chapter 8/instaling wireless and SOHO network Flashcards
wireless
339
Wireless Fidelity, Wi-Fi utilizes one of the IEEE 802.11 wireless standards to achieve a wireless connection to a network. A home wireless network uses a wireless access point or router to broadcast a signal using WAP or WEP encryption to send and receive signals from wireless devices on the network.
the IEEE is the most slandered but there are other out there like Bluetooth, cellular, infrared and more
802.11
there are over 20 IEEE, we are going to do only 4 of them
340
there are: IEEE 802.11 a IEEE 802.11 b IEEE 802.11 g IEEE 802.11 n
what do you need to know in order to connect to the wireless router or Hub
340
the client need to know the service set identifier of the device SSID
802.11 use an access method different then the one Ethernet uses (CSMA/CD)
340
802.11 uses ( CSMA/CA ) carrier sense multiple access/collision avoidance
802.11
340
WLAN’s standard capable of transmissions of 1 to 2 Mbps and operates in the 2.4 GHz band.
it uses ether FHSS or DSSS spectrum
802.11 a
340
Capable of transmissions of up to 54 Mbps and operates in the 5 GHz band.
data rate 11 Mbps
802.11 b
341
802.11b is capable of transmissions of up to 11 Mbps and operates in the 2.4 GHz band.
it uses DSSS for Data encoding
Data rate 11Mbps
802.11g
341
Capable of transmissions of up to 20 Mbps and operates in the 2.4 GHz band using OFDM or DSSS
Data rate 54Mbps
802.11 n
343
Operates using the 2.4GHz and 5GHz bandwidths. It utilizes multiple-input, multiple-output (MIMO) antennas to improve data transfer speeds. Data rate 600 Mbps
Modulation Technique
343
?
802.11 Devices
343
NIC card including USB and PCMCIA
wireless router
a hub called wireless access point WAP
Wireless Encryption Standards
344
wireless computers are like radios any one can listen to it , to solve this problem we need to put keys for safety
For that there are some encryption standards or security standards.
WEP
WPA
WPA2
WEP
never use the WEP encryption protocol.
345
Wireless Equivalent Privacy,
There were three different levels of encryption that we were able to use, WEP 64-bit uses 10 characters key and a much stronger WEP 128-bit uses 26 characters key. and the 3 one was WEP 256-bit uses 58 characters key.
WPA
345
Wi-Fi Protected Access, WPA is an improved data encryption standard
WPA used an encryption method called, TKIP stands for temporal key integrity protocol, WPA uses 128 bit dynamic per-packet key. WPA generated a new key for every packet.
WPA2
345
WPA2 (Wi-Fi Protected Access II) provides security and encryption for data transmissions and general computer connectivity and is a replacement for WPA. it uses CCMP which is a protocol based on AES