Ad-Hoc Network; Infrastructure Network; Security In Wireless Networks - Encryption - Gigaset 54 Manual

Hide thumbs Also See for 54:
Table of Contents

Advertisement

The Gigaset USB Stick 54

Ad-hoc network

In an ad-hoc network, PCs communicate with each other via wireless peer-to-peer con-
nections. An ad-hoc network is set up by participants as and when required. All the PCs
must have a wireless network adapter installed, for example a Gigaset USB Stick 54.
Ad-hoc networks are used wherever communication networks have to be set up quickly
without any existing network infrastructure and where the participants are mobile.

Infrastructure network

In an infrastructure network, connections between network participants are set up via
an access point (or several access points). The access point provides the basis for the
wireless network. It controls the connections between the participants and can also
establish the connection from the mobile stations of a wireless network to a wired LAN
(Ethernet) or the Internet.
Roaming
Several access points can be installed to extend the range of a wireless network. Parti-
cipants in the wireless network can move freely between the various access points with-
out losing contact with the network. As soon as there is a risk of losing contact, the PC
automatically looks for another access point with a stronger signal. All access points and
wireless network adapters must have the same SSID. All access points must be con-
nected to the same Ethernet network.
Security in wireless networks – Encryption
Any network, be it wired or wireless, is exposed to the risk of eavesdropping.
Connecting your local network to the public network exposes your data and applica-
tions to not inconsiderable risks. As with an individual connection, you should always
protect your network PCs against external attacks, for example via e-mail, with a virus
scanner.
These virus scanners, however, do not provide any protection against unauthorised
access from outside (hackers). To counter this risk, Gigaset data products offer various
encryption procedures that largely rule out unauthorised access (hacking) to your
wireless network.
7

Advertisement

Table of Contents
loading

Table of Contents