A bank employee steals funds from online bank accounts by illegally accessing the wireless network; a consultant illegally enters a company's wireless network, stealing sensitive documents related to the company's war of words; Network leaks. More statistics, as early as 2003, attacks against WLANs accounted for 23% of the total number of Internet attacks in the world, and in June 2004 reached the 03 comprehensive. In recent years, attacks against wireless networks have become more serious. The reason for these incidents is that the wireless security technology is not comprehensive. It was limited to technologies such as MAC address filtering and AP isolation. The defense capability is weak.
Now, not only for individual users, wireless Internet access has become a popular trend. For enterprise users, wireless LANs have also replaced the trend of wired networks, because wireless networks have no substitute advantages over wired networks. First, the bandwidth provided by wireless networks is getting higher and higher. One AP is enough to supply office needs of more than 60 employees. In terms of bandwidth, wireless networks have advantages. Second, wireless access is cheaper. Third, wireless networks. The deployment is more concise, the wired network needs to consider wiring and other issues, and the wireless network is not limited by the office conditions, and is more suitable for application in the enterprise. In addition, with the popularity of unified communications, wireless local area networks can incorporate employees' wireless terminals into the management of unified communications, facilitating communication between enterprises, and bringing great convenience to enterprises.
However, the security of wireless networks has to be taken seriously. For wireless networks, the biggest difficulty in deploying network security is not in network planning and deployment, but how to persuade users to configure the client. The traditional authentication encryption method is to input a user name and password on a webpage, and the operation is simple and easy for the user. For 801.11i, the authentication method is more complicated in configuration. If there are 100 access devices in a company, then users want to use this authentication method, they must be configured separately on these 100 devices. In addition, the higher the level of security authentication, the more information the user needs to configure, which is extremely inconvenient for the user, which is why users tend to use traditional authentication methods. Today, wireless networks are growing faster, but hacker technology is constantly evolving. The technical solutions for each security vulnerability are described below.
Eliminate interference in wireless communicationsSince wireless networks utilize wireless resources in the air, interference is inevitable. Interference includes unwanted interfering signals that affect normal wireless communication operations. In the wireless network of enterprise users, interference may occur between users of the same AP, and users in the same channel may also generate interference. Generally, methods for solving radio frequency interference have three ways of reducing the physical data rate, reducing the transmission power of the affected AP, and changing the AP channel allocation.
The market is currently flooded with a large number of APs that use omnidirectional dipole antennas that transmit and receive signals from all directions. Since these antennas always transmit and receive signals regardless of the environment, in the event of interference, these systems have no alternative but to combat interference. They have to reduce the physical data transfer rate until an acceptable level of packet loss is reached. And with it, all users sharing the AP will experience unbearable performance degradation.
The other is to reduce the transmit power of the AP to better utilize the limited number of channels. This can reduce the number of devices sharing an AP to improve AP performance. However, reducing the transmit power also reduces the strength of the client's received signal, which translates into lower data rates and a smaller range of Wi-Fi coverage, which in turn leads to the formation of coverage holes. These holes must be filled by adding more APs. Adding more APs, you can imagine that it will create more interference.
Most WLAN vendors want users to believe that the best solution to Wi-Fi interference is to "change channels." That is, when the RF interference increases, the AP will automatically select another "clean" channel to use. While changing channels is an effective way to resolve persistent interference at a particular frequency, interference is more prone to constant change and sometimes not. By jumping on a limited channel, the problem is even more than the problem it solves.
These three anti-interference methods cannot fundamentally solve the interference problem in the wireless network. In response to these conditions, the new Wi-Fi technology combines dynamic beamforming technology with a small smart antenna array (so-called "smart Wi-Fi"), making it an ideal solution. Dynamic beamforming technology focuses on Wi-Fi signals and automatically "steers" them around the interference when they are needed, that is, when interference occurs. For example, in the presence of interference, the smart antenna can select a signal mode that attenuates in the direction of interference, thereby increasing the SINR and avoiding the method of reducing the physical data rate.
Xu Wenwen, technical director of Ruckus China, believes that smart antenna arrays will actively reject interference. Since Wi-Fi only allows one user to be served at the same time, these antennas are not used to transmit data to a specific client, but to all clients, so that they can be ignored or rejected. Interference signal transmitted by Fi. Last year, two schools in Birmingham used Ruckus' smart wireless LAN products and technologies. The new smart wireless network system will provide reliable Wi-Fi coverage for all school staff and schools, and support a variety of mobile applications. In particular, the Ruckus ZoneFlex family of products is easy to configure and manage, saving a lot of burden for technicians and users in terms of security. The use of these two schools proves that this new dynamic beamforming technology can effectively prevent interference problems.
Best Smartwatch
Best Smartwatch
everyone enjoys luck , https://www.eeluck.com