Access Point Extender/bridge Radio card SSID - Service Set Identifier “An identifier attached to packets sent over the wireless LAN that functions as a "password" for joining a particular radio network.” Wireless Technology Overview Concepts
Wireless Technology Overview Concepts The Standards b - the standard for wireless data speed of up to 11 million bits per second (2.4 GHz). It was the first popular standard, and most hardware currently “out there” is b.
Wireless Technology Overview Concepts The Standards b - the standard for wireless data speed of up to 11 million bits per second (2.4 GHz). It was the first popular standard, and most hardware currently “out there” is b a - the standard for wireless data speed of 54 million bits per second (5 GHz, not backwards compatible with b)
Wireless Technology Overview Concepts The Standards b - the standard for wireless data speed of up to 11 million bits per second (2.4 GHz). It was the first popular standard, and most hardware currently “out there” is b a - the standard for wireless data speed of 54 million bits per second (5 GHz, not backwards compatible with b) g - the standard for wireless data speed of 54 million bits per second (2.4 GHz, backwards compatible with b, will become the dominant standard)
Wireless Technology Overview Concepts Encryption “To encode or scramble data so it cannot be used in a meaningful way by anyone other that the author or intended recipient.”
Wireless Technology Overview Concepts Encryption “To encode or scramble data so it cannot be used in a meaningful way by anyone other that the author or intended recipient.” WEP - Wired Equivalent Privacy “The Wired Equivalent Privacy generates secret shared encryption keys that both source and destination stations can use to alter frame bits to avoid disclosure to eavesdroppers.“
Wireless Technology Overview Concepts Encryption “To encode or scramble data so it cannot be used in a meaningful way by anyone other that the author or intended recipient.” WEP - Wired Equivalent Privacy “The Wired Equivalent Privacy generates secret shared encryption keys that both source and destination stations can use to alter frame bits to avoid disclosure to eavesdroppers.“ Authentication “Verification of identity and authorization to proceed.”
Wireless Technology Overview Concepts Encryption “To encode or scramble data so it cannot be used in a meaningful way by anyone other that the author or intended recipient.” WEP - Wired Equivalent Privacy “The Wired Equivalent Privacy generates secret shared encryption keys that both source and destination stations can use to alter frame bits to avoid disclosure to eavesdroppers.“ Authentication “Verification of identity and authorization to proceed.” VPN – Virtual Private Network A secure tunnel that can be created through the midst of an insecure environment to enable secure connection to remote networks. The Purdue PAL wireless system uses a VPN.
Wireless Technology Overview Demos How to configure an SSID Laptop wireless PDA wireless surfing, , beaming Wireless camera
Wireless Technology Overview Q&A Questions?