This document discusses wireless multimedia (WMM) and provides an overview of key concepts:
- WMM allows for the transfer of multimedia content like text, pictures, video, and sound between devices without wires using radio waves.
- It compares Bluetooth and Wi-Fi, noting they both use radio frequencies but Wi-Fi has greater range and speed while Bluetooth has lower costs.
- Advantages of wireless include convenience, mobility, and productivity while disadvantages include potential security issues, slower speeds, reliability concerns, and limited range.
The document then details common wireless security protocols like WEP, WPA, and WPA2 and how they work to encrypt data transmission between devices connected over wireless networks.
6. ? Wireless communication is the
transfer of information between two
or more points that are not
connected by an electrical
conductor and doesn't has a cables
between them.
? The wireless technologies use radio
waves to transfer the data.
7. What is the difference between
Bluetooth and Wireless?
? Both Wi-Fi and Bluetooth are
wireless technologies that transmit
data by using radio frequency (RF)
signal, but the main differences
between these two are range, speed,
and cost
13. WEP
The original encryption protocol
developed for wireless networks. As
its name implies, WEP was designed
to provide the same level of security as
wired networks. However, WEP has
many well-known security flaws, is
difficult to configure, and is easily
broken.
14. WPA
Introduced as an interim security enhancement
over WEP while the 802.11i wireless security
standard was being developed. Most current
WPA implementations use a preshared key
(PSK), commonly referred to as WPA Personal,
and the Temporal Key Integrity Protocol
(TKIP, pronounced tee-kip) for encryption.
WPA Enterprise uses an authentication server to
generate keys or certificates.
15. WPA 2
Based on the 802.11i wireless security standard,
which was finalized in 2004. The most
significant enhancement to WPA2 over WPA is
the use of the Advanced Encryption Standard
(AES) for encryption. The security provided by
AES is sufficient (and approved) for use by the
U.S. government to encrypt information
classified as top secret ¡ª it¡¯s probably good
enough to protect your secrets as well!
25. Now what is wireless
multimedia?
It¡¯s a process use wireless method to
transfer multimedia data
(text ¨C picture -video ¨C sound)
from point to another point.