Saturday, February 1, 2014

Wireless Security

AbstractThe advent of Information and Communications Technology has brought a fume of changes in today s upstart world . Many technologies be available in the market today that brings improvement in almost whole aspects of development . One of these technologies is the establishment of a cyberspaceA interlock is , basically , consists of calculating machines or client uniteed in concert to share resources . One profit can interconnect an early(a)(prenominal) ne iirk either through wired or tuner discourse paths . A network should have these four things - HUB to practise barter control , CABLE which is intent to connect all mean(a) , Network Interface Card (NIC ) which is plugged into the computer to be able to send and receive marrows and PROTOCOL which is the style apply to all overhaul among nodes in the net work (Jelen , 2003In a network , processes may institute a session to exchange information . in that respect are divers(prenominal) ways to connect processes to pass over the network . One common scheme is roundabout electric switch which establishes a permanent physical combine amid computers . This link is allocated for the good duration of the communication . On the other hand , message switching is also used to communicate from one node to another . In this scheme , a temporary link is built during the transfer of information . other scheme used is packet switching which divides the message into a number of packets and individually packet is sent to its destination independently (Silberschatz Galvin , 1998 p489IntroductionWireless LAN is experiencing marvelous change in today s roomrn world since in that location is an increase in bandwidth provided by IEEE 802 .11 standard . The table down the stairs shows the characteristics of WLAN technologyTable 1 : Key Char acteristics of WLANCharacteristicsPhysical ! stage Direct chronological sequence Spread Spectrum (DSSS , Frequency Hoping Spread Spectrum (FHSS , extraneous Frequency function Multiplexing (OFDM , Infrared (IRFrequency Band 2 .4 gigahertz (ISM band ) and 5 GHzData Rates 1 Mbps , 2 Mbps , 5 .5 Mbps , 11 Mbps , 54 MbpsData and Network Security RC4-based stream encoding algorithmic rule for confidentiality , authentication and integrity . Limited Key managementOperating regurgitate Up to 150 feet indoors and 1500 feet outdoorsPositive Aspects Ethernet speeds without wires numerous different products from some(prenominal) different companies . Wireless client cards and access consign be are decreasingNegative Aspects Poor security in subjective mode throughput decrease with distance and load (Karygiannis Owens , 2002 , p24Wireless Network plat find 1 : Wireless Network DiagramThe above common physical body tree shows the diagram of a wireless network . This involves the use of wireless router which must possess a wor king network transcriber A broadband modem which is connected to the wireless router enables the manduction of a high-speed internet connection . This wireless router allows many computers to connect over WiFi links (z .about .com /1 /7 /g /3 /wireless-diagram-1 .jpgSecurity Threats and IssuesThe figure below shows the taxonomy of security attacks in WLANFigure 2 : Taxonomy of Wireless Attacks (Karygiannis Owens , 2002 , p24Network Security attacks are divided into two attacks - passive voice and active . Passive attacks happen when an unauthorized party gains in full access...If you want to get a full essay, order it on our website: BestEssayCheap.com

If you want to get a full essay, visit our page: cheap essay

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.