Professional Documents
Culture Documents
Wireless
Wireless
of Electrical and Electronics Engineers Not for profit Sets the standards for 802.11
What is 802.11?
Set
of standards for WLAN Progressing with technology Change is denoted with a letter
http://www.ieee.org/web/aboutus/home/index.html
tests of product certification Products certified Wi-Fi will work with all 802.11 Wistandards
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci838865,00.html
By 2007-2008 200765% of enterprises will have wireless applications deployed With mobile devices outnumbering traditional PCs
By the dollars
Total U.S. spending on wireless communications will grow by 9.3% this year, reaching $158.6 billion. Its predicted to hit $212.5 billion by 2008, with a 10% compound annual growth rate.
Improved Security
802.11b & a
802.11b & a
a implemented in 1999
interference
http://www.computerworld.com http://www.siliconvalley.internet.com
802.11g
802.11g
Speed 54 Mbps Operates in a 2.4 GHz ISM Band
Is
it better than a or b?
Yes and No
http://siliconvalley.internet.com
Compatibility of 802.11g
802.11b a,b,
and g
http://www.computerworld.com
Disadvantages of 802.11g
Radio Frequency
Before this standard was fully ratified, 802.11n was already being discussed.
http://siliconvalley.internet.com http://www.computerowrld.com
Advantages of 802.11g
Compatibility
Ultimately it takes the guesswork away from the user. Ben Worthen Its a life extension of 802.11b
Higher speeds with little price increase. Use it when greater coverage is needed and cost is a big factor.
http://www.cio.com
802.11n
Definition
802.11n is a newer standard Proper name = IEEE (International Institute of Electrical and Electronics Engineers) The number 11 indicates the IEEE working group within this body, known as TGn.
http://www.wisegeek.com/what-ishttp://www.wisegeek.com/what-is-80211n.htm
802.11b
11 Mbps
5 Mbps
802.11g
54 Mbps
802.11a
54 Mbps
25 Mbps
802.11n
200+ Mbps
100 Mbps
The hope of implementing 802.11n is so that consumers may be able to use more of a range of products. HDTV Streaming videos Other consumer electonics Personal computing Hand held platforms
Wireless Networks
Public hotspots
Coffee Houses (Starbucks, Internet Cafes) Pizza Parlors (American Dream) Schools (OSU entire campus)
What is a hotspot?
Hotspot =
Public Area Wireless network connections to the internet NIC = Network Interface Card Have to ask permission to log onto the network Sometimes is free other times costs a small fee (i.e. Starbucks)
http://www.wisegeek.com/what-ishttp://www.wisegeek.com/what-is-a-hotspot.htm
Meeting in January 2006 in Kona, Hawaii Wave of the future Price range of $89.50 - $159.00
Only
Benefits of 802.11n
The connection speed is really fast It has a great, wide reaching range Comes with software that is compatible with both Windows and Macintoshes.
Disadvantages of 802.11n
It is very expensive as compared with the other routers for b/a/g Requires a MIMO adapter to be able to use it full potential.
http://google-cnet.com/4014-3319_9-30993672.html?part=googlehttp://google-cnet.com/4014-3319_9-30993672.html?part=googlecnet&subj=103011980&tag=103011980
Wireless Security
Wireless Security needs to protect two separate parts of the wireless network.
Access Signal
Controlling Access
End to End Encryption MAC Filtering Controlling which devices can Log on to the network This method can be hacked using a MAC Spoof
SSID Broadcasting Do not broadcast the SSID (Service Set Identifier) If the hackers cannot see your network, it is harder to get into One example of end to end encryption is online banking. Ever notice the https? https://www.bankofamerica.com
WEP Wireless Equivalent Privacy 64 or 128 bit encryption. Very easy to break. FBI demonstrated a 3 minute breach using common hacking software1 WPA Wifi Protected Access This adds additional security features to WEP. Much harder to crack and can use a pre-shared key (PSK) pre Like a secret password Based on the 801.11i standard WPA2 WPA with AES (Advanced Encryption Standard) Algorithm from WPA is replaced by a message authentication code, CCMP
VPN Virtual Private Network Two types Secure and Unsecured Secured VPN uses cryptographic tunneling protocols to provide the snooping), necessary confidentiality (preventing snooping), sender authentication (preventing identity spoofing), spoofing), and message integrity (preventing message alteration) to achieve the privacy intended. When properly chosen, implemented, and used, such techniques can provide secure communications over unsecured networks
Enable Wireless LAN on your device Go to the internet Browser will redirect you to the wireless security page for OSU (See next page) Enter login information (See next page) Enter computer information (See next page) Quit browser (15-20 min) (15Surf Your computer is now permanently registered with OSU (College of Engineering)
Questions?