Sunteți pe pagina 1din 13

WLAN

Definition
A network that links two or more devices using some wireless distribution method usually provides a connection through an access point to the wider internet

Brief history
Norman Abramson
Univ of Hawaii prof Developed ALOHAnet
Worlds 1st wireless communication network The system included seven computers deployed over four islands to communicate with the central computer on the Oahu Island without using phone lines

Wireless protocols
802.11 a
It operates in the 5 GHz band with a maximum net data rate of 54 Mbit/s

802.11 b
has a maximum raw data rate of 11 Mbit/s. Operates in the 2.4 Ghz band. Prone to interference

802.11 g
Works in the same frequency as with 802.11b. Has 54 Mbit/s of throughput. Backward compatible to 802.11b.

802.11 n
It operates at a maximum net data rate from 54 Mbit/s to 600 Mbit/s. 802.11n operates on both the 2.4 GHz and the lesser used 5 GHz bands

Considerations for deployment


1. Site Surveys and Wireless Signal Obstacles 2. Changes in Network Infrastructure 3. Router Upgrade 4. Rethink Security 5. Clamp Down on Unauthorized Access Loopholes 6. Plan for Upgrades 7. Invest in a WLAN Controller

Wireless Security
the prevention of unauthorized access or damage to computers using wireless networks

Wireless security types


WEP
"WEP," which is short for "Wired Equivalent Privacy" was introduced earlier than WPA one of the first wireless security protocols available. security password is created and wireless data is encrypted. Encryption is not very sophisticated WEP is usually not recommended.

WPA
"WPA," or "Wi-Fi Protected Access, a type of wireless network security that relies on encryption. WPA security provides user authentication. WPA
The first version is commonly used in corporate or organization situations where many different users must connect to a single network. It is designed to use a pre-shared security key

WPA2
compatible with fewer networks, but is more secure. WPA2 is typically used whenever possible, with WPA as a backup option for older systems.

802.1X
used as an additional layer of security that can be used with both WEP and WPA networks. a special server is used to validate network users. this server contains a list of users who are authorized on the network. Users with the proper permission are allowed to connect, while unauthorized outside users are blocked.

Encryption methods
AES vs TKIP
The Advanced Encryption Standard (AES)
a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2002. Originally called Rijndael developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen

Temporal Key Integrity Protocol or TKIP


is a security protocol used in the IEEE 802.11 wireless networking standard

Best choice?
AES offers stronger encryption technology and is the right choice (assuming all of the devices on your network support it). TKIP is also strong and tends to be supported by more equipment on the market. consider AES first and TKIP as a reasonable backup option.

Tips for wireless home network security


1. Change Default Administrator Passwords (and Usernames) 2. Turn on (Compatible) WPA / WEP Encryption 3. Change the Default SSID
Service set identifier

4. Enable MAC Address Filtering 5. Disable SSID Broadcast

6. Do Not Auto-Connect to Open Wi-Fi Networks 7. Assign Static IP Addresses to Devices 8. Enable Firewalls On Each Computer and the Router 9. Position the Router or Access Point Safely 10. Turn Off the Network During Extended Periods of Non-Use

S-ar putea să vă placă și