Netplus9e - PPT - Mod 06
Netplus9e - PPT - Mod 06
Netplus9e - PPT - Mod 06
Network+ Guide
to Networks,
Ninth Edition
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not
be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Module Objectives
By the end of this module, you should be able to:
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Characteristics of Wireless Transmissions
• Wireless networks (WLANs) are networks that transmit signals through the air via RF (radio
frequency) waves
• Wired and wireless signals share many similarities including the use of the same Layer 3
and higher protocols
• The nature of the atmosphere makes wireless transmission different from wired
transmission
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Wireless Spectrum (1 of 6)
• The wireless spectrum is the frequency range of electromagnetic waves used for data and
voice communication
• The wireless spectrum spans frequency ranges or bands between 9 kHz and 300 GHz
• Some bands have only a single frequency (called a fixed frequency) for that band
• RFID (Radio Frequency Identification) uses electromagnetic fields to store data on a
small chip in an RFID tag, which includes an antenna that can transmit and receive, and
possibly a battery
• RFID is commonly used for inventory management
• NFC (near-field communication) is a form of RFID that transfers data wirelessly over very
short distances
• Signal can be transmitted one way by an NFC tag, or smart tag
• The NFC tag collects power from the smartphone or other device by magnetic induction
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Wireless Spectrum (2 of 6)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Wireless Spectrum (3 of 6)
• Z-Wave is a smart home protocol that provides two basic types of functions:
• Signaling to manage wireless connections and control to transmit data and commands
between devices
• A Z-Wave network controller (called a hub) receives commands from a smartphone or
computer and relays the commands to various smart devices on its network
• ZigBee is a low-powered, battery-conserving wireless technology
• It is designed to handle small amounts of data
• Zigbee is used in IoT devices for purposes such as building automation, HVAC control,
AMR (Automatic Meter Reading), and fleet management
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Wireless Spectrum (4 of 6)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Wireless Spectrum (5 of 6)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Wireless Spectrum (6 of 6)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Channel Management
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Antennas
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Signal Propagation (1 of 4)
• Propagation refers to the way in which a wave travels from one point to another
• LOS (line-of-sight) occurs when the signal travels in a straight line directly from transmitter
to receiver
• Wireless signals do not usually follow a straight line
• When obstacles are in a signal’s way, the signal may:
• Pass through the object
• Be absorbed by the object
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Signal Propagation (2 of 4)
• Attenuation – the farther the signal moves away from the transmission source, the more it
weakens
• Wireless signals can be amplified by increasing the power of the transmission or
extended by repeating the signal from a closer broadcast point called a wireless range
extender
• Fading – as a signal runs into obstacles, its energy will gradually fade
• Excessive fading can cause dropped connections or slow data transmission
• Interference – electromagnetic waves can interfere with wireless communications
• Wireless signals are more vulnerable to noise
• Signal-to-noise ratio (SNR) is the proportion of noise to the strength of a signal
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Signal Propagation (3 of 4)
• Refraction – as a wave travels through objects the wave’s direction, speed, and wavelength
are altered (or refracted)
• Reflection – the wave encounters an obstacle and reflects, or bounces back toward its
source
• Scattering – when a wireless signal encounters an object that has small surface
dimensions compared with the signal’s wavelength, it’s diffused or scattered in multiple
directions
• Diffraction – a wireless signal is diffracted, or split into secondary waves, when it
encounters an obstruction
• Wireless signals follow different paths to destination, known as multipath signals
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Signal Propagation (4 of 4)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
802.11 WLAN Standards
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
802.11 Innovations (1 of 3)
• Several innovations have been implemented that contribute to making later 802.11
standards much faster and much more reliable:
• Channel bonding – two adjacent 20-MHz channels can be bonded to make 40-MHz
channel
• It more than doubles the bandwidth available in single 20-MHz channel
• MIMO (multiple input-multiple output) – multiple access point and client device antennas
may issue signal to one or more receivers
• MIMO increases range and a network’s throughput
• MU-MIMO (multiuser MIMO) – a newer technology that allows multiple antennas to
service multiple clients simultaneously
• MU-MIMO reduces congestion and contributes to faster data transmission
• MU-MIMO is available with WAVE 2 802.11ac products
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
802.11 Innovations (2 of 3)
• Several innovations have been implemented that contribute to making later 802.11
standards much faster and much more reliable (continued):
• OFDMA (Orthogonal Frequency Division Multiple Access) – supports more efficient
multiuser functionality for 80211 ax devices
• Frame aggregation combines multiple frames into one larger frame
• Networks can use one of two techniques for combining multiple data frames:
▶ A-MSDU (Aggregated Mac Service Data Unit)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
802.11 Innovations (3 of 3)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Access Method (1 of 2)
• 802.11 MAC services append 48-bit physical addresses to frame to identify source and
destination
• The use of the same physical addressing scheme as other Ethernet networks allows easy
combination with other IEEE networks
• Wireless devices are not designed to simultaneously transmit and receive
• 802.11 standards specify the use of CSMA/CA (Carrier Sense Multiple Access with Collision
Avoidance) procedures to access a shared medium
• Uses ACK packets to verify every transmission and requires more overhead than 802.3
• RTS/CTS (Request to Send/Clear to Send) protocol ensures packets are not inhibited by
other transmissions
• RTS/CTS decreases network efficiency, but can be efficient for large transmission
packets
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Access Method (2 of 2)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Association and Wireless Topologies (1 of 3)
• Association is the process where packets are exchanged between computer and an
access point in order to gain Internet access
• Scanning occurs when a wireless devices surveys its surroundings for an access point
• In active scanning the wireless client takes the initiative by transmitting a special frame
known as a probe
• In passive scanning the AP takes the initiative
• The wireless devices listens for special signal known as a beacon fame
• SSID (service set identifier) is a unique character string identifying an access point
• The SSID is contained in the beacon frame information
• The SSID is configured in the AP’s configuration utility and it is recommended that it be
changed from the default setting
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Association and Wireless Topologies (2 of 3)
• IEEE terms that reflect the most common wireless topologies include the following:
• IBSS (Independent basic service set) using an ad hoc topology – a small number of
nodes closely positioned transmit directly to each other without an intervening connectivity
device
• BSS (basic service set) using an infrastructure topology – a group of stations share an
access point
• The identifier for this group of nodes is known as a BSSID (basic service set identifier)
• ESS (extended service set) using a mesh topology – several access points are
connected to same LAN network
• These APs are configured and managed by a wireless LAN controller
• Clients that belong to the same ESS share a special identifier called an ESSID
(extended service set identifier)
• The ESSID allows a user to roam, or change from AP to AP
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Association and Wireless Topologies (3 of 3)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
IEEE 802.11 Frames (1 of 2)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
IEEE 802.11 Frames (2 of 2)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 6-1
Which type of identifier allows wireless clients to roam freely from AP to AP?
a. BSSID
b. IP address
c. ESSID
d. Transmitter address
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 6-1: Answer
Which type of identifier allows wireless clients to roam freely from AP to AP?
Answer: c. ESSID
Within an ESS (extended service set), a client can associate with any one
of many APs that use the same ESSID (ESS identifier). This allows users
to roam, or change from AP to AP, without losing wireless network
service.
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing a Wi-Fi Network
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Determine the Design (1 of 4)
• Home or small office network, called a SOHO network, might call for only one access point
• The AP device often combines switching, routing, and other network functions
• It connects wireless clients to LAN and acts as an Internet gateway
• Many home or office networks include IoT (Internet of Things) devices
• Examples of IoT devices that might be a part of a home or office network include the
following:
• Health monitors, exercise equipment, GPS locators, and smartwatches
• Smart speakers
• Smart thermostats
• Smart doorbells
• Security cameras
• Smart refrigerators
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Determine the Design (2 of 4)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Determine the Design (3 of 4)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Determine the Design (4 of 4)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Configure Wi-Fi Connectivity Devices
• APs vary in which wireless standards they support, their antenna strength, and other
features
• Variables set during installation include the following:
• Administrator password
• SSID and whether or not the SSID is broadcast
• Security options
• Whether or not DHCP is used
• If something goes awry during your SOHO router configuration, you can force a reset of all
the variables you changed
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Configure Wi-Fi Clients
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Wi-Fi Network Security
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
WPA (Wi-Fi Protected Access)
• WPA (Wi-Fi Protected Access) dynamically assigns every transmission its own key
• 802.11i incorporates an encryption key generation and management scheme known as
TKIP (Temporal Key Integrity Protocol) to improve security for legacy WEP-based devices
• TKIP accomplished the following improvements:
• Message integrity
• Key distribution
• Encryption
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
WPA2 (Wi-Fi Protected Access, Version 2)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Personal and Enterprise (1 of 2)
• The most secure communication is made possible by combining a RADIUS server with
WPA/WPA2
• Known as WPA-Enterprise or WPA2-Enterprise
• RADIUS (Remote Authentication Dial-in User Service) is an open source authentication and
authorization service
• A RADIUS server is used in cooperation with an authentication mechanism called EAP
• EAP (Extensible Authentication Protocol) provides the framework for authenticating clients
and servers
• EAP functions alongside RADIUS by organizing communications with the network client
devices, while RADIUS handles the actual authentication on the server
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Personal and Enterprise (2 of 2)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Other Security Configurations
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Security Threats to Wi-Fi Networks
• War driving – a hacker searches for unprotected wireless networks by driving around with a
laptop configured to receive and capture wireless data transmissions
• War chalking – hackers draw symbols with chalk on the sidewalk or wall near a vulnerable
AP to make it known to other hackers
• Evil twin – a rogue AP planted in a network’s geological area to pose as an authorized AP
• WPA attack – involves an interception of the network keys communicated between stations
and APs
• Also called WPA cracking
• WPS attack – involves cracking a PIN in order to access an APs settings
• The pin can be easily cracked through a brute force attack
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Wi-Fi Network Tools
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Avoid Pitfalls (1 of 2)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Avoid Pitfalls (2 of 2)
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 6-2
Which device will let you determine all frequencies within a scanned range that
are present in a specific environment, not just Wi-Fi?
a. Wi-Fi analyzer
b. Captive portal
c. Wireless LAN controller
d. Spectrum analyzer
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 6-2: Answer
Which device will let you determine all frequencies within a scanned range that
are present in a specific environment, not just Wi-Fi?
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary
Now that the lesson has ended, you should be able to:
• Describe characteristics of wireless transmissions
• Explain 802.11 standards and innovations
• Plan a Wi-Fi network
• Secure a Wi-Fi network
• Troubleshoot a Wi-Fi network
Jill West, CompTIA Network+ Guide to Networks, 9th Edition. © 2022 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.