Chapter 6 wireless network review

.pdf

School

Toronto Metropolitan University *

*We aren’t endorsed by this school

Course

301

Subject

Electrical Engineering

Date

Oct 30, 2023

Type

pdf

Pages

2

Uploaded by por.dean98

Report
46. **Why is it not advisable for an access point to always use its maximum power for broadcasting wireless signals?** Each access point should adjust its power level, which determines the signal strength it emits, to match the specific geographic area it covers. Using excessively low power levels can result in dropped signals as clients move to the outer edges of the access point's range. Conversely, using maximum power levels can lead to significant signal overlap between access points, causing clients from other coverage areas to connect with access points that are farther away but broadcasting a stronger signal. 47. **In what situations might the use of an omnidirectional antenna not be the best choice?** While omnidirectional antennas might seem like a good choice for widespread Wi-Fi coverage, there are situations where using unidirectional antennas can provide better signal availability. For instance, if a company installs an omnidirectional antenna near the high ceiling of a factory, the spherical signal it emits might only benefit workers who can stand on the ceiling, which is impractical. Unidirectional antennas can be mounted higher and directed downward to create a dome-shaped coverage, ensuring the signal reaches the desired areas without wasting it where it's not needed. 48. **What is the distinction between war driving and war chalking in the context of wireless network hacking?** War driving involves hackers actively searching for vulnerable wireless networks by driving around with devices configured to intercept wireless data transmissions. Once they identify such networks, they might engage in war chalking, where they publicly mark the locations of these networks by drawing symbols with chalk on sidewalks or walls. These symbols, inspired by the markings used by hobos to indicate hospitable locations, convey information about the access point's SSID and whether it's secured. Some websites also provide maps of these open networks, as reported by war drivers. 49. **How does configuring wireless clients for enterprise wireless access differ from a standard setup?** In an enterprise environment, configuring clients for wireless network access typically involves a more intricate two-step process. The first step is on-boarding, where users or network technicians install a specific agent app on the device (e.g., smartphone, laptop, tablet) to grant trusted access to certain parts of the network. This controls the device's permissions for services such as email, file sharing, and specific network administrative functions. The second step is off-boarding, which allows network administrators
to remotely remove the agent in case of device loss or theft. This process, known as a remote wipe, clears the device of network access and sensitive information. 50. **Why is it recommended to avoid using the WPS PIN feature if possible?** WPS (Wi-Fi Protected Setup) is a user-friendly but not very secure feature found on some consumer- grade access points. It involves using a PIN (personal identification number) to access the access point's settings or associate a new device with the network. However, the WPS PIN can be easily cracked through brute force attacks, where an attacker tries numerous character combinations to discover the correct PIN. This can compromise the network's WPA2 key, making it less secure.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: Solve the quadratic equation by completing the square: x2 – 8x + 6 = 14 Give the equation after…
Q: Explain, in detail, why it is important to proactively maintain a clean code base.
Q: Finding the Domain and Range of a Graph mine the Domain and Range for the graph below. Write your…
Q: There are two questions, first about an ideal diode and then about a modeled diode. For the modeled…
Q: Why do different operating systems use different tracks on disks to store directory files? Which of…
Q: A projectile is fired vertically upward and can be modeled by the function h(t)=-1612 + 7001 + 275.…
Q: What is the systems that depend on vesicular transport
Q: Find the derivative of y by implicit differentiation 2x2+ x + xy = 1  *Note: please use…
Q: age 341, 5.2.20.* Let Y₁ < Y₂ <... <Yn be the order statistics of a random sample of size n om a…
Q: a) RTotal = b) |Total = ON EN R₁ Figure (2) 3) The circuit in Figure (2) has values of, V = 40 Volt,…
Q: Multiple-Concept Example 7 explores the approach taken in problems such as this one. The blades of a…
Q: What was Transcendentalism
Q: Draw the most important resonance contributor of the following structure. Interactive 3D display…
Q: 7) The direction of the magnetic force on the proton is A. To the right. B. To the left. C. Into the…
Q: Given the diagram below and triangle ABC is similar to Triangle DBE, find AC when BE = 10.4 in, DE =…
Q: Data was collected on salaries of compliance specialists in corporate accounting firms. The salaries…
Q: x"+ 4x + 40x = -208(1-1) Initial Conditions: x(0) = 10, x'(0) = -2 8= the Dirac Delta function Find…
Q: how does that performance compare with that of the industry? a) What was Organic Grocers' inventory…
Q: per triangular nxn matrix. Prove that if CCT=
Q: orange-violet-red-silver = 37k Ω ± 10% 370k Ω ± 5% 37k Ω ± 10% 3.7k Ω ± 10% ±
Q: Two sucrose solutions, 125 mL of 1.50 M C12H22O11 and 275 mL of 1.25 M C12H22O11, are mixed.…
Q: 4. This Olympic skeleton athlete slides down an icy track head first. The track has many twists and…