Anda di halaman 1dari 3

LAB 15.01 Step 1: Standard 802.11 802.11a 802.11b 802.11g 802.11n Frequency 2.4 GHz 5.0 GHz 2.

4 GHz 2.4 GHz 2.4 GHz Spectrum DSSS DSSS DSSS OFDM OFDM Maximum Speed 2 Mbps 54 Mbps 11 Mbps 54 Mbps 100+ Mbps Maximum Range ~300 ~150 ~300 ~300 ~300 Compatability 802.11 802.11a 802.11b 802.11b/g 802.11b/g/n

Step 2: Wired devices work in full duplex to send and listen simultaneously, wireless devices are only half-duplex, and do not have the capability to do so. Wireless devices may not be able to detect other networks based on signal strength. CSMA/CA works by using Distributed Coordinated Function (DCF) to determine if a wireless network is busy, if so , DCF determines a back off period on top of the normal IFG time. Receiving nodes are required to send an ACK for processed frames, If the sending node does not receive and ACK, it will continue to repeat. Step 3: Security Component MAC address Filtering RADIUS EAP WEP WPA TKIP WPA2 AES WPA2-PSK IEEE 802.1X IEEE 802.11i Description Creates a list of accepted MAC addresses stored in the WAP, frames with MAC addresses not in the list are rejected. Uses a username and password combination that is stored in the servers database This is the framework designed for encrypted authentication. Uses a 64 or 128 bit encryption algorithm to scramble data frames. Static security. Updated WEP, with dynamic security keys and an encryption key integrity-checking feature. Added a 128 bit encryption key to WEP. Changed the encryption algorithm to AES. 128 bit block cypher, much more difficult to break than TKIP Combined the function of WPA2 and RADIUS servers. Extremely secure. Utilizes the RADIUS server and password EAP security measures Utilizes WPA2

Step 4: Antenna Technology Dipole Antenna Parabolic Antenna Yagi Antenna Patch Antenna Characteristics Straight wire antennas that provide omnidirectional broadcast. Looks and functions like a satellite dish. Known as a beam antenna, able to focus its signal directly for long distance. Concealed flat antenna typically in a square shape, used to mount flat.

LAB 15.02 Step 1: The basic requirement is of course some sort of ISP. When you have your internet source, you must configure a wireless AP with the security measures deemed fit by the head hancho. You should probably keep a maintenance computer handy for network modifications. That is pretty much it besides the obvious (like power supply) for hardware. Many routers or APs today do not have any software requirements and are extremely easy to set up. Just configure your security and it is ready to use. The rest is up those who wish to connect. Step 2: Down to the basics, ad hoc networks connect all nodes to each other in a mesh. It requires a static SSID, different IPs, and a sharing system. Infrastructure networks connect all nodes to a central device (or devices if you have multiple APs that connect to a central AP) that resembles a Star network topology. Step 3: Implementing WPA2 and WPA are very simple today. Access your AP with confidential login information, navigate to the security features, select your desired security measure (in this case WPA2 or WPA), and create (or randomly generate) a security key that will grant access. The MAC filtering is an extremely similar process, but under a different sub menu. I my opinion, neither of these are fitting for this hypothetical situation (rest stop) because MAC filtering would require a technician to add a MAC every time someone wanted access for a 10 minute visit. Password protection is not a good idea either; Rest stops are public so access should not require credentials. The only way I see a password being appropriate is if the provider was charging a timed access fee similar to Boingo Hotspot used in airports. Besides, I think enough info is stolen in a 10 minute connection to know who was on the network and what was being done.

Step 4: This is simple, add more access points. This is typically done by connection two or more wireless switches together using the rear RJ-45 ports. You must configure the secondary APs to broadcast the same SSID and (if you must) meet the same security requirements. Step 5: Most rest stops Ive seen personally didnt exceed the range limit of a decent speed 802.11g wireless network. Hypothetically, in an extreme rest stop, Id place enough unsecure APs with the greatest range (not greatest speed, its free internet they can handle a happy medium)to reach each end of the parking lot. Most likely apply some parental controls (content restrictions). Step 6: The ISP will connect to a modem (preferable cable) which then leads to a wireless router. This router will have a maintenance computer hard wired with a patch cable, then will be broadcasting 802.11g signal. If it does not extend the entire rest stop, wire a second AP in the direction necessary to get full area coverage. An RJ-45 extends from the last slot in the central switch, which then plugs into slot 1 of the extended AP. The extended AP then broadcasts the same SSID as the central AP.

Anda mungkin juga menyukai