Intel 2011B Identifying a Wlan, Identifying Devices on a Wlan, Wireless Security, Radio Basics

Models: 2011B

1 26
Download 26 pages 51.69 Kb
Page 8
Image 8

Chapter 1. Introduction to wireless networking

1.3Identifying a WLAN

All the devices on a WLAN use a Network Name, or Service Set Identifier (SSID) to identify the WLAN. In peer-to-peer mode, an Independent Basic Service Set Identifier (IBSSID) identifies a WLAN. In infrastructure mode, an Extended Service Set Identifier (ESSID) identifies a WLAN. This guide uses SSID as a general term for both ESSID and IBSSID. All the devices on a WLAN must use the same SSID to communicate with other wireless devices. When installing an access point or wireless device in a wireless client, the software asks you to specify an SSID.

1.4Identifying Devices on a WLAN

A Basic Service Set Identifier (BSSID) uniquely defines each wireless device. The BSSID is the Ethernet Media Access Control (MAC) address of the wireless device installed in the wireless client. The MAC address is permanently set when the device is manufactured. MAC addresses determine the device sending or receiving data. A MAC address is a 48-bit number written as six hexadecimal bytes separated by colons. For example:

00:A0:F8:24:9A:C8

To view the MAC address of an Intel® PRO/Wireless 2011B LAN USB device, see the label on the back of the device.

1.5Wireless Security

Wireless networking devices transmit information through the air. Without implementing security, it is easy for an unauthorized person to intercept the information.

A common way of implementing security and protecting information is encryption. Before sending information, the wireless client or access point encrypts or scrambles information using an encryption key. The device receiving the information uses the same key to decrypt or unscramble the information. The information is only readable to wireless devices that have the correct encryption key.

The IEEE 802.11 wireless LAN standard specifies the Wired Equivalent Privacy (WEP) encryption and decryption algorithm. The standard includes two levels of security, using a 40-bit key or a 128- bit key. To implement WEP, use either one of these methods. For better security, use a 128-bit key. A 128-bit key has several trillion times as many possible combinations as a 40-bit key. For added security, change your keys often. Some vendors refer to 40-bit encryption as 64-bit. These are identical. A wireless device that claims to have 40-bit encryption interoperates with a device that claims to have 64-bit encryption.

The same device, host computer or front-end processor usually performs both encryption and decryption. The algorithm, like the pattern of a lock, is standardized and may be used by anyone, but the encrypted data is unreadable without the appropriate key, which is known only by the sender and receiver of the transmitted data. You should change your keys often for added security.

1.6Radio Basics

IEEE 802.11 networking devices transmit and receive radio signals. Users communicate with the network by establishing radio links between mobile devices and access points, or between each other.

2

Intel® PRO/Wireless 2011B LAN USB Device Users Guide

Page 8
Image 8
Intel 2011B manual Identifying a Wlan, Identifying Devices on a Wlan, Wireless Security, Radio Basics

2011B specifications

The Intel 2011B socket, also known as LGA 2011B, represents a significant advancement in Intel's line of high-performance processing technology. Primarily designed for server and workstation applications, the 2011B socket provides robust support for Intel's Xeon E5 processors, which deliver exceptional performance for data-intensive tasks.

One of the main features of the 2011B socket is its ability to support multiple processor configurations. This flexibility allows for dual-socket setups, enabling systems to house two processors simultaneously. This capability is essential for applications requiring extensive parallel processing, such as scientific simulations, financial modeling, and high-performance computing.

In terms of memory support, the 2011B socket supports DDR3 memory technology, allowing for efficient data transfer rates and improved overall system performance. The socket can accommodate quad-channel memory architecture, which further enhances memory bandwidth, making it ideal for multi-threaded applications. System architects can leverage this feature to create configurations with higher capacity memory modules, providing an even bigger boost to performance.

Furthermore, Intel's 2011B socket is equipped with support for advanced technologies, including Intel Turbo Boost Technology and Intel Hyper-Threading Technology. Turbo Boost allows processors to dynamically increase their clock speeds when under load, delivering extra performance when it's most needed. Hyper-Threading enables the simultaneous execution of multiple threads per core, effectively doubling the number of threads available to applications, which further increases throughput.

Another notable characteristic of the 2011B platform is its extensive I/O capabilities. The socket supports multiple PCIe lanes, allowing for high-speed connectivity with a variety of peripherals, including graphics cards, storage solutions, and networking devices. This versatility makes the 2011B socket an excellent choice for building modern server and workstation solutions.

Additionally, the Intel 2011B socket is designed with power efficiency in mind, offering features such as Intel Energy Efficient technologies. These improvements enable lower overall power consumption, which can significantly reduce operational costs in large data centers.

In summary, the Intel 2011B socket is a crucial component in the Intel ecosystem, enabling enterprises to harness the power of Xeon E5 processors while providing advanced features for memory, I/O, and processing capabilities. Its versatility and efficiency make it an attractive option for demanding workstation and server applications.