Do you want to have a convenient and direct access in your transactions?

Sept.16 2005

Introducing…

Wireless Lan
Sept.16 2005

What’s inside
What is wireless LAN? History of wireless LAN Three transmission techniques Advantages in using wireless LAN What is war driving? Tips in protecting WLAN from war driving

Sept.16 2005

What is wireless LAN?
Wireless LAN is a type of local area network that uses high frequency radio rather than wires to communicate between nodes.

Sept.16 2005

History of wireless LAN
The first radio network technology was developed at University of Hawaii in a research project call ALOHANET. The ALOHANET system allows computer with 7 sites, which spread out in four islands without using any wired transmission links.
Sept.16 2005

four islands

History of wireless LAN
In 1980 the hobbyists (ham) in Canada and US had developed the equipment call TNCs (terminal node controller).
Sept.16 2005

Terminal node controller

Three transmission techniques

Spread spectrum
Is currently the most widely used transmission technique for WLAN. It was initially developed by the military to avoid jamming and eavesdropping of the signals.
Sept.16 2005

Spread spectrum

Narrowband microwave
Microwave technology is not really a LAN technology. It’s main use is to interconnect LAN between two building.
Narrowband microwave

Sept.16 2005

Infrared
Used infrared signals to transmit data. This is the same technology used in products like remote controls for television and VCR’s.

Sept.16 2005

Advantages in using wireless LAN
Mobility Installation speed and simplicity Installation flexibility Reduced cost-of-ownership

Sept.16 2005

What is war driving?
War driving is driving around a city searching for the existence of (WLAN). It’s locating and logging wireless access points while in motion. This task is automated using dedicated war driving software and GPS unit.

Sept.16 2005

Tips in protecting WLAN
Change the default password on your Access point. Use a proxy with access control for outgoing requests (web proxy and others). Regularly tests the security of your wireless network, using the latest war driving tools.

Sept.16 2005

Tips in protecting WLAN
Enable strict LOGGING on all devices and check your wireless log files regularly to see if your security policy is still adequate. Don’t give passwords, account nos. or credit card details if you’re not confident that the website is real or genuine. Turn off or remove your wireless card when not accessing a hot spot to deny hackers any opportunity to get into your computer.
Sept.16 2005

summary
Using wireless LAN brought a lot of advantages in our daily transactions. But let us not try to forget that there are hackers who try to invade our computer destroying everything. Don’t wait until complete stranger are abusing your computer. Be wise…
Sept.16 2005

It’s better to be careful rather than regretting things at the end.

Sept.16 2005

Back up

Wireless LAN card

hackers

War driving tools

Access point

GPS unit

motherboard

Sept.16 2005

Style:

Sept.16 2005

(2) In tree structures, a point where two or more lines meet.

e system, the cable TV system or the Internet. Fiber-optic lines are strands of optically pure glass as thin as a human hair that carry digital information over long dist ht pulses along a glass or plastic wire or fiber. Optical fiber carries much more information than conventional copper wire and is in general not subject to electromagn • To take or carry from one place to another; transport. • To serve as a medium of transmission for; transmit: wires that convey electricity. To communicate or make known; impart: “a look intended to convey sympathetic comprehension”

A hobby is a spare-time recreational pursuit. An activity or interest pursued outside one's regular occupation and engaged in primarily for pleasure. • • • To change keys within a piece of music

To alter the function or status of something in response to a stimulant

To "change". A signal can be transmitted via a carrier wave, by modulating the wave to represent the signal.

The intentional transmission of radio signals in order to interfere with the reception of signals from another station. • Deliberate interference intended to prevent reception of signals in a specific frequency band.

The act of intentionally directing electromagnetic energy at a communication system to disrupt or prevent signal transmission.

ne who participates in eavesdropping, i.e. someone who secretly listens in on the conversations of others, is called an eavesdropper. The origin of the term is literal, f The work or business of felling and trimming trees and transporting the logs to a mill. in a catalog or index, a heading that may be used to find information on an item. Common access points include author, title, and assigned subject headings.

ode in a bibliographic record under which library materials may be searched, identified, and retrieved. In a broader sense, any unique element which serves as a poin • • Searchable fields of a record in a database used to retrieve information. These fields can include the author's name, subject, date, title, etc.

march aggressively into another's territory by military force for the purposes of conquest and occupation; "Hitler invaded Poland on September 1, 1939" • intrude on: to intrude upon, infringe, encroach on, violate; "This new colleague invades my territory"; "The neighbors intrude on your privacy

al digital assistants (PDAs) (or Handheld PCs in the Microsoft vernacular). The Windows CE graphical user interface (GUI) is very similar to Windows 95 so devices

DOCKING STATIONS Sept.16 2005 model computer. When it is taken out, it becomes a portable computer again. Most importantly, the same data is accessible in both modes because it resides on the

Master your semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master your semester with Scribd & The New York Times

Cancel anytime.