Skip to main content

Home/ Wired Network/ Group items tagged Access Points

Rss Feed Group items tagged

wirednetworks wirednetworks

Wired Networks: Wi-Fi Security Concerns - 0 views

  •  
    WLANs have additional security threats to consider that are RF in nature. Protocol-level attacks that attempt to penetrate Wi-Fi data security include rogue access points, authentication attacks, evil twin access point, man-in-the-middle, Wi-Fi phishing, and malicious eavesdropping. Most of these attacks exit at layer 2 of the OSI model. Proper authentication, encryption, and segmentation security solutions can be implemented to mitigate many of these well-known attacks. Layer 2 security monitoring solutions can also be put in place to detect when layer 2 attacks are taking place. But a major oversight in current wireless intrusion detection systems (WIDS) solutions is that they have been unable to detect layer 1 security threats WIDS typically use 802.11 radio cards that have limited layer 1 visibility......
wirednetworks wirednetworks

Wired Networks: The Basic Access Method: CSMA/CA - 0 views

  •  
    The Distributed Coordination Function essentially Carrier a Sense Multiplying Access with Collision Avoidance mechanism (also known as CSMA/CA). CSMA protocols are one of the most known protocols in the industry, where the most common one is Ethernet which refers to CSMA/CD protocol (CD standing for Collision Detection). The CSMA protocol works as A station that transmit senses to the medium if the medium is not responding or some other station is transmitting then the medium will continue transmission at a later stage if the medium is sensed free then the station will accept transmission
1 - 2 of 2
Showing 20 items per page