Time
3 hours 38 minutes
Difficulty
Beginner
CEU/CPE
2

Video Description

Wireless Access Point (WAP)- Networking hardware device

  • Connects mobile devices to the wired infrastructure
  • Has ethernet interfaces RJ45 and antennae
  • Layer 2 device works in physical and data-link layers
  • Coverage area depends on the antennae
  • Many known vendors manufactures WAP
  • May contain a DSL and a router in the same box for wireless home connections
  • Supports multiple standards a,b,g, and n
  • Divided into several radio channels to avoid interference
  • Connects multiple SSIDs broadcasted and hidden
  • Speed and coverage depends on brand and model
  • Obstructed by walls and long distances
  • Configured through firmware directly or web based
  • May work with Power over Ethernet PoE

Wireless Access Point (WAP) Security- Hidden SSIDs

  • Filtering based on

    • MAC addresses
    • IP addresses
    • Port numbers (Services)
    • Domain Names
  • Encryption

    • WEP
    • WPA
    • AES

USB Modem- Connects PCs/Laptops to the GSM network via mobile operator

  • Depends on the network generation 3G/4G
  • Needs no wired infrastructure
  • Charging fees according to subscription
  • Less network speed than WiFi
  • Allows more flexibility and mobility

Smart Phones- Spreading fast over the world

  • WiFi
  • GSM
  • Bluetooth
  • Can act as Hot Spot
  • WiFi is less battery consuming than GSM
  • Charges for GSM depends on subscription

    • Monthly subscription
    • Pay as you go

Video Transcription

00:00
Let's now talk about the wireless networks devices.
00:04
What are the devices that can communicate wirelessly?
00:09
Let's start by the wireless excess point. The wireless Excess Point is a networking hardware device. As shown in the picture, it connects the mobile devices to the wild infrastructure. From one side, it is connected toe the registration jack 45 to the other side
00:28
it is connected to an antenna.
00:30
So this antenna is used for wireless communication, and the R J 45 is used as an Ethernet interface for the wired infrastructure. So it has the interfacing between the wild infrastructure and the wireless
00:47
network through the antenna and the Audrey 45 existing in the same device.
00:54
The access point is a layer to device. It works in the physical and datalink layers.
00:59
The coverage area depends on the antenna
01:02
on the number of antenna existing in this wireless access point
01:07
and the strength of each of its antenna. Off course wireless excess point with one antenna covers less area than
01:15
wireless. Excess point, with two and two is less than four and four is less than six and off course
01:23
each. Anton has its strength and its coverage area. So the antenna, its number and its strength determines, to a great extent the coverage area off this wireless excess point.
01:37
We have several exits. Points
01:40
manufactured by several known vendors for networking devices, Cisco and other companies has produced a very well known names for excess points such as well away and other networking companies.
01:55
It may contain a D. A cell and router in the same box. This is a wireless point for home connections, the one that contains the SL and the router. It is
02:07
a
02:07
variety off devices that are contained inside one box. So this the SL is connected to the
02:17
telephone line and the router is connected to
02:21
They're a splitter, and then
02:23
each of these devices interact toe. Get the wireless device inside your home connected to the Internet.
02:34
The water's excess point can support several standards off the WiFi A, B, G and and standards.
02:40
It can be divided into several radio channels to avoid interferes between the channels. It is communicated with each other. This excess point can act on Channel five, and the adjacent excess point can act on Channel seven, so we leave Channel six in between unused
03:00
so as to avoid interference between the communication challenge.
03:05
One excess point can hold several SS ID's either broadcasted or hidden.
03:10
The speed and coverage of the excess point depends on the brand and model of the manufacturers.
03:16
A good one can
03:20
cover
03:22
bigger area and can have a hard speed.
03:27
The excess point signals can be obstructed by wolves and can be
03:32
ah,
03:36
stopped by by long distances.
03:39
This wireless signals can be reflected by walls and cannot bypass walls, and
03:47
did
03:47
is
03:50
susceptible toe being weakened through long distances.
03:55
It can be configured through its firmware directly through tell not, for example, or any other communication that can directly
04:06
sets the configuration and saves the configuration over the firmware or the configuration can be Web based.
04:13
The excess point can show a Web interface that can be used by the user toe. Configure it to determine the channel to determine
04:24
their encryption protocol that will be used by this excess point and other settings. For this excess point,
04:30
the excess point can receive its power over the ether ether lad connection. It can use the power over Ethernet concept Toby powered if it is in the ceiling or in some place that is hard to connect power to it.
04:46
The security features inside the wildest excess point are many.
04:50
The S S I D itself can be hidden so it is not exposed to the attacker.
04:57
Excess once used
04:59
filtering based on several parameters, it can filter the traffic based on Mac addresses or based on I p addresses or based on port numbers, which means that it can filter that http service. Based on Port number 80
05:16
it can filter some domain names to access the network from inside to outside or vice versa.
05:24
Excess points use encryption techniques to communicate between the device and the excess point. The mobile device and the excess point can transmit and receive signals using the Web wireless encryption protocol, the W P. A or the A s protocols.
05:41
Those three are encryption protocols that are used to encrypt the traffic
05:45
between the wireless excess point and between the communicating mobile device wirelessly.
05:50
The A s is the most recent encryption protocol among these three.
05:57
Let's have a look at the configuration off wireless excess point. This is the configuration. Paige. This is the page that appears when configuring the excess point through Web interface. As you can see, you can enable villain. You can determine the SS I D.
06:15
You can determine the operation mode. You can determine the channel of communication, and you can
06:19
from the media on the left. Determine the security features that you want to apply over this wireless excess point. Namely, you can determine the Mac filtering, which make addresses to filter and which make addresses to pass, which I P addresses the filter and which I P addresses to pose and which domain names the filter and which domain names the path
06:40
you can monitor the throughput. You can have statistics about the wireless communications, and you can have
06:46
several features toe configure
06:48
through this excess point.
06:51
Using that Web interface speech,
06:55
let's have another device that can connect your
06:59
network wirelessly, which is the USB modem. It connects species laptops through the GSM network via mobile operator so it is inserted inside the PC or the laptop tow. Connect this PC or laptop. Tow the mobile operator company through the GSM letter.
07:17
It depends on the network generation, so the speed
07:20
can either be three G or can be faster using the four g or anti network. It needs no world infrastructure. It can be inserted inside the laptop with no wired infrastructure to connect this laptop toe that
07:36
Internet directly through the wireless infrastructure.
07:41
Off course, this USB modem has charging fees according to your subscription, Tow your mobile subscriber and your mobile letter. You should pay for this traffic
07:54
passing through the GSM network your subscribed to So it is ghostie than the WiFi network.
08:01
It has less network speed than the WiFi,
08:05
and
08:05
it uses more power off that
08:09
mobile device, such as the laptop or smartphone, more power than the WiFi It allows more flexibility and mobility says it can be connected anywhere covered by the mobile network
08:24
and the mobile operator. So it allows more flexibility and mobility. And it can be connected through streets and through remote areas just covered by the mobile network Operator.
08:39
Smartphones are the terminals that are most commonly connecting tow the wireless network, Smart forth and laptops are the in terminals. In a wireless network,
08:50
it's spreading fast over the world. We have so many statistics that says the smartphones are penetrating that markets off several countries, and it is
09:03
increasingly spreading over the world in number
09:07
and in the
09:11
type and number off users.
09:13
It can be connected to the Internet through WiFi. It can be connected through the GSM network. It can be connected to other more mobile devices through the Bluetooth.
09:24
It can also act as hot spot that can can connect other devices through it to the Internet can act as the excess point for other devices to the Internet, and this excess point can connect them through the GSM network.
09:39
WiFi is less battery consuming, then GS and in smartphones. If you connect through your smartphone toe WiFi and connect to the Internet, you will consume less battery than
09:54
connecting to the Internet. Using the GSM network charges four Gs and depends on your subscription. You either pay a monthly subscription and uses the Internet according to the subscription, or you can either pay as you go pay. As you download Perez. You pay as you use
10:13
for
10:16
the G s, a mop territory, or subscribe to and use whatever service is you can use offered by this mobile operator.
10:26
Thank you

Up Next

Network Fundamentals

In this basic Network Fundamentals course, you will get an introduction to basic networking concepts to expand your knowledge about network security. You will get a complete overview of networks including wired and wireless computer networks, devices, and protocols.

Instructed By

Instructor Profile Image
Mohammad Adly
EC3 Manager at Information Technology Institute
Instructor