tests for verifying successful data transmission? 58. What does a successful ping tell you? 7.2.6.4 Lab Activity 7.3.1 Why People Attach WLANS 59. What is one of the primary benefits of wireless networking? 60. What is one easy way to gain entry to a wireless network? 61. How can you make the network non-public? 62. Why should you change the default settings? 7.3.2 Limiting Access to a WLAN 63. What is one way to limit access to your wireless network? 64. What is MAC address filtering? 65. What happens if the MAC address is not located in the database? 7.3.3 Authentication of a WLAN 66. What is authentication? 67. 68. 69. 70. What is the most common form of authentication? What are the three types of wireless authentication methods? What is open authentication? What is PSK (pre-shared key) authentication? CCNA Discovery 1 Mod 7 Study Guide Page 5 YES or NO Link information Ping Data transmission is possible Ease and convenience of connecting devices Through the network name or SSID Turn off the SSID broadcast feature So that attackers cannot identify and infiltrate the network Control exactly which devices can gain access to your network Using the MAC address to identify which devices are allowed to connect to the wireless network The device will not be allowed to connect to or communicate across the wireless network The process of permitting entry to a network based on a set of credentials The use of a username and password 1. open authentication 2. PSK 3. EAP All clients are able to associate One-way authentication both the access point and client must be configured with the same key or 71. What is EAP (Extensible Authentication Protocol)? 72. If MAC address filtering and authentication are enabled, which occurs first? 7.3.4 Encryption of a WLAN 73. What is encryption? 74. 75. 76. 77. 78. The process of transferring data so that even if it is intercepted, it is unusable What is WEP (Wired Equivalency An advanced security feature that Protocol)? encrypts network traffic as it travels through the air How big is the WEP key? 64 or 128 bits What is a passphrase? An easy way to remember the word or phrase to automatically generate a key How is WPA (Wi-Fi Protected WPA generates a new, dynamic Access) different than WEP? key each time a client establishes a connection with the access point Why is WPA considered more It is more difficult to crack secure than WEP? 7.3.4.3 Activity 7.3.5 Traffic Filtering on a WLAN 79. What is traffic filtering? 7.3.5.2 Lab Activity 7.4. Configuring an Integrated AP & Wireless Client 7.4.1 Planning the WLAN 80. What things should be included when planning a network installation? 81. 82. secret work Two-way authentication as well as user authentication authentication What are the most common factors to consider when determining which WLAN standards to use? What is the best way to learn end- CCNA Discovery 1 Mod 7 Study Guide Page 6 Blocks undesirable traffic from entering or leaving the wireless network 1. the type of wireless standard to be used 2. the most efficient layout of devices 3. an installation and security plan 4. a strategy for backing up and updating the firmware for the wireless device Bandwidth requirements, coverage areas, existing implementation, and cost Ask questions user requirements? 83. Which wireless standard supports 802.11 b/g/n a larger BBS? 84. What is a benefit of a larger BBS? Less equipment and a lower cost of implementation 85. What is Total Cost of Ownership The purchase of the equipment as (TCO)? well as installation and support cots 7.4.2 Installing and Security The Access Point 86. What are some of the more basic 1. change default values for security measures? the SSID 2. disable broadcast SSID 3. configure MAC address filtering 7.4.3 Backing Up and Restoring Configuration Files 87. What are the two ways to restore 1. select restore factory factory defaults? defaults from appropriate menu 2. press and hold the reset button for 30 seconds 7.4.3.2 Activity 7.4.4 Updating the Firmware 88. Where is the operating system on In firmware most integrated routers stored? 89. If the update process is It may become inoperable interrupted before completion, what happens to the drive? 90. What is the process of updating 1. determine the version of firmware on an integrated router? the currently installed firmware 2. download the updated version fot he firmware 3. select firmware upgrade feature in GUI 7.4.4.2 Activity 7.6.1.1 Quiz CCNA Discovery 1 Mod 7 Study Guide Page 7