SlideShare uma empresa Scribd logo
1 de 4
Definition of 3G:<br />3G is the third generation of wireless technologies. It comes with enhancements over previous wireless technologies, like high-speed transmission, advanced multimedia access and global roaming. 3G is mostly used with mobile phones and handsets as a means to connect the phone to the Internet or other IP networks in order to make voice and video calls, to download and upload data and to surf the net.<br />What is a wireless LAN? <br />On this page:<br />Introduction <br />WLAN types <br />WLAN standards <br />Security standards <br />Introduction<br />A wireless local area network (WLAN) is a local area network (LAN) that doesn't rely on wired Ethernet connections. A WLAN can be either an extension to a current wired network or an alternative to it.<br />WLANs have data transfer speeds ranging from 1 to 54Mbps, with some manufacturers offering proprietary 108Mbps solutions. The 802.11n standard can reach 300 to 600Mbps.<br />Because the wireless signal is broadcast so everybody nearby can share it, several security precautions are necessary to ensure only authorized users can access your WLAN.<br />A WLAN signal can be broadcast to cover an area ranging in size from a small office to a large campus. Most commonly, a WLAN access point provides access within a radius of 65 to 300 feet.<br />WLAN types<br />Private home or small business WLAN<br />Commonly, a home or business WLAN employs one or two access points to broadcast a signal around a 100- to 200-foot radius. You can find equipment for installing a home WLAN in many retail stores.<br />With few exceptions, hardware in this category subscribes to the 802.11a, b, or g standards (also known as Wi-Fi); some home and office WLANs now adhere to the new 802.11n standard. Also, because of security concerns, many home and office WLANs adhere to the Wi-Fi Protected Access 2 (WPA2) standard.<br />Enterprise class WLAN<br />An enterprise class WLAN employs a large number of individual access points to broadcast the signal to a wide area. The access points have more features than home or small office WLAN equipment, such as better security, authentication, remote management, and tools to help integrate with existing networks. These access points have a larger coverage area than home or small office equipment, and are designed to work together to cover a much larger area. This equipment can adhere to the 802.11a, b, g, or n standard, or to security-refining standards, such as 802.1x and WPA2. <br />WLAN standards<br />Several standards for WLAN hardware exist:<br />WLAN standard Pros Cons 802.11a Faster data transfer rates (up to 54Mbps) Supports more simultaneous connections Less susceptible to interferenceShort range (60-100 feet) Less able to penetrate physical barriers812.11b Better at penetrating physical barriers Longest range (70-150 feet) Hardware is usually less expensive Slower data transfer rates (up to 11Mbps) Doesn't support as many simultaneous connections More susceptible to interference 802.11g Faster data transfer rates (up to 54Mbps) Better range than 802.11b (65-120 feet) More susceptible to interference 802.11n The 802.11n standard was recently ratified by the Institute of Electrical and Electronics Engineers (IEEE), as compared to the previous three standards. Though specifications may change, it is expected to allow data transfer rates up to 600Mbps, and may offer larger ranges. <br />Security standards<br />The 802.11x standards provide some basic security, but are becoming less adequate as use of wireless networking spreads. Following are security standards that extend or replace the basic standard:<br />WEP (Wired Equivalent Privacy)<br />WEP encrypts data traffic between the wireless access point and the client computer, but doesn't actually secure either end of the transmission. WEP's encryption level is relatively weak (only 40 to 128 bits). Many analysts consider WEP security to be weak and easy to crack.<br />WPA (Wi-Fi Protected Access)<br />WPA implements higher security and addresses the flaws in WEP, but is intended to be only an intermediate measure until further 802.11i security measures are developed.<br />802.1x<br />This standard is part of a full WPA security standard. WPA consists of a pair of smaller standards that address different aspects of security:<br />TKIP (Temporal Key Integrity Protocol encryption), which encrypts the wireless signal <br />802.1x, which handles the authentication of users to the network <br />Commonly, wireless systems have you log into individual wireless access points or let you access the wireless network, but then keep you from accessing network data until you provide further authentication (e.g., VPN).<br />802.1x makes you authenticate to the wireless network itself, not an individual access point, and not to some other level, such as VPN. This boosts security, because unauthorized traffic can be denied right at the wireless access point.<br />WPA2/802.11i<br />The Wi-Fi Alliances coined the term quot;
WPA2quot;
 for easy use by manufacturers, technicians, and end users. However, the IEEE name of the standard itself is 802.11i. The encryption level is so high that it requires dedicated chips on the hardware to handle it.<br />In practical use, WPA2 devices have interoperability with WPA devices. When not interfacing with older WPA hardware, WPA2 devices will run strictly by the 802.11i specifications.<br />WPA2 consists of a pair of smaller standards that address different aspects of security:<br />WPA2-Personal, which uses a pre-shared key (similar to a single password available to groups of users, instead of a single individual); the pre-shared key is stored on the access point and the end user's computer <br />WPA2-Enterprise, which authenticates users against a centralized authentication service <br />
Definition of 3 g
Definition of 3 g
Definition of 3 g

Mais conteúdo relacionado

Destaque

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 

Destaque (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Definition of 3 g

  • 1. Definition of 3G:<br />3G is the third generation of wireless technologies. It comes with enhancements over previous wireless technologies, like high-speed transmission, advanced multimedia access and global roaming. 3G is mostly used with mobile phones and handsets as a means to connect the phone to the Internet or other IP networks in order to make voice and video calls, to download and upload data and to surf the net.<br />What is a wireless LAN? <br />On this page:<br />Introduction <br />WLAN types <br />WLAN standards <br />Security standards <br />Introduction<br />A wireless local area network (WLAN) is a local area network (LAN) that doesn't rely on wired Ethernet connections. A WLAN can be either an extension to a current wired network or an alternative to it.<br />WLANs have data transfer speeds ranging from 1 to 54Mbps, with some manufacturers offering proprietary 108Mbps solutions. The 802.11n standard can reach 300 to 600Mbps.<br />Because the wireless signal is broadcast so everybody nearby can share it, several security precautions are necessary to ensure only authorized users can access your WLAN.<br />A WLAN signal can be broadcast to cover an area ranging in size from a small office to a large campus. Most commonly, a WLAN access point provides access within a radius of 65 to 300 feet.<br />WLAN types<br />Private home or small business WLAN<br />Commonly, a home or business WLAN employs one or two access points to broadcast a signal around a 100- to 200-foot radius. You can find equipment for installing a home WLAN in many retail stores.<br />With few exceptions, hardware in this category subscribes to the 802.11a, b, or g standards (also known as Wi-Fi); some home and office WLANs now adhere to the new 802.11n standard. Also, because of security concerns, many home and office WLANs adhere to the Wi-Fi Protected Access 2 (WPA2) standard.<br />Enterprise class WLAN<br />An enterprise class WLAN employs a large number of individual access points to broadcast the signal to a wide area. The access points have more features than home or small office WLAN equipment, such as better security, authentication, remote management, and tools to help integrate with existing networks. These access points have a larger coverage area than home or small office equipment, and are designed to work together to cover a much larger area. This equipment can adhere to the 802.11a, b, g, or n standard, or to security-refining standards, such as 802.1x and WPA2. <br />WLAN standards<br />Several standards for WLAN hardware exist:<br />WLAN standard Pros Cons 802.11a Faster data transfer rates (up to 54Mbps) Supports more simultaneous connections Less susceptible to interferenceShort range (60-100 feet) Less able to penetrate physical barriers812.11b Better at penetrating physical barriers Longest range (70-150 feet) Hardware is usually less expensive Slower data transfer rates (up to 11Mbps) Doesn't support as many simultaneous connections More susceptible to interference 802.11g Faster data transfer rates (up to 54Mbps) Better range than 802.11b (65-120 feet) More susceptible to interference 802.11n The 802.11n standard was recently ratified by the Institute of Electrical and Electronics Engineers (IEEE), as compared to the previous three standards. Though specifications may change, it is expected to allow data transfer rates up to 600Mbps, and may offer larger ranges. <br />Security standards<br />The 802.11x standards provide some basic security, but are becoming less adequate as use of wireless networking spreads. Following are security standards that extend or replace the basic standard:<br />WEP (Wired Equivalent Privacy)<br />WEP encrypts data traffic between the wireless access point and the client computer, but doesn't actually secure either end of the transmission. WEP's encryption level is relatively weak (only 40 to 128 bits). Many analysts consider WEP security to be weak and easy to crack.<br />WPA (Wi-Fi Protected Access)<br />WPA implements higher security and addresses the flaws in WEP, but is intended to be only an intermediate measure until further 802.11i security measures are developed.<br />802.1x<br />This standard is part of a full WPA security standard. WPA consists of a pair of smaller standards that address different aspects of security:<br />TKIP (Temporal Key Integrity Protocol encryption), which encrypts the wireless signal <br />802.1x, which handles the authentication of users to the network <br />Commonly, wireless systems have you log into individual wireless access points or let you access the wireless network, but then keep you from accessing network data until you provide further authentication (e.g., VPN).<br />802.1x makes you authenticate to the wireless network itself, not an individual access point, and not to some other level, such as VPN. This boosts security, because unauthorized traffic can be denied right at the wireless access point.<br />WPA2/802.11i<br />The Wi-Fi Alliances coined the term quot; WPA2quot; for easy use by manufacturers, technicians, and end users. However, the IEEE name of the standard itself is 802.11i. The encryption level is so high that it requires dedicated chips on the hardware to handle it.<br />In practical use, WPA2 devices have interoperability with WPA devices. When not interfacing with older WPA hardware, WPA2 devices will run strictly by the 802.11i specifications.<br />WPA2 consists of a pair of smaller standards that address different aspects of security:<br />WPA2-Personal, which uses a pre-shared key (similar to a single password available to groups of users, instead of a single individual); the pre-shared key is stored on the access point and the end user's computer <br />WPA2-Enterprise, which authenticates users against a centralized authentication service <br />