Daily Updating New Softwares, Cracks, Registered Software and you Need Any Software So Write In Comments

Saturday, January 31, 2009

Wireless Networking Question and Answer

What are the types of Wireless Networks?

Wireless data networks exist in such number and variety as to be difficult to categorize and compare.

Some wireless data networks run over wireless voice networks, such as mobile telephone networks. CPDP, HSCSD, PDC-P, and GPRS are examples. Other wireless networks run on their own physical layer networks, utilizing anything from antennas built into handlheld devices to large antennas mounted on towers. 802.11, LMDS, and MMDS are examples. A few wireless networks are intended only to connect small devices over short distances. Bluetooth is an example.

Wireless networks which run over other wireless networks often utilize the lower layer networks to provide security and encryption. Stand-alone wireless networks either provide their own security and encryption features or rely upon VPN's (Virtual Private Networks) to provide those features. In many cases, multiple layers of security and encryption may be desirable.

Some wireless networks are fixed, meaning that antennas do not move frequently. Other wireless networks are mobile, meaning that the antenna can move constantly. This is sometimes a feature of the specific implementation and antenna design, instead of an inherent limitation of the wireless network specification.

Wireless networks may operate on licensed or unlicensed portions of the frequency spectrum.

Common Wireless Network Types

Major types of wireless networks include:

CDPDCellular Digital Packet Data
HSCSDHigh Speed Circuit Switched Data
PDC-PPacket Data Cellular
GPRSGeneral Packet Radio Service
1xRTT1x Radio Transmission Technology
Bluetooth
IrDA
MMDSMultichannel Multipoint Distribution Service
LMDSLocal Multipoint Distribution Service
WiMAXWorldwide Interoperability for Microwave Access
802.11Wi-Fi




What is Wi-Fi (802.11)?

Wi-Fi (802.11) is a suite of specifications for wireless Ethernet.



802.11 security is a significant concern because 802.11 (Wi-Fi) networks can allow almost untraceable entry into networks.

The 802.11 (Wi-Fi) Standards

The 802.11 standards are defined by the IEEE (Institute of Electrical and Electronic Engineers) at http://grouper.ieee.org/groups/802/11/.


Standard Speed Frequency Modulation
802.11 2Mb 2.4GHz Phase-Shift Keying
802.11a 54Mb 5GHz Orthogonal Frequency Division Multiplexing
802.11b 11Mb 2.4GHz Complementary Code Keying
802.11g 54Mb 2.4GHz Orthogonal Frequency Division Multiplexing

The 802.11 (Wi-Fi) Channels

The most common 802.11 specification, 802.11b, defines twelve channels. These channels utilize overlapping frequencies. Channels one, six, and eleven do not overlap.

ChannelUS FrequencyEuropean FrequencyJapanese Frequency
12412

22417

324222422
424272427
524322432
624372437
724422442
824472447
924522452
1024572457
1124622462
12

2484


What is 802.11a?

802.11a is one of the many standards used for high speed wireless networks, usually referred to as Wifi. This standard was created by the IEEE (Institute of Electrical and Electronics Engineers) in 1999 and uses several different frequencies including 5.15-5.35/5.47-5.725/5.725-5.875 GHz to send and receive data from one electronic or computer device to another. There are many different standards of the 802.11 used today for wireless communication; the other popular standards include 802.11b, 802.11g and 802.11n. The standard 802.11a has been available for several years, but has not caught on and is not used as widely as other standards- specifically 802.11b and "g".

Millions of people each year are adding Wifi networks, either for their home, small business or corporate enterprise. While most home networks and small businesses have not embraced 802.11a, one sector that is more willing to use this standard is corporate enterprises.

802.11a is not very popular among small businesses or home networks, but has become popular among corporate users; here is how this standard stacks up in the attributes that matter. These attributes include Speed, Range, Clarity of the Signal, Price and Compatibility

Speed

The max speed of 802.11a is 54 megabits per second; however it is quite fast at its standard rate which is about 25 mbps. This makes it more than twice as fast as 802.11g and almost 4 times as fast as 802.11b when using it in day to day operations.

Range

802.11a delivers a range of about 33 meters or about 100 feet. This is about a 1/3 less than its cousin 802.11b which delivers a range of about 150 feet. It should be noted that because 802.11a uses much higher frequencies, there is less interference from cordless telephones and microwave ovens. However, higher frequencies have their limitations; they do not penetrate walls and obstacles as good as lower frequencies and they require more energy to power these devices.

Clarity of the Signal

802.11a operates on the frequency 5.15-5.35/5.47-5.725/5.725-5.875 GHz, for the most part, the clarity of the signal is generally good, and you are less likely to experience interference than other types of 802.11 standards.

Price

The Price for 802.11a is more expensive than both 802.11b and "g". While it does offer great speeds, many individuals might not view the speed worthy for its extra cost. However, for business's that need fast, interference free networks, these costs can be rationalized and accepted.

Compatibility

Unfortunately, 802.11a is not compatible with other types of standards. If you are running a network on 802.11a or have a Wifi card that receives 802.11a signals, do not expect this standard to work with others. There are dual band Wifi router and cards that offer both 802.11a and "b", but they are usually very costly.


What is WiMAX?


WiMAX stands for Worldwide Interoperability for Microwave Access.

WiMAX is a broadband wireless point-to-multipoint specification from the IEEE 802.16 working group.

Unlike wireless LAN technologies such as Wi-Fi (802.11), WiMAX is designed to operate as a wireless MAN (Metropolitan Area Network). This places WiMAX in the same class as the earlier 802.16 standards, MMDS and LMDS.

WiMAX Frequencies

WiMAX variants operate both on FCC licensed frequencies and on unlicensed frequencies.

Licensed WiMAX operates in the 10 to 66GHz range; unlicensed WiMAX operates in the 2 to 11Ghz range.

WiMAX Bandwidth and Range

WiMAX has a theoretical maximum bandwidth of 75Mbps. This bandwidth can be achieved using 64QAM 3/4 modulation. 64QAM can only be utilized under optimal transmission conditions. WiMAX supports the use of a wide range of modulation algorithms to enable the most bandwidth to be realized under all conditions.

WiMAX has a theoretical maximum range of 31 miles with a direct line of sight. Near-line-of-sight (NLOS) conditions will seriously limit the potential range.

In addition, some of the frequencies utilized by WiMAX are subject to interference from rainfade. The unlicensed WiMAX frequencies are subject to RF interference from competing technologies and competing WiMAX networks.

WiMAX Specifications

Fixed/MobileFixed
Circuit/Packet:Packet
Max Bandwidth70 Mbps
Range31 miles
Frequency10-66GHz, 2-11Ghz
Host NetworkN/A
DefinerIEEE (Institute of Electrical and Electronic Engineers)
URLhttp://grouper.ieee.org/groups/802/16/




What is EVDO?

EVDO is an acronym for "Evolution Data Only" or "Evolution Data Optimized" which is a standard for high speed wireless networks used for Broadband Internet connectivity. EVDO enables computer users to have high speed Internet access without the help of a hotspot. Just by inserting an EVDO card into the computer, users get connected to the Internet within seconds and have Net access at DSL-compatible speeds.

While traditional wireless networks assign a dedicated path between the source and destination for the entire duration of the call very similar to fixed-line telephone networks, EVDO transmits several users' data through a single channel using Code Division Multiple Access (CDMA) as well as Time Division Multiple Access (TDMA) to achieve higher throughput and better utilization of network bandwidth.

The standard underwent many revisions denoted as Rev. 0, Rev. A, and Rev. B and so on. Rev. 0 supports forward link speeds up to 2.4 Mbit/s. while Rev. A can go up to 3.1 Mbit/s. EVDO is part of the CDMA2000 family of standards and has been adopted by many service providers offering high speed broadband connectivity for mobile phone users through CDMA networks. It was developed by Qualcomm during the late 90s. Since the standard was a direct evolution from the 1xRTT standard which carried only data, it was initially called Evolution Data only. Later on, since the word 'only' seemed to add a negative connotation to the name, the name was switched to Evolution Data Optimized. Since the new name was more marketable and sounded more hi-tech, it stuck.

EVDO uses the current broadcast frequencies of existing CDMA networks which is a major advantage when compared to competing technologies which often require expensive hardware and software changes or upgrades to the network. Verizon and Sprint are the two major service providers in the US using EVDO. Verizon has implemented Rev. A throughout its network, and Sprint is rapidly catching up. While there is also a large presence of EVDO technology in Korea, it has made relatively no impact in Europe and countries in Asia which predominantly use the W-CDMA standard for high speed data access.





What is a WEP Key Passphrase?

To understand what a WEP key passphrase is, we first need to understand what WEP is. WEP is the Wired Equivalent Privacy portion of IEEE 802.wireless networks. WEP was introduced to provide security to wireless networks in view of their vulnerability to eavesdropping because of their use of radio waves. WEP uses the stream cipher RC4 for confidentiality. A WEP key is therefore a security code that is generated using this protocol. WEP keys allow computers on a network to exchange encoded messages with one another while hiding the contents of the messages from intruders. This key is what is used to connect to your wireless-security-enabled network.

A WEP key passphrase is a sequence of words or ordinary text that can be used to automatically generate a WEP key. They are generally longer and stronger than most passwords and can go from 8 to 63 ASCII characters. You can use uppercase, lowercase, and even numeric characters to form your passphrase. However, this may weaken your key and make it vulnerable to a dictionary attack. To protect from this kind of brute force attack, you can use Wi-Fi Protected Access (WPA) to automatically generate unique keys. WPA generates unique keys by employing the Temporal Key Integrity Protocol (TKIP) along with the network service set identifier (SSID) to generate unique keys for each wireless client.

A WEP key consists of a string of hexadecimal characters, which include the numbers 0-9 and the letters A-F. Each character represents 4 bits of the key.

The length of a WEP key depends on the type of WEP encryption used. The various WEP key lengths are as follows:

  • Standard 64-bit WEP uses a 40-bit key
  • . WEP 104-bit uses a 128-bit key.
  • 152-bit WEP key.
  • Preshared 256-bit WEP key
.

The strength of the protection given by encryption depends on the choice of encryption key.

Some security limitations of WEP include the following:

  1. The key size, as cracking a longer key will require more packets to be intercepted.
  2. The possibility of IV collisions and altered packets, which are not helped at all by a longer key.
  3. WEP uses RC4 to protect the confidentiality of the transmitted data. Because every device on the network uses one key to encrypt every transmitted packet, an eavesdropper could intercept the WEP encryption and find the key.

WPA is more secure and easier to use than WEP. It requires configuring your router with a passphrase that WPA will use to generate a WEP key.

An alternative is to use WEP key generators. There are several such tools available on the Internet. A WEP key generator generates random hexadecimal values from a passphrase value entered.

You can either use your WEP key or a passphrase to connect your router to the network. Most routers provide for this. If your router is set to WEP, then you need to enter your WEP key. If your router is set to WPA, then you need to set the passphrase that you will be using to connect to the network.




How do I Setup a Wireless Network?

For those who have been contemplating setting up a wireless network in their home, there are many reasons to consider how a wireless network will benefit you. One reason that many people decide to set up a wireless network is to share an Internet connection. By setting up a wireless network, several family members can be on the Internet at the same time. As well, the use of a wireless network also make it possible to send files between different computers without having to save the information to a diskette or CD-ROM.

To begin setting up your wireless network, you will need a few pieces of hardware:

  • A wireless router
  • One wireless network adapter for each computer
  • A cable or DSL broadband modem (if you wish to connect your wireless network to the Internet)
  • An Ethernet cable (to connect your wireless router to your cable or DSL modem)
  • A second Ethernet cable (to configure your wireless router from your computer)

Connect an Ethernet cable between your computer and a LAN port located at the back of your wireless router.

Next, attach another cable between the WAN port of your wireless router and the Ethernet port of your broadband modem.

After completing this, the next step is to turn on the wireless router and wait for it to initialize. Most wireless routers ship with default configurations that will allow you to connect to the Internet at this time. Check to ensure that you are able to access the Internet from your computer. If you are unable to connect, check to see if the cables are connected correctly.

The next step is to configure the wireless router. Configuring your wireless router is not as difficult as it may first appear. This may not be strictly necessary, but may be a very good idea. This configuration can be used to personalize your wireless router, or to secure it from public access. For example, you will most likely want to set the SSID on your wireless router and you will also probably want to configure WEP.

The next step is to install the wireless network adapters in each computer. These wireless cards may come in many form factors, including:

  • PCI wireless cards
  • PCMCIA wireless cards
  • USB wireless adapters

If you have a PCI wireless card, you will need to power off your computer, open the case, and install the PCI card in an available PCI expansion slot.

If you have a PCMCIA wireless card, you will only need to slide it into a PCMCIA slot on your notebook PC.

If you have a USB wireless adapter, you will only have to connect it to a USB port on your computer.

Once the card is physically installed, you will need to install the software that came with the card. Follow the instructions in the package to do so.

You will then configure your computer for the SSID and other wireless configuration information to match the options you chose when you configured your wireless router.








Design by Mady Bacha-cı | MoneyGenerator Blogger Template by Crackers