TERMINOLOGY Define: WPAN

Slides:



Advertisements
Similar presentations
SEMINAR ON Wi-Fi.
Advertisements

Wi-Fi Technology.
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
WIRELESS NETWORKS - A.HARIKA Y5CSO28. INTRODUCTION It refer to a telecommunication networks whose interconnections between nodes is implemented without.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Fundamentals of Networking Discovery 1, Chapter 7.
7: Wireless Technologies Networking for Home & Small Business.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Wireless Network Technologies Asst. Prof.
CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES.
After completion of this chapter, you should be able to :  Describe wireless technology  Describe the various components and structure of a wireless.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Computer networks 6: Wireless and Mobile Networks.
1 Chapter Overview Wireless Technologies Wireless Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Goodbye! ….. to all things that are connected by cable…… NOW it can be connected using….
Wireless Networks Tamus, Zoltán Ádám
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-3-1 Wireless LANs Implementing a WLAN.
OV Copyright © 2015 Logical Operations, Inc. All rights reserved. Unbounded Network Media  Wireless Networking  Wireless Network Devices and Components.
Presented by: Dr. Munam Ali Shah
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Wireless Technologies Chapter 9. Learning Objectives Explain current wireless networking technologies Discuss history of wireless networks and their advantages.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Remote Access for Mobile Computing Andrew Jessett NT Support and Development Group (a.k.a. PC Support) Business and Information.
WLAN.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
7: Wireless Technologies Networking for Home & Small Business.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Exploring the World of Wireless James Taylor - COSC 352 Fall 2007.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Wireless Network The Seventh Meeting. Wireless Standard.
Wi-Fi Technology.
Wireless Ethernet Programming
Wireless Networks Dave Abbott.
Wireless Technologies
CompTIA Security+ Study Guide (SY0-401)
Outline What is Wireless LAN Wireless Transmission Types
Instructor Materials Chapter 6 Building a Home Network
WIRELESS NETWORKS.
Wireless Technologies
Wireless Protocols WEP, WPA & WPA2.
Wireless Security.
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
WLAN Communication Network
Three types of wireless technology
Chapter 4: Wireless LANs
Wireless Technology.
expanded by Jozef Goetz, 2014 The McGraw-Hill Companies, Inc., 2007
Wireless Networking Chapter 23.
Wireless LAN Security 4.3 Wireless LAN Security.
Mobile Devices: How they Operate
Wireless Network Security
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Computer Networks Presentation IEEE Architecture
Comm. And Networking By: Sam & parker.
Terminologies in Wireless Communication Group Members Munib Ahmed Rehan Khan.
Presentation transcript:

TERMINOLOGY Define: WPAN (Wireless Personal Area Network) This is the smallest wireless network used to connect various peripheral devices such as mice, keyboards, headsets, PDAs and cellphones to a computer or each other. Usually IR or Bluetooth technology.

TERMINOLOGY Define: WLAN (Wireless Local Area Network) This network is the most common and is usually used to extend or supplement a wired network’s coverage. WLANs allow many users to connect using a Wireless Access Point (WAP).

TERMINOLOGY Define: WWAN (Wide Wireless Area Network) This network provides coverage over an extremely large area. A good example of this type of network would be a cell phone network such as Code Division Muliple Access (CDMA) or Global System for Mobile Communication (GSM). These network are typically regulated by government agencies.

TERMINOLOGY Define: IR (Infrared) This low powered, low energy technology cannot penetrate through walls or other obstacles but is useful in short line-of-sight applications such as connecting a PDA to a PC. This technology is used most often in TV remotes and is all but dead as a real networking technology.

TERMINOLOGY Define: RF (Radio Frequency) The electromagnetic waves in this range can penetrate through walls and other materials thereby making it the preferred choice in wireless networking technologies. Several RF bands have been set aside for various applications.

TERMINOLOGY Define: WAP or AP – (Wireless Access Point) The device for which wireless clients connect to gain access to the wired network.

TERMINOLOGY Define: Wireless Bridge Two wireless bridges are used to extend wireless coverage over large distances or to connect a single host where cabling is either not practical or not possible by having one unit at each end. Wireless bridges are usually directional and therefore carry signals further than a standard access point.

TERMINOLOGY Define: SSID (Service Set Identifier) The code assigned to packets that designate that the communication is part of a wireless network. SSID is also called the wireless network name.

TERMINOLOGY Define: STA An abbreviation for station which is a basic network device. Most common when referring to wireless networks.

TERMINOLOGY Define: Ad-hoc The simplest form of wireless networking where two or more wireless clients are linked together in a peer-to-peer network. This type of wireless network does not include an access point. The area covered by an ad-hoc network is called an Independent Basic Service Set (IBSS).

TERMINOLOGY Define: Infrastructure Mode Is the most common configuration for wireless networks because it uses one or more devices to control communication. In this configuration, wireless clients cannot communicate directly with each other, but rather must request permission from the access point to communicate. This setup means that each wireless client has equal access to the network. A single access point in infrastructure mode has a coverage area known as Basic Service Set (BSS).

TERMINOLOGY Define: Wireless Cell This is the invisible sphere for which a single AP is the center and all connecting wireless clients are contained. Cells are used to describe the size and shape of a Basic Service Set (BSS). Multiple BSSs can be linked together to create an Extended Service Set (ESS). When linking BSSs, wireless cells should be overlapped by at least 10% so a client can connect to the approaching AP before disconnecting from the departing one. An example for this would be walking down a very long hallway which is made up of two wireless cells.

TERMINOLOGY Define: War-Driving Pronounced as (W•AIR) and (W•OR) driving, war is or was not originally an acronym. Today the terms is equated to seeking free and open access to a resource. In this case war-driving is seeking open and unprotected wireless networks while in a car.

TERMINOLOGY Define: War-Walking A variation of war-driving where the seeker uses an ultra-portable device and simply walks around seeking an open wireless network. The term is correctly spelled with or without the hyphen, i.e. warwalking, wardriving, warbiking.

TERMINOLOGY Define: PSK (Pre-Shared Key) A secret shared between the wireless AP and a client to control access on a network.

TERMINOLOGY Define: EAP (Extensible Authentication Protocol) An authentication framework, not a specific authentication mechanism. Most commonly used in wireless LANs, EAP provides common functions and negotiation of the desired authentication mechanism.

TERMINOLOGY Define: WEP (Wireless Equivalent Privacy) Part of the IEEE 802.11 wireless standard that provides a low level of security by encrypting all traffic against a static WEP key of either 64 or 128 bits. Modern computers can break this cypher is less than an hour.

TERMINOLOGY Define: WPA (Wi-Fi Protected Access) Developed to address security issues with WEP. WPA provides a higher level of security in a wireless network by using a 128 bit per-packet encryption key. This means each packet transmitted has a different key and signature that is verified at the receiving end. There have been security flaws discovered in WPA and today it has been replaced with WPA2 .