War chalking is deliberately searching for wi-fi signals while driving by in a vehicle.

Successfully reported this slideshow.

Your SlideShare is downloading. ×

More Related Content

  1. 1. Because learning changes everything.® CHAPTER SEVEN © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
  2. 2. © McGraw Hill LLC CHAPTER SEVEN OVERVIEW SECTION 7.1 – CONNECTIVITY: THE WIRELESS WORLD. • Overview of a Connected World. • Wireless Networks. • Wireless Network Categories. • Protecting Wireless Networks. SECTION 7.2 – MOBILITY: THE BUSINESS VALUE OF A WIRELESS WORLD. • Mobile Enterprise Management. • Business Applications of Wireless Technologies. 2
  3. 3. © McGraw Hill LLC SECTION 7.1: CONNECTIVITY: THE WIRELESS WORLD 3
  4. 4. © McGraw Hill LLC LEARNING OUTCOMES 1 1. Understand wireless networks along with their benefits 2. Describe the different wireless network categories 3. Identify the security challenges of wireless networks 4
  5. 5. © McGraw Hill LLC UNDERSTANDING THE CONNECTED WORLD 1 • Local area network (LAN) - Connects a group of computers in close proximity, such as in an office building, school, or home. • Wide area network (WAN) - Spans a large geographic area such as a state, province, or country. • Metropolitan area network (MAN) - A large computer network usually spanning a city. Access the text alternative for slide images. 5
  6. 6. © McGraw Hill LLC UNDERSTANDING THE CONNECTED WORLD 2 • Mobile - Means the technology can travel with the user. For instance, users can download software, email messages, and web pages onto a laptop or other mobile device for portable reading or reference. • Mobile business - The ability to purchase goods and services through a wireless Internet- enabled device. • Wireless - Refers to any type of operation accomplished without the use of a hard-wired connection. 6
  7. 7. © McGraw Hill LLC UNDERSTANDING THE CONNECTED WORLD 3 • Wireless fidelity (Wi-Fi) - A means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves. • Wi-Fi infrastructure - Includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal. 7
  8. 8. © McGraw Hill LLC MEASURING WIRELESS NETWORK PERFORMANCE 1 • Bandwidth - The maximum amount of data that can pass from one point to another in a unit of time. • Bit - The smallest element of data and has a value of either 0 or 1. • Bit rate - The number of bits transferred or received per unit of time. 8
  9. 9. © McGraw Hill LLC MEASURING WIRELESS NETWORK PERFORMANCE 2 Bandwidth Abbreviation Bits per Second (bps) Example Kilobit Kb 1 Kbps = 1,000 bps Traditional modem = 56 Kbps Megabit Mb 1 Mbps = 1,000 Kbps Traditional Ethernet = 10 Mbps Fast Ethernet = 100 Mbps Gigabit Gb 1 Gbps = 1,000 Mbps Gigabit Ethernet = 1,000 Mbps 9
  10. 10. © McGraw Hill LLC WIRELESS NETWORK BENEFITS Access the text alternative for slide images. 10
  11. 11. © McGraw Hill LLC WIRELESS NETWORK CATEGORIES • Wireless Network Types. Access the text alternative for slide images. 11
  12. 12. © McGraw Hill LLC PERSONAL AREA NETWORK • Personal area networks (PAN) - Provide communication over a short distance that is intended for use with devices that are owned and operated by a single user. • Bluetooth - Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices. 12
  13. 13. © McGraw Hill LLC WIRELESS LAN 1 • Wireless LAN (WLAN) - A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet. Access the text alternative for slide images. 13
  14. 14. © McGraw Hill LLC WIRELESS LAN 2 • Access point – The computer or network device that serves an as interface between devices and the network. • Wireless access point – Enables devices to connect to a wireless network to communicate with each other. • Multiple-in/multiple-out technology – Multiple transmitters and receivers allowing them to send and receive greater amounts of data than traditional networking devices. 14
  15. 15. © McGraw Hill LLC WIRELESS MAN • Wireless MAN (WMAN) - A metropolitan area network that uses radio signals to transmit and receive data. • Worldwide Interoperability for Microwave Access (WiMAX) - A communications technology aimed at providing high-speed wireless data over metropolitan area networks. Access the text alternative for slide images. 15
  16. 16. © McGraw Hill LLC WIRELESS WAN – CELLULAR COMMUNICATION SYSTEM 1 • Wireless WAN (WWAN) - A wide area network that uses radio signals to transmit and receive data. Access the text alternative for slide images. 16
  17. 17. © McGraw Hill LLC WIRELESS WAN – CELLULAR COMMUNICATION SYSTEM 2 • Streaming - A method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred. • Streaming data - Data that is generated continuously by thousands of data sources, which typically send in the data records simultaneously, and in small sizes (order of kilobytes). 17
  18. 18. © McGraw Hill LLC WIRELESS WAN – CELLULAR COMMUNICATION SYSTEM 3 • Smart phone - Offer more advanced computing ability and connectivity than basic cell phones. • 5G - The fifth-generation wireless broadband technology that will greatly increase the speed and responsiveness of wireless networks. Access the text alternative for slide images. 18
  19. 19. © McGraw Hill LLC 5G NETWORKS: DISTRIBUTION IN CELLULAR NETWORKS • 5G - The fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks. 19
  20. 20. © McGraw Hill LLC 5G AND WI-FI 6 1 Access the text alternative for slide images. 20
  21. 21. © McGraw Hill LLC 5G AND WI-FI 6 2 • Wi-Fi 6 - The next generation of Wi-Fi expected to operate at 9.6 Gbps. 21
  22. 22. © McGraw Hill LLC WIRELESS WAN – SATELLITE COMMUNICATION SYSTEM • Satellite - A space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area. Access the text alternative for slide images. 22
  23. 23. © McGraw Hill LLC PROTECTING WIRELESS NETWORKS • Actor - An entity that is capable of participating in an action or a network. • Bad actor - An entity that is participating with ill intentions. 23
  24. 24. © McGraw Hill LLC PROTECTING WIRELESS CONNECTIONS Wired equivalent privacy (WEP) - An encryption algorithm designed to protect wireless transmission data. Wi-Fi protected access (WPA) - A wireless security protocol to protect Wi-Fi networks. • War chalking - The practice of tagging pavement with codes displaying where Wi-Fi access is available. • War driving - Deliberately searching for Wi-Fi signals while driving by in a vehicle. 24
  25. 25. © McGraw Hill LLC SECURITY • SSL Certificate - An electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company. • Secure hypertext transfer protocol (SHTTP or HTTPS) - A combination of HTTP and SSL to provide encryption and secure identification of an Internet server. 25
  26. 26. © McGraw Hill LLC SECTION 7.2: MOBILITY: THE BUSINESS VALUE OF A WIRELESS WORLD 26
  27. 27. © McGraw Hill LLC LEARNING OUTCOMES 2 4. Explain mobile enterprise management and its importance to a business 5. Explain the three primary business applications of wireless technology 27
  28. 28. © McGraw Hill LLC MOBILE ENTERPRISE MANAGEMENT 1 • IT consumerization - The blending of personal and business use of technology devices and applications. • Pervasive computing - The growing trend of embedding computer capabilities into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user‘s need to interact with computers as computers. 28
  29. 29. © McGraw Hill LLC MOBILE ENTERPRISE MANAGEMENT 2 • Enterprise mobility management (EMM) - An enterprise wide security strategy to enforce corporate epolicies while enabling employee use of mobile devices such as smart phones and tablets. 29
  30. 30. © McGraw Hill LLC MOBILE DEVICE MANAGEMENT Mobile device management (MDM) - A security strategy comprised of products and services that offer remote support for mobile devices, such as smart phones, laptops, and tablets. Three MDM Policies • Bring Your Own Device. • Choose Your Own Device. • Company-Issued, Personally- Enabled. Access the text alternative for slide images. 30
  31. 31. © McGraw Hill LLC MOBILE APPLICATION MANAGEMENT • Mobile application management (MAM) - A security strategy that administers and enforces corporate epolicies for applications on mobile devices. • Mobile application development - The set of processes and procedures involved in writing software for use on wireless devices. 31
  32. 32. © McGraw Hill LLC MOBILE INFORMATION MANAGEMENT 1 • Mobile information management (MIM) -A security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it. • Fast data - The application of big data analytics to smaller data sets in near real or real time in order to solve a problem or create business value. 32
  33. 33. © McGraw Hill LLC MOBILE INFORMATION MANAGEMENT 2 • There are three key security considerations to keep in mind as you enter the wireless world: 1. Start with the right equipment 2. Make security an ongoing process, not a one-time event 3. Understand that not all threats are purposeful 33
  34. 34. © McGraw Hill LLC BUSINESS APPLICATIONS OF WIRELESS TECHNOLOGIES 1 • Digital divide - A worldwide gap giving advantage to those with access to technology. 34
  35. 35. © McGraw Hill LLC BUSINESS APPLICATIONS OF WIRELESS TECHNOLOGIES 2 • Areas experiencing tremendous growth using wireless technologies include. Access the text alternative for slide images. 35
  36. 36. © McGraw Hill LLC RADIO FREQUENCY IDENTIFICATION (RFID) • Radio frequency identification (RFID) - Uses electronic tags and labels to identify objects wirelessly over short distances. • RFID tag - An electronic identification device that is made up of a chip and antenna. • RFID reader (RFID interrogator) - A transmitter/receiver that reads the contents of RFID tags in the area. Access the text alternative for slide images. 36
  37. 37. © McGraw Hill LLC GLOBAL POSITIONING SYSTEM 1 • Global positioning system (GPS) - A satellite- based navigation system providing extremely accurate position, time, and speed information. • Automatic vehicle location (AVL) – Uses GPS tracking to track vehicles. • Geocache - A GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find. • Geocoin - A round coin-sized object, is uniquely numbered and hidden in geocache. 37
  38. 38. © McGraw Hill LLC GLOBAL POSITIONING SYSTEM 2 • Estimated time of arrival (ETA) - The time of day of an expected arrival at a certain destination. • Estimated time en route (ETE) - The time remaining before reaching a destination using the present speed. 38
  39. 39. © McGraw Hill LLC GEOGRAPHIC INFORMATION SYSTEMS (GIS) • Geographic information system (GIS) - Consists of hardware, software, and data that provide location information for display on a multidimensional map. • Cartography - The science and art of making an illustrated map or chart. • GIS map automation - Links business assets to a centralized system where they can be tracked and monitored over time. 39
  40. 40. © McGraw Hill LLC GEOGRAPHIC INFORMATION SYSTEMS • Spatial data - Identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. • Geocoding - Spatial databases is a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category). • Location based services (LBS) - Applications that use location information to provide a service. 40
  41. 41. © McGraw Hill LLC LEARNING OUTCOME REVIEW • Now that you have finished the chapter, please review the learning outcomes in your text. 41
  42. 42. Because learning changes everything.® www.mheducation.com © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.

What is the difference between war driving and war chalking quizlet?

War driving is the hobby of popping in a car and cruising around with a Wi-Fi-equipped laptop looking for open Wi-Fi nodes. War chalking is the act of using specific chalk markings, usually on a sidewalk, to identify Wi-Fi hotspots.

What allows mobile voice calls to be made over broadband networks creating under the right network conditions clearer audio and fewer dropped calls?

VoLTE allows mobile voice calls to be made over broadband networks, creating – under the right network conditions – clearer audio and fewer dropped calls. One easy way to think of VoLTE is that it is essentially a VoIP call on your mobile phone.

Which network uses radio signals to transmit and receive data over distances of a few hundred feet?

Wi-Fi is a networking technology that uses radio waves to allow high-speed data transfer over short distances.

What is an encryption algorithm designed to protect wireless transmission data?

Wi-Fi Alliance developed WEP -- the first encryption algorithm for the 802.11 standard -- with one main goal: prevent hackers from snooping on wireless data as it was transmitted between clients and APs.

Toplist

Neuester Beitrag

Stichworte