• Main Menu
  • Wireless Networks

    • How to Increase a WiFi Signal

      How to Increase a WiFi Signal

      The first thing you can try to increase a WiFi signal is to move the laptop computer or mobile device closer to the source of the network that is being accessed. If you have control over the router of the network, you can increase the wireless signal by placing the router on a high area

    • How to Setup a Wireless Network

      How to Setup a Wireless Network

      For those who have been contemplating setting up a wireless network in their home, there are many reasons to consider how a wireless network will benefit you. One reason that many people decide to set up a wireless network is to share a internet connection. By setting up a wireless network, several family members can

    • How to Change a WEP Key

      How to Change a WEP Key

      A WEP (Wired Equivalent Privacy) key is a type of security algorithm for wireless devices that protects a computer from hackers and people who are trying to access someone else’s Internet connection. It consists of the numbers 0-9 and the letters A-F and can be 10, 26, or 58 characters long. For devices within the

    • 802.1X


      802.1x is an IEEE standard that provides the definition for the encapsulation of EAP (Extensible Authentication Protocol) and is also known as EAPOL (EAP over LAN). The standard was first defined in 2001 and later clarified in 2004 to be used with other IEEE 802 working group defined technologies such as the 802.11 wireless standard.

    • WiFi Scanner

      WiFi Scanner

      There are many different products and services available, especially via the Internet, that allow users to detect and crack wireless computer networks. The majority of these programs are illegal, extremely complicated to use, or both. The WiFi Scanner, however, is easy to use and allows the user to detect networks that are further away while

    • 802.11i


      The 802.11i wireless standard was released by the IEEE on June of 2004 and implements improved encryption for wireless networks than realized on past standards released. Commonly referred to as the WPA2 implementation, the 802.11i implementation requires newer encryption standards than seen with the WEP implementation by requiring TKIP (Temporal Key Integrity Protocol) and AES

    • CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

      CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

      CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) is the preferred encryption protocol in the 802.11i standard. CCMP Cryptography CCMP is based upon the CCM mode of the AES encryption algorithm. CCMP utilizes 128-bit keys, with a 48-bit initialization vector (IV) for replay detection. The Components of CCMP The Counter Mode (CM)

    • SSID (Service Set IDentifier)

      SSID (Service Set IDentifier)

      The SSID (Service Set IDentifier) is a name that identifies a specific 802.11 wireless network. The name is set by the network administrator who configures the router. Some vendors refer to the SSID simply as the “network name.” The SSID is the name of the wireless network and should not be confused with the host

    • What is Multicast Wireless?

      What is Multicast Wireless?

      Multicast is the transfer of messages to multiple destinations simultaneously, using fewer networks. The information is delivered to each of the links only once, and copies are created when the links to the destinations split, thus creating an optimal distribution path. Multicasting reduces unnecessary packet duplication. A wireless network utilizes radio communication, unlike wired networks,

    • How to Connect a Wireless Router

      How to Connect a Wireless Router

      Wireless routers are network devices that combine the functionalities of a router and a wireless access point. Wireless routers can be connected to broadband modems to provide wireless access to the Internet to two or more computers or laptops within a home environment. They enable greater mobility for laptops and other portable computers. They can

    318 queries in 0.622 seconds.