If supported by a wireless adapter and reported by a wireless network adapter, Windows supports the following IEEE wireless standards:
The following table is the standard, their maximum bit rate, the frequency setting range and its application.
Standard Maximum bit rate Application bandwidth 802.11 2 megabits per second (Mbps)
2Mbps S band for industry, science and medicine frequency range (2.4 to 2.5 GHz) Not widely used.
802.11b11 MbpsS band for industry, science and medicineWidely used802.11a54 MbpsC band for industry, science and medicine (5,725 to 5.875 GHz)Not widely used due to expensive and limited to the802.11gband54 MbpsS band for industry, science and medicine Highpopularity with 802.11g devices and later with 802.11b devices
Note
The S band uses the same ton range as microwave ovens, cordless phones, wireless video cameras, and Bluetooth devices. C band uses the same band as newer wireless phones and many other devices.
802.11 operation models
Wireless LAN for all 802.11 standards uses the following operational model:
Regardless of the operating mode, a service set identifier (SSID), also known as the wireless network name, identifies a specific wireless network by name. The SSID is configured on wireless ANTISPYWARE for initial infrastructure or wireless client mode in ad hoc mode. Wireless access points and wireless clients initially periodically report SSIDs so other wireless buttons can be found and join the wireless network.
Support for IEEE 802.11 security protocols
Although IEEE 802.11 wireless LAN technologies offer many of the benefits described in the previous section, they also present many other security issues that are not present in a conventional wired network. Unlike the closed cable system of an Ethernet network because they are protected in physical transmission, for completely different wireless systems, wireless frames are sent as radio transmissions and spreads. Go far to areas in your office or home. Any computer that is in a wireless coverage area can receive wireless signal frames as well as send its wireless signals backwards (it can be said that they can communicate with each other). If you do not protect your wireless network, some dangerous users may use it to access personal information or perform attacks against computers or may take advantage of your computer to attack. other computers on the Internet.
To protect wireless networks, you must configure authentication and encryption options:
IEEE 802.11 wireless LANs support the following security standards:
IEEE 802.11
The original IEEE 802.11 standard is defined for open systems and shared key authentication methods for authentication and Wired Equivalent Privacy (WEP) for encryption. WEP can use 40-bit or 104-bit encryption keys. The original IEEE 802.11 security standard is improved with regard to its weaknesses and the cumbersome complexity of private and public deployment. Because of its susceptibility to attack and support the spread of newer security standards such as WPA, its use is significantly reduced.
IEEE 802.1X
IEEE 802.1X is an existing standard for Ethernet switches and adapts to 802.11 wireless LANs to provide stronger authentication than the 802.11 standard. The IEEE 802.1X Verifier is designed for medium and large wireless LANs, which contain an infrastructure that verifies the existence of remote dial-up user service (Remote Authentication) servers. Dial-In User Service: RADIUS) and account databases such as Active Directory® directory service. IEEE 802.1X also prevents a wireless node from logging into a wireless network to a node that has successfully performed authentication. IEEE 802.1X uses the Extensible Authentication Protocol (EAP). Wireless network authentication can be based on other EAP authentication methods such as using names and passwords or issuing digital certificates.
Note
Many wireless network adapters use a link to indicate whether data frames have been sent or received. However, because the IEEE 802.11X authentication occurs before the wireless network adapter starts sending or receiving data frames, this link does not reflect the 802.11X authentication action.
WPA
Although 802.11X was born with the purpose of patching the weaknesses in its earlier version of 802.11, it didn't have a solution to WEP's weaknesses. As the 802.11i standard is being finalized, the Wi-Fi Alliance, an organization of wireless carriers, has created a forwarding standard known as Wi-Fi Protected Access (WPA). Wpa replaces WEP because it has better encryption with the encryption method known as the Temporal Key Integrity Protocol (TKIP).
WPA also allows the use of the advanced encryption standard (AES) option.
WPA2
The IEEE 802.11i standard was established to replace WEP and other security features of the 802.11 standard. Wi-Fi Protected Access 2 (WPA2) is a product certificate available through the Wi-Fi Alliance to certify that wireless devices exist in accordance with the 802.11i standard. The purpose of WPA2 certification is to support the mandatory security features of the IEEE 802.11i standard that may not be available in all WPA products. For example, WPA2 requires support for both TKIP and AES encryption.
WPA2 has two different modes:
Summary table of IEEE 802.11 security standards
The total table below is all wireless LAN security standards.
Security standard Authentication methods Encryption methods Encoding size (bit) Note IEEE 802.11 WEP key opening and sharing system 40 and 104 With weak authentication and encryption, usage can be reduced . IEEE 802.1X EAP authentication methods N / A N / A The EAP method provides for WPA-Enterprise 802.1X TKIP and AES authentication
(Optional) 128 Good authentication (with EAP method) and TKIP or AES WPA-Personal PSK TKIP and AES very strong encryption
(Optional)128Strong authentication (with PSK) and TKIP or AES strong encryption.WPA2-Enterprise802.1XTKIP and AES128Strongauthentication(with EAP) and TKIP or AES strong encryption.WPA2-PersonalPSKTKIP and AES128Strong authentication (with PSK) and TKIP or AES strong encryption.
If supported by a wireless network adapter and reported by the wireless adapter, Windows will support security features for 802.11 wireless LAN.
Although Windows supports the 802.11X standard, third-party wireless client software occasionally uses Windows' built-in 802.1X components. In this case, failure to authenticate a wireless network may be due to the loss of configuration of the third-party 802.1X software.
Checklist and resources
The following section provides the general principles of wireless networks with different sizes and links to the necessary resources.
Medium and large networks
For a medium and large wireless network that uses 802.11X authentication, you should use infrastructure mode and one of the following security techniques:
List of WPA products
To create a medium and large wireless network based on WPA-Enterprise, you must ensure the following:
List of WPA2 products
To create a medium and large WPA2-based wireless network, you must have the following:
Small office networks or families
For small or home office networks (SOHO) that do not use 802.1X authentication, you should use the infrastructure model and one of the following security techniques:
In one or two cases you have to configure PSK on wireless ANTISPYWARE and each wireless client or device. If you have a computer running Windows XP SP2, you can use the Wireless Network Setup Wizard to simplify the configuration for PSK.
You can use 802.11X authentication in SOHO wireless networks. However, you need to have an authentication infrastructure and many old wireless devices such as printers, which are not supported for 802.11X authentication.
WPA product checklist
To create a WPA-Personal-based SOHO wireless network you must ensure the following:
List of WPA2 products
To create a WPA2-Personal-based SOHO wireless network you must ensure the following: