Академический Документы
Профессиональный Документы
Культура Документы
Outline
THE WIRELESS LAN THE WIRELESS LAN SECURITY THE WIRELESS LAN CONFIGURATION THE WIRELESS LAN TROUBLESHOOTING
RF Characteristics
RF does not have boundaries. RF is unprotected from outside signals, whereas cable is in an insulating sheath. RF bands are regulated differently in various countries.
a separate path through which data can flow 11 channels for North America 13 channels for Europe
802.11 Topologies
Adhoc Networks can operate without access points; Client stations which are configured to operate in ad hoc mode configure the wireless parameters between themselves. The IEEE 802.11 standard refers to them as an IBSS.
802.11 Topologies
Adhoc Networks can operate without access points; Client stations which are configured to operate in ad hoc mode configure the wireless parameters between themselves. The IEEE 802.11 standard refers to them as an IBSS.
802.11 Topologies
Basic Service Sets APs provide an infrastructure that adds services and Improves the range for clients A single AP in infrastructure mode manages the wireless parameters The coverage area is the basic service area (BSA).
802.11 Topologies
Extended Service Sets Single BSS provides insufficient RF coverage More than one APs to extend into ESS One BSS is differentiated from another by the BSSID MAC address of the access point serving the BSS. Coverage area - extended service area (ESA).
a NULL authentication client says "authenticate me," and the access point responds with "yes. based on a Wired Equivalency Protection (WEP) key shared between the client and the access point
anyone within range of an AP an attacker may not have to physically enter the workplace to gain access to a WLAN.
someone who delved deeply into computer systems to exploit for creative reasons hackers and crackers- malicious intruders who enter systems as criminals and steal data or deliberately harm systems Break weak security measures