Professional Documents
Culture Documents
Definition
A network that links two or more devices using some wireless distribution method usually provides a connection through an access point to the wider internet
Brief history
Norman Abramson
Univ of Hawaii prof Developed ALOHAnet
Worlds 1st wireless communication network The system included seven computers deployed over four islands to communicate with the central computer on the Oahu Island without using phone lines
Wireless protocols
802.11 a
It operates in the 5 GHz band with a maximum net data rate of 54 Mbit/s
802.11 b
has a maximum raw data rate of 11 Mbit/s. Operates in the 2.4 Ghz band. Prone to interference
802.11 g
Works in the same frequency as with 802.11b. Has 54 Mbit/s of throughput. Backward compatible to 802.11b.
802.11 n
It operates at a maximum net data rate from 54 Mbit/s to 600 Mbit/s. 802.11n operates on both the 2.4 GHz and the lesser used 5 GHz bands
Wireless Security
the prevention of unauthorized access or damage to computers using wireless networks
WPA
"WPA," or "Wi-Fi Protected Access, a type of wireless network security that relies on encryption. WPA security provides user authentication. WPA
The first version is commonly used in corporate or organization situations where many different users must connect to a single network. It is designed to use a pre-shared security key
WPA2
compatible with fewer networks, but is more secure. WPA2 is typically used whenever possible, with WPA as a backup option for older systems.
802.1X
used as an additional layer of security that can be used with both WEP and WPA networks. a special server is used to validate network users. this server contains a list of users who are authorized on the network. Users with the proper permission are allowed to connect, while unauthorized outside users are blocked.
Encryption methods
AES vs TKIP
The Advanced Encryption Standard (AES)
a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2002. Originally called Rijndael developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen
Best choice?
AES offers stronger encryption technology and is the right choice (assuming all of the devices on your network support it). TKIP is also strong and tends to be supported by more equipment on the market. consider AES first and TKIP as a reasonable backup option.
6. Do Not Auto-Connect to Open Wi-Fi Networks 7. Assign Static IP Addresses to Devices 8. Enable Firewalls On Each Computer and the Router 9. Position the Router or Access Point Safely 10. Turn Off the Network During Extended Periods of Non-Use