Channels - WiFi channels are subdivisions of the frequency bands used for wireless communication, allowing multiple networks to operate simultaneously without interference., channel width - refers to the frequency span of a wireless channel., non-overlapping channels - are channels that do not interfere with each other and are crucial in environments with multiple wireless access points., regulatory impacts  - refer to the rules and regulations set by governmental or international bodies that govern the use of wireless frequencies and channels to prevent interference between different communication systems., 802.11h - standard that enhances 802.11 by adding support for dynamic frequency selection (DFS) and transmit power control (TPC) to comply with European regulations for 5 GHz WLANs, 2.4GHz - Long range communications because it has better penetration through barriers. Slower data rates compared to 5GHz. Non-overlapping channels 1, 6, and 11 offer the best chance of minimizing interference, 5GHz - faster data rates at shorter distances compared to 2.4GHz and is less likely to experience interference from other household devices., 6GHz - expands the bandwidth for wireless networks, doubling the spectrum available compared to the 5GHz band. This increase supports higher data rates, lower latency, and more simultaneous connections, making it ideal for high- demand applications and environments., Band steering - network management technology that automatically detects wireless devices capable of dual-band operations and steers them to the less congested 5 GHz or 6 GHz band. This process helps to balance the network load, maximize throughput, and improve overall wireless performance by minimizing interference found more commonly in the 2.4 GHz band., Service set identifier (SSID) - also known as the network name, is a unique character string used to identify an AP., Basic service set identifier (BSSID) - unique identifier that serves as the MAC address for a wireless access point (AP) and is used to differentiate one AP within a larger network or between multiple networks. It is essential in environments where multiple access points are deployed, as it helps client devices identify and connect to the specific physical device providing the network service., Extended service set identifier (ESSID) - also known as a Network Name, is used to identify a set of interconnected access points as a single network in larger WiFi deployments., Mesh networks - consist of nodes that connect directly and dynamically to as many other nodes as possible. This configuration creates multiple pathways for data to travel between points, enhancing reliability and redundancy. Mesh networks are self-healing and scalable, making them ideal for large areas like smart cities and IoT applications., Ad hoc - decentralized and do not rely on a pre-existing infrastructure. Nodes within an ad hoc network communicate directly without the use of a router or a network server, making them suitable for temporary setups in situations where quick deployment is necessary, such as emergency response or military operations., point to point - establish a direct connection between two wireless devices. This type of network is commonly used for linking two locations in a WAN, infrastructure - rely on fixed routers or access points that manage traffic to and from wireless devices. This is the most common type of network setup for residential and commercial internet connections,, Encryption - crucial in wireless networking to secure data transmissions against unauthorized access and interception., Wi-fi protected access 2 (WPA2) - Users authenticate using an alpha numeric passphrase (PSK) via CCMP(Counter mode Cypher block chaining Message authentication code Protocol). Vulnerable to krack attack. AES, WPA3 - Users authenticate using Simultaneous Authentication of Equals(SAE) via GCMP(Galois/Counter Mode Protocol). Vulnerable to dragonblood attack. AES, Guest networks - separate access networks provided by businesses or institutions to allow visitors limited internet access without exposing the main network. They help maintain network security by isolating guest user traffic from critical internal resources., Captive portals - web pages that appear automatically when a user connects to a public or semi-public Wi-Fi network, requiring interaction before network access is granted. They are commonly used in guest networks to manage access through authentication, terms of service agreements, or payment information, Authentication - critical security process in wireless networks, ensuring that only authorized devices can connect., Pre-shared key (PSK) - involves a simple, shared key known to all users of the network, commonly used in home and small office environments, Enterprise - Uses a more secure approach by employing a RADIUS server to manage each user's authentication individually. This method is suited for larger organizations, providing stronger security through individual credentials and enhanced control over network access.,

2.3 Configure wireless devices

排行榜

視覺風格

選項

切換範本

恢復自動保存: ?