Wireless networking (WLAN - Wireless Local Area Network) is currently the fastest growing connectivity solution in the UK. Broadband has overtaken dial-up as the majority share connection speed and so the internet is a very desirable place to be. It is so desirable in fact that people want to surf the web from the garden, the living room and the bedroom (well, obviously!) and so wireless networking is our new friend.
The Standard Rules for Securing Home Wireless Networking:
The 802.11 standards for WiFi - Serious Jargonism Here!!!!
The 802.11 standards for WiFi now come in an assortment of flavours; 802.11g is backwards compatible with 802.11b (ie. if you buy a 54Mbps card, it will work with older 11Mbps ones) The current standards, 802.11a,b,g & n are all actually separate although they are often teamed together in various products. 802.11b & g both function in the 2.4 GHz bandwidth range along with microwave ovens and Bluetooth devices. This is a crowded bandwidth but 802.11a&g do now co-exist well due changes that were made to allow this. Although 802.11b&g share a frequency range, they are different speeds. 802.11b is 11MBit/sec whereas 802.11g is 54MBit/sec like 802.11a. Confused yet? Yes 802.11a&g are both 54MB/s because the architecture is similar but 802.11b&g are both 2.4 GHz whereas 802.11a is 5GHz. Because of 802.11a's 5GHz frequency it is absorbed more readily by most materials and requires a very uncluttered path between access points or it does not work. 802.11n is a new standard being rolled out now with a theoretical max bandwidth of 540MB/s and should also have a range that is superior.
Dual banding and 'Super G' networks are ways of bonding channels or packet bursting of g networks together to increase the range up to four times and the speed to 108MB/s or 125MB/s but still use the same architecture and frequency of g. There are rumours that 'Super G' networks cause interference with other devices.
For a list of all of the task groups set-up to look into different wireless standards have a look at the Wikipedia page here
Here is a quick list:
The following IEEE Standards and task
groups exist within the IEEE 802.11 working group:
Some Jargon and Acronyms Explained:
Your router broadcasts your wireless network using an SSID (Service Set IDentifier), a 32-character unique identifier attached to the header of each packet sent over a WLAN (Wireless Local Area Network) that acts as a password when a mobile device tries to connect.
There are two main types of wireless network, the adhoc wireless network - a peer-to-peer network of client machines that uses the IBSS (Independent Basic Service Set Identifier) and Infrastructure Networks, based on access points using BSS or ESS ID instead.
WEP Encryption: The Wireless Equivalency Protocol was designed, as its name suggests, to make wireless networks as secure as cabling networks. It was the original standard for wireless network encryption. The flaws in this network were long ago breached and WEP is now just a way of delaying hackers breaking your network. Choose the highest level of encryption you can - ie. 128 or 256 bit if supported - as this will slow hackers down but you should be looking to move on to a newer encryption type.
WPA Wi-Fi Protected Access is an early version of the 802.11 security standard developed by the Wi-Fi alliance to replace WEP. TKIP (pronounced teekip) was developed for WPA as an improvement to WEP that could be rolled out as firware upgrades to existing hardware already in the market. WPA also provids support for Rijndael AES-CCMP which is the preferred 802.11i and WPA2 algorithm.
WPA2 is a Wi-Fi Alliance name for the final 802.11i standard. It uses AES-CCMP encryption as standard. Both WPA and WPA2 support EAP authentication with RADIUS servers and PSK (Pre-Shared Keys.)
LEAP - The Lightweight Extensible Authentication Protocol is based on 802.1x (which enables authentication from a central RADIUS or other server) minimizes risk by using WEP and key management systems. LEAP is not safe from hackers.
PEAP Protected Extensible Authentication Protocol, which allows a secure transport of data and encryption keys without needing a certificate server. This was developed by Cisco, RSA and Microsoft.
TKIP Temporal Key Integrity Protocol (Tee-Kip) is part of the 802.11i standard and implements per-packet key mixing with a key-keying system. A message integrity check is also performed avoiding the shortfalls of WEP.
RADIUS Remote Access Dial In User Server/Service which is a central authentication service used by many firewalls etc as a gatekeeper to check clients against a username and password. Windows 2000/3 IAS service can be configured as a RADIUS server for your router and can authenticate users for wireless or VPN access.
Questions or problems regarding this
Computer Help Forum
be directed to