2.3 - Wireless Devices and Technologies

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:31 PM on 1/30/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

29 Terms

1
New cards

Channels

Subdivisions of the frequency bands used for wireless communication, allowing multiple networks to operate simultaneously without interference. The availability and allowed types can vary by country, subject to regulatory impacts that dictate the specific options and power levels that can be used.

2
New cards

Channel Width

Refers to the frequency span of a wireless channel. Wider options (e.g., 40 MHz, 80 MHz) offer more bandwidth, which can increase data transmission speeds but may also increase the likelihood of interference in congested areas.

3
New cards

Non-Overlapping Channels

Do not interfere with each other and are crucial in environments with multiple wireless access points. For instance, in 2.4 GHz Wi-Fi, channels 1, 6, and 11 are commonly used in the US because they do not overlap.

4
New cards

Regulatory Impacts

Rules and regulations set by governmental or international bodies that govern the use of wireless frequencies and channels to prevent interference between different communication systems. These regulations affect the availability of certain frequencies and channels in different regions, impacting the design and deployment of wireless networks. Compliance ensures the wireless networks operate within the legal spectrum allocations and use approved power levels, minimizing interference with other devices and services.

5
New cards

802.11h

A standard that enhances 802.11a by adding support for dynamic frequency selection (DFS) and transmit power control (TPC) to comply with European regulations for 5 GHz WLANs. This helps in avoiding interference with radar and satellite communications, which also operate in the same frequency range.

6
New cards

2.4GHz

Widely used for wireless networking, offering a good balance between range and bandwidth. This band can penetrate walls and solid objects more effectively than higher frequencies, making it suitable for covering larger areas, but is more prone to interference from other devices like microwaves and Bluetooth due to its crowded spectrum.

7
New cards

5GHz

This band provides faster data rates at shorter distances compared to lower frequencies and is less likely to experience interference from other household devices. It supports more non-overlapping channels, reducing congestion and improving network performance, but has a shorter range and less effective penetration through walls and obstacles.

8
New cards

6GHz

This band marks a significant expansion in bandwidth for wireless networks, effectively doubling the spectrum available compared to the 5GHz band. This increase supports higher data rates, lower latency, and more simultaneous connections, making it ideal for high-demand applications and next-generation technologies like WiFi 6E.

9
New cards

Band Steering

A network management technology that automatically detects wireless devices capable of dual-band operations and moves them to the less congested 5 GHz or 6 GHz band. This process helps to balance the network load, maximize throughput, and improve overall wireless performance by minimizing interference found more commonly in the 2.4 GHz band. By optimizing the distribution of devices across available bands, efficiency and reliability of wireless networks is enhanced, especially in areas with high network density.

10
New cards

Service Set Identifier

The SSID is the name assigned to a wireless network. All devices attempting to connect to a particular wireless network must use this name to access it, serving as a basic form of network identification and security.

11
New cards

BSSID

A unique identifier that serves as the MAC address for a wireless access point (AP) and is used to differentiate one AP within a larger network or between multiple networks. It is essential in environments where multiple access points are deployed, helping client devices identify and connect to the specific physical device providing the network service.

12
New cards

Extended SSID

Also known as a Network Name, ESSID is used to identify a set of interconnected access points as a single network in larger WiFi deployments. It is shared among all APs in an Extended Service Set (ESS) to allow seamless connectivity for client devices as they move between APs. This facilitates the creation of large, scalable wireless networks, providing continuous connectivity across different physical locations within the covered area, enhancing user mobility and network efficiency.

13
New cards

Mesh Networks

Consist of nodes that connect directly and dynamically to as many other nodes as possible. This configuration creates multiple pathways for data to travel between points, enhancing reliability and redundancy. They are self-healing and scalable, making them ideal for large areas like smart cities and IoT applications.

14
New cards

Ad Hoc Networks

Decentralized and do not rely on a pre-existing infrastructure; P2P network. Nodes communicate directly without the use of a router or a network server, making them suitable for temporary setups in situations where quick deployment is necessary, such as emergency response or military operations.

15
New cards

Point-to-Point Networks

Establish a direct connection between two wireless devices. Commonly used for linking two locations in a WAN or providing a dedicated pathway for data transmission, ensuring consistent and reliable connectivity.

16
New cards

Infrastructure Networks

Rely on fixed routers or access points that manage traffic to and from wireless devices. This is the most common type of network setup for residential and commercial internet connections, providing stable and controlled connectivity, with the access points serving as the hub for all wireless communication.

17
New cards

Encryption

Crucial in wireless networking to secure data transmissions against unauthorized access and interception. It involves converting data into a coded format that can only be accessed and read by devices with the correct decryption key.

18
New cards

WPA2

A security protocol developed to secure wireless computer networks. It uses Advanced Encryption Standard (AES) encryption and provides substantial improvements in security over its predecessor by requiring stronger encryption methods and ensuring data integrity.

19
New cards

WPA3

The latest security protocol for wireless networks, introduced to address vulnerabilities found in WPA2 and provide enhanced security measures. It offers features like individualized data encryption, protection from brute-force attacks, and easier connection options for devices without a display.

Note the biggest difference between WPA2 and WPA3 is forward secrecy via Simultaneous Authentication of Equals; future cracked traffic won’t compromise past traffic

20
New cards

Guest Networks

Separate access networks provided by businesses or institutions to allow visitors limited internet access without exposing the main network. They help maintain network security by isolating visitor traffic from critical internal resources.

21
New cards

Captive Portals

Web pages that appear automatically when a user connects to a public or semi-public Wi-Fi network, requiring interaction before network access is granted. They are commonly used to manage access through authentication, terms of service agreements, or payment information.

22
New cards

Authentication

A critical security process in wireless networks, ensuring that only authorized devices can connect. It verifies the identities of devices attempting to connect, using various methods to prevent unauthorized access.

23
New cards

Pre-shared Key (PSK)

Involves a simple, shared key known to all users of the network, commonly used in home and small office environments. It offers ease of setup but lower security as the key is shared among users.

24
New cards

Enterprise Authentication

Uses a more secure approach by employing a RADIUS server to manage each user's authentication individually. This method is suited for larger organizations, providing stronger security through individual credentials and enhanced control over network access.

25
New cards

Directional Antenna

Antennas that focus the signal in a specific direction, offering longer range and improved signal strength in the targeted area. They are suitable for point-to-point connections or when the wireless signal needs to be directed over a long distance or to avoid interference.

26
New cards

Omnidirectional Antenna

Antennas that radiate and receive signals in all directions equally, making them ideal for covering a broad area from a central location. They are commonly used in home and office Wi-Fi setups where uniform coverage is needed.

27
New cards

Autonomous Access Point

Standalone units that handle all their operations and configurations independently, without the need for centralized control. Each unit is a self-contained router, performing all tasks including broadcasting SSIDs, serving as the DHCP server, and managing security protocols. Ideal for smaller networks or remote locations without centralized management.

28
New cards

Lightweight Access Point

Operate under the control of a centralized network controller, typically a wireless LAN controller (WLC). These units offload processing of real-time decision-making and user data broadcasting to the WLC, allowing for easier management and scalability. Suitable for larger networks where centralized control can provide significant advantages in performance and administration.

29
New cards

Autonomous AP vs Lightweight AP

The main difference is in their management architecture. Autonomous APs operate independently and are managed individually, while lightweight APs require a centralized wireless LAN controller for management and coordination. The choice between the two types of APs depends on factors such as the size of the deployment, management requirements, and scalability needs of the wireless network.