Welcome to Wireless Home Networking For Dummies. Wireless networking
for personal computers is not really a new idea; it’s been around
for at least five years. The emergence of an industry standard, however, has
caused the use of wireless networking technology to explode.
One of the most appealing things about the current crop of wireless networking
equipment is the ease with which you can set up a home network, but its
reasonable price might be the most attractive aspect of all. Setting up a wireless
home network can be both inexpensive and easy.
Wireless network refers to any type of computer network that is not connected by cables of any kind. It is a method by which homes, telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using a transmission system called radio waves. This implementation takes place at the physical level (layer) of the OSI model network structure....
Radio based communication, open air
The attacker, having a radio transmitter and receiver with the same radio frequency of the underlying wireless network, can easily:
Intercept wireless data
Connect his computing devices to a nearby wireless network
Inject new packets to an existing wireless network
Jam a particular wireless channel using a jamming device
Implement encryption algorithms, authentication algorithms, and integrity-check algorithms at the data-link layer
Provide network access with wired equivalent privacy
Higher-layer protocols and applications can be used ...
Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is one of the least secure forms of security.Many laptop computers have wireless cards pre-installed. The ability to enter a network while mobile has great benefits. However, wireless networking is prone to some security issues. Crackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into wired networks......
This guide describes how to configure secure wireless access using IEEE 802.1X
authentication using Protected Extensible Authentication Protocol with Microsoft
Challenge-Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2) and
Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) in a test lab using
a wireless access point (AP) and four computers.
A wireless local area network (WLAN) is exactly like a regular local area network (LAN), except that each
computer in the WLAN uses a wireless device to connect to the network. Computers in a WLAN share the same
frequency channel and SSID, which is an identification name shared by the wireless devices belonging to the
same wireless network.
Get a solid introduction to networking essentials from this practical guide Bestselling author Bruce Hallberg provides new IT professionals with a hands-on guide to wired and wireless networking. The book covers designing, building, and administering a network. Completely revised to cover the latest networking technologies such as virtualization, Networking: A Beginner's Guide, Fifth Edition shows you how to set up and run a secure network using both Linux and Windows. Windows Server 2008, Fedora 10, Ubuntu, and other Linux distributions are covered....
Your Guide to Easy and Secure Windows Vista Networking is a complete beginner’s guide to creating, configuring, administering, and using a small network using Windows Vista computers. Inside you’ll find comprehensive coverage of networking hardware, including Ethernet (wired) hardware (from NICs to cables to switches to routers) and wireless Hardware--from wireless NICs to access points to range extenders
Wireless technology has enormous potential to change the way people and things communicate. Future wireless networks will allow people on the move to communicate with anyone, anywhere, and at any time using a range of high-performance multimedia services. Wireless video will support applications such as enhanced social networking, distance learning and remote medicine. Wireless sensor networks can also enable a new class of intelligent home electronics, smart and energy-efficient buildings and highways, and in-body networks for analysis and treatment of medical conditions....
IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5 and 60 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). The base version of the standard was released in 1997 and has had subsequent amendments. These standards provide the basis for wireless network products using the Wi-Fi brand.
A WLAN is a shared network.
An access point is a shared device and functions like a shared Ethernet hub.
Data is transmitted over radio waves.
Two-way radio communications (half-duplex) are used.
The same radio frequency is used for sending and receiving (transceiver).
Chapter summary: Supports multiple cable types and speeds, uses the CSMA/CD MAC mechanism to detect collisions, uses a logical ring topology, uses the token passing MAC mechanism, uses a double ring or star topology, uses the token passing MAC mechanism, runs at speeds up to 11 Mbps, uses the CSMA/CA MAC mechanism.
Chapter 5 - Data-link layer protocols. Chapter summary: Supports multiple cable types and speeds, uses the CSMA/CD MAC mechanism to detect collisions, uses a logical ring topology, uses the token passing MAC mechanism, uses a double ring or star topology, uses the token passing MAC mechanism, runs at speeds up to 11 Mbps, uses the CSMA/CA MAC mechanism.
Over the last couple of years, manufacturers have produced some
incredibly sophisticated wireless networking equipment. Consumers’
ongoing demand for low-cost, high-speed, easy-to-use networking
gear has forced hardware manufacturers to continually refine their
designs. Engineers have produced tiny devices that use very little
power to perform amazing feats of ingenuity, producing them on such
a large scale that the cost is staggeringly low.
OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF. The Book of PF is the product of Hansteen's knowledge and experience, teaching good practices as well as bare facts and software options.
Hello, in this module we are going to discuss wireless networking. Specifically, we'll take a look at
how wireless technology works, how it is commonly deployed, and the security issues associated
with using it. Because wireless communications can penetrate opaque objects such as buildings, the
risk of someone accessing a private network increases markedly. With wireless, an attacker does not
need to gain access to physical cables or jacks, but only needs to have an antenna and be within
range of the transmissions....
Cisco Certified Network Associate (CCNA®) validates the ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation and verification of connections to remote sites in a WAN. CCNA curriculum includes basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based skills.
AD HOC NETWORKS: Technologies and Protocols is a concise in-depth treatment of various constituent components of ad hoc network protocols. It reviews issues related to medium access control, scalable routing, group communications, use of directional/smart antennas, network security, and power management among other topics. The authors examine various technologies that may aid ad hoc networking including the presence of an ability to tune transmission power levels or the deployment of sophisticated smart antennae. ...
Physical Layer. In this chapter, you will learn to:
Explain the role of Physical layer protocols and services in supporting communication across data networks.
Describe the purpose of Physical layer signaling and encoding as they are used in networks.
Describe the role of signals used to represent bits as a frame is transported across the local media.
Identify the basic characteristics of copper, fiber, and wireless network media.
When preparing to conduct a site survey for a Cisco wireless LAN (WLAN) installation, follow the Cisco network
design methodology. Cisco’s Prepare, Plan, Design, Implement, Operate and Optimize (PPDIOO) addresses
the network in a phased approach. This white paper provides a “how to” overview that can be used when
conducting a site survey and installation for a Cisco WLAN. In doing so, the Prepare, Plan, Design and
Implement phases should be followed.