1. A protocol for setting up wireless PANs and connecting to some peripherals is called Bluetooth.
2. Establishing a unique service set identifier (SSID) or network name helps ensure that only wireless network devices configured similarly are permitted access to the network.
3. The wireless Ethernet standard that operates at a maximum of 54 Mbps on the 2.4-GHz frequency is 802.11g.
4. Computers are in ad hoc mode when they connect directly together without using a WAP.
5. The 802.11 protocol is more commonly known as Wi-Fi.
6. Of the three common wireless encryption protocols, WEP is the least secure.
7. The wireless Ethernet standard that runs at speeds up to 54 Mbps but has limited range because it uses the 5-GHz frequency is 802.11a.
8. If you need to share an Internet connection or connect to a wired network through your wireless network, you would use infrastructure mode.
9. The multiple in/multiple out (MIMO) feature enables devices on 802.11n networks to make multiple simultaneous connections, allowing for a theoretical throughput of 600 Mbps.
10. 802.11 implements CSMA/CA, which proactively avoids network packet collisions rather than simply detecting them when they occur.
1. Two wireless nodes that are communicating directly with each other, without any intermediary systems or hardware, are using what wireless mode?
A. Ad hoc
2. What device centrally connects wireless network nodes in the same way that a hub connects wired Ethernet PCs?
A. Bluetooth adapter
B. Wireless NIC
3. What is the approximate range of an 802.11b/g network?
A. ~1000 ft
B. ~300 ft
C. ~150 ft
D. ~500 ft
4. Which encryption method used on wireless networks is the most secure?
5. What can limit wireless connectivity to a list of accepted users based on the hard-wired address of their wireless NIC?
B. MAC filtering
6. Which wireless standard combines the longest range with the most throughput?
7. Personal area networks are created by what wireless technology?
D. Cellular wireless
8. What is the best technology if you need Internet access from anywhere in the country?
D. Cellular wireless
9. What standard gained a speed boost in its second version with Enhanced Data Rate technology?
D. Cellular wireless
10. Which of these Wi-Fi security protocols is the least secure and easily hacked?
11. What is a cheap and easy way to extend the range of a WAP?
A. Upgrade the antenna.
B. Buy a WAP that advertises a longer range.
C. You can’t easily boost range.
D. Upgrade the wireless NICs.
12. What is the technical name of a wireless network?
13. What is the approximate range of a Bluetooth PAN?
A. ~100 ft
B. ~30 ft
C. ~5 ft
D. ~50 ft
14. Which of the following 802.11 standards can make use of both the 2.4- and 5-GHz bands?
15. Which of the following devices is a major source of interference for Wi-Fi networks?
A. Cell phones
B. Small FM radio transmitters
D. Florescent lights
1. Some friends of yours insist that wireless network standard 802.11a was available before 802.11b. They also say 802.11a is “better” than 802.11b. Find the pages in this chapter that discuss these standards, and jot down some notes to explain the facts.
Answer: The student should provide corrected facts (a came out after b) and come up with arguments for why 802.11a is better than 802.11b, such as that 802.11a offers substantially higher data throughput. A good answer will counter with the lack of range in the faster standard.
2. You are enrolled in a writing class at the local community college. This week’s assignment is to write on a technical subject. Write a short paragraph about each of the wireless standards that can reach theoretical speeds of 54 Mbps.
Answer: The student should discuss 802.11a and 802.11g networks, providing information about range, throughput, and frequency. A good answer will talk about backward compatibility between 802.11g and 802.11b networks. A clever answer would work in 802.11n because that technology easily surpasses 54 Mbps.
3. Prepare a short memo to your instructor (or friend) that outlines the basic differences between WEP and WPA encryption methods. Use any standard memo format you are familiar with. Include a company or school logo on the top of the page to make the memo appear to be printed on company stationery (or “letterhead”).
Answer: The student should provide details about the two encryption standards, such as how they’re implemented and the level of encryption. A good answer would discuss the relative security of the two.
4. Write a few paragraphs describing the pros and cons of both wired and wireless networks. Specifically, compare 100BaseT to the 802.11n standard. Then conclude with a statement of your own personal preference. You’ll need to draw on information you found in this chapter and in Chapter 23, “Local Area Networking.”
Answer: For this question, the student will need to draw on this chapter as well as Chapter 23, “Local Area Networking,” for the information about 100BaseT networks. The pros and cons of wired versus wireless networking vary according to the location and purpose of a network, so answers could come from many angles. Students should discuss cost, convenience, setup, and range. Security would be an added bonus topic to include.
1. The same way you do your wireless NIC, through your NIC’s properties dialog box.
2. Windows sets your NIC to use DHCP by default, just like a wired NIC.
3. Yes. Just right-click on the NIC and select “disable.”