There are number of different standards in Wireless networking, advantages and disadvantages. This video looks at the standards and reasons for using and not using wireless networking. Covered are the different 802.1 standards and a demo configuring wireless on Windows 7.
Advantages of wireless
Wireless uses no wires so this means no trip hazards. Wireless networks are faster to setup so are create for temporary networks or in historical buildings where you can't lay cables.
Disadvantages of wireless
The speed and performance of your wireless networking can be effected by many factors. This includes the distance between the user and the host. Wireless networking is affected by interference caused by objects and other wireless devices. Wireless speed can also be affected by other wireless devices. Since wireless devices transmit there signal over the airwaves anyone in range can pick up this signal. The signal can be encrypted but if weak encryption is used, the signal can be decoded.
Standards in wireless
Standard Range Speed Comments
802.11a 5Ghz 54Mbits Small range. Easily absorbed
802.11b 2.4Ghz 11Mbits Interference with Bluetooth, cordless
802.11g 2.4Ghz 54Mbits Interference with Bluetooth, cordless
802.11n 5 or 2.4 600Mbits Uses Multiple Interface Multiple Output (MIMO)
Mimo
Multiple input multiple output (Mimo) is used by the n standard to achieve higher speeds. It can use up to four signals at once to transmit a signal. Some device may only achive 300Mbit with the n standard because low through put or not using 4 signals.
Wireless Security standards
In order to prevent your wireless signal from ears dropping you should secure the signal using a wireless security standard. This will encrypt the signal so that an attacker cannot make sense of it.
None
Does not encrypt traffic so anyone can listen in. Some free access point may use this standard.
WEP
Wired Equivalent Privacy (WEP) was originally designed to be as secure as a wired network. The protocol has been found to be very insecure and easily hacked.
WPA and WPA2
Wi-FI Protected Access (WPA) is a more secure protocol and should be used instead of WEP where possible. The protocol comes in two versions, WPA and WPA2. WPA2 is the stronger of the two protocols and should be used where possible. Both versions come in personal and enterprise. Personal uses a password on the Wireless Access Point which must be known by the client in order to access the wireless network. Enterprise means that access is determined by a RADIUS authentication system.
802.1x
This is an authentication standard that works on wireless and wired networks. When a connection is requested the authentication request is sent to a back end server to authenticate. This could be RADIUS, Active Directory etc.
AdHoc and Infrastructure networks
ADHoc networks are peer to peer networks where each device communicates directly to each other.
Infrastructure networks are networks that use a Wireless Access Point (WAP). All communication goes through the wireless access point
SSID
Service Set Identifier (SSID) is a name that is associated with the wireless access point. This name is used to customize your wireless access point to make it easy for users to find it. For example, you may call a wireless Access Point in Star Bucks StarBucksWIFI. It should be pointed out that the SSID can be disabled. This stops people from finding the network easily but should not be consider a form of security because anyone with any descent wireless hacking skill will still be able to find the access point without the SSID.
Mac Filtering
Media Access Control (MAC) filtering is when the unique MAC address that is present on every network card is used to determine if the device can or can't access the network. It is considered insecure because MAC addresses can be faked.
Wireless Chanel
If you are experiencing poor signal strength or low speeds consider changing the channel on your Wireless Access Point. Changing the channel may improve the performance of your wireless access.
Wireless configuration
Windows 7 allows you to copy the wireless configuration to a USB device. This allows the configuration to be imported onto another computer or imported into
group policy.
See http://YouTube.com/ITFreeTraining or http://itfreetraining.com for are always free training videos. This is only one video from the many free courses available on YouTube.
MCTS 70-680: Wireless Access on Windows 7 | |
| 19,493 views views | followers |
| 46 Likes | 46 Dislikes |
| Education | Upload TimePublished on 21 Oct 2011 |
Không có nhận xét nào:
Đăng nhận xét