Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
-
Upload
lindsay-kelly -
Category
Documents
-
view
225 -
download
0
Transcript of Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
![Page 1: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/1.jpg)
Romney BakeBrian PetersonClay Stephens
Michael Hatheway
![Page 2: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/2.jpg)
OutlineIntroductionTopologyAdvantages/DisadvantagesHardwareA, B, G, N ComparisonMedia Access Controls/Data TransmissionSecurity TypesRouter ConfigurationQuestions
![Page 3: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/3.jpg)
Introduction & HistoryWireless connections were originally
developed for mobile computing devices, such as laptops, but is now increasingly used for more services, including Internet and VoIP phone access and basic connectivity of consumer electronics such as televisions and DVD players.
First Wireless LAN developed in 1971, called ALOHANET.
![Page 4: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/4.jpg)
TopologyInternetInternet
![Page 5: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/5.jpg)
AdvantagesAdvantagesNo cables (Outdoor uses)MobilityWidely available productsGlobal set of standardsAvailable in more than 300,000 hot spotsWPA and WPA2 securitiesCheaper/Comparable prices
![Page 6: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/6.jpg)
Drains batteries on laptopsSecurity issuesDefault settings for access points and routersPotential interoperability between brandsOften slower than wired connectionsLimited range
Disadvantages
![Page 7: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/7.jpg)
HardwareAccess Point (AP)Connects a group of wireless devices to an
adjacent wired LANRelays data between connected wireless
devices in addition to a (usually) single connected wired device
![Page 8: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/8.jpg)
Wireless Adapter (WNIC)Allows a device to connect to a wireless
networkConnects by either PCI, USB, PCMCIA
![Page 9: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/9.jpg)
Wireless RouterAllows wired and wireless ethernet LAN
devices to connect to a (usually) single WAN device such as cable modem or DSL modem
allows all three devices (mainly the access point and router) to be configured through one central utility
![Page 10: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/10.jpg)
Range ExtenderExtends the range of an existing wireless
networkAllows signal area to reach around barriers
such as those created in L-shaped corridorsIncrease in latency
![Page 11: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/11.jpg)
802.11a, b, g, n
![Page 12: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/12.jpg)
Media Access ControlUses Carrier Sense Multiple Access with
Collision Avoidance (CSMA/CA), similar to CSMA/CD in wired Ethernet
Computers listen before transmitting, if no one else is transmitting, they transmit
![Page 13: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/13.jpg)
Data TransmissionDistributed Coordination FunctionRelies on computers to physically listen
before transmittingStop and Wait ARQPoint Coordination FunctionComputer must send Request To Transmit to
Access Point firstThe Clear To Transmit is granted for
requesting computer for specific time period on the circuit
Works well with high traffic networks
![Page 14: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/14.jpg)
Security TypesService Set Identifier (SSID)Code attached to all packets on a wireless
network to identify each packet as part of that network
Code is a case sensitive text string which consists of a maximum of 32 alphanumeric characters
Minimum security
![Page 15: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/15.jpg)
Wired Equivalent Privacy (WEP)Provide comparable confidentiality to a
traditional wired networkWEP key can be cracked with readily
available software in two minutes or less Easy to share key for access
![Page 16: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/16.jpg)
Extensible Authentication Protocol (EAP)Generates WEP keys automaticallyUser login to serverAfter login sever will generate WEP key for
the sessionEasy to break by professional hackers
![Page 17: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/17.jpg)
Wi-Fi Protected Access (WPA and WPA2)Intended as an intermediate measure to take
the place of WEP while 802.11i was preparedDesigned to work with all wireless network
interface cards, but not necessarily with first generation wireless access points
WPA2 implements the full standard, but will not work with some older network cards
Not selected by default
![Page 18: Romney Bake Brian Peterson Clay Stephens Michael Hatheway.](https://reader036.fdocuments.in/reader036/viewer/2022062301/56649db35503460f94aa2bfc/html5/thumbnails/18.jpg)
Questions?