jagomart
digital resources
picture1_Slideshare Management 76998 | Wireless


 138x       Filetype PPT       File size 0.06 MB       Source: www.cs.sjsu.edu


File: Slideshare Management 76998 | Wireless
introduction a presentation of the paper your 802 11 wireless network has no clothes by william a arbaugh narendra shankar y c justin wan at univ maryland at college park ...

icon picture PPT Filetype Power Point PPT | Posted on 02 Sep 2022 | 3 years ago
Partial capture of text on file.
        Components of a Wireless 
        Components of a Wireless 
                 (Wi-Fi) Network
                  (Wi-Fi) Network
     Wireless                    Wireless 
       Wireless                    Router
      Router
       Router
     Wireless                                    Wire
       Wireless 
      network                                      To
       network 
      interface card                            Internet
       interface card 
      (WNIC)
       (WNIC)
     Ethernet cable 
       Ethernet cable 
      to connect AP                      Wireless 
       to connect AP 
      to Internet                           NIC
       to Internet
                                                         2
     Wireless Router
     Wireless Router
      Wireless Router 
       Wireless Router 
       receives and sends 
       receives and sends 
       radio signals
       radio signals
      It also connects to the 
       It also connects to the 
       Internet with an 
       Internet with an 
       Ethernet cable
       Ethernet cable
      It bridges the wireless 
       It bridges the wireless 
       network with the wired 
       network with the wired 
       network
       network
                                                        3
                     Wi-Fi NICs
                      Wi-Fi NICs
     To connect to a Wi-Fi network, you need a 
      To connect to a Wi-Fi network, you need a 
      Network Interface Card (NIC)
      Network Interface Card (NIC)
     The most common type is the PCMCIA 
      The most common type is the PCMCIA 
      card
      card
        Designed for laptop 
         Designed for laptop 
         computers
         computers
                                                        4
           USB and PCI Wi-Fi NICs
           USB and PCI Wi-Fi NICs
     USB
       USB
        Can be used on a 
          Can be used on a 
          laptop or desktop PC
          laptop or desktop PC
     PCI
       PCI
        Installs inside a 
          Installs inside a 
          desktop PC
          desktop PC
                                                              5
      Wireless Network Standards
      Wireless Network Standards
     802.11b
      802.11b
        Max. speed 11 megabits per second
         Max. speed 11 megabits per second
        Range 100 to 150 feet
         Range 100 to 150 feet
     802.11g
      802.11g
        Max. speed 54 megabits per second
         Max. speed 54 megabits per second
        Range 100 to 150 feet
         Range 100 to 150 feet
     802.11a
      802.11a
        Max. speed 54 megabits per second
         Max. speed 54 megabits per second
        Range 25 to 75 feet
         Range 25 to 75 feet
                                                        6
The words contained in this file might help you see if this file matches what you are looking for:

...Introduction a presentation of the paper your wireless network has no clothes by william arbaugh narendra shankar y c justin wan at univ maryland college park explosive growth in networks but many security issues initially left open standards committee result weak or non existent solutions for current deployments cont wired world emphasis on protection from external compromise firewalls provide an access point any adversary beyond physical controls back door is opened attacker which can be exploited parking lot attacks and simple eavesdropping attack against shared key authentication standard mechanisms equivalent privacy protocol wep confidentiality traffic demostrated to vulnerable systems authenticates anyone who requests management frames sent clear even with uses challenge response aaautautututhehehehenntnttniiccitcaiacattiaiton chaon reiton reion resquelponssleulngest te sssseeeeq q initiator responder initator sends req frame replies sending mgmt octets text generated using prng...

no reviews yet
Please Login to review.