list all of the wireless devices in your home and college. briefly explain the purpose of each device.
research the IEEE 802.11g and 802.11n standards. explain the key points of each standard including the data rates & make comparison between the two standards.
explain the different wireless network security risks and give the possible solution in order to avoid these risks.
find at least four (4) wireless networking protocols and explain each protocols.
answer
Wireless networks are computer networks that are not connected by cables of any kind. WiFi is a technology that uses radio waves to provide network connectivity.
- Wireless Networks Are Scalable
- Wireless Networks Can Be Used by Guests
- Wireless Networks Are Mobile
- Wireless Networks Work With Multiple Devices
- Wireless Networks Increase Efficiency
Wireless Router - A wireless repeater is a wireless networking device that is used to extend the range of a router. A repeater receives wireless signals and then re-emits them with increased strength. By placing a repeater between a router and the computer connected to the router, signal strength can be boosted, resulting in faster connection speeds.
Wireless Adapters - Wireless adapters are hardware devices installed inside computers that enable wireless connectivity. If a computer does not have a wireless adapter, it will not be able to connect to a router in order to access the Internet. Some computers have wireless adapters built directly into the motherboard while it is also possible to install stand-alone wireless adapters to add wireless capability to a computer that did not come with an adapter built in.
Wireless Repeater - A wireless repeater is a wireless networking device that is used to extend the range of a router. A repeater receives wireless signals and then re-emits them with increased strength. By placing a repeater between a router and the computer connected to the router, signal strength can be boosted, resulting in faster connection speeds.
Wireless Phones - Cellular and cordless phones are two more examples of device that make use of wireless signals. Cordless phones have a limited range, but cell phones typically have a much larger range than local wireless networks, since cell phone providers use large telecommunication towers to provide cell phone coverage.Satellite phones make use of signals from satellites to communicate, similar to Global Positioning System (Gps) devices.
The 802.11g specification is a standard for wireless local area networks (WLANs) that offers transmission over relatively short distances at up to 54 megabits per second (Mbps)
802.11n is a specification for wireless LAN (WLAN) communications. 802.11n, an addition to the 802.11 family of standards, will increase wireless local area network(WLAN) speed, improve reliability and extend the range of wireless transmissions.
802.11n is a specification for wireless LAN (WLAN) communications. 802.11n, an addition to the 802.11 family of standards, will increase wireless local area network(WLAN) speed, improve reliability and extend the range of wireless transmissions.
| [hide]
802.11 network PHY standards
| ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| 802.11 protocol | Release date[6] | Fre- quency | Band- width | Stream data rate[7] | Allowable MIMO streams | Modulation | Approximate range[citation needed] | |||
| Indoor | Outdoor | |||||||||
| (GHz) | (MHz) | (Mbit/s) | (m) | (ft) | (m) | (ft) | ||||
| 802.11-1997 | Jun 1997 | 2.4 | 22 | 1, 2 | N/A | DSSS, FHSS | 20 | 66 | 100 | 330 |
| a | Sep 1999 | 5 | 20 | 6, 9, 12, 18, 24, 36, 48, 54 | N/A | OFDM | 35 | 115 | 120 | 390 |
| a | Sep 1999 | 3.7[A] | 20 | 6, 9, 12, 18, 24, 36, 48, 54 | N/A | OFDM | — | — | 5,000 | 16,000[A] |
| ac | Dec 2013 | 5 | 20 | 400 ns GI : 7.2, 14.4, 21.7, 28.9, 43.3, 57.8, 65, 72.2, 86.7, 96.3 [B] 800 ns GI : 6.5, 13, 19.5, 26, 39, 52, 58.5, 65, 78, 86.7 [C] | 8 | MIMO-OFDM | 35 | 115[9] | ||
| ac | Dec 2013 | 5 | 40 | 400 ns GI : 15, 30, 45, 60, 90, 120, 135, 150, 180, 200 [B] 800 ns GI : 13.5, 27, 40.5, 54, 81, 108, 121.5, 135, 162, 180 [C] | 8 | MIMO-OFDM | 35 | 115[9] | ||
| ac | Dec 2013 | 5 | 80 | 400 ns GI : 32.5, 65, 97.5, 130, 195, 260, 292.5, 325, 390, 433.3 [B] 800 ns GI : 29.2, 58.5, 87.8, 117, 175.5, 234, 263.2, 292.5, 351, 390 [C] | 8 | MIMO-OFDM | 35 | 115[9] | ||
| ac | Dec 2013 | 5 | 160 | 400 ns GI : 65, 130, 195, 260, 390, 520, 585, 650, 780, 866.7 [B] 800 ns GI : 58.5, 117, 175.5, 234, 351, 468, 702, 780 [C] | 8 | MIMO-OFDM | 35 | 115[9] | ||
| ad | Dec 2012 | 60 | 2,160 | Up to 6,912 (6.75 Gbit/s) [10] | N/A | OFDM, single carrier, low-power single carrier | 3.3 | 10[11] | ||
| ah | Est. Dec 2016[6] | 0.9 | Up to 20 | |||||||
| aj | Est. Jul 2017[6] | 45/60 | ||||||||
| ax | Est. Dec 2018[6] | 2.4/5 | Up to 10.53 Gbit/s | MIMO-OFDM | ||||||
| ay | Est. Nov 2019[6] | 60 | 8000 | Up to 100,000 (100 Gbit/s) | 4 | OFDM, single carrier, | 60 | |||
| az | Est. Mar 2021[6] | 60 | ||||||||
| b | Sep 1999 | 2.4 | 22 | 1, 2, 5.5, 11 | N/A | DSSS | 35 | 115 | 140 | 460 |
| g | Jun 2003 | 2.4 | 20 | 6, 9, 12, 18, 24, 36, 48, 54 | N/A | OFDM | 38 | 125 | 140 | 460 |
| n | Oct 2009 | 2.4/5 | 20 | 400 ns GI : 7.2, 14.4, 21.7, 28.9, 43.3, 57.8, 65, 72.2 [B] 800 ns GI : 6.5, 13, 19.5, 26, 39, 52, 58.5, 65 [C] | 4 | MIMO-OFDM | 70 | 230 | 250 | 820[8] |
| n | Oct 2009 | 2.4/5 | 40 | 400 ns GI : 15, 30, 45, 60, 90, 120, 135, 150 [B] 800 ns GI : 13.5, 27, 40.5, 54, 81, 108, 121.5, 135 [C] | 4 | MIMO-OFDM | 70 | 230 | 250 | 820[8] |
Wireless phishing is any technique by which an attacker attempts to convince wireless network users to divulge sensitive information
solution:
- Educate yourself. Read up on the latest scams. Be familiar with what a phishing scam looks like so you can recognize common tricks when you see them.
- Use common sense. Read your emails carefully, checking to make sure you know the sender. Be suspicious of any email that asks for your personal or financial information. Also be very cautious when downloading any attachments or files from an email, unless you know and trust the sender.
- Practice smart browsing. Make sure that the website you're visiting is secure before you enter any information. If you have any doubts, enter a fake password since phony sites accept false information.
- Use technology to protect you. Comprehensive security software with anti-phishing technologies, like AT&T Internet Security Suite, can help protect you. Just make sure that your software is up-to-date with the latest security protections by enabling automatic updates or selecting the Update button on your security software control panel.
- Be vigilant both offline and online. Monitor your bank and credit card statements for any suspicious charges or transfers. Consider changing your passwords regularly. Make sure you create strong passwords that use a combination of letters, numbers, and special characters. Don’t use nicknames, birthdays, or other information that other people may know.
- Report anything you think is suspicious. If you do come across what looks to be a phishing attempt, help yourself and others by reporting it.
Evil Twin is a rogue wireless access point that masquerades as a legitimate Wi-Fi access point so that an attacker can gather personal or corporate information without the end-user's knowledge.
solutions:
- Use wireless intrusion detection to spot or block out-of-policy associations. Network WIPS products can provide these services for in-house WLANs. Host-resident agents can extend WIPS beyond your own WLAN, monitoring users that connect to wireless at home or on the road. For example, see Motorola AirDefense Personal and AirTight SAFE.
- Centrally-manage wireless device configurations to avoid mistakes and prevent users from adding unsecured wireless network entries. For example, Windows Active Directory Group Policy Objects can be used to manage 802.11 and 802.1X parameters on Windows PCs.
- Require 802.1X for your own WLAN, using an EAP Type that provides mutual authentication, and always verify server certificates. Although this actually proves the identity of the RADIUS server, that server authenticates your APs with a RADIUS secret, making it hard for an Evil Twin to successfully pose as a legitimate AP. EAP Types that let stations verify the server's certificate include EAP-TLS, EAP-TTLS and PEAP (see our companion tip, Choosing the right flavor of 802.1X).
- Supply mobile workers with secure hotspot clients to avoid Web page login. For example, T-Mobile's Connection Manager uses 802.1X with EAP-TTLS when connecting to "Enhanced WPA Networks." Because the Connection Manager automatically checks the T-Mobile server's certificate, a user cannot accidentally connect to an Evil Twin, so long as that user never accepts any offer to connect to another SSID (including the older "tmobile" SSID).
- Finally, educate teleworkers about options for using 802.1X in home WLANs. For example, some SOHO-class wireless APs have an on-board RADIUS server and local user list that can be used to support 802.1X without an external RADIUS server..
Data Interception is When packets travel across a network, they are susceptible to being read, altered, or “hijacked.” Hijacking occurs when a hostile party intercepts a network traffic session and poses as one of the session endpoints.
solutions:
- Monitoring the packets to save your server from the entrance of the counterfeit packets.
- Timely upgrading of the security patches on your host’s operating system.
- Beware of running of your server very close to the last level of the capacity.
The Misconfigured APs are a type of security surface, that are the easiest to breach, if its detected. The place, where you will most likely meet misconfigured AP's are home wireless network or very small businesses. Large wireless environments are most likely using centralized management platforms that control hundreds or thousands of AP and keep them synchronized, therefore it is less likely to meet any configuration error there.
Wireless protocols; technologies including 802.11, WLAN, WPA, WEP, Wi-Fi and wireless broadband; and deployment issues such as access points, security and troubleshooting are discussed in this guide designed to provide a basic introduction to wireless protocols and technologies.
A wireless local area network (WLAN) is a wireless distribution method for two or more devices that use high-frequency radio waves and often include an access point to the Internet.
Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections, or Wi-Fi.
Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN.
wifi is a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.
Wireless broadband is high-speed Internet and data service delivered through awireless local area network (WLAN) or wide area network (WWAN). ... The service is similar to that provided through digital subscriber line (DSL) or cable modem but the method of transmission is wireless.
Tiada ulasan:
Catat Ulasan