Overview Of SSID

Page 1

Information about SSIDs An SSID is a service set identifier. More and more individuals are becoming wireless signal hosts. These signals can broadcast for a few hundred feet. This allows people to see several networks. These are the service set identifiers. Background Information The service set terms in the identifiers are in reference to a network the computer is trying to connect to. These are known as wireless local area networks (wireless LANs). This is the usual configuration used for small businesses and homes. The Web service provider brings the Web into the home or office. This is done via a modem. The modem is hooked up to a wireless router via a cable. It is the router that sends out the signal to the user. The “identifier� in the name denotes the name designated for the network. SSID Types The most basic is an ASCII set that is unique for the router. This simple identifier is typically the router Media Access Control address (MAC). This address is composed of codes. These are assigned to network gateways or the Net. A good example is the router and modem of your service provider. The wireless access point also has a distinct MAC address. The wireless receiver card of a computer also has its own MAC address. It will also have its own service set identifier. Enhanced Service Set Identifiers Most of the routers sold today are compatible with enhanced identifiers. This is what allows a name to be designated to a network. In a wireless Internet service area, a user will be able to access the service via the network name. Without the set identifier, access would have to be via a 32 digit code. Service set identifiers are designated at the router or WAP (wireless access point) set up. The consumer grade router and WAP have numerous set up functions that can be used when it is installed. For instance, the default name for Linksys routers is Linksys. Most businesses will have specific names for the access points. Individuals will usually call it after themselves. For the sake of efficiency, unique names must be given for the access points. Security Measures A service set identifier broadcast to an individual or group does not imply the individual or group can link to that network. The computer wireless application can locate several networks close by. But most of the time, the network owner will have protective measures enforced. This is needed to limit access. The security measures are necessary against wireless poachers. Wireless poachers are those who use a Web connection without paying for it.


There are many ways to protect the SSIDs. One of the most effective ways is to use passwords. This can go a long way towards keeping people from getting to the network. References: http://www.symatech.net/ssid http://www.tech-faq.com/find-ssid-number.html http://www.tech-faq.com/ssid.html http://www.rolo.org/ssid.html


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.