• Main Menu
  • Wireless Networks

    • How to Secure a Linksys Wireless Router

      How to Secure a Linksys Wireless Router

      A Linksys wireless router is a device that converts digital information into wireless radio waves and vice versa. Linksys wireless routers, like other wireless routers, are used for wireless computer networking. They use an antenna and an Ethernet or coaxial cable connection to allow computers to connect to a wireless network that is within range.

    • Ad Hoc Network

      Ad Hoc Network

      An ad hoc network is a type of peer to peer wireless network mode where wireless devices communicate with each other directly, without the aid of a Wireless Access Point (WAP) device. Wireless networks typically depend on a base station or WAP device to manage and direct the stream of data between wireless devices. In

    • CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

      CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

      CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) is the preferred encryption protocol in the 802.11i standard. CCMP Cryptography CCMP is based upon the CCM mode of the AES encryption algorithm. CCMP utilizes 128-bit keys, with a 48-bit initialization vector (IV) for replay detection. The Components of CCMP The Counter Mode (CM)

    • Wireless Access Point

      Wireless Access Point

      Wireless Access Point (WAP) is essentially hardware equipment that enables wireless devices to connect to wireless networks, via standards such as Wi-Fi, Bluetooth and so on. The WAP device typically connects to a wired network, and acts as a communication interface between the wireless devices and wired devices on the network. The WAP device enables

    • What is Multicast Wireless?

      What is Multicast Wireless?

      Multicast is the transfer of messages to multiple destinations simultaneously, using fewer networks. The information is delivered to each of the links only once, and copies are created when the links to the destinations split, thus creating an optimal distribution path. Multicasting reduces unnecessary packet duplication. A wireless network utilizes radio communication, unlike wired networks,

    • How to Change WEP to WPA

      How to Change WEP to WPA

      Changing WEP to WPA is a great way to increase a wireless network’s security. These are the two main types of protection available through modern wireless routers: WEP or Wired Equivalent Privacy is a security algorithm that wireless networks use. Hackers can break into wireless networks using WEP very easily with simple software that is

    • W-CDMA (Wideband Code Division Multiple Access)

      W-CDMA (Wideband Code Division Multiple Access)

      WCDMA (Wideband Code Division Multiple Access) is the radio access scheme used for third generation cellular systems that are being rolled out in various parts of the globe. The 3G systems support wide band services like high speed Internet access and video and high quality image transmission with the same quality as the fixed networks.

    • Cantenna

      Cantenna

      A Cantenna is a waveguide antenna that is directional in nature, and is used to better detect or broaden a wireless network’s range. The original Cantenna was a 50 ohm resistive load that amateur radio enthusiasts used. It is a simple product that can be created with an empty Pringles can (and more recently, wider

    • How Does WiFi Work?

      How Does WiFi Work?

      Over the past decade, WiFi/wireless networking has become very popular. Low cost and simplicity are some of the reasons why WiFi is so popular. Today,  it is almost impossible to buy a laptop that doesn’t have a wireless card built into the screen, which is why WiFi’s popularity continues to grow. What Does WiFi Stand For?

    • MIC (Message Integrity Check)

      MIC (Message Integrity Check)

      A message integrity check (MIC), is a security improvement for WEP encryption found on wireless networks. The check helps network administrators avoid attacks that focus on using the bit-flip technique on encrypted network data packets. Unlike the older ICV (Integrity Check Value) method, MIC is able to protect both the data payload and header of

    321 queries in 0.408 seconds.