Identifying A Wlan; Identifying Devices On A Wlan; Wireless Security; Radio Basics - Intel PRO/Wireless 2011B LAN Product Reference Manual

Hide thumbs Also See for PRO/Wireless 2011B LAN:
Table of Contents

Advertisement

Chapter 1. Introduction to wireless networking
1.3

Identifying a WLAN

All the devices on a WLAN use a Network Name, or Service Set Identifier (SSID) to identify the
WLAN. There are several kinds of SSIDs, each having a slightly different meaning. In peer-to-peer
mode, an Independent Basic Service Set Identifier (IBSSID) identifies a WLAN. In infrastructure
mode, an Extended Service Set Identifier (ESSID) identifies a WLAN. For simplicity, this guide
uses the term Network Name (SSID) in place of ESSID and IBSSID. Regardless of whether you are
dealing with a infrastructure of peer-to-peer WLAN, the SSID indicates what WLAN you are
communicating with. All the devices on a WLAN must use the same SSID to communicate with
other wireless devices. When installing an access point or wireless adapter in a wireless client, the
software asks you to specify an SSID.
1.4

Identifying Devices on a WLAN

A Basic Service Set Identifier (BSSID) uniquely defines each wireless device. The BSSID is the
Ethernet Media Access Control (MAC) address of the wireless adapter installed in the wireless
client. The MAC address is permanently set when the adapter is manufactured. MAC addresses
determine the device sending or receiving data. A MAC address is a 48-bit number written as six
hexadecimal bytes separated by colons. For example:
0 0 : A 0 : F 8 : 2 4 : 9 A : C 8
To view the MAC address of an Intel® PRO/Wireless 2011B LAN device, see the bottom of the
device.
1.5

Wireless Security

Wireless networking devices transmit information through the air. Without implementing security,
it is easy for an unauthorized person to intercept the information.
A common way of implementing security and protecting information is encryption. Before sending
information, the wireless client or access point encrypts or scrambles information using an
encryption key. The device receiving the information uses the same key to decrypt or unscramble
the information. The information is only readable to wireless devices that have the correct
encryption key.
The IEEE 802.11 wireless LAN standard specifies the Wired Equivalent Privacy (WEP) encryption
and decryption algorithm. The standard includes two levels of security, using a 40-bit key or a 128-
bit key. To implement WEP, use either one of these methods. For better security, use a 128-bit key.
A 128-bit key has several trillion times as many possible combinations as a 40-bit key. For added
security, change your keys often. Some vendors refer to 40-bit encryption as 64-bit. These are
identical. A wireless device that claims to have 40-bit encryption interoperates with a device that
claims to have 64-bit encryption.
The same device, host computer or front-end processor usually performs both encryption and
decryption. The algorithm, like the pattern of a lock, is standardized and may be used by anyone,
but the encrypted data is unreadable without the appropriate key, which is known only by the sender
and receiver of the transmitted data. You should change your keys often for added security.
1.6

Radio Basics

IEEE 802.11 networking devices transmit and receive radio signals. Users communicate with the
network by establishing radio links between mobile devices and access points, or between each
other.
2
Intel® PRO/Wireless 2011B LAN Adapter Product Reference Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Wpc2011bww

Table of Contents