WIN XP Wireless Network 802.1X Wireless Network 2002-02-22 · · Dark ·· Yesky 802.1x wireless network, seems to be very complicated, want to know that it is 啥, first to understand what is a wireless network. The noun in the wireless network is only popular in recent years. It is quite wide, such as mobile communications fields, then what is the wireless network? Wireless network Overview Wireless network technology ranges, including global speech and data networks that allow users to establish remote wireless connections to optimize infrared and radio frequency technologies for close-range wireless connections. It is commonly used in wireless networks including laptop, desktop computers, handheld computers, personal digital devices, mobile phones, pen computers, and pagers. Wireless technology is used in a variety of practical uses. For example, mobile phone users can access emails using mobile phones. Passengers using a laptop can be connected to the Internet by a base station installed at the airport, station and other public places. At home, users can connect to the desktop device to synchronize data and send files. One. Definition Standard In order to reduce costs, ensure a wide range of works of cooperation and improve wireless technology, many organizations (eg Electronics Engineers Association (IEEE), Internet Engineering Task Force (IETF), Wireless Ethernet Compatibility Alliance (WECA) and international telecommunications Alliance (ITU) has participated in several major standardization work. For example, the IEEE Working Group is defining information how to transfer from one device to another device (whether using radio waves or use infrared light waves), and how to communicate when transmitting media. In the development of wireless network standards, some organizations such as IEEE focus on power management, bandwidth, security, and other items with wireless network features. Two. The wireless network type is the same as the wired network, and the wireless network can be divided into several different types according to the distance of data transmission. 1. Wireless Wide Area Network (WWANS) WWAN technology allows users to establish wireless networks through remote public networks or dedicated networks. These connections can cover a wide geographic area such as many cities or countries (regions) by using a number of antenna base stations or satellite systems maintained by wireless service providers. The current WWAN technology is the second generation (2G) system known to everyone. The main 2G systems include Global Digital Mobile Phone System (GSM), Network Digital Packet Data (CDPD), and Multiple Access Partition Access (CDMA). It is currently trying to transition from 2G networks, some of which have functions that limit roaming functions and mutual compatibility, to third generation (3G) technology will perform global standards and provide global roaming. ITU is actively promoting the development of 3G global standards. 2. Wireless City Network (WMANS) WMAN technology enables users to create wireless connections between multiple places in major urban areas (for example, between a city and university campus office building), without having to spend high cost laying optical cable, cable And rental lines. In addition, if the main lease lines of the wired network cannot be used, WMANs can be used as a backup network for wired networks. WMANS can use radio waves or infrared light waves to transmit data. Providing wireless access network bandwidth to users with high speed access Internet, the demand is growing. Although all kinds of different technologies, such as multi-point distribution services (MMDs), and local multi-point distribution services (LMDs), IEEE 802.16 Wide Frequency Wireless Access Standard Working Group is still developing specifications to standardize the development of these technologies. 3. Wireless Local Network (WLANS) WLAN technology enables users to create wireless connections locally (for example, in the company or campus building, or in public places, such as airports). WLANS can be used in a temporary office or other cable installation restricted place, or is used to enhance existing LANs, and use users to work different from different places at different times. WLANS can run two different ways.
In the base WLANS, the wireless station (device with a radio wave network card or an external modem) is connected to the wireless access point, which has a bridge between the wireless station and the existing network center. For peer-to-peer special WLANs, in several users within a limited area (such as a conference room), if you do not need to access network resources, you can establish a temporary network without using the access point. IEEE approved 802.11 WLANS standard in 1997 with a designated data transfer speed of 1 to 2 megabytes per second (MBPS). In 802.11b that is a new major standard, the maximum speed of data transmission is 11 Mbps through a 2.4 GHz (GHz) band. Another updated standard is 802.11a, which specifies the maximum speed of 54 Mbps through the 5 GHz band. 4. Wireless Personal Regional Network (WPANS) WPAN technology creates special wireless communication for devices for personal operations (POS) (such as PDA, mobile phones, and laptops). POS is the space around the individual, distance within 10 meters. Currently, two major WPAN technology are Bluetooth and infrared light waves. Bluetooth is an alternative technology that can transmit data within 30 feet. Bluetooth data transmission can penetrate walls, pockets and briefcases. Bluetooth technology is the development of the Bluetooth Special Stake Group (SIG). The group issued a version 1.0 version of Bluetooth specification in 1999. However, connecting the equipment in a close distance (within one meter), the user can also create an infrared link. In order to standardize the development of WPAN technology, IEEE has established an 802.15 working group. The working group is developing WPAN standards based on version 1.0 Bluetooth. The main goal of the draft standard is low complexity, low energy consumption, interactivity, and compatible with 802.11 networks. The wireless network configuration is about the overview of the wireless network, and WinXP's wireless network function is unprecedentedly powerful, so how to configure wireless network in WinXP? 1. Open Network Connections (To open "Network Connection", click Start, point to Setup, then double-click Control Panel, click Network, and Internet Connections, and then click Network Connections). 2. Right-click Wireless Network Connection, then click Properties. 3. On the Wireless Network tab, do one of the following: * To enable the automatic wireless network configuration, check "Configure my Wireless Network Settings Using Windows" checkbox. This check box will be selected by default. * To disable the automatic wireless network configuration, clear "Configure my Wireless Network Settings" check box using Windows. 4. To connect to an existing wireless network, do one of the following: * Access point (foundation)
To connect to an existing access point (basis) network, click Network Name Under "Free Network", then click Configure. In the Wireless Network Properties, specify the wireless network key (WEP) setting, or if the network key is automatically supplied (for example, the key stored on the Administrator), select Auto To provide a key check box. If you are not sure if a network key is required or you need to enter which network key settings, contact your network administrator or wireless network adapter manufacturer. It should be noted here that if the network does not broadcast its network name, it will not appear under "available network". To connect to the access point (basis) network that you can use but do not appear under the "available network", click Add "under the" Preferred Network ". Under Wireless Network Properties, specify the network name (service set identifier), if needed, specify the wireless network key setting. * Computers to Computers (Special) To connect to an existing computer to your computer (Special) network, click Network Name Under "Available Network", then click Configure. Specify a wireless network key (WEP) setting in Wireless Network Properties, or if you have automatically supplied the network key (for example, the key stored on the Administrator), select Auto I provide a key check box. If you are not sure if a key is required or you need to enter which network key settings, contact your network administrator or wireless network adapter manufacturer. If you want to connect to your computer to your computer (Special) network, and your computer to your computer network and access point (basis) network within your computer range, click Advanced, and then click "Only computer to your computer (especially )The internet". 5. To configure a new wireless network connection, click Add, then do the following: * Under "Wireless Network Properties", specify the network name (service set identifier), if necessary, specify wireless network key settings . * If the network connection being configured is connected to the computer to the computer (Special) network, select "This is the computer to the computer (special) network, so the wireless access point is not used check box. 6. To change the order of the connection attempt to access the preferred network, under the "Preferred Network", click Wi-Fi to move to a new location on the list, and then click "Top" or "Down". 7. To change the wireless network connection settings listed in a "preferred network", click the Wi-Fi to change, click Properties, and then change the settings as needed. 8. To remove a wireless network from the list of preferred networks, add the wireless network you want to delete under the "Preferred Network" and click Delete. 9. To update the list of available networks within your computer, click Refresh.
10. To automatically connect to an available network that appears in the "Preferred Network" list, click Advanced, and then select "Auto Connect to Non-League" checkboxes. There are some points in the configuration: 1. When you enable automatic wireless network configuration, you can connect to an existing wireless network, change wireless network connection settings, configure new wireless network connectivity, and specify the preferred wireless network. You will receive a notification when a new network is available. After selecting a wireless network, your wireless network adapter is automatically configured to match the settings of that network and try the network connection. 2. To configure the settings on the Wireless Network tab, you must log in as an administrator and must use a wireless network adapter that supports the Wireless Zero Configuration service. If you are not confident that the wireless network adapter supports the Wireless Zero Configuration service, contact your network administrator or wireless network adapter manufacturer. 3. If you use third-party wireless network software, clear "Configuring My Wireless Network Settings" check boxes using Windows. 4. If you are unable to connect to an existing wireless network, and the name of the network you want to connect Under the "preferred network" list, click the preferred network name, and then click Properties. In the Wireless Network Properties, check the settings and make sure it is correct. If you cannot determine if the setting is correct, contact your network administrator or wireless network adapter manufacturer. 5. If the "preferred network" list contains the access point (basis) and computer to your computer (Special) network, you cannot move your computer to your computer network to a higher location in the list. 6. To enhance the security of 802.11 Wireless Networks and Wired Ethernet networks, make IEEE 802.1x authentication defaults to enable state. 802.1X Authentication This introduces the wireless network, and begins with the 802.1x wireless network, you must know the 802.1x wireless network, you first know what is 802.1x authentication. 802.1X Authentication IEEE 802.1x is a draft of a standard based on port network access control, which provides network access to 802.11 wireless networks and validation of wired Ethernet. Port-based network access control uses the physical features of the swap LAN infrastructure to verify the device connected to the LAN port and prevent the port of accessing the authentication process that has failed. During the interaction based on port-based network access control, the LAN port uses one of the two roles: the verifier or aspect. If the validator role, the LAN port is verified before it allows the user to access the service accessed through that port. If it is a pleasing role, the LAN port requests access to services that can be accessed through the validator's port. Authentication Server (available) is a document that is a representative verifier who coexists alone or a representative verifier coexisting with the verifier. Verify that the server then responds to the validator, indicating whether the request has an authorization to access the authenticator's service. The validator's port-based network access control is defined into two access points to the LAN through a physical LAN port. The first logical access point - non-controlled port - allows you to exchange data between other computers on the validator and LAN without considering how the computer's authentication status is required. Second logical access point - controlled port - Allows exchange of data between authenticated LAN users and verifiers. IEEE 802.1X provides centralized user ID, authentication, dynamic key management, and accounting of the centralized user ID, authentication, dynamic key management, and billing using standard security protocols (eg, RADIUs). So what is the role of 802.1x authentication? To enhance security, you can enable IEEE 802.1x authentication.
IEEE 802.1X Authentication Provides an 802.11 wireless network and a verified access to wired Ethernet networks. IEEE 802.1x can reduce wireless network security risk (eg, unauthorized access to network resources) to the lowest level by providing user and computer identity, centralized authentication, and dynamic key management. IEEE 802.1X supports Internet Authentication Service (IAS), which performs a Remote Authentication Dial User Service (RADIUS) protocol. Under this, the wireless access point configured as the RADIUS client sends the connection request and the billing message to the Central RADIUS server. The Central RADIUS server handles this request and grants or rejects the connection request. If the request is given, the client obtains authentication according to the selected authentication method, and generates a unique key (from a place where WEP key) is generated. IEEE 802.1X provides an expandable authentication protocol (EAP) security type to enable you to use authentication methods such as smart cards, certificates, and Message Digest 5 (MD5) algorithms. With IEEE 802.1x authentication, if the computer requires access to network resources regardless of whether the user logs in to the network, you can specify whether the computer attempts to access the network authentication. For example, the data center operator for managing the remote management server can specify whether the server should try to access the identity verification of network resources. You can also specify if the user or computer information is not available, the computer attempts to access the identity verification of the network. For example, ISP can use this authentication option to allow users to access a free Internet service or an Internet service that can be subscribed. Companies can grant a limited guest access to visitors so they can access Internet, but they cannot access confidential network resources. 802.11 Security Options include authentication services and encryption services based on WEP algorithms. WEP is a secure service to prevent access from 802.11 networks from being accessed by unauthorized users, such as sneaking (capture wireless network communication). With the automatic wireless network configuration, you can specify a network key for authentication when you enter your network. You can also specify which network password used to encrypt data transmitted through the network. When data encryption is enabled, the secret shared encryption key is generated, and the source and target are used to change the frame bit, and thus prevent leakage to the sneak. 802.11 Support for two subtypes of network authentication services: open systems and shared keys. Under "Open Authentication", any wireless station can request authentication. A station that needs to be transmitted through another wireless station authentication will be sent. The receiving station will then indicate whether it identifies the frame of the send station's identity to send back. Under "shared key" authentication, each wireless station is assumed to have a secret shared key with a secure channel, which is independent of the 802.11 wireless network communication channel. To use the Shared Key Authentication, you must have a network key. When WEP is enabled, you can specify the network key used to encrypt. You can automatically provide a network key (for example, on the wireless network adapter), you can also specify the key by typing. If you personally specify a key, you can specify a key length (40-bit or 104 bit), a key format (ASCII character, or hexadecimal number) and key index (where the location of the specific key) is stored. The longer the key length, the safer security. Whenever the key length adds a bit, the number of possible keys may be doubled. Under 802.11, the wireless station can be configured with up to four keys (key indexes 0, 1, 2, and 3).