Tags » 802.11

802.11 Standards

802.11b

  • HR-DSSS (High-Rate Direct Sequence Spread Spectrum)
  • 2.4GHz Band (2.4Ghz-2.4835Ghz)
  • CCK (Complementary Code Keying)
  • Data rates 1, 2, 5.5, 11 Mbps

802.11a

802.11 Standards

SO - how about multicast/broadcast Audio/Video streaming over 802.11 aka Wi-Fi?

Ahhhhh… now that’s a really, really good question, originally titled as “Wi-Fi Monitor mode listening to traffic”, from pratiklodha, here.

Actually, it may have been titled as this: “how about multicast/broadcast Audio/Video streaming over 802.11 aka Wi-Fi?”, and so will I. 563 more words

Networking

SO - Why do 802.11 Acknowledgement Frames have no source MAC?

Ah… now that’s a legitimate good question that deserves a bit of background.

To its to its fullest extent, the question was this:

“Anyone know why 802.11 Acknowledgement Frames have no source MAC address?

565 more words
Networking

Wireless Network Security - The Basics of Securing a Wireless LAN

Network Authentication ProcessThe process of a client associating and authenticating to an access point is standard. Should shared key authentication be selected at the client, there are additional packets sent confirming the keys authenticity.The following describes EAP network authentication.1. 1,055 more words

This is How Wi-Fi Actually Works

I decided to write this blog because there appears to be a very common misunderstanding about how Wi-Fi works among end-users and even many network administrators as well. 761 more words

WLAN

LTE-U v. Wi-Fi Battle Set to Escalate

The battle between LTE-U and Wi-Fi will continue, even escalate – there is a lot at stake. LTE-U is designed to let cellular networks boost data speeds over short distances. 308 more words

WiFi

Wireless Network Security - The Basics of Securing a Wireless LAN

Network Authentication ProcessThe process of a client associating and authenticating to an access point is standard. Should shared key authentication be selected at the client, there are additional packets sent confirming the keys authenticity.The following describes EAP network authentication.1. 1,055 more words