1 / 10

Wireless Technology Essentials: Key Concepts and Standards Explained

Explore the fundamental concepts of wireless technology, including access points, extenders, and radio cards. Learn about encryption methods like WEP and authentication protocols. Delve into the 802.11 standards, such as 802.11a, 802.11b, and 802.11g, to understand data speeds and compatibility. Discover how to configure SSIDs and utilize VPNs for secure connections. Get insights on wireless camera usage, PDA connectivity, and more!

Download Presentation

Wireless Technology Essentials: Key Concepts and Standards Explained

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Concepts Wireless Technology Overview • Access Point • Extender/bridge • Radio card • SSID - Service Set Identifier • “An identifier attached to packets sent over the wireless LANthat functions as a "password" for joining a particular radionetwork.”

  2. Concepts Wireless Technology Overview • The 802.11 Standards • 802.11b - the standard for wireless data speed of up to 11 million • bits per second (2.4 GHz). It was the first popular standard, and • most hardware currently “out there” is 802.11b.

  3. Concepts Wireless Technology Overview • The 802.11 Standards • 802.11b - the standard for wireless data speed of up to 11 million • bits per second (2.4 GHz). It was the first popular standard, and • most hardware currently “out there” is 802.11b. • 802.11a - the standard for wireless data speed of 54 million bits • per second (5 GHz, not backwards compatible with 802.11b)

  4. Concepts Wireless Technology Overview • The 802.11 Standards • 802.11b - the standard for wireless data speed of up to 11 million • bits per second (2.4 GHz). It was the first popular standard, and • most hardware currently “out there” is 802.11b. • 802.11a - the standard for wireless data speed of 54 million bits • per second (5 GHz, not backwards compatible with 802.11b) • 802.11g - the standard for wireless data speed of 54 million bits per • second (2.4 GHz, backwards compatible with 802.11b, will become • the dominant standard)

  5. Concepts Wireless Technology Overview • Encryption • “To encode or scramble data so it cannot be used in a meaningful • way by anyone other that the author or intended recipient.”

  6. Concepts Wireless Technology Overview • Encryption • “To encode or scramble data so it cannot be used in a meaningful • way by anyone other that the author or intended recipient.” • WEP - Wired Equivalent Privacy • “The Wired Equivalent Privacy generates secret shared encryption • keys that both source and destination stations can use to alter frame • bits to avoid disclosure to eavesdroppers.“

  7. Concepts Wireless Technology Overview • Encryption • “To encode or scramble data so it cannot be used in a meaningful • way by anyone other that the author or intended recipient.” • WEP - Wired Equivalent Privacy • “The Wired Equivalent Privacy generates secret shared encryption • keys that both source and destination stations can use to alter frame • bits to avoid disclosure to eavesdroppers.“ • Authentication • “Verification of identity and authorization to proceed.”

  8. Concepts Wireless Technology Overview • Encryption • “To encode or scramble data so it cannot be used in a meaningful • way by anyone other that the author or intended recipient.” • WEP - Wired Equivalent Privacy • “The Wired Equivalent Privacy generates secret shared encryption • keys that both source and destination stations can use to alter frame • bits to avoid disclosure to eavesdroppers.“ • Authentication • “Verification of identity and authorization to proceed.” • VPN – Virtual Private Network • A secure tunnel that can be created through the midst of an • insecure environment to enable secure connection to remote • networks. The Purdue PAL wireless system uses a VPN.

  9. Demos Wireless Technology Overview • How to configure an SSID • Laptop wireless • PDA wireless • surfing, email, beaming • Wireless camera

  10. Q&A Wireless Technology Overview • Questions?

More Related