Tags » 802.11

Customer Matters

In the WiFi industry, we are very focused on advertising performance in terms of megabits and gigabits. Like the processor wars of the 90s and naughties, we are pushing the story that faster is better. 390 more words

WiFi World

802.11ac Encryption Upgrade

The security features¬†provided by the IEEE 802.11 standard haven’t changed much since the 802.11i amendment was ratified¬†in 2004, which is more commonly known by its Wi-Fi Alliance certification name WPA2. 923 more words

WLAN

Passive Wi-Fi -- 10,000 Times Energy Efficient

In an effort to curb battery drainage as you use Wi-Fi to play games or watch movies, a team of engineers including Indian-origin researchers has demonstrated that it is possible to generate Wi-Fi transmissions using 10,000 times less power than conventional methods. 467 more words

802.11

802.11 Standards

802.11b

  • HR-DSSS (High-Rate Direct Sequence Spread Spectrum)
  • 2.4GHz Band (2.4Ghz-2.4835Ghz)
  • CCK (Complementary Code Keying)
  • Data rates 1, 2, 5.5, 11 Mbps

802.11a

802.11 Standards

SO - how about multicast/broadcast Audio/Video streaming over 802.11 aka Wi-Fi?

Ahhhhh… now that’s a really, really good question, originally titled as “Wi-Fi Monitor mode listening to traffic”, from pratiklodha, here.

Actually, it may have been titled as this: “how about multicast/broadcast Audio/Video streaming over 802.11 aka Wi-Fi?”, and so will I. 563 more words

Networking

SO - Why do 802.11 Acknowledgement Frames have no source MAC?

Ah… now that’s a legitimate good question that deserves a bit of background.

To its to its fullest extent, the question was this:

“Anyone know why 802.11 Acknowledgement Frames have no source MAC address?

565 more words
Networking

Wireless Network Security - The Basics of Securing a Wireless LAN

Network Authentication ProcessThe process of a client associating and authenticating to an access point is standard. Should shared key authentication be selected at the client, there are additional packets sent confirming the keys authenticity.The following describes EAP network authentication.1. 1,055 more words