Professional Documents
Culture Documents
Objectives
Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless LAN security issues and mitigation strategies Configure an integrated wireless access point and a wireless client .
Wireless Technology
Wireless Technology and Devices
Describe the various wireless technologies and the devices that use them
Wireless Technology
Wireless Technology and Devices
Infrare Infrared (IR) is relatively low energy and cannot penetrate through walls or other obstacles It is commonly used to connect and move data between devices such as Personal Digital Assistants (PDAs) and PCs A specialized communication port known as an Infrared Direct Access (IrDA) port uses IR to exchange information between devices R only allows a one-to-one type of connection. It is generally used for short-range, line-of-sight, communications IR is also used for remote control devices, wireless mice, and wireless keyboards
Wireless Technology
Wireless Technology and Devices
Radio Frequency (RF)
Wireless Technology
Benefits and Limitations of Wireless Technology
Wireless Technology
Types of Wireless Networks and Their Boundaries
Wireless Technology
Wireless LAN Standards
Wireless Technology
Wireless LAN Components
Wireless Technology
Wireless LAN Components
Antennas
Used on APs and Wireless bridges Increases the output signal strength from a wireless device Receives wireless signals from other devices such as STAs Increase in signal strength from an antenna is known as the gain Higher gains usually translate into increased transmission distances
Wireless Technology
WLANS and SSID Identify and describe various wireless modes and the importance of the
SSID
IBSS ad hoc BSS - infrastructure
Wireless Technology
WLANS and SSID
Describe how wireless channels are used CSMA/CA: Describe how wireless channels avoid collisions
Wireless Technology
Configuring The Access Point
Wireless Technology
Configuring the Wireless Clients
WEP uses pre-configured keys to encrypt and decrypt data A WEP key is entered as a string of numbers and letters and is generally 64 bits or 128 bits long.
WPA generates new, dynamic keys each time a client establishes a connection with the AP
Wireless technologies use electromagnetic radiation in the form of radio signals to carry information between devices. Ease and convenience of connecting devices wirelessly creates security concerns that need to be addressed. Before installing wireless devices, an installation plan should be created which includes strategies for layout and security.