answersLogoWhite

0

You need a WAP - WIreless Access Point. This is a bridge device that connects the two types of networks together. Or, use a router.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What device connect wireless users to a wired network?

A wireless router.


Which simple wireless configuration technique can make the network invisible to unauthorized users?

The simple wireless configuration technique that can make the network invisible to unauthorized users are disable SSID broadcasting. This will disable the network from being broadcasted.


What does waiting for users mean on wireless network connection's?

It means its waiting for wireless connections to join your area.


Why there is Request for network password?

For either a personal or a business wireless network, it's to protect it from unauthorized users.


What procedure will help prevent users from detecting a wireless network?

Ssid broadcast


Which of these security components can you use to prevent wireless users from accessing a wired network?

Isolation


A operates as a standalone device and is shared by multiple users.?

network printer


Which procedure will help prevent users from detecting a wireless network?

You need to disable broadcasting of SSID.


What are advantages and disadvantages of wireless security?

The initial setup of a wireless connection infrastructure that implements security is not complicated as that of wired connections. The disadvantage of wireless security is that most of the encryption methods are common and have weaknesses.


What security component provides the strongest wayof preventing unwanted users from using a wireless network?

Authentication


What is a benefit of not broadcasting SSID for your wireless network?

Strangers won't see your wireless network, making it more difficult to hack. The downside is that when you want to add new devices, they won't be able to see it automtically either. You will need to manually enter the network ID.


What is needed to connect subnets?

A router. One possible solution to the problem of the overloaded network is to add a second networking device, such as a larger integrated service router (ISR). When adding a device, it is a good practice to place the wired and wireless users on separate local subnetworks to increase security. The original wireless router can still be used to provide the wireless users with connectivity and security on one network. Hubs or switches connecting the wired users can then be directly connected to the new ISR using a different network. The ISR and the wireless router can then be directly connected with a third network. This new network configuration requires that the existing Class C network be divided into at least three subnetworks. Using classful subnetting, at least two bits must be taken from the host portion of the address to meet the customer requirements. This subnetting scheme results in the creation of four individual networks, each with 62 available host addresses (64 possible addresses, minus the all-0s and all-1s addresses).