Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,740 --> 00:00:04,540
In our next section we're going to talk about the violence local area networks.
2
00:00:04,550 --> 00:00:13,380
And let's start with the light wireless local area network overview so why we need wireless networks
3
00:00:13,890 --> 00:00:23,040
into these companies wireless networks are a powerful tool for boosting productivity and encouraging
4
00:00:23,040 --> 00:00:32,160
information sharing with untethered to access to documents e-mails applications and other network resources.
5
00:00:32,250 --> 00:00:40,810
Employers can roam where they need to and have constant access to the tools required to do their jobs.
6
00:00:40,830 --> 00:00:48,970
That is the main reason that explains the need for the wireless networks and let's go ahead with the
7
00:00:48,970 --> 00:00:52,210
advantages of the wireless.
8
00:00:52,390 --> 00:00:57,470
The first advantage anchor is mobility and collaboration.
9
00:00:57,580 --> 00:01:05,080
Employees who use your wireless LAN can roam around your office or two different floors without losing
10
00:01:05,080 --> 00:01:06,770
their connection.
11
00:01:06,790 --> 00:01:15,010
Imagine everyone in a team meeting or in small conferences having access to up to the minute communications
12
00:01:15,250 --> 00:01:19,720
and all documents and applications on your network.
13
00:01:19,720 --> 00:01:24,970
The second advantage is the improved responsiveness.
14
00:01:25,150 --> 00:01:32,320
Customers want quick response to queries and concerns guys and a wireless network can improve customer
15
00:01:32,320 --> 00:01:37,030
service by connecting staff to the information they need.
16
00:01:37,030 --> 00:01:44,320
For example a doctor in a small medical office can access online patient files while moving between
17
00:01:44,320 --> 00:01:53,260
exam rooms or a retail sales person can check on available inventory necessary to write up orders on
18
00:01:53,260 --> 00:01:55,570
the showroom floor.
19
00:01:55,570 --> 00:01:59,980
The third advantage is better access to the information.
20
00:02:00,140 --> 00:02:07,000
Wireless lines allow a business to bring network access to areas that would be difficult to connect
21
00:02:07,060 --> 00:02:09,210
to a wired network.
22
00:02:09,340 --> 00:02:17,510
For example adding wireless access points to a warehouse can make it easier to check and manage inventory.
23
00:02:17,560 --> 00:02:25,630
Providing the company with accurate inventory figures in the real time and the fourth advantage is the
24
00:02:25,630 --> 00:02:28,090
easier network expansion.
25
00:02:28,090 --> 00:02:35,860
Companies that need to add employees or reconfigure offices for a complete will immediately benefit
26
00:02:35,860 --> 00:02:43,990
from the flexibility wireless lines provide desks can be moved and new employees can be added to the
27
00:02:43,990 --> 00:02:51,610
network without the effort and the costs recur to run cables and the wires.
28
00:02:51,610 --> 00:03:00,070
The most common wireless technologies used today are Wi-Fi Bluetooth why Max cellular broadband and
29
00:03:00,070 --> 00:03:02,110
the satellite broadband
30
00:03:04,820 --> 00:03:14,600
let's go with I Tripoli 800 and to that eleven by five standards eight unders and to that eleven refers
31
00:03:14,600 --> 00:03:21,770
to a family of specifications developed by the eye Tripoli for wireless LAN technology.
32
00:03:21,800 --> 00:03:24,020
These specifications.
33
00:03:24,020 --> 00:03:33,020
This standard specifies and all the air interface between a wireless client and a base station or between
34
00:03:33,020 --> 00:03:35,130
two wireless clients.
35
00:03:35,240 --> 00:03:41,000
In this chart you can see the history and the enhancements of the standard.
36
00:03:41,330 --> 00:03:50,180
The first standard is a standard and two that eleven as you can see and the maximum death rate is two
37
00:03:50,180 --> 00:03:52,450
megabits per second just.
38
00:03:52,460 --> 00:04:02,720
But the less than that which is eight under then two that on a C is supporting up to seven gigabit per
39
00:04:02,960 --> 00:04:11,030
second and you can see the bands that the standard are using and the benefits they support and the modulation
40
00:04:11,030 --> 00:04:16,000
type and advanced antenna technologies.
41
00:04:16,170 --> 00:04:19,250
Let's go ahead we then worse again.
42
00:04:19,470 --> 00:04:27,480
This chart explains some differences between wireless local area network and the wired LAN physical
43
00:04:27,480 --> 00:04:37,550
layer component of wireless local area network is radio frequency and the physical Lear component of
44
00:04:37,610 --> 00:04:42,020
the Internet is cable as you know.
45
00:04:42,440 --> 00:04:53,540
Availability of the wireless LAN is everybody in the range of the access point while you need a cable
46
00:04:53,540 --> 00:05:01,580
connection on the internet look we're a network to reach the network and we can face with the signal
47
00:05:01,670 --> 00:05:11,090
interference for wireless local area network but it is inconsequential for the Internet local area network
48
00:05:13,090 --> 00:05:20,740
and let's go ahead with the wireless network interface cards a wireless network interface controller
49
00:05:20,770 --> 00:05:28,780
is a network interface controller which connects through a wireless radio based computer network rather
50
00:05:28,780 --> 00:05:32,160
than a wire network such as Internet.
51
00:05:32,170 --> 00:05:42,810
This card uses an antenna to communicate via microwave radiation and let's go ahead with the wireless.
52
00:05:42,810 --> 00:05:51,780
More than a wireless modem is a device that provides wireless broadband connections such as DSL for
53
00:05:51,780 --> 00:05:54,970
home users over the Wi-Fi.
54
00:05:54,990 --> 00:06:05,330
Most of us use modem in our houses and connect to Internet by using more them or wireless.
55
00:06:05,370 --> 00:06:09,310
Let's go ahead with the business wireless solutions.
56
00:06:09,510 --> 00:06:19,590
When 800 to that eleven networking began all access points were autonomous mode which means that each
57
00:06:19,710 --> 00:06:28,560
AP access point worked as a standalone unit with no knowledge of the or interaction among other access
58
00:06:28,560 --> 00:06:36,900
points autonomous mode was fine in the beginning when wireless networking was often limited to providing
59
00:06:36,900 --> 00:06:45,720
network access in common areas or broad boardrooms and continuous streaming was not a requirement.
60
00:06:45,780 --> 00:06:55,290
Rather than using autonomous access points you can use lightweight access points to if you have a network
61
00:06:55,290 --> 00:07:00,930
component that offers wireless local area network controller services.
62
00:07:00,930 --> 00:07:08,250
In this scenario the access points all have their configuration managed but the wireless controller
63
00:07:08,640 --> 00:07:16,950
you can set a single policy on that wireless controller and that configuration setting can be deployed
64
00:07:16,980 --> 00:07:26,770
to all managed access points reducing the workload of managing hundreds of afternoons access points.
65
00:07:26,970 --> 00:07:31,280
Let's go ahead with the wireless antennas and antenna.
66
00:07:31,320 --> 00:07:40,620
Use the wireless system three fundamental properties gain direction and the polarization and we have
67
00:07:40,620 --> 00:07:50,730
three types of antennas and they're only directional directional and the Yagi directional antennas are
68
00:07:50,730 --> 00:07:58,720
designed to be pointed to or focus in a single direction somewhat like our flashlight only antennas
69
00:07:58,740 --> 00:08:08,970
collect and broadcast signal in a 360 degree pattern similar to how a light bulb throws light in all
70
00:08:09,240 --> 00:08:18,060
directions and the antenna is a directional antenna consisting of multiple parallel elements in a line
71
00:08:20,520 --> 00:08:22,220
and let's go ahead with the.
72
00:08:22,260 --> 00:08:25,340
That's a lie them topology mounts.
73
00:08:25,470 --> 00:08:33,140
We have basically two topology much for wireless network guys and they are ad hoc mode.
74
00:08:33,210 --> 00:08:43,690
And the infrastructure modes let's start with the ad hoc moment in the ad the much to the wise is connect
75
00:08:43,820 --> 00:08:53,180
each other wirelessly without the aid of an infrastructure do as such as a wireless router on or access
76
00:08:53,180 --> 00:08:54,970
point as you can see in here.
77
00:08:55,130 --> 00:09:03,440
We have leapt up one and leapt up two and they're connected wirelessly to each other without an access
78
00:09:03,440 --> 00:09:12,880
point in the infrastructure mod wireless clients interconnect via a wireless rather or access points
79
00:09:12,890 --> 00:09:18,410
such as in wireless local area not in the infrastructure mode.
80
00:09:18,470 --> 00:09:26,700
Wireless clients interconnect via a wireless rather or access points such as in WI Lance in basic SOS
81
00:09:26,810 --> 00:09:27,380
area.
82
00:09:27,380 --> 00:09:31,030
We have just won access points to connect.
83
00:09:31,060 --> 00:09:38,810
As you can see in here we have a laptop one laptop two again and this guys are this time connected to
84
00:09:38,810 --> 00:09:47,460
each other by the help of an access point and in extended service area.
85
00:09:47,460 --> 00:09:56,250
This time we have two or more access points to connect and our laptop one is in here for example and
86
00:09:56,280 --> 00:09:58,960
our laptop too is on the remote.
87
00:09:58,970 --> 00:10:09,110
And as you can see and they are connected to each other by using two or more access points let's go
88
00:10:09,110 --> 00:10:18,510
into the wireless LAN operations and let's go ahead with the Wi-Fi frame format in the Wi-Fi frame.
89
00:10:18,520 --> 00:10:22,330
We have two birds of frame control field.
90
00:10:22,450 --> 00:10:31,540
We have two points of duration field six bytes of destination and source and the rather MAC address
91
00:10:31,540 --> 00:10:42,310
failed two birds of sequential control bid for but I'm sorry six parts of MAC address of the AP and
92
00:10:42,310 --> 00:10:55,650
we have data payloads and the CRC fields let's go ahead with the CSM ACA carrier since multiple access
93
00:10:55,660 --> 00:11:04,060
collision what the evidence is a protocol for carrier transmission it in a under then to that eleven
94
00:11:04,060 --> 00:11:12,820
networks unlike CSM may see the carrier since multiple access collision that Act which deals with transmissions
95
00:11:12,850 --> 00:11:23,550
after a collision has occured CSM ACA acts to prevent collisions before they happen and let's go ahead.
96
00:11:23,560 --> 00:11:34,950
The declined access points connection the first the client sends air these core AP message to discover
97
00:11:34,960 --> 00:11:45,430
the access point in the network then an authentication message is shared between Klein and the access
98
00:11:45,430 --> 00:11:46,240
point.
99
00:11:46,240 --> 00:11:55,710
Then the associate message is shared also between the client and the access point to connect an access
100
00:11:55,710 --> 00:11:56,040
point.
101
00:11:56,040 --> 00:11:59,170
We have five parameters and their SSI.
102
00:11:59,180 --> 00:12:08,280
These security key security in network mode and the channels setting assess the idea is the short for
103
00:12:08,280 --> 00:12:15,140
service set identifier and basically SSA today is the name for a Wi-Fi network.
104
00:12:15,210 --> 00:12:23,070
Security is the security key is the passport that we are using to connect to wireless access point.
105
00:12:23,070 --> 00:12:32,030
We can also set the security and network modes and channels settings to in wireless network guys three
106
00:12:32,060 --> 00:12:39,230
cancer channels are used for communication between sender and wireless receiver devices.
107
00:12:39,300 --> 00:12:48,470
If channel is used so much by clients it can saturate and to decrease the saturation.
108
00:12:48,480 --> 00:12:57,030
We have different types of techniques and they're the s ss which means direct sequence spreads spectrum
109
00:12:57,570 --> 00:13:05,760
FHA says which means free counseling helping spread its spread spectrum and all of them which means
110
00:13:06,060 --> 00:13:10,050
orthogonal accounts in the Asian multiplex.
111
00:13:10,740 --> 00:13:15,160
And that squares with the violence locally that security.
112
00:13:15,390 --> 00:13:24,420
And let's start with the wireless those attacks this part recent Wi-Fi security advances wireless local
113
00:13:24,420 --> 00:13:32,140
area networks remain wary vulnerable for denial of service attacks worldwide.
114
00:13:32,280 --> 00:13:40,320
Traditional those attacks involve overwhelming air hosts with service requests in wireless networks
115
00:13:40,590 --> 00:13:49,170
limited bandwidth and writhing functionality associated with nodes open up new avenues for launching
116
00:13:49,170 --> 00:13:52,700
the those attacks.
117
00:13:52,780 --> 00:14:00,610
Let's go ahead with the rogue access point term a rogue access point is a wireless access point that
118
00:14:00,610 --> 00:14:09,260
has been installed on a secure network without explicit authorization from a local area network administrator.
119
00:14:09,310 --> 00:14:16,870
Rogue access points can allow a hacker to conduct a man in the middle attack flood the network with
120
00:14:16,870 --> 00:14:26,350
useless data creating a denial of service send for us outside advertising attractive features such as
121
00:14:26,650 --> 00:14:35,960
free internet connectivity and provides a conduit for the theft of company information.
122
00:14:36,020 --> 00:14:41,410
Let's go ahead with the men in the middle attack in the men in the middle attack.
123
00:14:41,490 --> 00:14:49,090
Attackers secretly relays and possibly alters the communication between two parties who believe they
124
00:14:49,100 --> 00:14:52,740
are directly communicating with each other.
125
00:14:52,880 --> 00:15:00,970
An attacker with reception range of an unencrypted Wi-Fi wireless access point can insert himself as
126
00:15:00,970 --> 00:15:03,360
a man in the middle.
127
00:15:04,010 --> 00:15:04,760
Let's go ahead.
128
00:15:04,760 --> 00:15:12,530
The wireless local area network configuration to configure a wireless local area network we should choose
129
00:15:12,560 --> 00:15:23,890
the right network modes society channel with channel and a society broadcast or we can choose the security
130
00:15:23,920 --> 00:15:32,570
application and the administration parameters as well as we can see in a year we are choosing a security
131
00:15:32,580 --> 00:15:43,290
mode and we need to enter the password that we need to use while we are connecting to our wireless device.
132
00:15:43,540 --> 00:15:52,060
And also we should use as security modes and ready so where we can define as ready as or rather as port
133
00:15:52,060 --> 00:16:02,970
as well and we can make wireless mac filtering as you can see in here and just allow these guys to enter
134
00:16:02,970 --> 00:16:05,250
our access points.
15907
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.