Wireless Local Area Network (WLAN) is a system that extends the reach of a wired network to include wireless devices.
WLAN operates using IEEE 802-series standards, such as 802.11a, 802.11b, and 802.11g.
These standards allow Ethernet network signals to be transmitted wirelessly.
コンピューター英語の訳をお願いします。
翻訳サイトでの訳はやめてください。
よろしくお願いします。
1 Wireless Local Area Network (WLAN) system extends the reach of a wired network to include wireless laptops and PDAs within a room ob building.
2 Virtually all wireless LANs operate using one of several IEEE 802-series standards; 802.11a,802.11b,and 802.11g, collectively known as the Wi-Fi standards.
3 These standards define a method for transporting Ethernet network signals using a digital radio link instead of a physical Ethernet cable.
4 Wireless LANs use a device called an access point that provides wireless coverage for a limited area.
5 The access point provides a bridge between an existing Ethernet LAN and all of the wireless-equipped computers within range of the access point.
6 Wi-Fi networks use complex data encoding schemes similar to those used in GPS satellites and advanced digital cellular telephone networks to send data across the radio link.
7 The radios in these systems use differential phase shift keying to impose the data onto the radio signal.
8 The range of Wi-Fi access points varies, but each access point typically covers a radius of 200-300 feet and often much less
9 You can cover an entire building or campus by using multiple access points attached to the LAN.
10 Access points broadcast their names and invite client computer to link.
11 A single access point can connect to many clients at the same time.
12 Each client has a unique identifier called a mac address that enables the access point to tell one client from another.
13 If a client is within range of several access points, it chooses the one with the best signal strength.
14 Security across wireless links is important, so wireless LANs use authentication and encryption to maintain security.
15 In the simplest and most effective form of authentication, an access point will only connect to clients having specific mac address number.
16 Mac address are burned into client adapter card chipsets during manufacture and are very difficult to mimic.
17 More complex authentication schemes use public key authentication systems, including smart cards and biometric scanning, to confirm the identity of the user.
18 Wireless network encryption comes in two forms: the older Wired Equivalency Privacy (WEP) and the newer Wi-Fi Protected Access (WPA).
19 Both use the RC4 encryption algorithm, which is known as a stream cipher.
20 A stream cipher operates by using mathematical operations to create a pseudorandom stream of data from a key of 40 or 128 bits.
21 The transmitting device mixes the payload data with the pseudorandom stream to produce an encrypted data stream.