Introduction

Wireless networking has become incredibly attractive to businesses and home users because of the remarkable amount of flexibility and freedom you gain from unleashing yourself from the Ethernet cable. Early wireless networking technologies were expensive and very slow; for example, when Hewlett-Packard released its LaserJet 5P with an infrared port for wireless printing, it was hailed as the greatest feature ever. Unfortunately, infrared data transfer is extremely slow and the range is very limited.

Wireless network technology has advanced significantly. More and more individuals and companies are recognizing the benefits of “cutting the cord” and moving into the wireless world. Why not? Being physically connected seems so claustrophobic. Wireless technology gives you the freedom to move around as you please. Also, what happens when you want to move a PC from one desk to another? In the wired world you need to worry about moving not only the machine, but also the network connection. What if the new location doesn't have an Ethernet port? You'll need to take out the office wiring diagram, look for an existing open connection in your hub or switch, and run the cables through the wall. If you're in a brand new building with no installed cabling, the task of laying out Cat5 cable throughout the building can be extremely daunting.

A wireless environment opens up so many new expansion and workflow possibilities. With wireless, there is no need to worry if you move the PC from one office to the next, or if the place you want to work does not have an Ethernet port. Coffee shops, hotels, airports and other establishments now offer wireless local area network (LAN) connections for people to connect their wireless devices (PDAs, laptops) and get their email or surf the Internet.

The bad news is wireless security is often sacrificed at the altar of functionality and ease of use. The good news is there is light at the end of the tunnel. Wireless networks can be deployed with a healthy respect for both user needs and security requirements. This chapter will introduce you to some of the basic security options built into 802.11, as well as provide you with a better understanding of how clients associate and authenticate with Access Points (APs). You will also see, firsthand, some of the difficulties involved in scaling security for large enterprises.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.220.112.56