Authentication is the process of matching a person’s credentials to those on the client database. This process can be strengthened by using MAC filtering, or encryption.There are several threats to a wireless network. These include war driving, war chalking, evil twin attacks, WPA attacks, and WPS attacks.Two tools that can be used to scan for wireless signals are a Wi-Fi analyzer, and a spectrum analyzer. There is also software that can be downloaded for the same purpose.
There are several variables needed for a wireless network to succeed. Those that should be avoided from happening are a SSID mismatch, incorrect encryption, inappropriate antenna type and placement, and client saturation.
2.adhoc()An ad hoc network is a network that is composed of individual devices communicating with each other directly. The ad hoc topology is a smaller wireless network that has nodes close together that exchange data. There are no connectivity devices - the nodes transmitting data to each other through NICs.“ Peer-to-Peer”Infrastructure()When anetwork joins devices together. The infrastructure WLAN topology uses a connectivity device called a wireless access point that accepts wireless signals from multiple nodes and transmits them to the other nodes within the network.The access point needs to have enough power to run and be placed where all the nodes can access it.Mesh()Includes many access points, and when the access points work together on the same network they form a wireless mesh network.The Mesh access points are small radio transmitters that function in the same way as a wireless router. These access points use the 802.11a, b and g standards to communicate wirelessly with users and with each other.
- Spring '16
- Networking, Computer network, Wi-Fi, Wireless access point, IEEE 802.11