Wireless Networks

766
-1

Published on

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
766
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
52
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Wireless Networks

  1. 1. The Wireless Network
  2. 2. Implementing Wireless <ul><li>Access point (AP) or </li></ul><ul><li>Wireless router w/ firewall </li></ul><ul><li>Wireless card or adapter (PC card) </li></ul><ul><li>Repeaters </li></ul>
  3. 3. Access Point (AP) <ul><li>Dedicated AP – has radio that serves as a bridge between the wired and wireless network </li></ul><ul><li>a hardware device or a computer's software that acts as a communication hub for users of a wireless device to connect to a wired LAN </li></ul><ul><li>Important for providing heightened wireless security and for extending the physical range of service </li></ul><ul><li>Security gateways intercept wireless traffic as it passes from AP to wired network for authentication of messages </li></ul>
  4. 4. IEEE 802.11 Wireless <ul><li>802.11b – (late 1999) most widely implemented and compatible with “g” </li></ul><ul><li>All hot spots are 802.11b </li></ul><ul><li>802.11a – (late 2001) incompatible with “b” and “g” products </li></ul><ul><li>802.11g – (mid 2003) compatible with “b” at “b” throughput </li></ul><ul><li>Theoretically 5x faster than “b” </li></ul><ul><li>802.11a/g – (mid 2003) can be used at hot spots </li></ul>
  5. 5. Throughput 15-20 Mbps 54 Mbps 2.4 and 5 802.11a/g 15-20 Mbps 54 Mbps 2.4 802.11g 15-20 Mbps 54 Mbps 5 802.11a 4-6 Mbps 11 Mbps 2.4 802.11b Usable at 20’-60’ Throughput (Max) Frequency GHz Standard
  6. 6. Hot Spots <ul><li>Areas offering wireless online access to anyone with an 802.11b wireless LAN card </li></ul><ul><li>Hot spots may be unsecured wireless servers </li></ul><ul><li>If you are working off-line, remove your wireless card or disconnect from the network. </li></ul><ul><li>To check for hotspots or learn how to set up wireless go to </li></ul><ul><li>http://www.jiwire.com/?cid=140 </li></ul>
  7. 7. Wireless Security <ul><li>Wireless Equivalency Protocol (WEP) – </li></ul><ul><ul><li>Older protocol using encryption </li></ul></ul><ul><ul><li>Not considered secure against hackers </li></ul></ul><ul><li>Wi-Fi Protected Access (WPA) – </li></ul><ul><ul><li>Stronger security that fixes weaknesses in WEP. Look for Wi-Fi on the seal. </li></ul></ul><ul><li>Security is usually not implemented and must be configured by the administrator </li></ul>
  8. 8. Implementing Wi-Fi Protected Access (WPA) <ul><li>You must have </li></ul><ul><li>an access point (AP) or wireless router w/WPA support </li></ul><ul><li>a wireless network card with WPA drivers </li></ul><ul><li>a client (aka supplicant) that supports WPA and your OS </li></ul>
  9. 9. Le finis <ul><li>that’s all on wireless for the time being! </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×