1. Trang chủ
  2. » Công Nghệ Thông Tin

OReilly windows XP unwired aug 2003 ISBN 0596005369

416 70 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 416
Dung lượng 7,06 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Bluetooth SD card 6.2.5 Bluetooth Access Points Besides 802.11 wireless access points, Bluetooth access pointsare also becoming common.. Figure 6-8 shows the BluetakeBT300 Bluetooth Acce

Trang 1

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [L] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 2

Like the book? Buy it!

Trang 3

[SYMBOL] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 4

[ SYMBOL ] [A] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 6

[ SYMBOL ] [ A ] [B] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 7

BSS (Basic Service Set)

Building Wireless Community Networks

bypassing proxy servers

[ Team LiB ]

Trang 8

[ SYMBOL ] [ A ] [ B ] [C] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 10

[ SYMBOL ] [ A ] [ B ] [ C ] [D] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 12

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [E] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 13

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [F] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 14

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [G] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 15

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [H] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 16

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [I] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 17

IP routing

IP subnet addressing

iPaq series of Pocket PCs

ipconfig command 2nd 3rd 4th 5th finding MAC addresses

Trang 18

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [J] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

joining the network

Jones, Matt

[ Team LiB ]

Trang 19

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [K] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 20

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [M] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 21

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [N] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 22

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [O] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 23

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [P] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 24

port-based authentication mechanism [See 802.1X standard] ports

Trang 25

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [Q] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

QFE (Quick Fix Engineering) 313183 patch

[ Team LiB ]

Trang 26

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [R] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 27

[ Team LiB ]

Trang 28

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [S] [ T ] [ U ] [ V ] [ W ] [ X ]

Trang 30

Synchronization Profile

[ Team LiB ]

Trang 31

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [T] [ U ] [ V ] [ W ] [ X ]

Trang 32

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [U] [ V ] [ W ] [ X ]

Trang 33

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [V] [ W ] [ X ]

Trang 34

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [W] [ X ]

Trang 36

WPA2 standard (802.11i)

[ Team LiB ]

Trang 37

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [X]

XScale PX250 processor (Intel)

[ Team LiB ]

Trang 38

Imagine you are out of the office and need to access a printer

or file server on the office network Unless you dial in to thecompany's server, it is not possible for you to access the

resources in the office Moreover, using a dial-up line is not acheap alternative (despite the slow speed), especially if you areoverseas

A Virtual Private Network (VPN) allows you to establish a

secure, encrypted connection to the office's network, all

through a public network such as the Internet Using a VPN,you can work as though you are connected to your company'snetwork

There are two main types of VPN:

User-to-Network

This type allows a client to use a VPN to connect to a securenetwork, such as a corporate intranet

Network-to-Network

This type connects two networks via a VPN connection Thiseffectively combines two disparate networks into one,

eliminating the need for a Wide Area Network (WAN)

4.2.1 Tunneling

Tunneling is the process of encapsulating packets within other

Trang 39

packet forwarding, and masking of IP private addresses Figure4-1 shows a tunnel established between two computers throughthe Internet Think of a tunnel as a private link between the twocomputers: whatever one sends to another is only visible to theother, even though it is sent through a public network like theInternet

Point-to-Point Tunneling Protocol (PPTP)

This was designed by Microsoft (and other companies) tocreate a secure tunnel between two computers PPTP

provides authentication and encryption services, and

encapsulates PPP packets within IP packets It supports

multiple Microsoft networking protocols such as LAN to LANand dial-up connections However, it is proprietary and the

Trang 40

Layer 2 Tunneling Protocol (L2TP)

This works like PPTP, except that it does not include

encryption L2TP was proposed by Cisco Systems, and likePPTP, supports multiple networking protocols

In the following sections, I illustrate how to set up a VPN host

as well as a client using two Windows XP Professional systems

4.2.2.1 On the host computer

Trang 42

Figure 4-4 Granting access rights to users

The next window allows you to install additional networkingsoftware for this connection (see Figure 4-5) Click on Next to

go to the next screen

Trang 43

Figure 4-6 Selecting the network connection type

Trang 44

Figure 4-7 Selecting the network connection

Enter a name for the VPN connection (see Figure 4-8) ClickNext

Figure 4-8 Giving your VPN connection a name

Trang 46

desktop" checkbox Click Finish

That's it! When the process is completed, an icon is shown onthe desktop (see Figure 4-11)

Figure 4-11 The icon for the VPN connection

To connect to the VPN server, double-click on the icon and log inwith your username information (see Figure 4-12) You can nowwork as though you are working on a computer in your office:most (if not all) of your network resources, such as file and

print servers, will be accessible

Resist the temptation to check the box titled "Save this user name and password for the following users" (see Figure 4-12 ) If you enable this, your password will be saved on your computer; if your computer is stolen or compromised, an attacker will be able to connect to the VPN and access everything it protects.

Trang 47

One common error that you might encounter has to do with setting a proxy server in Internet Explorer For example, my ISP does not require

me to use a proxy server when surfing the Web But when I connected

to the VPN server in my workplace, I was suddenly unable to connect to the Web As it turns out, my company requires me to use a proxy

server to connect to the Web With the proxy server configured in IE (Tools Internet Options Connections Connection Name Settings), I am now able to connect to the Web (see Figure 4-13 ).

Figure 4-13 Setting a proxy server for a VPN

connection

Trang 49

Most wireless routers support a feature known as "IPSec and PPTP pass

through." What does it do?

IPSec and PPTP are security protocols that provide authentication and encryption over the Internet The "pass through" feature of the wireless router allows

secure packets to flow through the router, but the router itself does not perform any authentication and encryption operation.

IPSec works in two modes: transport and tunnel Transport mode secures IP packets from source to destination, whereas tunnel mode puts an IP packet into another packet that is sent to the tunnel's endpoint Only tunnel mode (ESP) IPSec can be passed through.

Trang 50

Just a year ago, Bluetooth devices were a rare species It wasdifficult to find Bluetooth add-ons, not to mention Bluetooth-enabled devices Today, you can find Bluetooth adapters of allshapes and sizes, and with different kinds of interfaces for thevarious devices Bluetooth adapters come in the following types

Trang 51

The easiest way to add Bluetooth capability to your system is toinsert a USB Bluetooth adapter into your USB port Today, USBBluetooth adapters come in all shapes and sizes For as little as

$40 you can a get Class 2/3 Bluetooth adapter For slightly

more, you can get a Class 1 adapter that extends the effectivecommunication radius Figure 6-4 shows the Billionton USB

Trang 52

Figure 6-6 A PCMCIA Bluetooth card

Trang 53

Toshiba seems to be the only vendor producing the Bluetooth

SD (Secure Digital) card (the one used by Palm devices aremanufactured by Toshiba) Figure 6-7 shows the Toshiba

Bluetooth SD card

Figure 6-7 Bluetooth SD card

6.2.5 Bluetooth Access Points

Besides 802.11 wireless access points, Bluetooth access pointsare also becoming common Figure 6-8 shows the BluetakeBT300 Bluetooth Access Point (AP), which is Bluetooth 1.1

compliant and supports an operating range of 100 meters (300feet) The AP comes with two interfaces: RS232 (standard PCserial adapter) and a 10/100 Base-T Ethernet port It supportsthe Bluetooth LAN Access profile (more on this later), operates

at a maximum data rate of 1 Mbps, and supports up to sevensimultaneous users I look at how to use a Bluetooth accesspoint for network access later, in Section 6.6.1

Figure 6-8 The Bluetake BT300 Bluetooth Access

Trang 54

6.2.6 Personal Digital Assistants

One of the earliest PDAs to support Bluetooth is HP's (formerlyCompaq) iPaq series of Pocket PCs Starting from the iPaq 3800series, HP has been building Pocket PCs with the Bluetooth

capability built in Palm has since also built devices that comewith the Bluetooth capability built in The Palm Tungsten T isone such model Figure 6-9 shows the Palm Tungsten T

Figure 6-9 The Palm Tungsten T

6.2.7 Cell Phones

Trang 55

Figure 6-10 The Sony Ericsson T68i and the Sony Ericsson P800 (shown with the kind permission of Sony Ericsson; copyright Sony Ericsson 2003)

Trang 56

The original T68 was marketed under the Ericsson brand It was then that Ericsson and Sony started a joint venture in mobile phone development Subsequent phones were marketed under the Sony Ericsson label The Sony Ericsson T68i was an improved version of the T68 In some places, you can convert your T68 to T68i via a firmware upgrade.

Trang 57

As a consumer technology, Bluetooth needs to be widely

supported by vendors to be successful Interoperability, theability for different devices (from different manufacturers) towork with one another, is the key factor in securing this broadsupport (many a technology has been stalled because userswere frustrated by incompatibilities and finger-pointing amongvendors) In Version 1.1 of the Bluetooth specification (the

Generic Access Profile

The Generic Access Profile (GAP) defines how two Bluetoothdevices discover and establish communications betweeneach other The GAP is the "mother" of all profiles, as it

Trang 58

Serial Port Profile

The Serial Port Profile defines how two Bluetooth devicescan communicate with each other by using virtual serialports Using this profile, Bluetooth communication can betreated as just another serial communication

Trang 59

The Generic Object Exchange Profile (GOEP) defines a set ofprotocols used by applications for exchanging objects

Object Push Profile

The Object Push Profile is used together with the GOEP tosend and receive objects, primarily for exchanging

electronic business cards

File Transfer Profile

The File Transfer Profile is used together with the GOEP totransfer files between two Bluetooth devices

Synchronization Profile

Trang 60

In this chapter, we will make use of several of the 13 profiles forfile transfer, Internet connectivity, etc

Trang 61

Ericsson 2003)

Trang 62

Like Wi-Fi access points, Bluetooth access points are

increasingly popular Using a Bluetooth access point is similar tousing a Wi-Fi access point connect the access point to a wirednetwork and you can wirelessly connect your Bluetooth devices

When the access point is found, right-click on the icon andselect Discover Available Services, as shown in Figure 6-54

Figure 6-54 Discovering the services that the

Bluetooth access point provides

Trang 63

Connect to Network Access Point, as shown in Figure 6-55

Figure 6-55 Connecting to the Bluetooth access

point

By default, the Bluetooth access point has a static IP address of 1.1.1.1 You can configure it to obtain its address from a DHCP server I discuss this in more detail in Section 6.6.1.2

4 You should then see a dialog prompting you to enter your username and password Simply leave these

boxes empty and click on Connect, as shown in Figure 6-56

Figure 6-56 Click on Connect to log on to the

Bluetooth access point

Trang 64

6.6.1.2 Configuring the Bluetooth access point

By default, the connection to the Bluetooth access point is set

at 115200 bps You should set it to the maximum of 921600bps To do so, right-click on My Network Places and selectProperties Then, right-click on BluetoothNullConnection andselect Properties Under the General tab, click on the

Configure button This is shown in Figure 6-57

Figure 6-57 Changing the maximum transfer

speed of the Bluetooth access point

Trang 65

One problem that you need to look out for is when you connectthe Bluetooth access point to a router You need to assign an IPaddress to the access point before you can connect to it usingthe Internet To do so, once you are connected to the accesspoint, use a web browser and configure the access point (see

Trang 66

For those using an ADSL/DSL modem, choose the PPPoE option(see Figure 6-59) For cable modem users, choose DHCP (Ifyou are not sure whether your Internet connection uses DHCP

or PPPoE, contact your ISP.) There are also three security

options available levels 1 to 3 For security level 3, you need tosupply a PIN code You can also optionally enable data

encryption But doing so will effectively reduce the data transferrate

Figure 6-59 Configuring the network type and

security for the access point

If you use security level 3, you will be prompted to enter thePIN code when your computer connects to the access point

(shown in Figure 6-60)

Figure 6-60 Prompt from the access point when

security level 3 is selected

Ngày đăng: 26/03/2019, 16:29

TỪ KHÓA LIÊN QUAN