802.11 [Wi-Fi] applies to wireless LANs
o 802.11a - 5 GHz, 54 Mbps by using Orthogonal Frequency Division Multiplexing [OFDM]
-more sensitive to walls and other obstacles
o 802.11b - 2.4 GHz, 11 Mbps by using direct-sequence spread spectrum DSSS modulation.
o 802.11d is an enhanced version of 802.11a and 802.11b.
-The standard supports regulatory domains.
-Can be set at the media access control [MAC] layer
o 802.11e: It
is used for real-time applications such as voice, VoIP, and video.
-Quality of Service [QoS] to Layer 2
o 802.11g - 54 Mbps using the OFDM technology and uses the same 2.4 GHz band as 802.11b.
- defines high-speed extensions to 802.11b.
-compatible with the 802.11b standard
o 802.11ac - 5 GHz.
-Faster and more reliable than the 802.11n
- involves Gigabit networking that provides an instantaneous data transfer experience.
o 802.11i
-improves WLAN security by implementing new encryption protocols such as TKIP and AES
o 802.11ad - 60 GHz
-inclusion of a new physical layer
-operating on 2.4 GHz and 5 GHz.
- speed is much higher than that of 802.11n.
o 802.15: It defines the standards for a wireless personal area network [WPAN]. It describes the specification for wireless connectivity with fixed or portable devices
o 802.15.1 - Bluetooth is mainly used for exchanging data over short distances on fixed and mobile devices. This standard works on a 2.4 GHz ban
o 802.15.4 [ZigBee], 802.15.5 [mesh network], 802.16 [WiMax], 802.11X [RADIUS]
1.Change the default password on your router
2.use a hard to guess SSID
3.disable SSID broadcasting
4.enable security protocols like WPA or WEP
5.create a network passphrase
6.implement media access control
7.limit your signal range
8.apply firmware upgrades
--Descriptions--
Change your network name [SSID]. Each wireless network has its own name to identify it, which is known as the service set
identifier [SSID]. Unless you change this name when you set up your router, the router uses a default network name that all routers from that manufacturer use [e.g., "Wireless" or "Netgear"]. Hackers know the default names and access codes for routers.
Disable SSID broadcast. Most routers are set up to broadcast their SSIDs so that other wireless devices can find them. If your router supports disabling SSID broadcasting, turn it off. This makes it more difficult for a hacker to detect your
network and nearly impossible for a neighbor to inadvertently connect to your network.
Change the default password on your router. Routers have default user names and passwords. Hackers can use these to access your router and break into your network. Change the password on your router to something hard to guess. Use at least eight characters that are a combination of letters, symbols, and numbers.
Turn on security protocols. Most routers ship with security protocols such as Wired
Equivalent Privacy [WEP] or Wi-Fi Protected Access [WPA]. Both use encryption [a method of translating your data into code] to protect data in your wireless transmissions. WPA is a much stronger protocol than WEP, so enable WPA if you have it; enable WEP if you don't.
Create a passphrase. When you enable these protocols, you're forced to create a security encryption key [passphrase]. When you attempt to connect a node to a security-enabled network for the first time, you're required to enter
the security key. The security key or passphrase is the code that computers on your network need to decrypt [decode] data transmissions from your network.
Implement media access control. Each network adapter on your network has a unique number [like a serial number] assigned to it by the manufacturer. This is called a media access control [MAC] address, and it is a number printed right on the network adapter. Many routers allow you to restrict access to the network to only certain MAC
addresses.
Limit your signal range. Many routers allow you to adjust the transmitting power to low, medium, or high. Cutting down the power to low or medium could prevent your signal from reaching too far away from your home.
Apply firmware upgrades. Your router has read-only memory that has software written to it. This software is known as firmware. As bugs are found in the firmware [which hackers might exploit], manufacturers issue patches. Periodically check the manufacturer's website
and apply any necessary upgrades.