CH1 CWNA Certification Questions. Network Architecture Model What are the layers of the Network Architecture Model? – Core – Distribution – Access.

Slides:



Advertisements
Similar presentations
SEMINAR ON Wi-Fi.
Advertisements

Anatomy of an Wi-Fi Enterprise Wireless LAN Chris De Herrera Pacific Crest Bank Chief Information Officer Webmaster, Tablet PC Talk, CEWindows.NET.
Wi-Fi Technology.
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
DIR-619L Wireless N 300 Cloud Router Sales Guide February 9 th 2011 D-Link HQ.
A Wireless Local Area Network (WLAN) is a network that interconnects devices using radio waves. Wireless networking technologies allow devices to communicate.
IEEE Overview Mustafa Ergen UC Berkeley
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Doc.: IEEE /1078r0 SubmissionBill Carney (Texas Instruments)Slide 1 Wi-Fi Alliance Liaison Report September 15, 2004 Bill Carney Wi-Fi Alliance.
Wireless Technologies In The Home – The Invisible Cable Plant Sandy Teger and David J. Waks System Dynamics Inc.
Wireless Networks.
Security in Wireless Networks Juan Camilo Quintero D
Filtering and Security By Mohammad Shanehsaz June 2004.
Chapter - 11 CWNA Certified Wireless Network Administrator Introduction to Wireless LANs.
Wireless Fundamentals Chapter 6 Introducing Wireless Regulation Bodies, Standards, and Certifications.
IEEE Overview and Meshed Networking ELEC6076 Computer Networks Alan Ford
Wireless LANs: Different, Slower, Kinda Cheaper Jim Gogan Director, ITS - Networking
Introduction to Wireless Networking Module-01 Overview of Wireless Standards, Organizations and Technology Jerry Bernardini Community College of Rhode.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Network and Internet Security
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Doc.: IEEE /0848r0 Submission January 2008 Gal Basson (Wilocity)Slide Wireless LAN user experience Date: Authors:
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Chapter 11: Wireless LANs Business Data Communications, 6e.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Sybex CCNA Chapter 12: Wireless Networks.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
1 Wi-Fi Jason Orgill John Bodily Scott Rowberry. 2 Background Purpose Develop MAC and PHY layer for wireless connectivity of fixed, portable and moving.
Chapter 5 WIRELESS NETWORK SECURITY
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Presented by: Dr. Munam Ali Shah
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Chapter 1 Overview of Wireless Standards, Organizations, and Fundamentals.
PRESENTATION ON WI-FI TECHNOLOGY
IEEE Standards. First published in June Defines technologies at the Physical layer and the MAC sublayer of the Data-Link layer. The standard.
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
IEEE &
WME ABC ’ s LayerDescription aPHY 54 Mb/s in 5 GHz bands bPHY 11 Mb/s direct sequence in 2.4 GHz band cMAC Bridging operation dPHY International.
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 1 Overview of Wireless Standards, Organizations, and Fundamentals.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
WLAN.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
1 3/13/ :25 Chapter 5Protocol Architecture1 Rivier College CS575: Advanced LANs Chapter 5: Protocol Architecture.
Doc.: IEEE /182r0 Submission March 2002 Brüninghaus / Euscher / Kockmann, Siemens.Slide 1 Home Networking Requirements & Aspects for Next Generation.
IEEE Wireless LAN Standard
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Wireless Networks Dave Abbott.
WIMAX AND LTE.
TERMINOLOGY Define: WPAN
CompTIA Security+ Study Guide (SY0-401)
Wireless Local Area Network
Instructor Materials Chapter 6 Building a Home Network
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
General Overview IEEE WLAN Standard
Instructor & Todd Lammle
Wi-Fi Technology.
IEEE i Dohwan Kim.
Presentation transcript:

CH1 CWNA Certification Questions

Network Architecture Model What are the layers of the Network Architecture Model? – Core – Distribution – Access

Network Architecture Model Where is deployed in the network architecture model? – technology is in the ACCESS layer

Network Architecture Model An device in Bridge set up falls within what network architecture layer? – Distribution

Organizations What organization controls ? – IEEE Who control the maximum transmit power for unlicensed Wi-Fi? – Local authorities such as CRTC, FCC, provincial regulators What organization ensures Wi-Fi interoperability? – Wi-Fi Alliance Where is the IEEE specification in the OSI model? – PHY layer and DL layer (One and two)

Network Architecture Model Where does the IEEE standard defines communication mechanisms (layer and sub-layer)? – Only the Physical layer and MAC sub-layer of the Data- Link layer of the OSI model. – The Logical Link Control (LLC) sub-layer of the Data- Link layer is not defined by the standard. – WPA is a security certification. – FSK is a modulation method.

Organizations What is the organization responsible for RFC documents? – The IETF is responsible for creation of RFC documents. What is the organization responsible for 802 documents? – The IEEE is responsible for the 802 standards. What is the organization responsible for certification tests? – The Wi-Fi Alliance is responsible for certification tests. The Wi-Fi Alliance used to be known as WECA, but changed their name to Wi-Fi Alliance in What is the organization responsible for RF regulations? – The FCC is responsible for RF regulatory rules in the United States.

Wi-Fi Alliance What is the certification program that deal with QoS or quality of service? – Wi-Fi Multimedia (WMM) is a Wi-Fi Alliance certification program that enables Wi-Fi networks to prioritize traffic generated by different applications. – NOT ANSWERS: – is the IEEE standard, and WEP (Wired Equivalent Privacy) is defined as part of the IEEE standard. – i was the IEEE amendment that defined robust security network (RSN) and is not part of the standard. – PSK is not a standard; it is an encoding technique.

Wi-Fi Alliance What is the Wi-Fi method to allow easy interconnection between wireless devices? – Wi-Fi Direct is designed to provide easy setup for communications directly between wireless devices. – Wi-Fi Personal does not exist. – n will likely provide connectivity, but setup could be easy or difficult depending on the environment. – CWG-RF is designed for Wi-Fi and cellular radios in a converged handset. Wi-Fi Protected Setup is designed to simplify security setup.

Wi-Fi Alliance What is the main objective of the Wi-Fi Alliance? – The Wi-Fi Alliance maintains certification programs to ensure vendor interoperability. What is the certification program for voice over Wi-Fi? – Voice Personal is a certification program that defines enhanced support for voice applications in residential and small-business Wi-Fi networks. What is the certification program that defines battery saving methods? – WMM-PS is a certification program that defines methods to conserve battery power for devices using Wi-Fi radios by managing the time the client device spends in sleep mode.

Wi-Fi Alliance