13.01.2013 Views

Wireless Home Networking - Index of

Wireless Home Networking - Index of

Wireless Home Networking - Index of

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

38<br />

Part I: <strong>Wireless</strong> <strong>Networking</strong> Fundamentals<br />

� Channel: When you set up your wireless network, you have the option<br />

<strong>of</strong> selecting a radio channel. All stations and the access point must<br />

broadcast on the same radio channel to communicate. Multiple radio<br />

channels are available for use by wireless networks, and some <strong>of</strong> the<br />

newer wireless APs use multiple channels to increase the speed <strong>of</strong> the<br />

network. The number <strong>of</strong> channels available varies according to the type<br />

<strong>of</strong> wireless network you’re using and the country in which you install the<br />

wireless network. <strong>Wireless</strong> stations normally scan all available channels<br />

to look for a signal from an AP. When a station detects an AP signal, the<br />

station negotiates a connection to the AP.<br />

� Encryption key: Because it’s relatively easy for a hacker to determine<br />

a wireless network’s name and the channel on which it’s broadcasting,<br />

every wireless network should be protected by a secret encryption key<br />

unless the network is intended for use by the general public. Only someone<br />

who knows the secret key code can connect to the wireless network.<br />

The most popular wireless network technology, Wi-Fi, comes with two types<br />

<strong>of</strong> security: Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA).<br />

WEP uses the RC4 encryption algorithm and a private key phrase or series <strong>of</strong><br />

characters to encrypt all data transmitted over the wireless network. For this<br />

type <strong>of</strong> security to work, all stations must have the private key. Any station<br />

without this key cannot get on the network. WPA, which is now built into all<br />

new Wi-Fi equipment and is a free upgrade on most older Wi-Fi equipment,<br />

is far more secure than WEP, and we recommend that you use it. WPA uses<br />

either Temporal Key Integrity Protocol (TKIP) or Advanced Encryption<br />

System (AES) encryption, which dynamically changes the security key as the<br />

connection is used. We talk about using both types <strong>of</strong> systems in Chapter 9,<br />

with our primary emphasis on WPA, and we promise we won’t test you on<br />

these acronyms at all!<br />

In the home, you’ll most likely get your access point functionality through a<br />

wireless home router or a wireless Internet gateway. These devices combine<br />

the access point with a router, a wired Ethernet network switch, and (in the<br />

case <strong>of</strong> the gateway) a broadband modem. Similar devices may even throw in<br />

a print server. This Swiss army knife–like approach is <strong>of</strong>ten a real bargain for<br />

use in a wireless home network. A stand-alone access point may be part <strong>of</strong><br />

your network when you’re adding a second wireless network to the mix (it<br />

would attach to one <strong>of</strong> the wired Ethernet ports on your router), or if you<br />

have some kind <strong>of</strong> fancy wired router in place (this isn’t common, but some<br />

folks who work from home may have a special router supplied by their company<br />

for accessing the corporate network).<br />

We use the term AP throughout this chapter to mean either a stand-alone AP<br />

or the AP built into a wireless home router or gateway.<br />

<strong>Wireless</strong> networking devices can operate in one <strong>of</strong> two modes: infrastructure<br />

mode or ad hoc mode. The next two subsections describe the differences<br />

between these two modes.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!