Unit VII
Unit VII
Learning Outcomes
Introduction
Everyone has heard of Wi-Fi and uses it to connect to the internet, wireless printers, and
other devices on their computer, smartphone, or tablet. But, how does wireless technology
work? The process of exchanging data wirelessly, as in over the airwaves, is known as wireless
networking or Wi-Fi (Wireless Fidelity). It connects stations or devices by sending
electromagnetic waves via open space. Computers, cellphones, tablets, printers, and other
devices are examples of devices. In order for this to operate, each device must be able to
connect to each other and communicate, exactly like with cabled networking.
Without the need of wires, users may communicate and access applications and
information. Allows for mobility and the extension of applications to other portions of a building,
city, or practically anyplace on the planet. People can use wireless networks to check e-mail or
surf the Internet from wherever they want.
Source: https://www.onlinecomputertips.com/support-categories/networking/627-wireless-
networking-and-standards
WLANS allow users in a local area, such as a university campus or library, to form a
network or gain access to the internet. A temporary network can be formed by a small number
of users without the need of an access point; given that they do not need access to network
resources.
Infrared (IR) and Bluetooth are the two current wireless personal area network
technologies (IEEE 802.15). Personal gadgets will be able to connect within a 30 foot radius
using these. IR, on the other hand, requires a direct line of sight and has a shorter range.
Multiple satellite systems or antenna sites managed by an ISP can sustain these types
of networks over enormous areas, such as cities or countries.
Wireles Within a High IEEE 802.11, Wi-Fi, and HiperLAN Mobile extension
s LAN building or of wired
campus networks
Wireles Within a High Proprietary, IEEE 802.16, and WIMAX Fixed wireless
s MAN city between homes
and businesses
and the Internet
Wireles Worldwide Low CDPD and Cellular 2G, 2.5G, 3G, and Mobile access to
s WAN 4G the Internet from
outdoor areas
1. In order for vendors to build compatible devices, IEEE describes the mechanical method of
how WLANs are implemented in the 802.11 standards.
2. The Wi-Fi Alliance certifies companies by checking that their devices comply with the 802.11
standards, allowing users to buy WLAN solutions from a variety of suppliers without worrying
about compatibility difficulties.
Lesson 3. Wireless Security Protocols
1. WEP
WEP (Wired Equivalent Privacy) was the first encryption-based security solution for
WLANs. WEP employs a static 64-bit key with a 40-bit key length and a 24-bit initialization
vector (IV). The IV is sent in plain text. WEP can be broken since it employs the RC4 encryption
technique and the IV is sent in clear-text. The key was extended to 104 bits with the IV value to
solve this problem. On today's laptops and computers, however, either variety can be readily
broken in minutes.
2. 802.1x EAP
The Extensible Authentication Protocol (EAP) is a layer 2 protocol that allows a wireless
client to connect to a network and authenticate itself. There are two types of EAP: one for
wireless connections and one for LAN connections (also known as EAP over LAN) (EAPoL).
3. WPA
The Wi-Fi Alliance created Wi-Fi Protected Access (WPA) as an interim security solution
to allow for the usage of 802.1x and improvements in the use of WEP until the 802.11i standard
was finalized. WPA has two modes of operation: personal and enterprise. Personal mode was
created for use at home or in a small office setting. Authentication is done via a pre-shared key,
which you must configure on both the clients and the access point. As per the official 802.1 x
standards, no authentication server is required in this mode. Enterprise mode is designed for
large organizations, and it uses an authentication server to centralize the clients' authentication
credentials.
4. WPA2
A wireless router and a wireless network interface card are required to set up a wireless
network. The wireless router is the brains of the wireless network. Like a wire-based network,
the hub is a central location that all computers connect to, providing the computers with network
access.
The D-Link Router can be configured in a matter of minutes, and after you've done so, your Wi-
Fi connection will be established, and you'll be able to connect to the internet via your D-Link
Router.
Make sure the ethernet wire is connected to the modem or an active data jack is connected to
the ethernet port on the back of your router before proceeding.
4. A login page will appear. The default username is admin and the password field is to be
left blank. Click on Log In.
5. Now, you can configure and set up your router using the Internet Connection Setup
Wizard.
6. Under Wireless Setup enter SSID (WiFi Name) and Key (Password).
7. Under WAN Setup choose Connect type: DHCP/PPPoE/Static (You can ask your ISP
about your internet connection and the required details).
8. After you have configured your internet connection, you can then click on Save and
Connect and the router will now connect to the Internet.
9. You can then visit the Wireless Settings and set up your Wi-Fi Network including its
SSID and password.