1. Explain how error connection is handled in 802.11a. 2. Write a report compari
ID: 3566453 • Letter: 1
Question
1. Explain how error connection is handled in 802.11a. 2. Write a report comparing the wired equivalent privcy (WEP) protocol against the Wi-Fi protected access (WPA) protocol and WPA2. Which protocol is strongest ? 1. Explain how error connection is handled in 802.11a. 2. Write a report comparing the wired equivalent privcy (WEP) protocol against the Wi-Fi protected access (WPA) protocol and WPA2. Which protocol is strongest ? 2. Write a report comparing the wired equivalent privcy (WEP) protocol against the Wi-Fi protected access (WPA) protocol and WPA2. Which protocol is strongest ?Explanation / Answer
1.
802.11a (OFDM Waveform)
OFDM waveform at 5.8 GHz is now defined in clause 18 of the 2012 specification and provides protocols that allow transmission and reception of data at rates of 1.5 to 54Mbit/s. It has seen widespread worldwide implementation, particularly within the corporate workspace. While the original amendment is no longer valid, the term "802.11a" is still used by wireless access point (cards and routers) manufacturers to describe interoperability of their systems at 5.8 GHz, 54Mbit/s.
The 802.11a standard uses the same data link layer protocol and frame format as the original standard, but an OFDM based air interface (physical layer). It operates in the 5 GHz band with a maximum net data rate of 54 Mbit/s, plus error correction code, which yields realistic net achievable throughput in the mid-20 Mbit/s.
Since the 2.4 GHz band is heavily used to the point of being crowded, using the relatively unused 5 GHz band gives 802.11a a significant advantage. However, this high carrier frequency also brings a disadvantage: the effective overall range of 802.11a is less than that of 802.11b/g. In theory, 802.11a signals are absorbed more readily by walls and other solid objects in their path due to their smaller wavelength and, as a result, cannot penetrate as far as those of 802.11b. In practice, 802.11b typically has a higher range at low speeds (802.11b will reduce speed to 5.5 Mbit/s or even 1 Mbit/s at low signal strengths). 802.11a also suffers from interference, but locally there may be fewer signals to interfere with, resulting in less interference and better throughput.
2- Wired Equivalent Privacy
Wired Equivalent Privacy, a security protocol for wireless local area networks (WLANs) defined in the 802.11b standard. WEP is designed to provide the same level of security as that of a wired LAN. LANs are inherently more secure than WLANs because LANs are somewhat protected by the physicalities of their structure, having some or all part of the network inside a building that can be protected from unauthorized access. WLANs, which are over radio waves, do not have the same physical structure and therefore are more vulnerable to tampering. WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. However, it has been found that WEP is not as secure as once believed. WEP is used at the two lowest layers of the OSI model - the data link and physical layers; it therefore does not offer end-to-end security.
Wi-Fi Protected Access
Wi-Fi Protected Access, a Wi-Fi standard that was designed to improve upon the security features of WEP. The technology is designed to work with existing Wi-Fi products that have been enabled with WEP (i.e., as a software upgrade to existing hardware), but the technology includes two improvements over WEP:
WPA2
WPA2 has replaced WPA. WPA2, which requires testing and certification by the Wi-Fi Alliance, implements the mandatory elements of IEEE 802.11i. In particular, it introduces CCMP, a new AES-based encryption mode with strong security. Certification began in September, 2004; from March 13, 2006, WPA2 certification is mandatory for all new devices to bear the Wi-Fi trademark.Wi-Fi Protected Access II (WPA2) is a security standard to secure computers connected to a Wi-Fi network. Its purpose is to achieve complete compliance with the IEEE802.11i standard, only partially achieved with WPA, and to address the security flaw in the 128-bit
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.