05.01.2013 Views

Mac OS X Leopard - ARCAism

Mac OS X Leopard - ARCAism

Mac OS X Leopard - ARCAism

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

168<br />

CHAPTER 9 CONNECTING TO THE INTERNET<br />

802.11a: 802.11a came out about the same time as 802.11b, provided faster transfer<br />

speeds, and used radio frequencies in the 5 GHz range, which cut down on interference<br />

from cordless phones, Bluetooth devices, and microwave ovens. However, 802.11a<br />

products started shipping late by which time the industry was already implementing<br />

802.11b. As such, 802.11a never really caught on to the extent of 802.11b. (An ironic<br />

twist on this is that although Apple has never supported 802.11a, the current AirPort<br />

chips included with Intel-based <strong>Mac</strong>s do support 802.11a.) 802.11a is not compatible<br />

with 802.11b or 802.11g.<br />

802.11g: This is currently the most popular 802.11 variant. It is 100 percent compatible<br />

with 802.11b, but when used with 802.11g devices at both ends, it provides much faster<br />

transfer speeds and a slight boost in distance. Apple’s AirPort devices (both in computers<br />

and base stations) quickly switched from 802.11b to 802.11g (Apple called this AirPort<br />

Extreme). The downside with 802.11g is that it still operates in the crowded 2.4 to<br />

2.5 GHz radio frequency range.<br />

802.11n: 802.11n is the newest version of 802.11 with shipping products, even though the<br />

actual specification has yet to be ratified. 802.11n increases transfer speeds about 45 and<br />

25 the range over 802.11g, when used in 802.11n mode with other 802.11n devices. It can<br />

work in either the 2.4 to 2.5 or 5.0 GHz radio frequency range. 802.11n devices also can<br />

operate in three modes: Legacy, which supports 802.11 b/g and 802.11 a; Mixed, which<br />

supports 802.11 b/g, 802.11 a, and 802.11n; and then a pure 802.11n mode, which is<br />

necessary to take advantage of the increased speed and distances offered by 802.11n.<br />

Apple’s newest AirPort Extremes as well as all new Core 2 Duo and newer <strong>Mac</strong>s support<br />

a draft of this technology.<br />

Wi-Fi Security Schemes<br />

Besides the different types of actual networks, there are also different security mechanisms used<br />

to protect 802.11 networks. These include the following:<br />

WEP: Wired Equivalent Privacy (WEP) was written as part of the 802.11 standard to<br />

provide access control and data security to WLANs. Standard 64-bit WEP uses a 40-bit<br />

encryption key; however, today 128-bit WEP is prevalent and supports a 104-bit<br />

encryption key. Although WEP is quite popular and does provide at least some protection<br />

from casual eavesdropping, from a security standpoint it is considered broken. Not only<br />

are the keys vulnerable (a WEP key can be cracked in a few minutes using readily available<br />

software from the Internet), but there are other inherent flaws in WEP that makes it<br />

unsuitable for situations where security and data integrity are a priority.<br />

WPA/WPA2: Wi-Fi Protected Access (WPA) was created in response to flaws discovered<br />

with WEP, and it was quickly implemented and is based upon the IEEE 802.11i standard<br />

(WPA2 fully implements 802.11i, while WPA implemented most of it). WPA uses an<br />

improved encryption key, making cracking the key significantly more difficult than a<br />

WEP key, and improves data integrity checks lacking in WEP. WPA2 further increases the<br />

strength of the encryption key. WPA and WPA2 offer two modes of use: a Personal mode<br />

and an Enterprise mode. Personal mode works similarly to WEP in that there is a single<br />

preshared encryption key (PSK) used. In Enterprise mode a user must first log into a<br />

RADIUS server that assigns a dynamic key to that user. Not only does this provide excellent<br />

user access control, but by providing a unique key for each user, it provides excellent data<br />

security as well.<br />

802.1X: This is an IEEE standard that is part of the same group as 802.11 (though it is not<br />

directly related). It is a method of authentication often used in conjunction with WPA2<br />

Enterprise mode when authenticating the user to the RADIUS server.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!