Difference between revisions of "Wireless Networking"

From TRCCompSci - AQA Computer Science
Jump to: navigation, search
(Question 8)
(Question 8)
Line 183: Line 183:
  
 
{ Which one of these would make a network more secure?  
 
{ Which one of these would make a network more secure?  
  | type="()" }
+
  | type="[]" }
  
 
+ Use a MAC address whitelist.
 
+ Use a MAC address whitelist.

Revision as of 16:07, 21 November 2019

Overview

Wireless networking is used to wirelessly communicate devices to a network. Data is transmitted using radio waves. The Wi-Fi Alliance establish international standards to allow interoperability and backwards compatibility.

CraigNDave

https://www.youtube.com/watch?v=03cdhk8WruE&list=PLCiOXwirraUDvVsza-xO2mMwW9QBIa_FG&index=3

Computer Science Tutor

https://www.youtube.com/watch?v=Z_R4GubNuhg&list=PL04uZ7242_M6O_6ITD6ncf7EonVHyBeCm&index=30

TRC PowerPoint

Wireless Networking

Devices

These are connected by using a WAP (Wireless Access Point), this is a bridge between a wireless network and a wired network. They broadcast a wireless signal which other devices can connect to, all the devices share the bandwidth of the access point. The Access Point is normally connected to a single wired network port. In the home this could be packaged with a router and a network switch, but can also be a stand alone device.

A receiving device called a Wireless Network Interface Card. These can be added to a mobile device or a computer by using either a Wi-Fi dongle or a Wi-Fi PCIe Card. It is the device used to connect to a wireless network, receive and transmit data wirelessly.

A Station is a combination of a device and a wireless networking interface card.

Standards / Technologies

These are a few different types of network technologies. The most common and newest version is 802.11ac but there are different types including 802.11a/b/g/n/ac/ac/ab. Speeds have increased from approximately 11mbps to 500mbps.

Distance

Distance affects the signal of the Wi-Fi, if the signal is indoors it can spread to a distance of 50-70m and outdoors it can spread to a distance of 250m. It is weaker indoors because of interference like doors, walls, pipework and microwaves.

SSID

Each network is set a SSID (Service Set Identification). This is the name that is associated with a network. When a device is trying to connect to a network, the device will search for a network . and that network will report back with its SSID. Some networks don't broadcast there SSID. This is so that devices can't find the network during a search, they can still connect to the network but they will need to know it exists.

MAC Address

A MAC (Media Access Control) address is a group of hexadecimal digits that contain information about that device that broadcasts data. the first three groups represents the manufacturer (or manufacturer & type of device) and the last three groups represent your actual device.

MacAddress.jpg

The purpose of the MAC Address is to uniquely identify your device, any data is sent to the MAC Address at a specific IP Address. Your device may have several MAC Addresses, one for Wi-Fi, one for Bluetooth, and one for NFC.

Protocols

https://www.youtube.com/watch?v=WpSZBu9i108&list=PLCiOXwirraUDvVsza-xO2mMwW9QBIa_FG&index=4

CSMA/CA

Computer Science Tutor

https://www.youtube.com/watch?v=My4VDzviiNg&list=PL04uZ7242_M6O_6ITD6ncf7EonVHyBeCm&index=31

CSMA/CA without RTS/CTS

Ethernet uses the CSMA/CD protocol which detects if a data collision has occurred, it will stop the transmission on the colliding devices and each will wait a random amount of time before resending.

CSMA/CA actually checks the communication channel is idle before sending any data. This will prevent collisions.

Csma-ca.GIF

CSMA/CA with RTS/CTS

RTS/CTS adds an extra layer onto CSMA/CA, by checking if the receiving machine is ready to receive data. A Request To Send is transmitted, and when ready the receiver will transmit a Clear To Send.

Csma-ca-rts-cts.GIF

Frequency & Channels

2 different frequencies are used for Wi-Fi, The old Wi-Fi frequency is 2.4Ghz which is what all Wi-Fi capable devices can use. This frequency has become very crowded and is used by other technology such as microwaves etc.

A new frequency as been approved, the 5Ghz frequency cannot be accessed by older devices which only support the 2.4Ghz frequency. The main benefit of this is that not many devices use this new technology so that means that there wont be as much interference hence better speeds.

The 2.4Ghz frequency is broken up into approximately 12 channels that can be used, and the 5Ghz frequency is broken up into more channels and in Europe 27 channels are usable. Channels are required because different wireless networks can overlap, and by using a different channel different wireless networks can operate.

720px-2 4 GHz Wi-Fi channels (802 11b,g WLAN) svg.png

However the image above shows how the channels on the 2.4Ghz frequency can interfere with each other. Having adjacent channels is never a good idea because too much interference is generated, there should always be atleast 2 channels in between.

In the home situation your wireless router creates a Wi-Fi network which overlaps with the wireless network next door or even from across the road. Imagine the situation in densely populated areas such has the Centre of London or Manchester.

Wireless Network Security

There are many different ways that you can secure a network.

  • Change the default SSID to your own
  • Hide the SSID
  • Create a whitelist to only allow certain devices to connect to the network
  • Secure the network with a password using WPA/WPA2

WPA/WPA2

WPA or Wi-Fi Protected Access is a protocol that secures a Wi-Fi network. It was developed by the Wi-Fi Alliance to secure wireless networks. WPA was rolled out in 2003 and then WPA2 was introduced in 2004 improving upon WPA.

It replaced WEP which used a single key for all data packets, however WPA/WPA2 use a different key for each packet.

Revision Questions

Question 1

1. what does disabling SSID broadcasting do?

only allows MAC addresses on a stored list to access
this is MAC address whitelisting
key to packet encrypting
WPA/WPA2
must pre know the network to connect, will not appear; not broadcasted

2. How many computer scientists does it take to fit a lightbulb

1 wayne and a ladder
this is MAC address whitelisting
none as it has no ram
WPA/WPA2
mike snaith

Your score is 0 / 0


Question 2

1. Select the amount of channels that's provided by 2.4ghz and 5ghz?

2.4ghz has 27 channels and 5ghz has 12 channels.
...
5ghz has 27 channels in europe and 2.4ghz has 12 channels.
Correct
5ghz has 26 channels in the uk and 2.4ghz has 13 channels.
...
2.4ghz has 27 channels and 5ghz has 13 channels.
...
2ghz has 12 channels and 5ghz has 27 channels in america.
...

Your score is 0 / 0


Question 3

Question 4

Question 5

1. What is a station composed of in terms of wireless networking?

A table.
...
A device.
Correct
An ethernet cable.
"Wireless networking"
Wireless Access Point
Incorrect, a WAP allows other devices to connect to the network
A network interface card
Correct. A NIC allows for a device to connect to networks

Your score is 0 / 0


Question 6.1

Point added for a correct answer:  
Points for a wrong answer:
Ignore the questions' coefficients:

1. What does SSID stand for?

Salad Sub including Daikon
Solid State identification
Service set identifier
Super Safe Intercredible Democracy

Your score is 0 / 0


Question 7

1. { What does a per-packet key entail?

A key split into many packets.
Incorrect. A per packet key has a different key for each packet.
A different key for each packet.
Correct!
A single key per packet
Incorrect. A per packet key has a different key for each packet.
The key has no packets
Incorrect. A per packet key has a different key for each packet.

Your score is 0 / 0


Question 8

1. Which one of these would make a network more secure?

| type="[]"
Use a MAC address whitelist.
Correct answer.
Change and remove SSID from being shared.
Correct answer.
Use WPA/WPA2.
Correct answer.
Wrap the network in bubble wrap.
The correct answer were the other three answers.

Your score is 0 / 0


Question 9

Question 10

1. Describe the various security measures, other then logging in, that a school or business might have put in place to prevent anyone unauthorised from connecting to the network.

Creating a whitelist to only allow certain devices onto the network
Change the default WNIC to your own
Change the default SSID to your own
Change the default WPA2 to your own
Secure the network using WEP
Secure the network using WPA/WPA2
Hide the SSID

2. What hardware component does each device need to be able to be connected to a wireless network?

WNAC
WNIP
WNIT
WMIC
WNAP
WNIC

Your score is 0 / 0


Question 11

1. What is the role of the SSID:

Name given to the router
correct answer
Allows access to router when there are multiple devices]
Wrong answer
Displays when scanned by a device
Correct answer

2. What does white listing devices do:

Prevents a specific device/s from accessing the network
wrong answer
Allows a specific device/s to access a network and stops others from accessing
right answer

Your score is 0 / 0


Question 12