Sie sind auf Seite 1von 2

..

WLANs provide wireless network communication over short distances using radio or infrared signals instead of traditional network cabling. A WLAN typically extends an existing wired local area network. WLANs are built by attaching a device called the access point (AP) to the edge of the wired network. Clients communicate with the AP using a wireless network adapter similar in function to a traditional Ethernet adapter. .. IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN. .. The 802.11b standard for wireless local area networks (WLANs) - often called Wi-Fi - is part of the 802.11 series of WLAN standards from the Institute of Electrical and Electronics Engineers (IEEE). 802.11b is backward compatible with 802.11. Like other 802.11 standards, 802.11b uses the Ethernet protocol and CSMA/CA (carrier sense multiple access with collision avoidance) for path sharing. The modulation used in 802.11 has historically been phase-shift keying (PSK). The modulation method selected for 802.11b is known as complementary code keying (CCK), which allows higher data speeds and is less susceptible to multipath-propagation interference. .. CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.11 networks. Unlike CSMA/CD (Carrier Sense Multiple Access/Collision Detect) which deals with transmissions after a collision has occurred, CSMA/CA acts to prevent collisions before they happen. .. WEP is a standard network protocol that adds security to 802.11 Wi-Fi networks at the data link layer (OSI model Layer 2). WEP was designed to give wireless networks the equivalent level of privacy protection as a comparable wired network. However, the underlying technology behind WEP has been demonstrated to be relatively insecure compared to newer protocols like WPA. .. Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy).The WPA protocol implements the majority of the IEEE 802.11i standard. .. 802.11i is a standard for wireless local area networks (WLANs) that provides improved encryption for networks that use the popular 802.11a, 802.11b (which includes Wi-Fi) and 802.11g standards. The 802.11i standard requires new encryption key protocols, known as Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). The 802.11i standard was officially ratified by the IEEE in June of 2004, and thereby became part of the 802.11 family of wireless network specifications. .. Advanced Encryption Standard (AES) is a specification for the encryption of electronic data. It has been adopted by the U.S. government and is now used worldwide. It supersedes DES.[3] AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. .. Short for the Wireless Application Protocol, a secure specification that allows users to access information instantly via handheld wireless devices such as mobile phones, pagers, two-way radios, smartphones and communicators. .. Q. What is a site survey--A. A radio frequency (RF) site survey is the first step in the deployment of a Wireless network and the most important step to ensure desired operation. A site survey is a task-by-task process by which the surveyor studies the facility to understand the RF behavior, discovers RF coverage areas, checks for RF interference and determines the appropriate placement of Wireless devices. ..What is the need for Wireless Site Survey--In a Wireless network, many issues can arise which can prevent the radio frequency (RF) signal from reaching all parts of the facility. Examples of RF issues include mulitpath distortion, hidden node problems, and near/far issues. In order to address these, you need to find the regions where these issues occur. A site survey helps you to do this. A site survey helps define the contours of RF coverage in a particular facility. It helps us to discover regions where mulitpath

distortion can occur, areas where RF interference is high and find solutions to eliminate such issues. A site survey that determines the RF coverage area in a facility also helps to choose the number of Wireless devices that a firm needs to meet its business requirements. ..What are the design constraints that a proper site survey needs to address--The four main design requirements that need to be taken care of while a site survey is performed are:High Availability,Scalability,Manageability,Interoperability ..What are the results of a Wireless site survey--A proper site survey provides detailed information that addresses coverage, interference sources, equipment placement, power considerations and wiring requirements. The site survey documentation serves as a guide for network design and for the installation and verification of the Wireless communication infrastructure. ..What basic equipment is required for the completion of a site survey--Some of the basic equipment and utilities that are required for the completion of a site survey include:Wireless access point,Wireless client card,Laptop or PDAs,Variety of antennas (this depends on the requirement of the firm),Site survey utility software ..What are the steps to perform a site survey--A professional installer is needed for optimal results. These are the steps that are performed: 1. Obtain a facility diagram in order to identify the potential radio frequency (RF) obstacles. 2. Visually inspect the facility to look for potential barriers or the propagation of RF signals and identify metal racks. 3. Identify user areas that are highly used and the ones that are not used. 4. Determine preliminary access point (AP) locations. These locations include the power and wired network access, cell coverage and overlap, channel selection, and mounting locations and antenna. 5. Perform the actual surveying in order to verify the AP location. Make sure to use the same AP model for the survey that is used in production. While the survey is performed, relocate APs as needed and re-test. 6. Document the findings. Record the locations and log of signal readings as well as data rates at outer boundaries.

Das könnte Ihnen auch gefallen