-
It's only 10 points...Find out online for yourself.
-
The IEEE TG faces several challenges. First, in order to protect the confidentiality of the traffic generated by management, the IEEE assumes that dynamic critical content is exchanged between the client and the access point. This eliminates the need to protect any management framework before sending critical content, exposing information about network users (SSIDs) and other identities that clients need to connect to the network.
Second, it is also a big challenge for future non-IEEE wireless network devices to remain compatible, as this limits the protection that can be provided unless all hardware is upgraded to support the required features.
A TGW solution that can identify forged management frameworks may overlook some malicious traffic used to launch DoS attacks. However, reducing the probability of a DoS attack is not the goal of TG, so there is nothing wrong with that. Even if access points and clients can identify malicious management frameworks, they will in no way reduce the efficiency of RF-jamming attacks.
Also, the IEEE TG does not say that it wants to provide protection for the control framework on the wireless network. Without protection, an attacker can choose any one of a variety of DoS attacks to attack a variety of wireless control technologies.
-
In June 1997, the IEEE published a standard for wireless LANs, which is an open standard. In addition to introducing the advantages and different capabilities of wireless LANs, the standard also enables the interconnection of wireless products from various manufacturers. In addition, the standard enables core equipment to implement a single-chip solution, reducing the cost of adopting wireless technology.
In August 2000, the IEEE standard was further refined and revised and became a joint standard of IEEE ANSI and ISO IEC, which was designated as ISO. The revisions to the IEEE standard include replacing the original OSI-based MIB with an SNMP-based MIB. In addition, two new additions have been added:
The IEEE has expanded the standard physical layer to use the 5GHz frequency band. The standard uses quadrature frequency division modulated data with a transmission rate range of 6m to 54Mbps. Such rates can be used for both indoor and outdoor applications.
IEEE is another extension of the IEEE standard that specifies the use of frequency bands and the modulation method uses compensation code keying (CKK). CKK** In direct sequence spread spectrum technology, the media access control (MAC) of the multi-rate mechanism ensures that when the distance between workstations is too long or the interference is too large, and the signal-to-noise ratio is below a certain threshold, the transfer rate can be automatically reduced from 11 Mbps or adjusted to 2 Mbps according to the direct sequence spread spectrum technology, and the maximum contribution to wireless LAN communication is to support two rates - and 11 Mbps. To do this, DSSS needs to be chosen as the only physical layer technology for the standard, as higher rates cannot currently be supported by frequency hopping without violating FCC regulations.
This means that IEEE systems can interoperate with IEEE systems at 1Mbps and 2Mbps, but not with IEEE systems at 1Mbps and 2Mbps.
The draft was completed in 2003 as a high-speed version of the standard for the use of frequency bands of radio waves. However, in order to achieve a transmission speed of 54Mbps, 11G uses a different OFDM (orthogonal frequency division multiplexing) modulation method than 11B. Therefore, in order to be compatible with 11b, 11G has the function of using the same modulation method as 11b in addition to its own unique modulation method, and the modulation mode can be switched according to different communication objects.
When 11G and 11B terminals are mixed, the 11G access point can switch different modulation modes for each packet according to different objects. That is to say, it communicates with the 11G terminal in 11G modulation mode, and communicates with the 11B terminal in 11B modulation mode.
Obviously different from the wired LAN network, the wireless LAN network is transmitted through the microwave into the lead trace line of the signal pants, this thing can not be seen, can not be touched, so the signal transmission security of the wireless LAN makes many wireless Internet users a little worried, in fact, as long as we are familiar with the signal transmission mechanism of the wireless network, and can use some security protection methods in a targeted manner, we will be able to make the wireless LAN security work to the end.
1.Check the "Channel" number in the wireless parameters of the wireless router. >>>More
If you turn off the optical modem, then your wireless router can't be used! >>>More
There is no DNS and no gateway, you still want to surf the Internet... >>>More
When it comes to the historical origins of wireless LANs, everyone may think that they are a relatively recent emerging technology, but they actually appeared earlier than expected. The initial application of wireless LAN can be traced back to 50 years ago during World War II, when the U.S. Army used radio signals for data transmission, and they developed a set of radio transmission technology, and used very high encryption technology. During World War II, the technology was widely used by both the U.S. and Allied forces, and scholars were inspired by it. >>>More