Summary of 802.11 standard issues

Source: Internet
Author: User

This article summarizes some basic issues and helps you understand network-related Protocol issues and security issues. Let's take a look. This article mainly answers three questions about wireless network knowledge, all of which are basic content. From these questions, we can learn about related protocol and security issues, I hope you can get help.

Can wireless networks support voice IPVoice over Internet protocols and VoIP?

Is the related standard 802.11 expected to be officially approved soon? Is it designed to replace private protocols such as Spectralink Voice PrioritySVP before they are widely established?

Like the 802.1p protocol for wired Ethernet, 802.1e adds a Quality of Service (Qos) mechanism to support speech, video, and other sensitive applications with latency? It defines eight data transmission types or priorities, and effectively adjusts the waiting time for a network workstation from a conflict in transmission to an attempt to transmit data again?

The combination of VoIP and the 802.11 standard in a foreseeable form will make it possible to simultaneously transmit voice and data in a single wireless network architecture, which of the following functions can be used for voice transmission on PDA and notebook computers?

WEP wireless security standards have been considered unable to ensure network security. What are the weaknesses of this technology alternative?

The Wireless Equivalent protocol Wireless Equivalent Privacy, WEP) provides a method to prevent irregular network monitoring using message detectors? However, for a series of reasons, the adoption of this technology is not very secure, and the most notable is that it uses a shared static key with a fixed length? This means that it is relatively easy to crack a sufficient number of packets and crack the key?

How many other technologies can be used, such as key jump and key hopping )? How many seconds can this technology change the WEP Key? This makes it very difficult for attackers to attack, because they need a message containing the same key for analysis in about a few minutes?

IEEE has published the 802.11 standard, which can be used to authenticate port-based users and devices in existing 802.1x specifications? 802.11i includes two major developments: Wi-Fi protection for access to WPA) and Robust Security Network, RSN )?

Is WPA a subset of the 802.11 standard? It fixes WEP vulnerabilities by changing the key and hybrid key, and introduces some improvement measures in encoding? It is based on a central authentication server such as Radius and also uses 802.1x and Its Extended Authentication Protocol EAP?

At least theoretically, all of these technologies can avoid using VPNs? In addition, some existing WLAN hardware will be upgraded to WPA? However, some early-generation devices may not be compatible with WPA, so it is still unknown whether to use the necessary encryption and decryption software on client devices that cannot provide sufficient power such as PDAs?

Does this mean that enterprises should wait for the 802.11 standard devices to go public?

Not necessarily? WPA has fixed some WEP vulnerabilities, which makes the latter no longer applicable to enterprise users, but more importantly, should WPA be able to work on numerous legacy devices?

However, the future of wireless network security will be the 802.11 standard and RSN? The latter provides security through dynamic negotiation authentication and encryption mechanism between AP and mobile devices? This technology is also based on 802.1x and EAP, and uses Advanced Encryption Standard AES) encryption algorithm. Can this Mechanism support up to 256 bits of password length?

Dynamic negotiation will gradually make RSN a new algorithm and significantly enhance its security compared with WEP and WPA. Can it provide the same security protection as IPSec? The obstacle to using this technology is that customers may be reluctant to add new devices to early-production clients and AP devices to speed up algorithms and provide better performance?

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.