+ All Categories
Home > Documents > WIRELESS LAN PRESENTATION

WIRELESS LAN PRESENTATION

Date post: 11-Apr-2015
Category:
Upload: api-3765549
View: 2,250 times
Download: 0 times
Share this document with a friend
Description:
finale
19
Sept.16 2005 Do you want to have a convenient and direct access in your transactions?
Transcript
Page 1: WIRELESS LAN  PRESENTATION

Sept.16 2005

Do you want to have aconvenient and direct access in your transactions?

Page 2: WIRELESS LAN  PRESENTATION

Sept.16 2005

Introducing…

Wireless Lan

Page 3: WIRELESS LAN  PRESENTATION

Sept.16 2005

What’s inside

What is wireless LAN?History of wireless LAN

Three transmission techniquesAdvantages in using wireless LANWhat is war driving?Tips in protecting WLAN from war driving

Page 4: WIRELESS LAN  PRESENTATION

Sept.16 2005

What is wireless LAN?

Wireless LAN is a type of local area

network that uses high frequency radio rather than wires to

communicate between nodes.

Page 5: WIRELESS LAN  PRESENTATION

Sept.16 2005

History of wireless LAN

four islands

The first radionetwork technologywas developed at University of Hawaii in a researchproject callALOHANET. The ALOHANET systemallows computerwith 7 sites, whichspread out in fourislands withoutusing any wiredtransmission links.

Page 6: WIRELESS LAN  PRESENTATION

Sept.16 2005

History of wireless LAN

Terminal node controller

In 1980 thehobbyists (ham)in Canada and US haddeveloped theequipment callTNCs (terminalnode controller).

Page 7: WIRELESS LAN  PRESENTATION

Three transmission techniques

Page 8: WIRELESS LAN  PRESENTATION

Sept.16 2005

Spread spectrum

Spread spectrum

Is currently the mostwidely usedtransmissiontechnique forWLAN. It wasinitially developedby the military toavoid jamming andeavesdropping of thesignals.

Page 9: WIRELESS LAN  PRESENTATION

Sept.16 2005

Narrowband microwave

Narrowband microwave

Microwavetechnology is notreally a LANtechnology. It’s mainuse is to interconnectLAN between twobuilding.

Page 10: WIRELESS LAN  PRESENTATION

Sept.16 2005

Infrared

Used infrared signalsto transmit data. Thisis the same technologyused in products likeremote controls fortelevision and VCR’s.

Page 11: WIRELESS LAN  PRESENTATION

Sept.16 2005

Advantages in using wireless LAN

Installation flexibility

Installation speed and simplicity

Mobility

Reduced cost-of-ownership

Page 12: WIRELESS LAN  PRESENTATION

Sept.16 2005

What is war driving?

War driving is driving around a city searching for

the existence of (WLAN).

It’s locating and logging wireless access points while

in motion.

This task is automated usingdedicated war drivingsoftware and GPS unit.

Page 13: WIRELESS LAN  PRESENTATION

Sept.16 2005

Tips in protecting WLAN

Change the default password on your Accesspoint.

Use a proxy with access control for outgoingrequests (web proxy and others).

Regularly tests the security of your wirelessnetwork, using the latest war driving tools.

Page 14: WIRELESS LAN  PRESENTATION

Sept.16 2005

Tips in protecting WLAN

Enable strict LOGGING on all devices and check your wireless log files regularly to see

if your security policy is still adequate.

Don’t give passwords, account nos. or credit card details if you’re not confident that the

website is real or genuine.

Turn off or remove your wireless card whennot accessing a hot spot to deny hackers anyopportunity to get into your computer.

Page 15: WIRELESS LAN  PRESENTATION

Sept.16 2005

summary

Using wireless LAN brought a lot of advantages in our daily transactions.

But let us not try to forget that there are hackers who try to

invade our computer destroying everything. Don’t wait until

complete stranger are abusing your computer.

Be wise…

Page 16: WIRELESS LAN  PRESENTATION

Sept.16 2005

It’s better to be careful rather than regretting things

at the end.

Page 17: WIRELESS LAN  PRESENTATION

Sept.16 2005

Back up

Wireless LAN card hackers War driving tools

Access pointGPS unit motherboard

Page 18: WIRELESS LAN  PRESENTATION

Sept.16 2005

Style:                       

Page 19: WIRELESS LAN  PRESENTATION

Sept.16 2005

With the lack of physical cabling to tie down the location of the node on a network, the network can be more flexible moving a wireless lan node is easy. As opposed to the large amount of labor required to add or move the cabling in any other type of network. Also going wireless may be a better choice where the physical make up of the building makes it difficult or impossible to wire in the building. Conclusion For the SOHO (Small Office/Home Office) this product is very attractive. With this product there is no need to run wires under carpets or through walls. The SOHO user need not worry about plugging their laptop into docking stations every time they come into the office or fumble for clumsy and unattractive network cabling. Wireless networking provides connectivity without the hassle and cost of wiring and expensive docking stations. Also, as the business or home office grows or shrinks, the need for wiring new computers to the network is nonexistent. If the business moves, the network is ready for use as soon as the computers are moved. For the wired impossible networks such as those that might be found in warehouses, wireless will always be the only attractive alternative. As wireless speeds increase, these users have only brighter days in their future.

Summary:Wireless Networking is on the rise and adds a whole new level of convenience to networking. It has the ability to reduce the costs of setting up and maintaining a computer network. It does, however, pose certain risks that might be considered too big for high end corporations as well as high end users.

   

3. What are the disadvantages of Wireless LANs ?The speed of Wireless LAN is still relative slower than wired LAN. The most popular wired LAN is operated in 100Mbps, which is almost 10 times of that of Wireless LAN (10Mbps). A faster wired LAN standard (1000Mbps), which is 100 times faster, becomes popular as well. The setup cost of Wireless LAN is relative high because the equipment cost including access point and PCMCIA Wireless LAN card is higher than hubs and CAT 5 cables.

4. Where can you find wireless 802.11 networks ?Airports, hotels, and even coffee shops like Starbucks are deploying 802.11 networks so people can wirelessly browse the Internet with their laptops. As these types of networks increase, this will create additional security risk for the remote user if not properly protected

 NODE: 1) In networks, a processing location. A node can be a computer or some other device, such as a printer. Every node has a unique network address, sometimes called a Data Link Control (DLC) address or Media Access Control (MAC) address.

(2) In tree structures, a point where two or more lines meet.  

Optical fiber: You hear about fiber-optic cables whenever people talk about the telephone system, the cable TV system or the Internet. Fiber-optic lines are strands of optically pure glass as thin as a human hair that carry digital information over long distances. They are also used in medical imaging and mechanical engineering inspection. Optical fiber (or "fiber optic") refers to the medium and the technology associated with the transmission of information as light pulses along a glass or plastic wire or fiber. Optical fiber carries much more information than conventional copper wire and is in general not subject to electromagnetic interference and the need to retransmit signals. Most telephone company long-distance lines are now of optical fiber.

convey1. To take or carry from one place to another; transport.

2. To serve as a medium of transmission for; transmit: wires that convey electricity. 3. To communicate or make known; impart: “a look intended to convey sympathetic comprehension”

hobbyistsA hobby is a spare-time recreational pursuit. An activity or interest pursued outside one's regular occupation and engaged in primarily for pleasure.

 modulate

• To change keys within a piece of music

• To alter the function or status of something in response to a stimulant

• To "change". A signal can be transmitted via a carrier wave, by modulating the wave to represent the signal.

• To adjust, or change.• jamming

• The intentional transmission of radio signals in order to interfere with the reception of signals from another station.

• Deliberate interference intended to prevent reception of signals in a specific frequency band.

• The act of intentionally directing electromagnetic energy at a communication system to disrupt or prevent signal transmission.

Eavesdropping is the intercepting and reading of messages and conversations by unintended recipients. One who participates in eavesdropping, i.e. someone who secretly listens in on the conversations of others, is called an eavesdropper. The origin of the term is literal, from people who would literally hide out in the of houses to listen in on other people's private conversations.logging

The work or business of felling and trimming trees and transporting the logs to a mill.• Access point :

• in a catalog or index, a heading that may be used to find information on an item. Common access points include author, title, and assigned subject headings.

• A name, term, heading, or code in a bibliographic record under which library materials may be searched, identified, and retrieved. In a broader sense, any unique element which serves as a point of entry to a file of information.

• Searchable fields of a record in a database used to retrieve information. These fields can include the author's name, subject, date, title, etc.INVADE

• march aggressively into another's territory by military force for the purposes of conquest and occupation; "Hitler invaded Poland on September 1, 1939" • intrude on: to intrude upon, infringe, encroach on, violate; "This new colleague invades my territory"; "The neighbors intrude on your privacy

PDA USERSA version of the Windows operating system designed for small devices such as personal digital assistants (PDAs) (or Handheld PCs in the Microsoft vernacular). The Windows CE graphical user interface (GUI) is very similar to Windows 95 so devices running Windows CE should be easy to operate for anyone familiar with Windows 95.

  

DOCKING STATIONSA platform into which you can install a portable computer. The docking station typically contains slots for expansion cards, bays for storage devices, and connectors for peripheral devices, such as printers and monitors. Once inserted in a docking station, the portable computer essentially becomes a desktop model computer. When it is taken out, it becomes a portable computer again. Most importantly, the same data is accessible in both modes because it resides on the portable computer's drives. The idea behind docking stations is to let you simultaneously enjoy the expansion possibilities of desktop model computers with the portability of notebook computers. In addition, the docking station enables you to use a full-size keyboard and monitor when you're not traveling.

  

• ENCRYPTED Similar to "coded" in that it is a way to attempt preserving someone's confidentiality. Encrypting is supposed to be more secure, in that not all researchers would necessarily have access to the exact code or method of encryption. In a form of coded language.

 • ROOT NODE

• A node within a scene graph that establishes the default environment. See also group node, leaf node.

• In a graphical representation of data as a tree, a node that has no parents but typically has children.

• The root node is the root of the document tree. This is not the same as the node corresponding to the document element. (It is that nodes parent.) 

PRNETPacket Radio Network. Experimentelles

 TCP

Abbreviation of Transmission Control Protocol, and pronounced as separate letters. TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent. 


Recommended