TechiWarehouse.Com


Top 3 Products & Services

1.
2.
3.

Dated: Jul. 16, 2013

Related Categories

Networking In General

Wireless networking is a wireless communication, but as a way to get a computer with a wireless card connected to the SOHO device that allows wireless communication (not to all devices) and become a full member of the local network. SOHO device works as a wireless access point (WAP - Wireless Access Point). In today's rules, all laptops have this feature built-in antenna and they are incorporated in the monitor frame. So, this is a Wi-Fi network connection that is based on the approval of the communication settings SOHO devices entering the MAC address of wireless network interface cards (NIC), and assign security at the SOHO device settings.

For the 'intrusion' in someone else's network it is enough to intercept a single data packet and clone the MAC address of the sender. Therefore, security and encryption for wireless connection to the network needs to be addressed. As wireless networks are subject to misuse, of which the most effective theft are MAC addresses, a necessary protection against unauthorized connection and user identification when connecting. MAC address belongs to L2 level of the OSI model, and are registered in the list of allowed MAC addresses that will serve the SOHO device, and the type of communication at this level is CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance) - avoiding collision on the way to waiting for a free medium. TCP / IP settings, computer name and workgroup are defined as for wired communication, and for simplicity there is automatically adjust the network connection, and the required TCP / IP settings of the computer to deliver the SOHO device. As an addition in wireless communication are WEP (Wired Equivalent Privacy) or WPA (Wi-Fi Protected Access) security protocols of higher level. From the above it follows that active wireless network does not have to be a computer, but also any other devices, like a printer, a NAS device or a modern TV set if you have the wireless NIC.Windows Network WEP is an algorithm for secure communication over IEEE 802.11 wireless networks.

Because wireless networks use radio signals to transmit data very they are susceptible to eavesdropping, unlike wired networks. Security is achieved by 64/128 bit encryption-term communication and the regulation of access to the network based on the authentication via MAC address of the network device that connects to SOHO devices. However, because of the perceived vulnerability of the WEP algorithm, A WPA algorithm with enhanced 128-bit encryption term communication and authentication is introduced, and then after it the WPA2, whose improvement is reflected in the application of advanced and secure algorithms: basic TKIP (Temporal Key Integrity Protocol) and AES advanced (Advanced Encryption Standard). TKIP was created as a solution compatible with older network adapters during the transition from WEP to WPA, and AES is used in advanced protected wireless networks.

AES is a symmetric key algorithm, which means that the same key is used for encrypting and decrypting data, the key size is 128, 192, or 256 bits. Version WPA2-PSK (Pre-Shared Key) uses this algorithm. PSK is the key-a phrase with the size of 8-63 ASCII characters. How can that phrase be 'broken' with some violent character generator (Brute force decriptor). It is best to use phrase combined figures and letters of the site, because the programs of 'intruders' are often using dictionaries. With regard to ease of access to the wireless network WPS is established (Wi-Fi Protected Setup). The aim of the protocol is to allow home users who know little about the safety of wireless communication and are not skilled in setting up WPA encryption methods, easier to add new devices to an existing wireless network, without the need of typing the safety phrases. It offers several methods for connecting; PIN (Personal Identification Number) - user device access on the basis of recognition of the number of eight digits, PBC (Push-Button Method) - use of the access button also allows the release of encryption and 120 seconds if the connection is set up to generate and write access WPA settings, NFC (Near-Field Communication) method and the use of recording on a USB stick, of which the first two mentioned methods are of practical importance. But it proved to be quite insecure and one should be careful because all recent SOHO devices have WPS as their default setting.

Now that you've gotten free know-how on this topic, try to grow your skills even faster with online video training. Then finally, put these skills to the test and make a name for yourself by offering these skills to others by becoming a freelancer. There are literally 2000+ new projects that are posted every single freakin' day, no lie!


Previous Article

Next Article