无线网络资料63.pdfVIP

  • 2
  • 0
  • 约5.59万字
  • 约 10页
  • 2017-08-18 发布于江苏
  • 举报
Wireless Security Hodgepodge Page 1 Wireless Security Hodgepodge Glenn Royster A+, Network+, A.A.S., B.S., M.S. © 2005 _____________________________________________________________________________________ ABSTRACT A BRIEF LOOK AT THE IEEE 802.11 FAMILY During the infancy of the wireless computing 802.11a wireless devices operate in the 5 age, key defenses and deterrents to wireless attacks GHz band. The orthogonal frequency-division were the cost and complexity of methods required to multiplexing method is used to generate the signal. partake in such activities. The current age of easily The prime difference between OFDM and frequency- accessible, inexpensive tools have tilted the balance division multiplexing (FDM) is each sub-band is used of price, complexity, and deterrence in favor of the by one source at a given time in OFDM. In the case novice wireless attacker. During year 2005, over a of OFDM, there are 52 sub-bands; 48 are dedicated billion wireless users are projected (Lauter, 2004). to transmitting data and 4 are reserved for control As of this writing, the wireless security discussion is information (Forouzan, 2004). There are 12 non- in escalation. This paper is a brief participant of the overlapping channels, 4 reserved for point to point discussion, and concludes multiple security and 8 reserved for indoor (Wikipedia, nd). OFDM mechanisms (a hodgepodge, instead of a single employs quadrature amplitude modulation (QAM) to solution) provide maximum wirel

文档评论(0)

1亿VIP精品文档

相关文档