首页> 外文期刊>Library technology reports >Wireless Network Configuration and Security Strategies
【24h】

Wireless Network Configuration and Security Strategies

机译:无线网络配置和安全策略

获取原文
获取原文并翻译 | 示例
       

摘要

Now that I've reviewed some of the theoretical issues related to wireless technologies, I'll move on to examine the practical aspects of setting up a wireless network. Wireless access points and the client computers that connect to them must be properly configured to operate on a TCP/IP network. Unless a network has specifically been configured otherwise, wireless clients receive their TCP/IP configuration details through DHCP (see Chapter I, p. 11). It would be extremely inconvenient for a network administrator to manually assign IP addresses to wireless clients' computers every time they roam into an organization's network. Although there may be authentication credentials that need to be manually entered, most wireless users won't need to manually set their IP addresses, default gateways, subnet masks, or any of the other TCP/IP configuration details (see Chapter Ⅰ, "Network Basics"). One prominent exception to this may be networks on which the system administrator needs tight control of each individual device.
机译:现在,我已经回顾了与无线技术有关的一些理论问题,我将继续研究建立无线网络的实际方面。无线访问点和连接到它们的客户端计算机必须正确配置为在TCP / IP网络上运行。除非另外专门配置了网络,否则无线客户端将通过DHCP接收其TCP / IP配置详细信息(请参阅第一章,第11页)。对于网络管理员而言,每次无线客户端漫游到组织网络中时,为其手动分配IP地址将非常不便。尽管可能需要手动输入身份验证凭据,但是大多数无线用户无需手动设置其IP地址,默认网关,子网掩码或任何其他TCP / IP配置详细信息(请参阅第一章,“网络基本”)。一个明显的例外是网络,系统管理员需要在这些网络上严格控制每个单独的设备。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号