Page 146 / 198 Scroll up to view Page 141 - 145
ZXDSL 931WII Operation manual
T
ABLE
27 WLAN B
ASIC
T
ERMS
Term
Description
AP
Short for Access Point, a hardware
device or the software of a com-
puter that acts as a communica-
tion hub for users of a wireless de-
vice to connect to a wired LAN. APs
are important for providing rein-
forced wireless security and for ex-
tending the physical range of serv-
ice a wireless user has access to.
STA
Any device that contains an IEEE
802.11
conformant
medium
ac-
cess
control
(MAC)
or
physical
layer (PHY) interface to the wire-
less medium (WM).
SSID
Wireless networks use a Service
Set Identifier (SSID) to allow wire-
less
devices
to
roam
within
the
range of the network.
Wireless
devices that wish to communicate
with each other must use the same
SSID. Several access points can be
set to use the same SSID, so that
wireless stations can move from
one
location
to
another
without
losing connection to the wireless
network.
The Guw5.5Z66-5 op-
erates in Infrastructure mode.
It
controls
network
access
on
the
wireless interface in its broadcast
area. It allows access to the wire-
less network by devices that use
the
correct
SSID
after
a
nego-
tiation process takes place.
By
default, the Guw5.5Z66-5 broad-
casts its SSID so that any wireless
station in range can learn the SSID
and ask permission to associate
with it.
Many wireless adapters
are
able
to
survey
or
scan
the
wireless
environment
for
access
points.
An access point in Infra-
structure
mode
allows
wireless
devices
to
survey
that
network
and
select
an
access
point
with
which to associate.
You may dis-
able SSID broadcas
Wireless Standard
Wireless
Standard
includes
802.11a,
802.11b,
802.11g,
and
802.11n.
802.11b
IEEE expanded the original 802.11 standard in July 1999, cre-
ating the 802.11b specification. 802.11b supports bandwidth
140
Confidential and Proprietary Information of ZTE CORPORATION
Page 147 / 198
Chapter 18 Wireless Configuration
up to 11 Mbps, comparable to traditional Ethernet.
802.11b
uses the same unregulated radio signaling frequency (2.4 GHz)
as the original 802.11 standard.
Vendors often prefer using
these frequencies to lower their production costs.
Being unregulated,
802.11b devices can incur interference
from
microwave
ovens,
cordless
phones,
and
other
appli-
ances using the same 2.4 GHz range.
However, by installing
802.11b devices a reasonable distance from other appliances,
interference can easily be avoided.
802.11g
In 2002 and 2003, WLAN products supporting a newer stan-
dard called 802.11g emerged on the market.
802.11g at-
tempts to combine the best of both 802.11a and 802.11b.
802.11g supports bandwidth up to 54 Mbps, and it uses the
2.4 GHz frequency for greater range.
802.11g is backwards
compatible with 802.11b, meaning that 802.11g access points
work with 802.11b wireless network adapters and vice versa.
802.11a
While 802.11b was in development, IEEE created a second ex-
tension to the original 802.11 standard called 802.11a.
Be-
cause 802.11b gained popularity much faster than 802.11a, it
is believed that 802.11a was created after 802.11b.
In fact,
802.11a was created at the same time.
Due to its higher
cost, 802.11a is usually found on business networks whereas
802.11b better serves the home market.
802.11a supports bandwidth up to 54 Mbps and signals in a
regulated frequency spectrum around 5 GHz. This higher fre-
quency compared to 802.11b shortens the range of 802.11a
networks.
The higher frequency also means 802.11a signals
have more difficulty penetrating walls and other obstructions.
Because 802.11a and 802.11b utilize different frequencies, the
two technologies are incompatible with each other. Some ven-
dors offer hybrid 802.11a/b network devices, but these prod-
ucts merely implement the two standards side by side (each
connected devices must use one or the other).
Use
T
a
b
l
e
2
8
below to get some quick information to help you
differentiate between the available wireless networking standards.
T
ABLE
28 W
IRELESS
N
ETWORKING
S
TANDARDS
Standard
Data Rate
Modu-
lation
Scheme
Security
Pros/Cons
& More
Info
IEEE
802.11
Up
to
2
Mbps in the
2.4
GHz
band
FHSS
or
DSSS
WEP &
WPA
This
speci-
fication
has
been
ex-
tended
into
802.11b.
Confidential and Proprietary Information of ZTE CORPORATION
141
Page 148 / 198
ZXDSL 931WII Operation manual
Standard
Data Rate
Modu-
lation
Scheme
Security
Pros/Cons
& More
Info
IEEE
802.11a
(Wi-Fi)
Up
to
54
Mbps in the
5 GHz band
OFDM
WEP & WPA
Products
that
ad-
here to this
standard
are
consid-
ered
“Wi-Fi
Certified”.
Eight
avail-
able
chan-
nels.
Less
potential for
RF
interfer-
ence
than
802.11b
and
802.11g.
Better
than
802.11b
at
supporting
multime-
dia
voice,
video
and
large-image
applications
in
densely
populated
user
envi-
ronments.
Relatively
shorter
range
than
802.11b.
Not
intero-
perable with
802.11b.
IEEE
802.11b
(Wi-Fi)
Up
to
11
Mbps in the
2.4
GHz
band
DSSS
with
CCK
WEP & WPA
Products
that
ad-
here to this
standard
are
consid-
ered
“Wi-Fi
Certified”.
Not
intero-
perable with
802.11a.
Requires
fewer
access
points
than
802.11a
for
coverage
of
large areas.
Offers high-
speed
ac-
cess to data
at up to 300
feet
from
base
sta-
tion.
14
channels
available
in
142
Confidential and Proprietary Information of ZTE CORPORATION
Page 149 / 198
Chapter 18 Wireless Configuration
Standard
Data Rate
Modu-
lation
Scheme
Security
Pros/Cons
& More
Info
the
2.4GHz
band
(only
11 of which
can be used
in
the
U.S.
due
to
FCC
regulations)
with
only
three
non-
overlapping
channels.
IEEE
802.11g
(Wi-Fi)
Up
to
54
Mbps in the
2.4
GHz
band
OFDM above
20Mbps,
DSSS
with
CCK
below
20 Mbps
WEP & WPA
Products
that
ad-
here to this
standard
are
consid-
ered
“Wi-Fi
Certified”.
May replace
802.11b.
Improved
security
enhance-
ments
over
802.11.
Compati-
ble
with
802.11b.
14 channels
available
in
the
2.4GHz
band
(only
11 of which
can be used
in
the
U.S.
due
to
FCC
regulations)
with
only
three
non-
overlapping
channels.
Note:
Maximum wireless signal rate based on IEEE Standard 802.11g
specifications is 54 Mbps. But actual data throughput varies. Net-
work conditions and environmental factors, including volume of
network traffic, building materials and construction, and network
overhead causes lower actual data throughput rate.
Confidential and Proprietary Information of ZTE CORPORATION
143
Page 150 / 198
ZXDSL 931WII Operation manual
Wireless Security
Various security options are available on the Guw5.5Z66-5 includ-
ing open or WEP, 802.1x, WPA, WPA-PSK, WPA2 and WPA2-PSK.
The following section describes some authentications.
WEP
Wireless Encryption Protocol (WEP) is part of the IEEE 802.11 wire-
less networking standard and was designed to provide the same
level of security as that of a wired
LAN
. Because wireless net-
works broadcast messages using radio, they are susceptible to
eavesdropping, WEP provides security by encrypting data over ra-
dio waves so that it is protected as it is transmitted from one end
point to another.
WEP was the encryption scheme considered to be the initial stan-
dard for first generation wireless networking devices. However, it
has been found that WEP is not as secure as once believed. WEP is
used at the two lowest layers of the
OSI
model - the data link and
physical layers; it therefore does not offer end-to-end security.
The major weakness of WEP is its use of static encryption keys.
When you set up a router with a WEP encryption key, that key is
used by every device on your network to encrypt every packet that
is transmitted.
But the fact that packets are encrypted does not
prevent them from being intercepted, and due to some technical
flaws it is entirely possible for an eavesdropper to intercept enough
WEP-encrypted packets to eventually deduce what the key is.
WPA
Wi-Fi Protected Access (
WPA
) debuts to address many shortcom-
ings of WEP. It includes two improvements over WEP:
Improved data encryption through the temporal key integrity
protocol (TKIP). TKIP scrambles the keys using a hashing al-
gorithm and, by adding an integrity-checking feature, ensures
that the key is not tampered.
User authentication, which is generally missing in WEP, through
the extensible authentication protocol (EAP). WEP regulates
access to a wireless network based on a computer’s hard-
ware-specific MAC address, which is relatively simple to be
sniffed out and stolen.
EAP is built on a more secure pub-
lic-key encryption system to ensure that only authorized net-
work users can access the network.
To encrypt a network with WPA Personal/PSK, you should set up
your router not with an encryption key, but rather with a plain-Eng-
lish passphrase between 8 and 63 characters long. Using a tech-
nology called TKIP, that passphrase, along with the network SSID,
is used to generate unique encryption keys, which are constantly
changed, for each wireless client.
Although WEP also supports
passphrases, it does so only as a way to more easily create static
keys, which are usually comprised of the hex characters 0-9 and
A-F.
802.1x
The 802.1x standard is designed to enhance the security of wire-
less local area networks (
WLAN
s) that follow the IEEE 802.11 stan-
dard.
802.1x provides an authentication framework for wireless
LANs, allowing a user to be authenticated by a central authority.
The actual algorithm that is used to determine whether a user is
authentic is left open and multiple algorithms are possible.
144
Confidential and Proprietary Information of ZTE CORPORATION

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top