Chapter 9: Wireless Networking Terminology

1234567891011121314151617181920212223242526272829303132333435363738
Across
  1. 3. Encryption that uses 128-, 192-, or 256-bit key lengths to encrypt and decrypt block-sized messages over a wireless transmission.
  2. 4. The rate of oscillation of electromagnetic radio waves in the range of 3 kHz to 300 GHz, as well as the alternating currents carrying the radio signals. This is the frequency band that is used for communications transmission and broadcasting.
  3. 6. A device that displays signal amplitude (strength) as it varies by signal frequency. The frequency appears on the horizontal axis; the amplitude is displayed on the vertical axis.
  4. 13. A station is a wireless NIC in an end device such as a laptop or wireless PDA. STA often refers to the device itself, not just the NIC. A station is often abbreviated as STA.
  5. 14. A wireless topology that connects to all APs through wired links. The individual APs contain very little embedded intelligence and are sometimes referred to as lightweight access points (LWAPs).
  6. 16. An antenna that disperses the radio frequency wave in an equal 360-degree pattern. This provides access to many clients in a radius.
  7. 17. A signal that corrupts or destroys the wireless signal sent by APs and other wireless devices. Interference affects the availability of a network because normal communications are made impossible.
  8. 18. A signal passes through objects and the signal loses power.
  9. 21. The name of the wireless network. Client devices see a list of available networks when trying to connect to a wireless network.
  10. 23. The ability of devices to connect from one access point to another while maintaining connection to the same network. For example, a laptop moved from one building to another stays connected to the same network.
  11. 25. Radio waves pass through objects of different densities, causing the signal to bend or change speeds.
  12. 26. The point at which all the available bandwidth on a connection has achieved maximum capacity and cannot pass any more data through the connection.
  13. 28. An antenna that creates a narrow, focused signal, which increases the signal strength and transmission distance. It provides a stronger point-to-point connection and is better equipped to handle obstacles.
  14. 29. A process of planning and designing a wireless network that includes network capacity, coverage, data rates, and quality of service.
  15. 32. Encryption that implements a key-mixing feature that only the receiver can unlock.
  16. 33. The point at which bandwidth utilization for the device is close to 100%.
  17. 34. A case-sensitive name that specifies a service set (network) to which a wireless device can join or connect to.
  18. 36. An authentication method that configures clients and access points with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.
  19. 37. Devices on the network are not broadcasting on the same frequency.
  20. 38. An ESS consists of multiple BSSs with a distribution system (DS). In an ESS, BSSs that have an overlapping transmission range use different frequencies.
Down
  1. 1. A wireless topology that moves some of the network intelligence from the controller to the individual APs. Newer wireless networks can be deployed using a distributed wireless mesh architecture.
  2. 2. The BSSID is a 48-bit value that identifies an AP in an infrastructure network or an STA in an ad hoc network. The BSSID allows devices to find a specific AP within an ESS that has multiple access points, and STAs use it to keep track of APs as they roam between BSSs. The BSSID is the MAC address of the AP and is set automatically.
  3. 5. An attack that spoofs the MAC address and then disconnects the device from the wireless network. Attackers can use a deauthentication attack to stage evil twin or on-path attacks.
  4. 7. A wireless network that works in peer-to-peer mode without an access point. The wireless NICs in each host communicate directly with one another.
  5. 8. The standard for short-range wireless interconnection. It is designed to allow devices to communicate within a personal area network (PAN) of close proximity. PAN devices include cell phones, personal digital assistants (PDAs), printers, mouses, and keyboards.
  6. 9. Any unauthorized access point added to a network.
  7. 10. The interception and decoding of wireless transmissions. It is also known as eavesdropping.
  8. 11. Signal interference created intentionally by an attacker to make a wireless network impossible to use.
  9. 12. An IBSS is a set of stations (STAs) configured in ad hoc mode.
  10. 15. Access points that separate wireless networks by using independent configuration. Each AP stands alone.
  11. 19. The LAN that connects multiple APs (and BSSs) together. The DS allows wireless clients to communicate with the wired network and with wireless clients in other cells.
  12. 20. The electromagnetic field generated by a network cable or network device (such as wireless router) that can be manipulated in order to eavesdrop on conversations or steal data.
  13. 22. An authentication method that requires clients to provide a MAC address to connect to the wireless network.
  14. 24. An authentication method that uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients.
  15. 27. An AP is the device that coordinates all communications between wireless devices, as well as the connection to the wired network. An AP is sometimes called a wireless AP (WAP).
  16. 30. These are used to connect wired or wireless networks.
  17. 31. A BSS is the smallest unit of a wireless network. All devices in the BSS can communicate with each other. A BSS is also called a cell.
  18. 35. A security certification program that was developed by the Wi-Fi Alliance to secure wireless signals between devices.