DOC PREVIEW
OSU BA 479 - Wireless

This preview shows page 1-2-3-4-5-6 out of 18 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Slide 1OutlineIntroduction & HistoryTopologyAdvantagesSlide 6HardwareSlide 8Slide 9Slide 10802.11a, b, g, nMedia Access ControlData TransmissionSecurity TypesSlide 15Slide 16Slide 17QuestionsRomney BakeBrian PetersonClay StephensMichael HathewayOutlineIntroductionTopologyAdvantages/DisadvantagesHardwareA, B, G, N ComparisonMedia Access Controls/Data TransmissionSecurity TypesRouter ConfigurationQuestionsIntroduction & HistoryWireless connections were originally developed for mobile computing devices, such as laptops, but is now increasingly used for more services, including Internet and VoIP phone access and basic connectivity of consumer electronics such as televisions and DVD players.First Wireless LAN developed in 1971, called ALOHANET.TopologyInternetInternetAdvantagesAdvantagesNo cables (Outdoor uses)MobilityWidely available productsGlobal set of standardsAvailable in more than 300,000 hot spotsWPA and WPA2 securitiesCheaper/Comparable pricesDrains batteries on laptopsSecurity issuesDefault settings for access points and routersPotential interoperability between brandsOften slower than wired connectionsLimited rangeDisadvantagesHardwareAccess Point (AP)Connects a group of wireless devices to an adjacent wired LANRelays data between connected wireless devices in addition to a (usually) single connected wired deviceWireless Adapter (WNIC)Allows a device to connect to a wireless networkConnects by either PCI, USB, PCMCIAWireless RouterAllows wired and wireless ethernet LAN devices to connect to a (usually) single WAN device such as cable modem or DSL modemallows all three devices (mainly the access point and router) to be configured through one central utilityRange ExtenderExtends the range of an existing wireless networkAllows signal area to reach around barriers such as those created in L-shaped corridorsIncrease in latency802.11a, b, g, nMedia Access ControlUses Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), similar to CSMA/CD in wired EthernetComputers listen before transmitting, if no one else is transmitting, they transmitData TransmissionDistributed Coordination FunctionRelies on computers to physically listen before transmittingStop and Wait ARQPoint Coordination FunctionComputer must send Request To Transmit to Access Point firstThe Clear To Transmit is granted for requesting computer for specific time period on the circuitWorks well with high traffic networksSecurity TypesService Set Identifier (SSID)Code attached to all packets on a wireless network to identify each packet as part of that networkCode is a case sensitive text string which consists of a maximum of 32 alphanumeric charactersMinimum securityWired Equivalent Privacy (WEP)Provide comparable confidentiality to a traditional wired networkWEP key can be cracked with readily available software in two minutes or less Easy to share key for accessExtensible Authentication Protocol (EAP)Generates WEP keys automaticallyUser login to serverAfter login sever will generate WEP key for the sessionEasy to break by professional hackersWi-Fi Protected Access (WPA and WPA2)Intended as an intermediate measure to take the place of WEP while 802.11i was preparedDesigned to work with all wireless network interface cards, but not necessarily with first generation wireless access pointsWPA2 implements the full standard, but will not work with some older network cardsNot selected by


View Full Document
Download Wireless
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Wireless and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Wireless 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?