q More and more networks are operating without cables, in the
wireless mode.
q Wireless LANs use high frequency radio signals, infrared light
beams, or lasers to communicate between the workstations, servers, or hubs.
q Each workstation and file server on a wireless network has some
sort of transceiver/antenna to send and receive the data.
q Information is relayed between transceivers as if they were
physically connected.
q For longer distance, wireless communications can also take place
through cellular telephone technology, microwave transmission, or by satellite.
´ Wireless networks are great for allowing laptop computers,
portable devices, or remote computers to connect to the LAN.
´ Wireless networks are also beneficial in older buildings where
it may be difficult or impossible to install cables.
´ The two most common types of infrared communications used in
schools are line-of-sight and scattered broadcast.
Line-of-sight
communication means that there must be an unblocked direct line between the
workstation and the transceiver
´ If a person walks within the line-of-sight while there is a
transmission, the information would need to be sent again.
´ This kind of obstruction can slow down the wireless network.
´ Scattered infrared
communication is a broadcast of infrared transmissions sent out in multiple
directions that bounces off walls and ceilings until it eventually hits the
receiver.
´ Networking communications with laser are virtually the same as
line-of-sight infrared networks.
Wireless standards and speeds
´ The Wi-Fi Alliance is a global, non-profit organization that
helps to ensure standards and interoperability for wireless networks, and
wireless networks are often referred to as WiFi (Wireless Fidelity). The
original Wi-Fi standard (IEEE 802.11) was adopted in 1997.
´ Since then many
variations have emerged (and will continue to emerge). Wi-Fi networks use the
Ethernet protocol.
Standard
|
Max Speed
|
Typical Range
|
802.11a
|
54 Mbps
|
150 feet
|
802.11b
|
11 Mbps
|
300 feet
|
802.11g
|
54 Mbps
|
300 feet
|
802.11n
|
100 Mbps
|
300+ feet
|
Wireless Security
´ Wireless networks are much more susceptible to unauthorized use
than cabled networks.
´ Wireless network devices use radio waves to communicate with
each other.
´ The greatest vulnerability to the network is that rogue machines
can "eves-drop" on the radio wave communications.
´ Unencrypted information
transmitted can be monitored by a third-party, which, with the right tools ,
could quickly gain access to your entire network, steal valuable passwords to
local servers and online services, alter or destroy data, and/or access
personal and confidential information stored in your network servers.
´ To minimize the
possibility of this, all modern access points and devices have configuration
options to encrypt transmissions.
´ These encryption methodologies are still evolving, as are the
tools used by malicious hackers, so always use the strongest encryption
available in your access point and connecting devices.
´ ENCRYPTION:
´ WEP (Wired Equivalent Privacy) encryption can be easily hacked
with readily-available free tools which circulate the internet.
´ WPA and WPA2 (WiFi
Protected Access versions 1 and 2) are much better at protecting information,
but using weak passwords or passphrases when enabling these encryptions may
allow them to be easily hacked.
´ If your network is running WEP, you must be very careful about
your use of sensitive passwords or other data.
´ Three basic techniques are used to protect networks from
unauthorized wireless use.
´ Use any and all of these
techniques when setting up your wireless access points:
´ Encryption.
´ Enable the strongest encryption supported by the devices you
will be connecting to the network. Use strong passwords (strong passwords are
generally defined as passwords containing symbols, numbers, and mixed case
letters, at least 14 characters long).
´ Isolation.
´ Use a wireless router that places all wireless connections on a
subnet independent of the primary private network.
´ This protects your private network data from pass-through
internet traffic.
´ Hidden SSID.
´ Every access point has a Service Set IDentifier (SSID) that by
default is broadcast to client devices so that the access point can be found.
´ By disabling this
feature, standard client connection software won't be able to "see"
the access point.
´ However, the eves-dropping programs can easily find these access points, so this
alone does little more than keep the access point name out of sight for casual
wireless users.
Advantages of wireless networks:
´ Mobility - With a laptop computer or mobile device, access can
be available throughout a school, at the mall, on an airplane, etc.
´ More and more businesses
are also offering free WiFi access ("Hot spots").
´ Fast setup - If your computer has a wireless adapter, locating a
wireless network can be as simple as clicking "Connect to a Network"
-- in some cases, you will connect automatically to networks within range.
´ Cost - Setting up a wireless network can be much more cost
effective than buying and installing cables.
´ Expandability - Adding new computers to a wireless network is as
easy as turning the computer on (as long as you do not exceed the maximum
number of devices).
Disadvantages of wireless networks:
´ Security - Be careful. Be vigilant. Protect your sensitive data
with backups, isolated private networks, strong encryption and passwords, and
monitor network access traffic to and from your wireless network.
´ Interference - Because wireless networks use radio signals and
similar techniques for transmission, they are susceptible to interference from
lights and electronic devices.
´ Inconsistent connections –
´ wireless connections are not nearly as stable as those through a
dedicated cable.
´ Speed - The transmission speed of wireless networks is
improving; however, faster options (such as gigabit Ethernet) are available via
cables.
´ If you are only using wireless for internet access, the actual
internet connection for your home or school is generally slower than the
wireless network devices, so that connection is the bottleneck.
´ If you are also moving large amounts of data around a private
network, a cabled connection will enable that work to proceed much faster.
No comments:
Post a Comment