Upload
marsha-boone
View
226
Download
0
Tags:
Embed Size (px)
Citation preview
PROTOCOLS
STANDARDS
EQUIPMENT
BLUETOOTH
CELL PHONE DATA NETWORKS
ADVANTAGES/ DISADVANTAGES
GENERAL INFORMATION
Wireless Networking
Main Menu
GENERAL INFORMATIONTYPES OF WIRELESS NETWORKS
Wireless Personal Area Network (WPAN) Wireless Local Area Network (WLAN) Wireless Metropolitan Area Network
(WMAN) Wireless Wide Area Network (WWAN)
WPAN – REACHES ONLY SHORT DISTANCES
WLAN – Most Recognizable Used in Small AreasUsually Within Buildings
WMAN – Expands over several kilometers
WWAN – Extends Over Large Areas
RETURN TO MAIN MENU
Types of Wireless Networks
Long Term Evolution (LTE) Wi-Fi Bluetooth 60 GHz Protocol Wireless Home Automation
PROTOCOLS
Long Term Evolution (LTE) is wireless
internet access via cell phones and
handheld devices
LONG TERM EVOLUTION (LTE)
RETURN TO PROTOCOLS
Wi-Fi is the most popular wireless networking protocol
Wi-Fi uses WLAN networking and is associated with home networks and public networks called Hot Spots
WI-FI
RETURN TO PROTOCOLS
Wireless Security Protocols or Wi-Fi Protected AccessWEP WPAWPA2
Operates across short distances
Synchronized data between battery powered devices and cell phones
BLUETOOTH PROTOCOL
RETURN TO PROTOCOLS
High band width wireless protocol
Protocol used to support video data
Uses the standards Wireless HD and WiGig
60 GHZ PROTOCOL
RETURN TO PROTOCOLS
Used to create automation in the home
Two Wireless Home Automation protocols are Zwave or Zigbee
Used to control lights, appliances, and various gadgets in the home
WIRELESS HOME AUTOMATION
RETURN TO MAIN MENU
WIRED EQUIVALENT PRIVACY (WEP)
WEP is the original security for wireless
WEP can be easily broken and difficult to configure
RETURN TO WiFi
WI-FI PROTECTED ACCESS (WPA)
WPA replaced the WEP protocol
There are two types of WPA protocols WPA Personal WPA Enterprise
RETURN TO WiFi
WI-FI PROTECTED ACCESS VERSION 2(WPA2)
WPA2 security protocol was available in 2004
WPA2 was an improvement over WPA
WPA2 provides improved security and uses
the same type of security used by the U.S.
government
RETURN TO PROTOCOLS
Two organizations create standards for networking computers• International Organization for
Standardization• Institute of Electrical and
Electronic Engineers (IEEE)
STANDARDS
•The IEEE has continued to generate new versions of wireless networking standards•The newer standards perform better and offer more features; however can communicate with older versions
STANDARDS
•802.11 was the first Wireless Local Area Network standard and continues to be improved.•The following web pages summarize the evolution of WLAN standards and those being developed
Wireless Networking StandardsIEEE 802.11 Standards
STANDARDS
RETURN TO MAIN MENU
EQUIPMENTWireless internet access begins with internet cable or DSL cable receiving signal from providers
EQUIPMENT
The signal is transmitted to the modem through the cable
EQUIPMENTThe signal is transferred to the Wireless Access Point or Router
EQUIPMENTThe Router sends the signal using electromagnetic waves to devices or if necessary, a wireless adapter
NETWORKING EQUIPMENT
RETURN TO MAIN MENU
Devices receive the wireless signal
Connects devices via low-power radio waves
Uses frequency band set aside Baby Monitors Garage Doors Cordless Phones
Wireless, automatic and inexpensive Simplifies our lives
BLUETOOTH
RETURN TO MAIN MENU
Wireless Data Networks that Exist on Cell Phones
Emails Internet Instant Messages GPS
CELL PHONE DATA NETWORKS
RETURN TO MAIN MENU
ADVANTAGES Convenience Ease of Set Up
ADVANTAGES/ DISADVANTAGES
DISADVANTAGES• Security• Interference
WORKS CITED
http://compnetworking.about.com/cs/wireless80211/a/aa80211standard_2.htm
http://www.webopedia.com/quick_ref/WLANStandards.asp
http://netsecurity.about.com/cs/wirelesssecurity/qt/qt_wifihardware.htm
http://compnetworking.about.com/od/wireless/a/introduction-to-wifi-wireless-networking.htmhttp://searchnetworking.techtarget.com/tutorial/Wireless-protocols-learning-guidehttp://www.dummies.com/how-to/content/wireless-security-protocols-wep-wpa-and-wpa2.html http://fcit.usf.edu/network/chap1/chap1.htm