Authentication is the process of matching a persons credentials to those on the

Authentication is the process of matching a persons

This preview shows page 1 - 4 out of 5 pages.

Authentication is the process of matching a person’s credentials to those on the client database. This process can be strengthened by using MAC filtering, or encryption.There are several threats to a wireless network. These include war driving, war chalking, evil twin attacks, WPA attacks, and WPS attacks.Two tools that can be used to scan for wireless signals are a Wi-Fi analyzer, and a spectrum analyzer. There is also software that can be downloaded for the same purpose.
Background image
There are several variables needed for a wireless network to succeed. Those that should be avoided from happening are a SSID mismatch, incorrect encryption, inappropriate antenna type and placement, and client saturation.
Background image
2.adhoc()An ad hoc network is a network that is composed of individual devices communicating with each other directly. The ad hoc topology is a smaller wireless network that has nodes close together that exchange data. There are no connectivity devices - the nodes transmitting data to each other through NICs.“ Peer-to-Peer”Infrastructure()When anetwork joins devices together. The infrastructure WLAN topology uses a connectivity device called a wireless access point that accepts wireless signals from multiple nodes and transmits them to the other nodes within the network.The access point needs to have enough power to run and be placed where all the nodes can access it.Mesh()Includes many access points, and when the access points work together on the same network they form a wireless mesh network.The Mesh access points are small radio transmitters that function in the same way as a wireless router. These access points use the 802.11a, b and g standards to communicate wirelessly with users and with each other.
Background image
Image of page 4

You've reached the end of your free preview.

Want to read all 5 pages?

  • Spring '16
  • Networking, Computer network, Wi-Fi, Wireless access point, IEEE 802.11

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes