• Main Menu
  • Wireless Networks

    • 802.11a

      802.11a

      802.11a is one of the many standards used for high speed wireless networks, usually referred to as Wifi. This standard was created by the IEEE (Institute of Electrical and Electronics Engineers) in 1999 and uses several different frequencies including 5.15-5.35/5.47-5.725/5.725-5.875 GHz to send and receive data from one electronic or computer device to another. There

    • How to Setup a Wireless Network

      How to Setup a Wireless Network

      For those who have been contemplating setting up a wireless network in their home, there are many reasons to consider how a wireless network will benefit you. One reason that many people decide to set up a wireless network is to share a internet connection. By setting up a wireless network, several family members can

    • MAC Address Filtering

      MAC Address Filtering

      MAC Address filtering is a technique that is implemented on many wireless networks to filter which devices are able to connect to the wireless network. MAC Address filtering allows an administrator to allow specific devices to connect to the network while blocking all other devices. MAC Address filtering is a free service provided by most

    • How to Change WEP to WPA

      How to Change WEP to WPA

      Changing WEP to WPA is a great way to increase a wireless network’s security. These are the two main types of protection available through modern wireless routers: WEP or Wired Equivalent Privacy is a security algorithm that wireless networks use. Hackers can break into wireless networks using WEP very easily with simple software that is

    • CDMA-2000 1xRTT

      CDMA-2000 1xRTT

      CDMA-2000 1xRTT is a 3G wireless technology based on the CDMA platform. The 1x in 1xRTT refers to 1x the number of 1.25MHz channels. The RTT in 1xRTT stands for Radio Transmission Technology. The CDMA-2000 1xRTT protocol was developed by Qualcomm. CDMA-2000 1xRTT is a CDMA version of the IMT-2000 standard which was developed by

    • How to Configure a Router

      How to Configure a Router

      One of the main disadvantages of connecting to the Internet via wire is that it prevents you from moving around. On the other hand, by setting up and configuring a router, you can move around with your lap top and surf the web more comfortably. Configuring a router is not difficult; however, people may have

    • How to Secure a Linksys Wireless Router

      How to Secure a Linksys Wireless Router

      A Linksys wireless router is a device that converts digital information into wireless radio waves and vice versa. Linksys wireless routers, like other wireless routers, are used for wireless computer networking. They use an antenna and an Ethernet or coaxial cable connection to allow computers to connect to a wireless network that is within range.

    • Bluetooth

      Bluetooth

      Bluetooth is a specification for short distance wireless communication between two devices. Bluetooth Specifications Fixed/Mobile Mobile Circuit/Packet Both Max Bandwidth 1Mb Range 10 meters Frequency 2.40GHz-2.483.5Ghz (U.S. and Europe) or 2.472Ghz-2.497Ghz (Japan) Host Network None Definer Bluetooth SIG Bluetooth technology is named after Harald Bluetooth, a Danish king who managed to consolidate Denmark and a

    • WEP (Wired Equivalent Privacy)

      WEP (Wired Equivalent Privacy)

      Wired Equivalent Privacy (WEP) is the encryption algorithm built into the 802.11 (Wi-Fi) standard. WEP encryption uses the RC4 stream cipher with 40 or 104 bit keys and a 24 bit initialization vector. WEP Key Generation Most 802.11 devices allow WEP keys to be entered using an ASCII passphrase or in hexidecimal format. The conversion

    • EAP, LEAP, PEAP and EAP-TLS and EAP-TTLS

      EAP, LEAP, PEAP and EAP-TLS and EAP-TTLS

      Once the popularity of WiFi started to take off in the early 2000s, a major issue that was identified with the inherent security included in the 802.11 standard was the weakness of WEP encryption. Although a number of competing security methods have emerged since this time, the EAP, LEAP, PEAP, EAP-TLS, and EAP-TTLS protocols were

    wireless-networks
    386 queries in 3.590 seconds.