Deploying Secure 802.11 Wireless Networks with Microsoft Windows

Chapter 1

IEEE 802.11 Overview

Before getting into the technical details of the Institute of Electrical and Electronic Engineers (IEEE) 802.11 standard, it is helpful to review the benefits of wireless LAN networking, which include the following:

Beyond the corporate campus, access to the Internet and even corporate sites can be made available through public wireless hot spot networks. Airports, restaurants, rail stations, and common areas throughout cities can be provisioned to provide this service. When the traveling worker reaches his or her destination, perhaps meeting a client at the corporate office, limited access can be provided to the user through the local wireless network. The network can recognize the user from another corporation and create a connection that is isolated from local corporate network but provides Internet access to the visiting user. Wireless infrastructure providers are enabling wireless connectivity in public areas around the world. Many airports, conference centers, and hotels provide wireless access to the Internet for their visitors.

NOTE In all these wireless LAN scenarios, it is worth noting that today s standards-based wireless LANs operate at the same speeds that were considered state of the art for wired networks just a few years ago. For example, IEEE 802.11b, a prevalent wireless LAN technology, operates at a maximum of 11 megabits per second (Mbps), or about 30 to 100 times faster than standard dial-up technologies. This bandwidth is certainly adequate to deliver acceptable throughput for a number of applications or services. In addition, ongoing advancements with these wireless standards continue to increase the bit rate, with speeds of up to 54 Mbps.

Although IEEE 802.11 wireless LAN technologies provide these benefits, they also introduce security challenges with regard to who is allowed to connect and how they must send wireless traffic. These security challenges and their solutions are described in detail in Chapter 2, Wireless Security.

Категории