Wireless Networking <ul><li>Presented by:   </li></ul><ul><ul><ul><li>Jeffrey D. Bombell, American Computer Technologies <...
Agenda <ul><li>Introduction to Wireless Technologies </li></ul><ul><li>Wireless Networking Overview  </li></ul><ul><li>Non...
What is Wi-Fi   <ul><li>Wi-Fi is an abbreviation for Wireless Fidelity and a catch all phrase for the several different st...
Standards <ul><li>IEEE 802.11.b –2.4GHz – 11Mbps </li></ul>Introduction to Wireless /802.11b International standard for wi...
Standards <ul><li>IEEE 802.11.b –2.4GHz – 11Mbps </li></ul>Introduction to Wireless /802.11b 802.11b enables transfers of ...
Standards <ul><li>IEEE 802.11.a –5GHz – 11Mbps </li></ul>Introduction to Wireless /802.11b International standard  for wir...
Standards <ul><li>IEEE 802.11.b –2.4GHz – 11Mbps </li></ul><ul><li>IEEE 802.11.a – 5GHz – 54 Mbps </li></ul><ul><li>IEEE 8...
Limitations  <ul><li>300 ft. effective range from access point </li></ul><ul><ul><li>1400 ft maximum range </li></ul></ul>...
Security Overview   <ul><li>WEP - Wired Equivalent Privacy  </li></ul><ul><ul><li>40 bit vs. 128 bit </li></ul></ul><ul><u...
Applications  <ul><li>Any application currently used on a traditional wired network can be used on a wireless network.  </...
Agenda <ul><li>Introduction to Wireless Technologies </li></ul><ul><li>Wireless Networking Overview  </li></ul>
Wireless Network Components <ul><li>Access Points </li></ul><ul><li>NICs – Network Interface Cards </li></ul><ul><ul><li>P...
Connecting To a Legacy Network   <ul><li>Access Points connect the wireless network to the legacy network. </li></ul>Wirel...
Security  (Encryption, Content Filtering, Privacy, etc.)   <ul><li>Partition The Network </li></ul><ul><ul><li>A safe prac...
Security  (Encryption, Content Filtering, Privacy, etc.)   <ul><li>Encryption </li></ul><ul><li>Encryption on the pubic ne...
Security  (Encryption, Content Filtering, Privacy, etc.)   <ul><li>Content Filtering & Proxy Servers </li></ul><ul><ul><li...
Security  (Encryption, Content Filtering, Privacy, etc.)   <ul><li>Viruses and Hacker </li></ul><ul><ul><li>Wireless does ...
Environment Assessment  <ul><li>Look at the structure of your building. </li></ul><ul><ul><li>Steel, Concrete, Stone, Glas...
Agenda <ul><li>Introduction to Wireless Technologies </li></ul><ul><li>Wireless Networking Overview   </li></ul><ul><li>No...
Why Deploy Wireless? <ul><li>Cost savings over wireline. </li></ul><ul><li>Can not run wire to locations needed. </li></ul...
Cost <ul><li>802.11b Wireless Access Points start around $130.00 for basic connectivity and run up to $500.00 for more man...
The A-B-Gs of Wireless <ul><li>Which standard is right for you? </li></ul>Non-Technical Considerations <ul><li>802.11.a  <...
Security Planning <ul><li>Develop a Security Plan.  It should include: </li></ul><ul><li>What are your special security ne...
Virtual Hours   <ul><li>Your wireless network may not stop at your door.  This means anyone can access your network after ...
Where to Start Non-Technical Considerations <ul><li>Evaluate the need. </li></ul><ul><li>Assess current security and futur...
Agenda <ul><li>Introduction to Wireless Technologies </li></ul><ul><li>Wireless Networking Overview  </li></ul><ul><li>Non...
Wireline Other Comparable Technologies If you have a network installed today, wireline is what you.  Does it satisfy your ...
HPNA Other Comparable Technologies HPNA is Phone Line Networking.  HPNA allows you to transmit data over normal phone line...
Bluetooth – 802.15 Other Comparable Technologies Bluetooth is the standard for wireless personal area networks or WPAN.  I...
Agenda <ul><li>Introduction to Wireless Technologies </li></ul><ul><li>Wireless Networking Overview  </li></ul><ul><li>Non...
Upcoming SlideShare
Loading in...5
×

Wireless

322

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
322
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Wireless

  1. 1. Wireless Networking <ul><li>Presented by: </li></ul><ul><ul><ul><li>Jeffrey D. Bombell, American Computer Technologies </li></ul></ul></ul>
  2. 2. Agenda <ul><li>Introduction to Wireless Technologies </li></ul><ul><li>Wireless Networking Overview </li></ul><ul><li>Non-Technical considerations </li></ul><ul><li>Other Comparable Technologies </li></ul><ul><li>Q&A </li></ul>
  3. 3. What is Wi-Fi <ul><li>Wi-Fi is an abbreviation for Wireless Fidelity and a catch all phrase for the several different standards and recommendations that comprise wireless networking . </li></ul><ul><li>Wi-Fi enables the user to deploy a computer network without needing to run cable throughout the facility. </li></ul>Introduction to Wireless /802.11b
  4. 4. Standards <ul><li>IEEE 802.11.b –2.4GHz – 11Mbps </li></ul>Introduction to Wireless /802.11b International standard for wireless networking that operates in the 2.4 GHz frequency range (2.4 GHz to 2.4835 GHz) and provides a throughput of up to 11 Mbps with a range of just over 300 feet indoors. This is a very commonly used frequency. Microwave ovens, cordless phones, medical and scientific equipment, as well as Bluetooth devices, all work within the 2.4 GHz frequency band.
  5. 5. Standards <ul><li>IEEE 802.11.b –2.4GHz – 11Mbps </li></ul>Introduction to Wireless /802.11b 802.11b enables transfers of up to 11 Mbps. Comparable to 10BaseT in speeds, 802.11b is the most common wireless standard deployed today. In comparison T1 speeds are 1.54Mbps and DSL is normally in the 640Kbps range. Most deployments of Wireless utilize 802.11b
  6. 6. Standards <ul><li>IEEE 802.11.a –5GHz – 11Mbps </li></ul>Introduction to Wireless /802.11b International standard for wireless networking that operates in the 5 GHz frequency range (5.725 GHz to 5.850 GHz) with a maximum 54 Mbps data transfer rate. The 5 GHz frequency band is not as crowded as the 2.4 GHz frequency, because the 802.11a specification offers more radio channels than the 802.11b. These additional channels can help avoid radio and microwave interference. Cost of 802.11a equipment is approximately twice that of 802.11b and current deployment is limited.
  7. 7. Standards <ul><li>IEEE 802.11.b –2.4GHz – 11Mbps </li></ul><ul><li>IEEE 802.11.a – 5GHz – 54 Mbps </li></ul><ul><li>IEEE 802.11g – 2.4Ghz – Hybrid 11/54Mbps </li></ul><ul><ul><ul><li>802.11g is in the final stages of development. The current draft (V5.0) is open for comments until January 8, 2003. </li></ul></ul></ul>Introduction to Wireless /802.11b
  8. 8. Limitations <ul><li>300 ft. effective range from access point </li></ul><ul><ul><li>1400 ft maximum range </li></ul></ul><ul><li>Structural interference </li></ul><ul><li>Interference from other devices such as cordless phones. </li></ul>Introduction to Wireless /802.11b
  9. 9. Security Overview <ul><li>WEP - Wired Equivalent Privacy </li></ul><ul><ul><li>40 bit vs. 128 bit </li></ul></ul><ul><ul><li>Is Encryption Necessary? </li></ul></ul><ul><li>Open access vs. Secured </li></ul><ul><li>Other Security Measures </li></ul><ul><ul><li>Content Filtering </li></ul></ul><ul><ul><li>Network Partitioning </li></ul></ul>Introduction to Wireless /802.11b
  10. 10. Applications <ul><li>Any application currently used on a traditional wired network can be used on a wireless network. </li></ul><ul><li>New applications may be available or can be developed to take advantage of wireless, such as Wireless PDA access to a card catalog. </li></ul>Introduction to Wireless /802.11b
  11. 11. Agenda <ul><li>Introduction to Wireless Technologies </li></ul><ul><li>Wireless Networking Overview </li></ul>
  12. 12. Wireless Network Components <ul><li>Access Points </li></ul><ul><li>NICs – Network Interface Cards </li></ul><ul><ul><li>PCMCIA </li></ul></ul><ul><ul><li>USB </li></ul></ul><ul><ul><li>PCI </li></ul></ul><ul><ul><li>CompactFlash </li></ul></ul><ul><li>Other Wireless Devices </li></ul><ul><ul><li>Bridges and Routers </li></ul></ul><ul><ul><li>Print Servers </li></ul></ul><ul><li>PCs, Laptops, PDAs </li></ul>Wireless Networking Overview
  13. 13. Connecting To a Legacy Network <ul><li>Access Points connect the wireless network to the legacy network. </li></ul>Wireless Networking Overview
  14. 14. Security (Encryption, Content Filtering, Privacy, etc.) <ul><li>Partition The Network </li></ul><ul><ul><li>A safe practice is to create two separate networks. A private network for day to day business and a network for public access. Both can be wireless. These networks can talk to one another through a proxy server that will protect the private network from malicious attacks via the public network. </li></ul></ul>Wireless Networking Overview
  15. 15. Security (Encryption, Content Filtering, Privacy, etc.) <ul><li>Encryption </li></ul><ul><li>Encryption on the pubic network can be used but would create administrative overhead. Encryption keys would have to be changed regularly and anyone using their own laptop would have to be given the key. </li></ul><ul><li>Encryption works best in a network that does not allow people to use their own laptops. </li></ul><ul><li>Encryption increases privacy, but can be thwarted, either by software, or by gaining access to a PC configured with wireless and writing down the key. </li></ul>Wireless Networking Overview
  16. 16. Security (Encryption, Content Filtering, Privacy, etc.) <ul><li>Content Filtering & Proxy Servers </li></ul><ul><ul><li>Web content filtering that has generally been software on the desktop would have to be handled by a server if people are allowed to use their own laptops. </li></ul></ul><ul><ul><li>Proxy servers allow you to control what information people have access to. This is a good practice anyway, allowing you to control at a global level what information travels over your network. It also allows you to track usage. </li></ul></ul>Wireless Networking Overview
  17. 17. Security (Encryption, Content Filtering, Privacy, etc.) <ul><li>Viruses and Hacker </li></ul><ul><ul><li>Wireless does not add any additional threat in the way of viruses. </li></ul></ul><ul><ul><li>Anyone, anywhere can attack a network that is connected to the Internet. Wireless does not increase that chance. Security measures such as firewalls, can reduce the risk. </li></ul></ul>Wireless Networking Overview
  18. 18. Environment Assessment <ul><li>Look at the structure of your building. </li></ul><ul><ul><li>Steel, Concrete, Stone, Glass </li></ul></ul><ul><ul><li>Open w/ few walls or many separate rooms? </li></ul></ul><ul><li>Current technologies used </li></ul><ul><ul><li>Do you use a 2.4 GHz cordless phone? Does it work throughout your environment? </li></ul></ul>Wireless Networking Overview
  19. 19. Agenda <ul><li>Introduction to Wireless Technologies </li></ul><ul><li>Wireless Networking Overview </li></ul><ul><li>Non-Technical considerations </li></ul>
  20. 20. Why Deploy Wireless? <ul><li>Cost savings over wireline. </li></ul><ul><li>Can not run wire to locations needed. </li></ul><ul><li>To enable patrons to bring their own laptop, therefore reducing the cost of owning many PCs. </li></ul><ul><li>To enable you to easily move PCs. </li></ul><ul><li>To be on the leading edge. </li></ul>Non-Technical Considerations
  21. 21. Cost <ul><li>802.11b Wireless Access Points start around $130.00 for basic connectivity and run up to $500.00 for more management features. </li></ul><ul><li>802.11b Network Interface Cards (NICs) cost between $50-$100 and come in USB, PCI, PCMCIA and CompactFlash versions. </li></ul>Non-Technical Considerations
  22. 22. The A-B-Gs of Wireless <ul><li>Which standard is right for you? </li></ul>Non-Technical Considerations <ul><li>802.11.a </li></ul><ul><ul><li>54 Mbps @ 5MHz </li></ul></ul><ul><ul><li>Not widely adopted </li></ul></ul><ul><li>802.11.b </li></ul><ul><ul><li>11 Mbps @2.4GHz </li></ul></ul><ul><ul><li>Low Cost </li></ul></ul><ul><li>802.11.g </li></ul><ul><ul><li>New technology - Available late 2003 </li></ul></ul><ul><ul><li>Compatible with 802.11b </li></ul></ul>
  23. 23. Security Planning <ul><li>Develop a Security Plan. It should include: </li></ul><ul><li>What are your special security needs? </li></ul><ul><li>What known vulnerabilities exist? </li></ul><ul><li>How to safe guard against the risks? </li></ul><ul><li>How do you recover from a security breech? </li></ul>Non-Technical Considerations
  24. 24. Virtual Hours <ul><li>Your wireless network may not stop at your door. This means anyone can access your network after hours by sitting outside with a laptop. </li></ul>Non-Technical Considerations
  25. 25. Where to Start Non-Technical Considerations <ul><li>Evaluate the need. </li></ul><ul><li>Assess current security and future needs. </li></ul><ul><li>Assess the environment. </li></ul><ul><li>Choose a standard. </li></ul><ul><li>Ask for help. </li></ul>
  26. 26. Agenda <ul><li>Introduction to Wireless Technologies </li></ul><ul><li>Wireless Networking Overview </li></ul><ul><li>Non-Technical considerations </li></ul><ul><li>Other Comparable Technologies </li></ul>
  27. 27. Wireline Other Comparable Technologies If you have a network installed today, wireline is what you. Does it satisfy your needs? There is not reason to abandon your current infrastructure for wireless if wireline currently serves all your needs. If it serves some, but not all of your needs, Wireless may be a good supplement.
  28. 28. HPNA Other Comparable Technologies HPNA is Phone Line Networking. HPNA allows you to transmit data over normal phone lines at the same time you use that phone for voice calls and DSL. HPNA v2.0 runs at 10Mbps over a standard phone line. V3.0 is coming soon and delivers 100Mbps. If you currently have a lot of phone lines running through your facility this may be an option to consider.
  29. 29. Bluetooth – 802.15 Other Comparable Technologies Bluetooth is the standard for wireless personal area networks or WPAN. It allows high speed transmission of data over very short distances. Bluetooth is normally used for transferring data between laptops, or in Internet Kiosk type applications where roaming is not needed.
  30. 30. Agenda <ul><li>Introduction to Wireless Technologies </li></ul><ul><li>Wireless Networking Overview </li></ul><ul><li>Non-Technical considerations </li></ul><ul><li>Other Comparable Technologies </li></ul><ul><li>Q&A </li></ul>
  1. Gostou de algum slide específico?

    Recortar slides é uma maneira fácil de colecionar informações para acessar mais tarde.

×