beautypg.com

Ad-hoc network, Infrastructure network, Security in wireless networks: encryption – Siemens 54 User Manual

Page 7: Wep encryption, Ad-hoc network infrastructure network

background image

5

The Gigaset USB Adapter 54

Gigaset USB Adapter 54 / englisch / A31008-M1071-R101-1-7619 / introduction.fm / 22.11.2006

Ad-hoc network

In an ad-hoc network, PCs communicate with each other via wireless peer-to-peer
connections. An ad-hoc network is set up by participants as and when required. All
participating PCs must have a wireless network adapter installed, e. g. a Gigaset USB
Adapter 54, a Gigaset PC Card 54 or a Gigaset USB Stick 54. Ad-hoc networks are used
wherever communication networks have to be set up quickly without any existing
network infrastructure and the participants are mobile.

Infrastructure network

In an infrastructure network, connections between network participants are set up via
an access point (or several access points). The access point provides the basis for the
wireless network. It controls the connections between the participants and can also
establish the connection from the mobile stations of a wireless network to a wired LAN
(Ethernet) or the Internet.
Roaming
Several access points can be installed to extend the range of a wireless network.
Participants in the wireless network can move freely between the various access points
without losing contact to the network. As soon as there is a risk of losing contact, the
PC automatically looks for another access point with a stronger signal. All access points
and wireless network adapters must have the same SSID. All access points must be
connected to the same Ethernet network.

Security in wireless networks: Encryption

Any network, be it wired or wireless, is exposed to the risk of eavesdropping.
Connecting your local network to the public network exposes your data and
applications to not inconsiderable risks. As with an individual connection, you should
always protect your network PCs against external attacks, e. g. attacks via emails, with
a virus scanner.
These virus scanners however do not provide any protection against unauthorised
access from outside (hackers). To counter this risk, Gigaset data products offer various
encryption procedures that largely rule out unauthorised access (hacking) to your
wireless network.

WEP encryption

WEP encryption (Wired Equivalent Privacy) encodes data for sending using a key that
you have defined. Once they reach the recipient, who uses the same key, the data are
restored to the state before you sent them. Recipients who do not know this key cannot
read the content of this data stream or only after a great deal of effort.
There are two security levels for calculating the encryption key:

u

64-bit mode

u

128-bit mode