SlideShare a Scribd company logo
1 of 18
Module 12:
Wireless
Overview
Networking Without Wires
Connecting to a Wireless Network
Working with Offline Files
Lesson 1: Networking Without Wires
What Is a Wireless Network?
Wireless Network Technologies
Wireless Network Security Options
What Is a Wireless Network?
A wireless network:
Wireless networks can work in 2 modes:
Uses radio waves instead of wiresUses radio waves instead of wires
Enables users to roamEnables users to roam
Adds additional security headachesAdds additional security headaches
Ad hocAd hoc
InfrastructureInfrastructure
Wireless Network Technologies
Standard
Speeds
up to
Pros Cons
802.11a
54 Mbps
Fast Speed
Many simultaneous users
Uses 5 GHz frequency
Short-range signals
Not compatible with 802.11b
802.11b 11 Mbps
Cheap
Good signal range
Slower speeds
Fewer simultaneous users
Uses 2.4 GHz frequency
Interference
802.11g
54 Mbps
More simultaneous users
Best signal range
Compatible with 802.11b
Uses 2.4 GHz frequency
Interference
More expensive than 802.11b
Wireless Network Security Options
Option Features
Wired Equivalent Privacy
(WEP)
Open system or shared key
authentication
RC4 encryption
Wi-Fi Protected Access
(WPA or WPA-2)
User and computer authentication
RC4 with IV Encryption
802.1x Authentication Physical port authentication
Lesson 2: Connecting to a Wireless Network
Hardware for Connecting to a Wireless Network
Wireless Signal Strength
Demonstration: Connecting to a Wireless Network
Process for Troubleshooting a Wireless Network
Connection
Hardware for Connecting to a Wireless Network
Connect and configure a WAPConnect and configure a WAP
Configure a client computer to connect to the
wireless network
Configure a client computer to connect to the
wireless network


Wireless Signal Strength
To improve signal strength, move the computer:To improve signal strength, move the computer:
Closer to the WAPCloser to the WAP
Away from devices that might cause interferenceAway from devices that might cause interference


Demonstration: Connecting to a Wireless Network
Your instructor will demonstrate how to:
Connect to a Wireless Network
Connect to an Unlisted Wireless Network
Process for Troubleshooting a Wireless Network
Connection
To run the Windows Network Diagnostics:To run the Windows Network Diagnostics:
Resolve the problemResolve the problem55
Identify the problemIdentify the problem44
Review the informationReview the information33
Diagnose the connectionDiagnose the connection22
Attempt to connect to a networkAttempt to connect to a network11
Lesson 3: Working with Offline Files
What Are Offline Files?
Options for Configuring Offline Files
Options for Making a Network File Available Offline
Demonstration: Accessing Offline Files by Using
Windows 7
What Are Offline Files?
With Offline Files, you can take your computer off
the network and still have access to shared files
With Offline Files, you can take your computer off
the network and still have access to shared files
Options for Configuring Offline Files
With Offline Files, you can choose how your offline
files are configured
With Offline Files, you can choose how your offline
files are configured
Options for Making a Network File Available Offline
With Offline Settings, you can choose how your
computer makes files available to computers with
Offline Files configured
With Offline Settings, you can choose how your
computer makes files available to computers with
Offline Files configured
Demonstration: Accessing Offline Files by Using
Windows 7
Your instructor will demonstrate how to:
Setup an offline share
Access offline files
Edit offline files
Sync offline files
Lab: Networking Mobile Computers
Exercise 1: Configuring a Wireless
Network
Exercise 2: Troubleshooting a Wireless
Network
Exercise 3: Using Offline Files
Course Evaluation

More Related Content

Similar to Module 12 wireless

The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005Bill Drew
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comphanleson
 
Network operating systems1
Network operating systems1Network operating systems1
Network operating systems1Abu Sayed Adhar
 
Identify-and-Resolve-Network-Problems.pptx
Identify-and-Resolve-Network-Problems.pptxIdentify-and-Resolve-Network-Problems.pptx
Identify-and-Resolve-Network-Problems.pptxTsegabrehanZerihun
 
Module 4 sharing files by using windows 7
Module 4   sharing files by using windows 7Module 4   sharing files by using windows 7
Module 4 sharing files by using windows 7xeroxk
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
shawn.rainbolt.it241.week7.3
shawn.rainbolt.it241.week7.3shawn.rainbolt.it241.week7.3
shawn.rainbolt.it241.week7.3Shawn Rainbolt
 
Nagios Conference 2007
Nagios Conference 2007Nagios Conference 2007
Nagios Conference 2007nirvdrum
 
Wireless hacking tools.jpeg
Wireless hacking tools.jpegWireless hacking tools.jpeg
Wireless hacking tools.jpegTushant sharma
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network TroubleshootingJoy Sarker
 
Network Trends
Network TrendsNetwork Trends
Network TrendsArun ACE
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connectionsguest85e156e
 
Network Administration presentation File sharing(1).pptx
Network Administration presentation File sharing(1).pptxNetwork Administration presentation File sharing(1).pptx
Network Administration presentation File sharing(1).pptxIdrissSylla1
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Introduction to Basic IT Knowledge.pptx
Introduction to Basic IT  Knowledge.pptxIntroduction to Basic IT  Knowledge.pptx
Introduction to Basic IT Knowledge.pptxsboral2
 
Module 5 security
Module 5   securityModule 5   security
Module 5 securityIT
 

Similar to Module 12 wireless (20)

The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
Network operating systems1
Network operating systems1Network operating systems1
Network operating systems1
 
Identify-and-Resolve-Network-Problems.pptx
Identify-and-Resolve-Network-Problems.pptxIdentify-and-Resolve-Network-Problems.pptx
Identify-and-Resolve-Network-Problems.pptx
 
Module 4 sharing files by using windows 7
Module 4   sharing files by using windows 7Module 4   sharing files by using windows 7
Module 4 sharing files by using windows 7
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
2 1 lan
2 1 lan2 1 lan
2 1 lan
 
Gradution Project
Gradution ProjectGradution Project
Gradution Project
 
shawn.rainbolt.it241.week7.3
shawn.rainbolt.it241.week7.3shawn.rainbolt.it241.week7.3
shawn.rainbolt.it241.week7.3
 
Nagios Conference 2007
Nagios Conference 2007Nagios Conference 2007
Nagios Conference 2007
 
Wireless hacking tools.jpeg
Wireless hacking tools.jpegWireless hacking tools.jpeg
Wireless hacking tools.jpeg
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
Network Trends
Network TrendsNetwork Trends
Network Trends
 
Wireless security
Wireless securityWireless security
Wireless security
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
Network Administration presentation File sharing(1).pptx
Network Administration presentation File sharing(1).pptxNetwork Administration presentation File sharing(1).pptx
Network Administration presentation File sharing(1).pptx
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Introduction to Basic IT Knowledge.pptx
Introduction to Basic IT  Knowledge.pptxIntroduction to Basic IT  Knowledge.pptx
Introduction to Basic IT Knowledge.pptx
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 

More from xeroxk

Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...xeroxk
 
Hiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên PhotoshopHiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên Photoshopxeroxk
 
Powerpoint 2010
Powerpoint 2010Powerpoint 2010
Powerpoint 2010xeroxk
 
Một Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh TếMột Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh Tếxeroxk
 
Xây Dựng Thương Hiệu
Xây Dựng Thương HiệuXây Dựng Thương Hiệu
Xây Dựng Thương Hiệuxeroxk
 
Trò Chơi Tập Thể
Trò Chơi Tập ThểTrò Chơi Tập Thể
Trò Chơi Tập Thểxeroxk
 
Toefl grammar
Toefl grammarToefl grammar
Toefl grammarxeroxk
 
Thơ Tình Thế Giới
Thơ Tình Thế GiớiThơ Tình Thế Giới
Thơ Tình Thế Giớixeroxk
 
Lab linux phần iv- Internet Services
Lab linux phần iv- Internet ServicesLab linux phần iv- Internet Services
Lab linux phần iv- Internet Servicesxeroxk
 
Lab linux phan i, ii.doc
Lab linux phan i, ii.docLab linux phan i, ii.doc
Lab linux phan i, ii.docxeroxk
 
Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010xeroxk
 
Athena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNAAthena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNAxeroxk
 
Hướng Dẫn Php-3
Hướng Dẫn Php-3Hướng Dẫn Php-3
Hướng Dẫn Php-3xeroxk
 
Athena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng LanAthena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng Lanxeroxk
 
Athena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLanAthena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLanxeroxk
 
Module 6 configuring user account security
Module 6   configuring user account securityModule 6   configuring user account security
Module 6 configuring user account securityxeroxk
 
Module 3 configuring post-installation system settings
Module 3   configuring post-installation system settingsModule 3   configuring post-installation system settings
Module 3 configuring post-installation system settingsxeroxk
 
Module 7 configuring network security
Module 7   configuring network securityModule 7   configuring network security
Module 7 configuring network securityxeroxk
 
Sử Dụng win 7
Sử Dụng win 7Sử Dụng win 7
Sử Dụng win 7xeroxk
 

More from xeroxk (20)

Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
 
Hiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên PhotoshopHiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên Photoshop
 
Powerpoint 2010
Powerpoint 2010Powerpoint 2010
Powerpoint 2010
 
Một Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh TếMột Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh Tế
 
Xây Dựng Thương Hiệu
Xây Dựng Thương HiệuXây Dựng Thương Hiệu
Xây Dựng Thương Hiệu
 
Trò Chơi Tập Thể
Trò Chơi Tập ThểTrò Chơi Tập Thể
Trò Chơi Tập Thể
 
Toefl grammar
Toefl grammarToefl grammar
Toefl grammar
 
Thơ Tình Thế Giới
Thơ Tình Thế GiớiThơ Tình Thế Giới
Thơ Tình Thế Giới
 
Xml
XmlXml
Xml
 
Lab linux phần iv- Internet Services
Lab linux phần iv- Internet ServicesLab linux phần iv- Internet Services
Lab linux phần iv- Internet Services
 
Lab linux phan i, ii.doc
Lab linux phan i, ii.docLab linux phan i, ii.doc
Lab linux phan i, ii.doc
 
Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010
 
Athena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNAAthena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNA
 
Hướng Dẫn Php-3
Hướng Dẫn Php-3Hướng Dẫn Php-3
Hướng Dẫn Php-3
 
Athena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng LanAthena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng Lan
 
Athena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLanAthena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLan
 
Module 6 configuring user account security
Module 6   configuring user account securityModule 6   configuring user account security
Module 6 configuring user account security
 
Module 3 configuring post-installation system settings
Module 3   configuring post-installation system settingsModule 3   configuring post-installation system settings
Module 3 configuring post-installation system settings
 
Module 7 configuring network security
Module 7   configuring network securityModule 7   configuring network security
Module 7 configuring network security
 
Sử Dụng win 7
Sử Dụng win 7Sử Dụng win 7
Sử Dụng win 7
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Module 12 wireless

  • 2. Overview Networking Without Wires Connecting to a Wireless Network Working with Offline Files
  • 3. Lesson 1: Networking Without Wires What Is a Wireless Network? Wireless Network Technologies Wireless Network Security Options
  • 4. What Is a Wireless Network? A wireless network: Wireless networks can work in 2 modes: Uses radio waves instead of wiresUses radio waves instead of wires Enables users to roamEnables users to roam Adds additional security headachesAdds additional security headaches Ad hocAd hoc InfrastructureInfrastructure
  • 5. Wireless Network Technologies Standard Speeds up to Pros Cons 802.11a 54 Mbps Fast Speed Many simultaneous users Uses 5 GHz frequency Short-range signals Not compatible with 802.11b 802.11b 11 Mbps Cheap Good signal range Slower speeds Fewer simultaneous users Uses 2.4 GHz frequency Interference 802.11g 54 Mbps More simultaneous users Best signal range Compatible with 802.11b Uses 2.4 GHz frequency Interference More expensive than 802.11b
  • 6. Wireless Network Security Options Option Features Wired Equivalent Privacy (WEP) Open system or shared key authentication RC4 encryption Wi-Fi Protected Access (WPA or WPA-2) User and computer authentication RC4 with IV Encryption 802.1x Authentication Physical port authentication
  • 7. Lesson 2: Connecting to a Wireless Network Hardware for Connecting to a Wireless Network Wireless Signal Strength Demonstration: Connecting to a Wireless Network Process for Troubleshooting a Wireless Network Connection
  • 8. Hardware for Connecting to a Wireless Network Connect and configure a WAPConnect and configure a WAP Configure a client computer to connect to the wireless network Configure a client computer to connect to the wireless network  
  • 9. Wireless Signal Strength To improve signal strength, move the computer:To improve signal strength, move the computer: Closer to the WAPCloser to the WAP Away from devices that might cause interferenceAway from devices that might cause interference  
  • 10. Demonstration: Connecting to a Wireless Network Your instructor will demonstrate how to: Connect to a Wireless Network Connect to an Unlisted Wireless Network
  • 11. Process for Troubleshooting a Wireless Network Connection To run the Windows Network Diagnostics:To run the Windows Network Diagnostics: Resolve the problemResolve the problem55 Identify the problemIdentify the problem44 Review the informationReview the information33 Diagnose the connectionDiagnose the connection22 Attempt to connect to a networkAttempt to connect to a network11
  • 12. Lesson 3: Working with Offline Files What Are Offline Files? Options for Configuring Offline Files Options for Making a Network File Available Offline Demonstration: Accessing Offline Files by Using Windows 7
  • 13. What Are Offline Files? With Offline Files, you can take your computer off the network and still have access to shared files With Offline Files, you can take your computer off the network and still have access to shared files
  • 14. Options for Configuring Offline Files With Offline Files, you can choose how your offline files are configured With Offline Files, you can choose how your offline files are configured
  • 15. Options for Making a Network File Available Offline With Offline Settings, you can choose how your computer makes files available to computers with Offline Files configured With Offline Settings, you can choose how your computer makes files available to computers with Offline Files configured
  • 16. Demonstration: Accessing Offline Files by Using Windows 7 Your instructor will demonstrate how to: Setup an offline share Access offline files Edit offline files Sync offline files
  • 17. Lab: Networking Mobile Computers Exercise 1: Configuring a Wireless Network Exercise 2: Troubleshooting a Wireless Network Exercise 3: Using Offline Files