Wireless Network

2013-06-25 21:30

 Wikipedia card called Wi-Fi wireless networks, including both long-range wireless connectivity allows users to create a global voice and data network, including the short-range wireless connection optimized infrared technology and radio frequency technology, the use of the wired network is very similar, the biggest difference is that the different transmission media, the use of radio technology to replace the network cable, and the cable network can back up each other.

directory

networking standard definition of the concept nouns resolve network classifier personal area network MAN network device type Wireless LAN wireless bridge wireless antenna network radiation threat to network security network network network network solutions to solve business network troubleshooting network is protected Future Internet access network products conceptual issues edit this section are defined in the client computer for the wireless network definition: 802.1X authentication: Right-click the notification area wireless network connection icon, and then click "View Available Wireless Network. " For more information, see "Note." In the "Related Tasks", click "Change the order of preferred networks." In the "Preferred networks" under the "Wireless Networks" tab, click where you want to configure 802.1X authenticated wireless network connection, and then click "Properties." In the "Authentication" tab, do any of the following: To enable this connection IEEE 802.1X authentication, select "Enable this network IEEE 802.1X authentication" check box is selected by default this checkbox. To disable this connection IEEE 802.1X authentication, clear the "Enable IEEE802.1x authentication for this network" checkbox. In the "EAP type", click to use for this connection "Extensible Authentication Protocol (EAP)" type. If the "EAP type" select "Smart Card or other certificate", click "Properties" and in the "Smart Card or other Certificate Properties", do the following: To use that resides on a smart card certificate for authentication, Please click "Use my smart card." To use the resident on the computer certificate store for authentication certificate, click "Use a certificate on this computer", and then specify whether to use simple certificate selection. To verify that your computer provides the server certificate is still valid, please select the "Validate server certificate" check box to specify that your computer will automatically connect to one or more servers, and then specify the trusted root certificate authority. To view information about the selected root certification authority detailed information, please click the "View Certificate." When a smart card or certificate as login user name and user domain name is not the same, to use another user name, select "Use this connection a different user name" box. If the "EAP type" select "Protected EAP (PEAP)", click "Properties", then do the following: In the "Select Authentication Method", click to PEAP authentication method used within , and then click "Configure." If you select the "protected password (EAP-MSCHAP v2)", then, in the "EAP MSCHAP v2 Properties" specifies whether to use your Windows login screen, type in the user name for authentication and password (and domain if if applicable), click "OK", and then click "OK." If you select "Smart Card or other certificate", then in the "Smart Card or other Certificate Properties", in accordance with the instructions in step 6 configuration settings as needed, click "OK", and then click "OK." In the "Authentication" tab, do the following: When a user is not logged, you specify the computer attempts to access the network authentication, select the "when computer information is available for the computer authentication" checkbox. By default, this check box will be selected. When the user information or computer information is unavailable, you specify the computer attempts to access the network authentication, select "When a user or computer information is unavailable Authenticate as guest 'checkbox. Important strongly recommended when connecting to an 802.11 wireless network, using 802.1X authentication. 802.1X is an IEEE standard that by providing centralized user identification, authentication, dynamic key management, and accounting support to enhance security and deployment. For more information, see the "Related Topics." To enhance security in Windows XPService Pack 1 and Windows Server 2003 family, will need to use a network key (WEP) access point (infrastructure) networks using 802.1X authentication. WEP by encrypting wireless clients and wireless access points to provide the data sent between data confidentiality. Information about wireless network security for additional information, see the "Related Topics." If you try to connect to a computer network or computer network without the use of an access point network key, then the "Authentication" tab settings will be unavailable, and you can not configure 802.1X authentication for this connection. Performing this task does not require administrative credentials. Therefore, as a security best practice, consider a user without administrative credentials to perform this task identity. tok: wirelessicon when detected may limit or prevent connect to wireless networks such an error, the notification area will display the wireless warning icon. To open Network Connections, clickStart, clickControl Panel, and then double-clickNetwork Connections. To define 802.1X authentication, you must select an existing wireless network connection, or you must add a new wireless network connection. About how to add a new wireless network connection information, see the "Related Topics." [1] Edit this paragraph networking standard common criteria are the following:

 

IEEE802.11a: use the 5GHz band, the transmission speed of 54Mbps, is not compatible with 802.11b IEEE 802.11b: use the 2.4GHz band, the transmission speed of 11Mbps IEEE802.11g: use the 2.4GHz band, the transmission speeds are 54Mbps, 108Mbps, backward compatible with 802.11b IEEE802.11n Draft: Using the 2.4GHz band, the transmission speed of up to 300Mbps, the standard is still in draft, but the product has been endless. Currently the most commonly used IEEE802.11b, IEEE802.11g more but the strength of next-generation standard, 802.11n is rapidly evolving. IEEE802.11b standard to ensure access control and encryption with the two parts, these two parts must be in the wireless LAN to configure each device. Wireless LAN users have hundreds or thousands of companies need a reliable security solution, from a control center for effective management. Lack of centralized control of a wireless LAN security only on a relatively small number of companies and specific applications has been to use the root causes. IEEE802.11b standard defines two mechanisms to provide wireless LAN access control and confidentiality: Service Configuration Identifier (SSID) and Wired Equivalent Privacy (WEP). There is also a transparent encryption mechanism is running on the wireless LAN VPN (VPN) to carry out. SSID, wireless LAN, a feature often used is called the SSID naming numbers, which provides low-level access control. SSID is typically the wireless LAN device network subsystem name; it is used to split the local subsystem. WEP, IEEE802.11b standard specifies a method called Wired Equivalent Privacy (otherwise known as WEP) encryption scheme optional, providing a wireless LAN to ensure that the mechanism of the data stream. WEP using a symmetric scheme, the encryption and decryption of data using the same key and algorithm. Edit this paragraph the term analytic wireless LAN noun resolution. Network can be divided according to area classification LAN, MAN and WAN. Modulation: 11MbpsDSSS physical layer uses complementary code keying (CCK) modulation mode. CCK IEEE802.11DSSS existing program with the same channel, the 2.4GHzISM band interfering with three independent channels, each channel is approximately 25MHz. Therefore, CCK has a multi-channel operating characteristics. PCI slot Wireless LAN (NIC): can do without leaving your computer cables and other computer on the network traffic. Wireless NIC card and other similar, the difference is, it is through radio waves instead of physical cables send and receive data. Wireless NIC in order to expand the scope of their effectiveness need to add an external antenna. PCMCIANIC: same as above-mentioned wireless NIC, but they are suitable for notebook computer's PC Card slot. Similar with the desktop computer, you can use an external antenna to enhance the PCMCIA wireless card. AP Access Point (ACCESSPOINT, also known as wireless LAN transceiver): for wireless networks wireless HUB, is the core of the wireless network. It is a mobile computer users into wired Ethernet backbone access point, AP can be easily installed on the ceiling or wall, it is the largest coverage in open space up to 300 meters, wireless transmission rates up to 11Mbps. Antenna: Wireless LAN antenna can extend wireless network coverage, the different office building connected. In this way, the user can carry the computer in a room in the building or between moving between dynamic rate conversion: When the RF conditions deteriorate, the data transfer rate can be reduced from 11Mbps to 5.5Mbps, 2Mbps, and 1Mbps. Roaming Support: When users move between buildings or when the corporate sector, allowing seamless connection between access points. IEEE802.11 wireless standard allows wireless users in different wireless bridge segment using the same channel or a different channel in each other roaming. Load balancing: When the AP becomes the load is too large or the signal weakens, NIC connected thereto can change the access point AP, automatically switches to the best available AP, in order to improve performance. Spread spectrum technology: a in the 1940s developed modulation techniques, which transmit a wide band radio frequency transmission signal. Including frequency hopping spread spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) two kinds. Frequency hopping spread spectrum is limited to 2Mb / s data transfer rate, and recommended for use in specific applications. For all other wireless LAN services, direct sequence spread spectrum is a better choice. In the IEEE802.11b standard, allowing the use of DSSS Ethernet speeds of up to 11Mb / s. Automatic Rate Selection Function: IEEE802.11 wireless networking standard allows mobile users to set the automatic rate selection (ARS) mode, ARS function depending on the signal quality and distance from the access point and bridge automatically selects the best path for each transmission transfer rate, this function can also be based on user environment settings for different applications into different fixed application rate. Power consumption management features: IEEE802.11 MAC layer also defines a signaling mode, by the power management software control, so that the mobile user to a maximum battery life. Power management will make the network when no data transfer is in sleep (low power or power) state, so that data packets may be lost. To solve this problem, IEEE802.11 provides the AP should have a buffer to store information, the mobile user in the sleep wake up periodically to restore the information. Security features: relying only on direct sequence spread spectrum coding common modulation technique is not reliable enough, such as the use of wireless broadband scanner, its information and easy to be stolen. The latest WLAN standard uses a method Confidential Bytes loaded, making wireless networks with wired Ethernet with the same level of confidentiality. This password encoding technique used earlier confidential U.S. military radio communications, wireless network equipment other end must use the same password encoding can communicate with each other when a wireless access point using the AP must also be connected to a wired network via an AP access point security certification. The technology not only prevents air ****, but also an effective wireless network authentication method for mobile users. CSMA / CD protocol: Wired Ethernet LAN standard protocol at the MAC layer is CSMA / CD, namely Carrier Sense Multiple Access / Collision Detection. However, due to the wireless adapter is not easy to detect the product channel if a conflict exists, therefore IEEE802.11 new definition of a new protocol, namely Carrier Sense Multiple Access / Collision Avoidance (CSMA / CA). On the one hand, the carrier medium is idle listening view; hand, through a random time to wait, so that the signal to minimize the probability of conflict, when the medium was listening to idle, then sent first. Moreover, in order to make the system more stable, IEEE802.11 also provided with ACK of CSMA / CA protocol. Packet re: When sending frames severely disturbed, must be retransmitted. Therefore, if a packet larger consuming retransmissions required greater; Then, if reducing the frame size, the large packet is divided into several small packets, even if the retransmission, it is only a small message retransmission package, consuming relatively smaller. This will greatly improve the wireless network in the area of ​​noise immunity. DHCP Support: Dynamic Host Configuration Protocol (DHCP) automatically from a DHCP server to obtain an IP address lease, allowing notebook users to automatically obtain the network goes down a new IP address in order to continue working, and thus enjoy seamless roaming. Edit this paragraph network classifier personal network wireless personal area network (WPAN) are connected to each other in a small area formed by a number of wireless network device, usually a personal accessible range. Such as Bluetooth headsets and laptops connected, ZigBee also provides a wireless personal area network application platform. Bluetooth is an open, short-range wireless communication technology standard. This technique does not want to become another wireless LAN (WLAN) technology, which is intended for a small range of mobile devices to connect, so essentially it is a cable replacement technology. It can be used within a short distance to replace the current variety of cabling solutions through walls and other obstacles, through a unified short-range wireless link between digital devices in a variety of flexible, secure, low-cost, small power Consumption of voice and data communications. Bluetooth trying to do: to be as safe as cable; reduced and the cost of the same cable; mobile user can connect many devices to form a piconet (piconet); support different interconnection interconnection slightly to form a scatternet; support high rate; support different data types; meet the low-power, compactness requirements in order to embed small mobile devices; Finally, the technology must have a global versatility to facilitate the users roam in every corner of the world. From a professional point of view, Bluetooth is a wireless access technology. From a technical standpoint, Bluetooth is an innovative technology that brings the industry is a vibrant industry, so to say Bluetooth is an industry, it has been the industry as a whole field of mobile communication an important part. Bluetooth is not just a chip, but a network, the near future, posed by the Bluetooth wireless personal area network will be everywhere. It is GPRS and 3G pusher. [2] LAN Wireless LAN (Wireless Regional Area Network, referred WRAN) based on cognitive radio technology, IEEE802.22 WRAN system defines the applicable air interface. WRAN system work in 47MHz ~ 910MHz high frequency / high frequency band TV, because they have a user (such as a TV user) takes up this band, so 802.22 equipment must be detected using the same frequency to avoid interference system. Wireless MAN MAN is to connect several Wireless LAN wireless network type. January 2003, a new wireless metropolitan area network standard IEEE802.16a duly passed. Organization dedicated to the study of this standard is the WiMax Forum - Global Interoperability for Microwave Access (Worldwide Interoperability for Microwave Access) organization. As a non-profit industry group, WiMax by Intel and many other leading communications component and equipment company co-founded. As of the end of January 2004, the number of its members from the previous 28 quickly grew to more than 70, in particular, has attracted AT & T, PCCW and other operators, as well as Siemens Mobile and China ZTE and other communications companies involved. WiMax CEO and Chairman LaBrecque believe that this will be a milestone in the development of the organization. Although the actual commercial process still to be, but from the information published on the WiMax Forum show, WiMax is trying to become the wireless LAN Wi-Fi Alliance has sufficient industry after another influential radio industry alliance. As a key member of WiMax, Intel has been working IEEE 802.16 wireless metropolitan area network chip development. It is reported, Intel is expected to begin selling in the second half of 2004 based on IEEE 802.16d standard chip, the chip will be able to help achieve the terminal equipment and antennas wireless high-speed connection. The WiMax outdoor installation work will also be the first half of 2005, the second half will be WiMax antenna indoor installation. Based on the IEEE 802.16e standard with WiMax chip devices are expected to be available in early 2006. [3] Edit this paragraph in the wireless LAN device type, common device with a wireless network card, wireless bridge, wireless antennas. Wireless network card wireless card is similar to the Ethernet network card, as a wireless LAN interface, and wireless LAN connections. Wireless LAN according to the interface type, mainly divided into three types, namely PCMCIA wireless card, PCI wireless network card and USB wireless card. PCMCIA wireless card only for laptops, hot swappable, can be very easy to achieve mobile wireless access. PCI wireless card for ordinary desktop computers. In fact, PCI wireless network card in the PCI riser card just insert a normal PCMCIA cards. USB interface wireless card for laptops and desktops, hot swappable, if you have a wireless network card external antenna, then, USB interface, is a better choice. Be understood from the role of wireless bridge wireless bridge, it can be used to connect two or more separate network segments, these independent network segments typically located in different buildings, a few hundred meters to several tens of kilometers apart. So it can be widely used in the interconnection between different buildings. Meanwhile, according to protocol, the wireless bridge can be divided into the 2.4GHz band 802.11b or 802.11G and the use of the 5.8GHz band 802.11a wireless bridge. There are three ways of working wireless bridge, point to point, multipoint, repeater connection. Especially suitable for long-distance communication in the city. In the absence of tall obstacles (mountains or buildings) under the conditions of one pair of speed networking and field operations of the temporary network. The reaction distance depends on the environment and the antenna, is 7km point to point microwave interconnect. One pair 27dbi directional antenna can achieve the 10km point to point microwave interconnect. 12dbi directional antenna can achieve 2km point to point microwave interconnection; one pair only to realize the function of wireless bridge link layer is transparent bridge, and with routing and other network layer functions, the network 24dbi directional antenna can be implemented to achieve heterogeneous layer network interconnection device called a wireless router, a bridge can also be used as a third layer. Wireless bridge is usually used outdoors, mainly used to connect two networks using wireless bridge can not just use one, two or more essential, while the AP can be used alone. Wireless bridge power, transmission distance (up to about 50km), anti-interference ability, which does not comes with antenna, generally equipped with a parabolic antenna to achieve long-distance point to point connection. When a computer with wireless antenna wireless AP or other computer far away, with the weakening of the signal, or transmission rate decreased, or simply can not be achieved with the AP or other communications between computers, this time, it must be by means of cellular antennas received or transmitted signal gain (amplification). There are many types of wireless antennas, but common, there are two, one is indoor antenna, the advantage of convenient and flexible, the disadvantage is the gain is small, short transmission distance; One is an outdoor antenna. More types of outdoor antenna A pan-shaped directional antenna, one is omnidirectional antenna rod. The advantage of the outdoor antenna transmission distance. More suitable for long-distance transmission. Edit this paragraph radiation network for the elderly, children, pregnant women against the larger process of using a wireless network, wireless router, wireless AP and other equipment are constantly transmitting a radio wave, high doses of electromagnetic radiation can affect and disrupt the body's bio-electric current original and bio-magnetic field, electromagnetic field makes the body of the original exception occurred. Notably, different people or the same person at different ages of electromagnetic radiation tolerance is not the same, the elderly, children, pregnant women are sensitive to electromagnetic radiation of the crowd, resistance is weak, should be the focus of our protection object. Wi-Fi radiation is very weak radiation depends mainly on the size of transmitted power, China's Radio Management Committee states: wireless LAN products can not be greater than the transmit power of 10mW,2013 Football Boots Soccer Cleats Shoes Nike Mercurial Vapor Superfly IV FG Light Green Black , and the relatively loose standards of other countries, such as: Japan's wireless LAN products maximum transmit power is 100mW, some European and American countries is about 50mW. Products marketed in Europe are generally in line with national standards. Phone power when you can to 1W, the vast majority of the wireless router will transmit power between the 50mW ~ 100 mW, and the wireless network card power is generally below 10mW. Replace high-gain antenna will not increase the radiation wireless networking products on the market, generally 2dBi antenna gain and 3dBi, to extend the wireless signal, some users like to replace high-gain antenna. Since the antenna is a passive device, and the power does not increase, regardless of how much additional gain antenna, which power is transmitted no more than 50mw higher transmit power depends emission hotspots that are wireless router, wireless AP itself, as long as they The power to meet safety standards, you can rest assured replacing high-gain antenna. The mechanism of radiation hazards to human thermal effect: more than 70% of the human body is water, the water molecules by the friction between electromagnetic radiation, causing the body temperature, which affects the internal organs to work properly. Non-thermal effects: the body's organs and tissues weak electromagnetic fields are present, they are stable and orderly, and once by external electromagnetic interference, weak electromagnetic fields in equilibrium impending destruction, the body will suffer damage. Cumulative effects: thermal and non-thermal effects in the human body, the human body has not yet had time to self-repair the damage before (commonly referred to within the body endurance --- resistance), then again by the electromagnetic radiation, the degree of injury accumulation occurs, a long time will become permanent morbid life-threatening. For long-term exposure to electromagnetic radiation group, even if power is very small, very low frequency, may also induce unexpected lesions, should be vigilant. How to avoid damage caused by wireless radiation radiation depends primarily on wireless networks transmitting power from the wireless transmitter closer point where radiation is stronger, so it should be the wireless router, wireless AP placed in some of the places far away from the people, from the Bedrooms should be further away, try to avoid the elderly, children and pregnant women close, prolonged contact with wireless routers and other equipment, the power should be turned off before going to sleep at night. Also note that to avoid too close to wireless audio, television and other electronic equipment to prevent mutual interference produce other radiation. As long as we maintain the far distance, avoid prolonged life in a wireless network environment caused by the cumulative effect, to develop good habits, you should have no problem. Edit this paragraph cyberthreats wireless network security is not a separate issue, companies need to recognize that should deal with the attacker on several fronts, but there are many threats are unique to wireless networks, which include: 1, insertion attacks: Insert attack to deploy non-authorized devices or create a new wireless network, based on this deployment or create a process often do not go through security or safety checks. Access point can be configured to require a password for client access. If there is no password, the intruder can be enabled by a wireless client communicate with the access point to connect to the internal network. However, some access points required for all clients access password even identical. This is very dangerous. 2, roaming attacker: the attacker does not need to be physically located within the building business, they can use a network scanner, such as Netstumbler and other tools. In a moving vehicle with a laptop computer or other mobile devices sniff out wireless networks, this activity is called "wardriving"; walking down the street or through a corporate Web site to perform the same task, this is called "warwalking". 3, fraudulent access point: the so-called rogue access point is a wireless network without the owner's permission or knowledge of the case, or the existence of the access point settings. Some employees may install rogue access points, its purpose is to avoid the company has installed security measures to create hidden wireless network. This secret network, while essentially harmless, but it can construct an unprotected network, and thus acts as an intruder into the corporate network open door. 4, double-sided demons attack: This attack is also sometimes referred to as "wireless phishing", the devil is actually a two-sided network name hidden near the rogue access point. Some blind sided demons waiting trusted user enters the wrong access point, and the individual networks to steal data or attack your computer. 5, theft of network resources: Some users prefer from neighboring wireless networks to access the Internet, even if they have nothing malicious intent, but will take up a lot of network bandwidth, seriously affecting network performance. And more uninvited guests will take advantage of this connection from a company-wide email, or download pirated content, which will produce some legal issues. 6, hijacking wireless communications and surveillance: the same as in the wired network, wireless network hijacking, and monitor network traffic is entirely possible. It includes two cases, one wireless packet analysis, that a skilled attacker similar to a wired network technology to capture wireless communications. There are many tools which can capture the initial part of the connection session, and their data will generally contain the user name and password. Attacker can then use the captured information to falsely claimed that a legitimate user, and hijack user sessions and perform some unauthorized commands. The second case is a broadcast packet monitoring, this monitor dependent on the hub, so rare. Of course, there are other threats, such as a client to the client attacks (including denial of service attacks), interference, attack the encryption system, the wrong configuration, which all belong to the wireless network can be a risk factor. Enterprise wireless network security threats (1) ciphertext has long ceased to be broken frequently Safety: Once upon a time the most reliable wireless communication is a secure way to encrypt data for wireless communication, encryption also many types, from the most basic WEP encryption to WPA encryption. However, these encryption methods are gradually crack, first WEP encryption cracked by hackers in a few minutes; and then in November of foreign researchers will TKIP WPA encryption algorithm in reverse to restore the plaintext. WEP and WPA encryption have been cracked, so that makes wireless communications can only be established through their own or use WPA2 Radius authentication server to improve communications secure. However, not all devices WPA2 support. (2) allows wireless communication wireless data sniffer no privacy: Another lets users is because most do not trust the flexibility of wireless communication, as long as there is a signal that an intruder will be able through professional wireless data wireless sniffer sniff Tools contents of the packet communication, whether encrypted or not encrypted, and can be viewed by means of other means to communicate the specific data content. Like a hidden SSID information, modify the signal transmission band and other methods in the wireless data sniffer tool before to no avail. However, from the root to prevent wireless sniffer but not too realistic, after all, a wide range of signal coverage is a major feature of the wireless network. So let wireless communications wireless data sniffer no privacy is its inherent insecurity of a mainly reflected. (3) modify the MAC address filtering function so useless: Although wireless network applications provide features such as MAC address filtering, many users do use this function to protect the wireless network security, but because MAC addresses can be arbitrarily modified, through the registry properties can be forged or NIC MAC address information. So when the data through wireless sniffer tool to find the MAC address that has access to communication information, it can be illegal invasion of the host's MAC address forgery, so that MAC address filtering useless. Edit this paragraph networking safety tips one using strong passwords. As I pointed out in the text, a password can be strong enough to make brute become impossible situation. Conversely, if the password is strong enough, it is almost sure to make your system is compromised. Tip two non-broadcast service set identifier (SSID). If you can not service set identifier is the name you gave to protect the wireless network, it will cause serious security risks. Configure the wireless router, disable service set identifier broadcasting, although not bring real security, but at least can reduce the threat, because a lot of malicious attacks are the primary way to find those by scanning vulnerable systems. Hidden service set identifier, which may be greatly reduced. Most commercial grade router / firewall devices provide relevant feature set. Tip three adopted effective wireless encryption. Dynamic Wired Equivalent Privacy (WEP) encryption method is not a good effect. Just use the same free tools like aircrack, you can find out in just a few minutes dynamic Wired Equivalent Privacy mode encrypted wireless network vulnerabilities. Wi-Fi Protected Access (WPA) encryption standard is generic, you're probably already using. Of course, if possible, you should choose to use some of the more powerful and effective way. After all, the encryption and decryption of struggle carried out all the time. Tip four possible, using different types of encryption. Do not rely solely on wireless encryption means to ensure the overall security of the wireless network. Different types of encryption at the system level to improve the safety and reliability. For instance, OpenSSH is a good choice, within the same network can provide secure communications systems, even need to go through the Internet is not a problem. Use encryption technology to protect your wireless network all communication data from being stolen is very important, as using SSL encryption technology, like e-commerce site. In fact, if not indeed necessary, try not to replace the encryption. Tip five pairs of medium access control (MAC) address control. Many people will tell you, the media access control (MAC) address restriction does not offer real protection. But, like hidden wireless network service set identifier, restrict media access control (MAC) address of the network access, it can ensure that the network will not be the primary malicious attackers harassment. For the entire system, from expert to novice against various attacks carried out a comprehensive protection to ensure system security is very important impeccable. Tip six in the network does not use the time to turn it off. The adoption of this proposal or not, depending on the network's specific circumstances. If you're not need twenty-four hours seven days a week using the network, it can adopt this measure. After all, the network is down time,Adidas Adipure Cheap Kaka IV TPU FG White Black Blue Soccer Cleats, security is the highest, no one can network connection does not exist. Tip seven off the wireless network interface. If you're using a laptop like mobile terminal, it should be a wireless network interface by default given off. Only really need to connect to a wireless network, time to open the related functions. The rest of the time, turn off the wireless network interface so you will not become a target for malicious attacks. Tip eight pairs of network intruders monitored. For the network security situation, we must maintain full attention. You need to follow the development trend of attacks, malicious tools to understand how to connect to the network, how do can provide better security. You also need to scan and log access attempts, and other related information for analysis, find useful part, and to ensure that the abnormal situation in real time can give timely notice. After all, we all know that time is the most dangerous thing for half of the time. Tip nine to ensure the safety of the core. In the time you leave, make sure your wireless router or connect to the wireless network is using a laptop computer running an effective firewall. Also note that, be sure to turn off unnecessary services, particularly in the Microsoft Windows operating system does not require the service because by default the consequences of their activities may be unexpected. In fact, you have to do is to do everything possible to ensure the safety of the entire system. Tip ten invalid security measures do not waste time on. I often encounter some users do not understand the technical security measures doubt that they were a free consultation about security problems. In general, this advice is not just useless, and often downright harmful. We most often see unwanted advice is similar to the cafe in the public wireless network environment connection time, you should only choose to adopt wireless encrypted connection. Sometimes people tend to understand the proposed half, the result became you should only connect to Wi-Fi Protected Access with mode (WPA) protected wireless network. In fact, the use of encryption public access points does not give you extra security, because, the network will send the application to any terminal to send keys. It is like the door of the house to the lock up, but on the door that says "key under the welcome mat." If you want the wireless network available to everyone, anyone can easily access, encryption is not required. In fact on the wireless network, the encryption is more like a deterrent. Only the use of a particular wireless network, will be in the lower case of convenience, to improve security. Tips eleven change wireless router password. Routing for wireless Internet access is essential to set a password, a strong password to help secure a wireless network, but do not use the original wireless router's default password, the proposed change is more complex to avoid simple passwords being compromised. [4] For a wireless network security, most of the tips can be said is "common sense." But the frightening thing is that "common sense" is so much that can not be given full consideration at the same time. Therefore, you should always move the computer to the wireless network and check to ensure that no miss some important parts, and to ensure that concerns are valid and not unnecessary or even completely ineffective security measures. Edit this paragraph Enterprise Network Solutions Enterprise Network Wireless Network Solutions enterprise information is based on enterprise networks, companies are committed to building a high-speed, secure, reliable, scalable network systems, in order to achieve a high degree of information sharing within the enterprise, transfer , greatly improve work efficiency; external information exchange in order to achieve, but also the establishment of export channels, to achieve and the Internet, you can easily carry on such information. Businesses need information services are higher, and its network should have the following characteristics: · As an enterprise Intranet-based information management application networks and systems, providing a variety of services · corresponding variety of network software and hardware resources can be shared,2013 Football Boots Soccer Cleats Shoes Nike Mercurial Vapor IX TFNike Mercurial Glide III Silver Black Orang, and can quickly and stably transmit a variety of information, provide effective network information management tools · an open, standardized system architecture to facilitate functional expansion and technological upgrading · to work with the outside world WAN connection, provided, enjoy a variety of information services · With a comprehensive network security mechanism. · To the original computer local area networks and application systems connected smoothly, calling all the original computer system. Network Solutions 1) Wi-Fi network using wireless networking technology, by installing AP and PCMCIA wireless card or USB wireless network card, you can play in the company's internal wireless LAN architecture, making the office area, conference room, meeting room, exhibition hall and lounge area can be moved online, to create the conditions for the mobile office. 2) Operational Programme Description · User Isolation mobility of wireless users and uncertainty, the need for isolation between users visits, you must first have the required AP Layer 2 isolation functions. However, the AP has only Layer 2 isolation function can only guarantee connection under the same AP isolation between two wireless users, while the AP connected to different users, but can communicate on a switch, so AP only achieve isolation can not fundamentally solve the problem of isolation between users. To do this, you must connect the AP to switch on a switch port configuration for each VLAN, in order to ensure the AP connected to different isolation between users, while Ocamar AC should also be set on the user isolation state, This allows the use of fundamentally different network access equipment to achieve isolation between users. · Authentication user authentication using WEB DHCP mode, the user open the IE browser, enter a URL, then Ocamar AC user's browser will be redirected to the authentication page, requires the user to provide authentication page user name and password, when a user successfully certification, AC back into the user's browser just typed URL. WEB-based authentication, the user's computer to set simple, users need to install any client software, the user only needs to set the network card automatically obtain an IP address, Ocamar AC users will automatically assign the correct IP; wireless card even if the user set a fixed IP addresses can also use AC Plug and Play feature. After passing authentication, in order to improve safety, Ocamar AC on MAC address, IP address, and the username of the three binding policy implementation. · User permissions and network access control based on business models and user permissions management needs, the need for users to access the local network permissions

network connection

control. For example, employees allow WLAN access local network resources, such as file servers, print servers, MIS, video services, while allowing access to INTERNET; For visiting staff, according to their different status levels, their ability to control access to local network resources . Based on these requirements, Ocamar AC outlet has two Internet for access to the local network so that some do not allow users to directly access the resource INTERNET. Ocamar AC one port (exit 2) and enterprise convergence switches connected for providing to certain users (eg guests) Internet outlet, because these users are not allowed to access the corporate network. And Ocamar AC another port (exit 1) corporate intranet access, so that internal staff through this route to access local network resources and access INTERNET, user rights in order to achieve the control and the control of local network resources. In addition, according to the actual business needs, increase the MAC address binding way that only specified MAC addresses, and through the corresponding user name and password for authentication, can legally access network; or using MAC address authentication, according to different MAC address for the wireless network users to assign different IP addresses, different user-based business strategies and access control; also be based on different Ocamar AC network port, the corresponding switch VLAN assign different segment of the IP address, based on different areas to achieve business strategies and access control. · Wireless network equipment in order to facilitate network administrators to manage the entire wireless network for effective management, Ocamar AC built on a WEB-based management platform that provides wireless access control server (AC) and wireless access point (AP ) management. The management includes the AC AC operation and other configuration parameters, such as health monitoring of each module; wireless access point management includes all specified network scanning AP, AP real-time reporting of all operating states, the AP found illegal police immediately, group Changing the AP group settings such as ESSID, etc., so that all the AP centralized management. · User Management User management is a WEB-based administrator interface, it can be a client program, in which you can add new users, add new user groups, modify user attributes and modify the properties of the user group, in addition, Each user can be allowed to use VPN, the need for MAC address authentication and other content settings. Ocamar AC can also record user access logs, including user name, destination IP address, access times, the user's host IP address, MAC address, VLAN access location and other information. User access log can record a user's online activities throughout the process, easy to trace a malicious user's physical location, network security control. Edit this paragraph network protection techniques to protect wireless networks? 1 using WPA2 encryption - the old security options such as WEP can be cracked instantly without the need for special equipment or skills. Simply use the browser plug-in or a mobile application can be. WPA2 is the latest security algorithms, which implement the entire wireless system, you can make a selection from the configuration screen. 2 over ten characters using a password - even the relatively new encryption scheme, such as WPA2, also be taking a password that automatically capture process. Not necessarily use long and hard to remember passwords, they can use some expressions, such as "makemywirelessnetworksecure" and so replace the original shorter password. Or use more complex passwords, such as "w1f1p4ss". Such passwords more secure.

 

? 3. Do not use the standard SSID - Many wireless routers have built-in default wireless network name, which is what we know as SSID, such as "netgear" or "linksys", Most users do not think you want to change these names. WPA2 encryption will be part of this SSID as a password to use. Do not change it means allowing a hacker using a password query list, and this will no doubt accelerate password cracking process, and even allows them to test the speed of password millions per second. Using a custom SSID is lawless destruction increases the difficulty of the wireless network. 4 in the password, add numbers, special symbols, and uppercase and lowercase letters - complex password increases the number of characters, and this will increase the difficulty of password cracking. For example, if your password contains four bytes, but you only use numbers, it may be a password that is 10 to the fourth power, that is 10000. If you use only lowercase letters, then the password is likely to achieve 36 to the fourth power. This forces the attacker to test a significant amount of code, thereby increasing his decryption time. 5 adjust the wireless signal coverage - modem includes a plurality of antennas and the access point transmit power, so the user can adjust the signal coverage. Some products can let us through the menu options to adjust transmission power. This limits the others can access your wireless signal range, thus avoiding their damage your network. Edit this paragraph troubleshooting wireless networks, especially wireless LAN to our lives has brought great convenience, provides us with a ubiquitous, high-bandwidth network services, but because of the unique nature of the radio channel, the wireless network connection is unstable, greatly affected the quality of service, this article will introduce some common wireless network problems and troubleshooting methods to help users to timely and effectively eliminate these failures. Hybrid wireless networks often dropped Symptom using Linksys WPC54G card and Linksys WRT54G AP build wireless local area network, they use all IEEE802.11g protocol, there are still a few 802.11b network card. When using the WRT54G for 54Mb / s connection often dropped. Failure analysis theory, IEEE802.11g protocol is backward compatible with 802.11b protocol, the use of these two protocols devices can be connected simultaneously to use the IEEE 802.11g protocol AP. However, from a practical experience, as long as there is a network card using the IEEE802.11b protocol, then the entire network connection speed will be reduced to 11Mb / s (IEEE 802.11b protocol transmission speed). Troubleshooting in the mix and IEEE802.11g IEEE802.11b wireless devices, we must make the wireless AP is set to mixed (MIXED) mode, use this mode, you can also compatible with IEEE 802.11b and 802.11g modes. Wireless clients can not receive signals Symptom build wireless LAN, and found that the client can not receive the wireless AP's signal. Failure analysis is causing the failure may include the following: (a) the distance wireless network card wireless AP or wireless router is too far away, over the wireless network coverage in the wireless signal reaches the wireless network card has been very weak, and allows the wireless client can not be properly connected. (2) wireless AP or wireless router is not powered or is not working properly, causing the wireless client can not connect. (3) When a wireless client is farther from the wireless AP, we often use a directional antenna technology to enhance the wireless signal propagation, if the angle of the directional antenna problems, can also cause the wireless client can not properly connected. (4) If the wireless client is not properly set the network IP address, you can not communicate with the wireless AP. (5) For security reasons, the wireless AP or wireless router will filter some of the MAC address, if the NIC's MAC address to be filtered out, then it can not be normal network connection. Troubleshooting can be resolved using the following methods: (1) installing an antenna on the wireless client to enhance reception. If there are many clients are unable to connect to the wireless AP, wireless AP to install in omnidirectional antenna to enhance the transmission capability. (2) by looking at the LED indicator to check the wireless AP or wireless router is working properly, and using a laptop for close tests. (3) If the wireless client to use an antenna, you try to adjust the antenna to the wireless AP or wireless router for direction. (4) for the wireless client to set the correct IP address. (5) Check the wireless AP or wireless router's security settings, the wireless client's MAC address is set to a trusted MAC address. 3 wireless client can normally receive the signal but can not access the wireless network fault phenomenon wireless client shows a wireless signal, but can not access the wireless network fault analysis led to the failure may be caused by: (a) a wireless AP or wireless router IP address has been allocated. When a wireless client set to automatically obtain an IP address, it will because there is no available IP address and can not access the wireless network. (2) wireless network card is not set to the correct IP address. When a user is manually set the IP address, if you set the IP address and the IP address of the wireless AP not in the same network segment, it will not be able to access the wireless network. Troubleshooting can take the following solutions: (1) increase the wireless AP or wireless router's address range. (2) for the wireless card to set the correct IP address, ensure that it and the wireless AP's IP address in the same subnet. 4 wireless networks can communicate internally, but can not communicate with the wireless router connected to Ethernet communication failure phenomenon wireless clients can communicate with a wireless router normally, but can not connect with the wireless router and Ethernet communications. Failure analysis led to the failure may be due to: (1) local area network (LAN) port connection failure. (2) IP address setting is wrong. Troubleshooting can use the following solutions: (1) by looking at the LAN indicator to check the LAN port with an Ethernet connection is correct. Should use a crossover cable to connect the LAN port and an Ethernet hub. (2) Check whether the wireless network and Ethernet IP address in the same segment, only IP addresses within the same host to communicate. Edit this paragraph Wi-Fi network is compared with the wired network. Wireless LAN refers to the use of wireless transmission medium computer networks, combined with the latest computer network technology and wireless communication technology. First, the wireless LAN is an extension of wired LANs. Using wireless technology to transmit and receive data, reducing the user's connection needs. In the wired world, Ethernet has become the mainstream LAN technology, its development is not only the development of parallel wireless LAN standard, and indeed the latter indicates the direction of development. Through the Institute of Electrical and Electronics (IEEE) 802.3 standard definition, Ethernet provides a continuous development of high-speed, widely interoperable and have the characteristics of network standards. This standard continues to evolve to keep pace with the modern LAN data transfer rates and throughput requirements. Ethernet standard was originally only provide 10 Mbits / second (Mbps) data transfer rate, has become available network backbone and bandwidth-intensive applications require 100 Mbits / sec data transfer rate. IEEE 802.3 standard is open, reducing the barriers to market entry and led to a large number of available Ethernet user selected suppliers, products and value point of generation. The most important thing is that they meet the Ethernet standard to interoperability can be achieved, allowing the user to select multiple suppliers of a product, while ensuring that these products can be used together. The first generation of wireless LAN technology is a low-speed (1-2 Mbit / s) proprietary products. Despite these shortcomings, the wireless freedom and flexibility brought by or in the vertical market for these early products occupy a place, such as retail and warehousing industry, these industries use handheld devices for mobile workers, inventory management and data collection. Subsequently, the hospital using wireless technology information will be sent directly to the patient's bedside. With computers in the classroom, schools and universities began installing wireless networks, in order to avoid the cost of wiring and shared Internet access. The head of the wireless providers soon realized that, in order to make this technology widely accepted by the market, the need to establish a similar Ethernet standards. Suppliers in 1991 combined together for the first time and subsequently created a proposal based on their technical standards. June 1997, IEEE published the 802.11 standard for wireless LANs. Just as the 802.3 standard allows data to be transmitted via the same twisted pair and coaxial cable, 802.11WLAN standard allows different media for data transmission. You can use two kinds of media, including infrared and without licensed 2.4 GHz band radio transmission: frequency hopping spread spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS). Spread Spectrum developed during the 1940s a modulation technique in a wide band radio frequency signal propagation. This technique is ideal for data communication, because it is not very sensitive to radio interference, and almost no interference. FHSS limited to 2 Mbit / s data transfer rate, is only recommended in very specific applications, such as certain types of watercraft use. For all other wireless LAN applications, DSSS is a better choice. Published by IEEE 802.11b DSSS Evo providing considerable Ethernet 11 Mb / s data transfer rate. FHSS not support 2 Mbit / sec data transfer rate. Aironet / IEEE multi-level security measures, greatly enhance the safety and reliability of wireless networks, and users can add functionality to achieve a higher number of subsidiary confidentiality, wireless network already has a wired LAN with even higher levels of security features. Compared with wired LAN, wireless LAN with the development of low operating costs, time is short, fast return on investment, easy to expand, by the natural environment, topography and the impact of disasters is small, fast and flexible networking advantages. Can achieve "any person at any time, any place, in any way communicate with anyone," to make up for the deficiencies of the traditional wired LAN. With the IEEE802.11 standards development and implementation of wireless LAN products will be more abundant, the compatibility of different products will be strengthened. Wireless network transmission rate has reached and exceeded 10Mbps, and is still changing fast. In addition to wireless LAN can transmit voice messages, but also smoothly graphics, images, and digital transmission of video and other media. Known to the wired network through the network cable to the various network devices connected together, whether it is a router, switch, or computer, network communications are needed cable and adapter; while wireless networks are significantly different, we can widely used 802.11 standard wireless network via 2.4GHz wireless signals for communication, the use of wireless communications signals, the network access will be even more flexible, as long as the signal can be completed through a wireless LAN network access purposes; while network administrators do not have to worry about the insufficient number of switch or router ports unable to complete the expansion work. Overall SMEs compared to traditional wired networks wireless networks feature is mainly reflected in the following two aspects. (1) Wireless networking is more flexible: Wireless networks use radio signals communications, network access is more flexible, as long as there is a signal that can be connected to a network device anywhere within the enterprise network. Therefore, intranet applications require mobile office wireless networks or instant presentation more obvious advantages. (2) Wi-Fi scale upgrade more convenient: the number of wireless network terminal device access less restrictive compared to an interface corresponds to a wired network, wireless router allows multiple wireless devices simultaneously access to a wireless network, so the corporate network Upgrade scale wireless networks more obvious advantages. Edit this paragraph Future generation technology just launched in the market, the higher technology applications have been developed in the laboratory. Japan's NTT DoCoMo has said, 4G trial network has been deployed to communicate the company's Yokosuka R & D park, the network brings together experimental base stations and mobile terminals, while NTT DoCoMo, Inc. said, 4G communications services will be launched in 2010, the network The download speed can reach 100Mbps, upload speed of 20Mbps. U.S. AT & T's launch of 4G communications network testing, is said to be with the EDGE wireless upload and download via OFDM technology to achieve rapid purpose. AT & T's claim that the United States also needs about five years, this technology can be released; another ten years or so, 4G can really put into commercial stage. Europe's four mobile device manufacturers - Alcatel, Ericsson, Nokia and Siemens formed a Wireless World Research Forum (WWRF), to study the 3G future direction of development. WWRF 4G technology is expected to commence in the 2010 application. This generation communication technologies can be different wireless local area network and communications standards, cell phone signals, radio communications and television broadcasting and satellite communication together, so mobile users can roam arbitrary. In Europe, wireless local loop and digital audio broadcasting for which the Interior (Indoor) applications and the related research and development, test items, including 10Mbps with MPEG video transmission applications, while the fourth generation mobile communication technology is will be available two extension of R & D technology, starting with indoor technology began, and then gradually extended to the outside of the mobile communication network. Ericsson, a senior official said the company in the economic downturn does not reduce fourth-generation wireless communications technology research and development budget, the company's official also said that the company's research and development work has 3-10 years looking, temporary weak demand so that the company will not slow down the speed of research. ITU Radiocommunication has also reached a consensus, mobile communication systems will combine with other systems, by 2010 the number of data transfer rate of 100Mbps. For more advanced 3G systems, ITU IMT-2000 decided simultaneously develop two standard - and sound files to improve data packet transfer rate - by the Japanese NTT DoCoMo and J-Phone companies will be able to use the WCDMA maximum reach 8Mbps download speeds, while CDMA2000 system will reach a rate of 2.4Mbps. ITU said in a statement released to the public while the fourth generation mobile communication bands have not been discussed with the development, but will be based on the principle of high frequency spectrum based, the other will also use technical and related to the microwave frequency band. The fourth generation mobile communication system should have the following basic characteristics: (1) fully focused services: personal communication, information systems, broadcasting and entertainment and other businesses will be combined into a whole, providing a wider range of users than ever before services and applications; the use of the system will be more secure, convenient, and more care for the individual user. (2) ubiquitous mobile access: in 4G systems, mobile access will be to provide voice, high-speed information services, broadcasting and entertainment business, the main access way, people can anytime, anywhere access to the system. (3) a wide range of user devices: the user will use a variety of mobile devices to access to 4G systems. Communication between the device and the person is no longer just simply listen, speak, read, but also through other means to communicate with the user. This will greatly facilitate the people in the use, especially the use of some users with disabilities. (4) autonomous network structure: 4G network system is a fully autonomous, adaptive network, it can automatically manage dynamically change their structure to meet the system requirements change and development. Edit this paragraph access modes depending on the application environment, wireless LAN topology used to connect the main bridge type, the access node connection type, HUB-access and non-central type of four. 1, the bridge connection type. This structure is mainly used for wireless or wired LAN interconnection between. When the two LANs can not be achieved using a wired connection or a wired connection difficulties, you can use the bridge connection type point to point connections. In this structure, the communication between the LAN through the respective wireless bridge to achieve, wireless bridge played a network routing and protocol conversion effect. 2, the access node connection type. This architecture uses a mobile cellular communications network access, communication between the mobile site is the first through the nearest radio station (Access Point: AP) receives the information down, and then will receive information through the cable network passed to the " Mobile Switching Center "and then sent by the mobile switching center to all the wireless receiving station. Then the network anywhere within the coverage area can receive the signal, and roaming traffic. 3, HUB access type. HUB in the wired LAN can be set up using a star network structure. The same can also be formed using a wireless AP Xingxingjiegou wireless LAN, and its working methods and wired star structure is very similar. However, the general requirements in WLAN wireless AP should have a simple network switching. 4, no central structure. This structure works similarly wired peer work. It requires the network between any two sites can directly exchange information. Each site is both a workstation, but also server. Edit this paragraph networking products wireless networking products. OneWireless wireless network 1, versatility - can simultaneously support multiple protocols and applications live a single platform; 2, simplicity - easy to understand, operate and maintain the system; 3, effectiveness - saving and power spectrum can be expanded Network. Key features more than bring the following advantages: 1, applies to the entire plant can be a single wireless infrastructure to minimize the total cost of ownership; 2, a number of simultaneous connections installed industrial protocols (such as HART, OPC, Modbus, etc.); 3. with existing industrial safety products integrate seamlessly; 4, the most reliable network - field-proven to provide maximum uptime; 5, currently the most flexible and scalable factory wireless systems. Linux802.11WLAN WLAN communication system as an alternative to wired LAN choice is generally used in the same building. WLAN uses ISM (Industrial, Scientific, Medical) radio frequency communication. The WLAN 802.11a standard uses the 5 GHz band, supports a maximum speed of 54 Mbps, while the 802.11b and 802.11g standards use the 2.4 GHz band, which support 11 Mbps and 54 Mbps maximum speed. WLAN is similar to wired Ethernet, they are all from the same address pool allocation MAC (Media Access Control) address, and all Ethernet devices appear as a network device in the operating system layer. For example, ARP (Address Resolution Protocol) table is a WLAN MAC address and the Ethernet MAC address filled. However, WLAN and wired Ethernet link layer are very different. For example, the 802.11 standard uses collision avoidance (CSMA / CA) instead of wired Ethernet collision detection (CSMA / CD). Moreover, the Ethernet frame is different, WLAN frame is confirmed. Since the fuzzy boundary between WLAN stations, WLAN link layer has cleared before sending a regional agreement. For security reasons, WLAN the Wired Equivalent Privacy (WEP) encryption mechanism provides the same level of security wired network. The 40-bit WEP or 104-bit key and a random combination of 24-bit initialization vector used to encrypt and decrypt data. WLAN supports two communication modes: Ad Hoc mode is used for small groups between workstations without using an access point short communications, and Infrastructure mode, all traffic must pass the access point. Access point periodically broadcasts a service set identifier (SSID), SSID for a WLAN network and other networks to distinguish. Most available WLAN card is based on Intersil Prism or Lucent Hermes chipset. Compaq, Nokia, Linksys and D-Link cards use Prism chipset, while Lucent Orinoco card and the Apple Airport using the Hermes chipset. Linux WLAN supported by the WLAN API implementation and WLAN device drivers. There are two Linux project defines the general WLAN API, and provides tools to allow the user space application configuration parameters and device drivers from the WLAN access information. Wireless Extensions project for different wireless cards provide a common Linux user space interface. This project tools include iwconfig to configure parameters (eg WLAN driver WEP key and SSID). linux-wlan Wireless Extensions project as part of the project, and also supports a range of space from the user interacts with the WLAN device driver tool. Wireless Extensions-based tools, these tools similar to SNMP (Simple Network Management Protocol) MIB (Management Information Base) The syntax that reflects the IEEE 802.11 specification. Continue to discuss the device drivers, support for popular WLAN card device drivers for Linux include: Orinoco WLAN driver: is part of the Linux kernel source code, support for Hermes based cards and cards based on Intersil Prism. orinoco_cs module provides the PCMCIA and CF card PCMCIA card services necessary to support. linux-wlan project linux-wlan-ng driver: support for multiple Prism chipset based cards. This driver supports linux-wlan API and partial support for Wireless Extensions. Host AP Device Drivers: Prism chipset supports AP mode, you can make the WLAN access point from the host role. Linux Symbol Spectrum Device Drivers: Support Symbol PCMCIA cards. Unlike PCMCIA card, Symbol CF card lacks onboard firmware, it depends on device drivers to download firmware. The driver of a separate version for the CF card. Intel will Symbol PCMCIA card repackaged as Intel PRO / Wireless card and repackaged Socket Communications Symbol CF cards. Atmel USB WLAN driver: using Atmel's chipset supports many USB WLAN devices. Edit this paragraph on the Wi-Fi access issues but not on the network because the sake of convenience, I believe many people often use 3g wireless Internet access, broadband telecommunications with 2-year contract, is not conducive to mobile Internet access, wireless internet, so I chose Or buy Telecom / Unicom 3g wireless network card more and more people. But with wireless internet is not so smooth. Many times there will be Wi-Fi on, but not on the network, and that encounter such a situation how to do it? Following on from the I Love IT Technology Network IT Edit to share with everyone on the wireless network connection, but not on the net a little more experience. For some wireless network users, are generally set a password, and the password is easy to forget, but others may also be cracked, so I love IT Technology Network editor that you can choose to set a password for the complex, such as numbers, letters and special symbols mixed , of course, is to allow the case to set a good password, it is best to save a copy, so as not to forget the password when you can not access issue. When [5] when on but not on the network, it is recommended to check your password is entered correctly, often because the wireless network password is too long or too complex to cause mistake, if you can directly use the copy and paste will be very convenient, but also To check whether the input space and so on.