Monday,Mar14,

Wireless at work

Wi-Fi or Wireless Fidelity, is a term promulgated by the non-profit organization, Wireless Fidelity Alliance to products which comply with the IEEE 802.11 wireless LAN to designate. A Wi-Fi network sends a radio signal, and licensed 2.4 and 5 GHz frequency with a data transfer rate of 11 (IEEE 802.11b) and 54 Mbps (IEEE 802.11a).

Certified "A new generation of" Wi-Fi "wireless products developed, the state not to accept only-of-the-art securityMeasures but also the interoperability of Wi-Fi certified products from different manufacturers. "

Advantages of Wi-Fi

With Wi-Fi networks can be a new set of benefits and services offered are:

• Access to the wired network and the Internet for laptop users and the guests all officers

° Freedom of cable connections, making it easy to move locations without the cost of network cabling

·True modular telephone access within the farm buildings, where the service is often spotty, with the help of Wi-Fi gateway to route calls and signals from other mobile devices

"Last mile" facilities in which appeals may be inconvenient or expensive

Installation planning

The first step in any wireless LAN deployment planning. That is, you must first determine who needs wireless access, the user will be, and how to access the network. It isrecommend that you visit the area and obtain a building model.

A Wi-Fi radio signal has a radius of about 100-300 feet indoors and up to 2,000 meters outdoors. And an access point may be 10 to 30 users to manage, as consumption patterns. For highly populated areas, walk-in, for example, more access points are required. Possible barriers must be identified as signals pass through several walls, but for metal barriers to stop theseElevator shafts. Nor should overlap built into the reporting process, in order to avoid blind spots.

Second, have the necessary equipment. If you only have a few users and uses a peer-to-peer network, you will have to base stations, as determined by the plan. For the office, companies like Cisco, 3Com and Symbol Enterprise-class office equipment offered with the latest security features. To avoid conflicts, all equipment purchased by the company itself, and make sure that access to adjacentPoints to use the same frequency, but different channels.

Network Security:

To protect the network is particularly important given the significant risks of wireless networks. However, there are a number of technologies available today that can make your wireless network as secure as a wired network.

· WPA. Wi-Fi Protected Access (WPA) is a standards-based technology, security, Wi-Fi protected. WPA comes in two versions, a Personal Edition and aEnterprise Edition. The Enterprise Edition offers 128-bit encryption of data, including dynamic session keys, as well as strong access controls. WPA2 provides government grade security with AES encryption, FIPS 140-2. It 'important to note, however, that the EPA and other wireless encryption methods protect only operating between Wi-Fi-enabled computers and access points Wi-Fi CERTIFIED. Once the data over public networks or the Internet, the data will again be vulnerable if onlyThe measures are taken, such as SSL.

· Media Access Control (MAC) filtering. Each Wi-Fi radio has a unique MAC number. Access points can be programmed to accept only certain MAC addresses, ensuring that only authorized users have access to the wireless network.

• Close the network. To counter this, find the tools to scan and exploit wireless networks, the network name or SSID disable all access points. This ensures that theNetwork do not receive a list of available networks to external users.

· Networks virtual private. A VPN is "virtual tunnel" from your computer to the enterprise system, encryption of data transferred to a computer outside the office. VPN technology also works for wireless networks and able to protect transmissions from Wi Fi-equipped computer servers.

• Remote Access Dial-Up User Service (RADIUS). RADIUS is a standardThe authentication technology is used by many companies to control access to their wireless networks. It uses a user name and password system for the user to check the permissions on the network, and different levels of access can be enabled.

· Other security measures. Some kind of firewall is essential for a wireless network. Some Wi-Fi gateway and access points that provide an integrated firewall. But if yours is necessary to protect the network with a firewall as you wouldWired Ethernet or other network. For those with a taste for Kerberos-based security for wireless networks and Kerberos can be implemented. And the rules of Wi-Fi Alliance security as 802.11i and 802.1x, the Advanced Encryption added technologies such as AES and TKIP, as well as basic methods developed to ensure the distribution.

Conclusion:

With the wide range of security technologies now there is a wireless security solution for nearly all wirelessNetwork There is no reason for IT departments to offer wireless services, fear for their users.

About Jonathan clutch:

Jonathan clutch is the Vice President and Chief Technology Officer of ITX Corp. Mr. coupling handles both daily and strategic operations of the Technology Integration Practice Group. Under Mr. Kuppe greatest strengths evaluate unique customer problems, developing innovative, cost effective and provide better "Practice "implementation methodology. Mr. joint allows a wide knowledge and experience to fully analyze client systems to build the most effective technologies and solutions that optimize both recommend their business processes and fulfill immediate and future goals. Main clutch and his team have a high degree of confidence in customers, on ITX as their IT partner of choice.
Mr. Clutch holds certifications with Microsoft, CompTIA, including MCSE, MCSA, Security +, Linux +and I-Net +, and served as a subject expert (SME) for the development of the CompTIA Linux +.

Wireless Printer All in one data recovery software wireless inkjet printer

Danos tu comentario