.

Thursday, January 2, 2014

Wireless Security

AbstractThe advent of Information and Communications Technology has brought a frame of changes in forthwith s in advance(p) world . Many technologies be available in the market today that brings improvement in almost only aspects of development . unmatchable of these technologies is the establishment of a cyberspaceA net profit is , basically , consists of data processors or lymph gland assign in concert to share resources . One meshing deal interconnect well-nigh separate ne cardinalrk either through with(predicate) wired or radiocommunication communication paths . A network should have these four things - HUB to actualize traffic control , business line which is determinationd to connect all medium , meshwork embrasure Card (NIC ) which is plugged into the computer to be able to bear down and receive put ac rosss and PROTOCOL which is the lyric used to announce among nodes in the network (Jelen , 2003In a network , processes may institute a session to exchange information . There are distinct ways to connect processes to overstep over the network . One common scheme is racing circuit switching which establishes a permanent physical draw between computers . This link is allocated for the blameless duration of the communication . On the other hand , message switching is also used to communicate from one node to another . In this scheme , a temporary link is built during the transfer of information . some other scheme used is packet switching which divides the message into a procedure of packets and each packet is sent to its destination one by one (Silberschatz Galvin , 1998 p489IntroductionWireless LAN is experiencing tremendous change in today s modern world since there is an increase in bandwidth provided by IEEE 802 .11 bar . The table below shows the characteristics of WL AN technologyTable 1 : trace Characteristic! s of WLANCharacteristicsPhysical forge Direct Sequence beam Spectrum (DSSS , Frequency Hoping Spread Spectrum (FHSS , orthogonal Frequency Division Multiplexing (OFDM , Infrared (IRFrequency Band 2 .4 gigacycle (ISM band ) and 5 GHzData Rates 1 Mbps , 2 Mbps , 5 .
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
5 Mbps , 11 Mbps , 54 MbpsData and Network warranter RC4-based stream encryption algorithm for confidentiality , authentication and integrity . contain Key managementOperating blow Up to 150 feet indoors and 1500 feet outdoorsPositive Aspects Ethernet speeds without wires some different products from some(prenominal) different companies . Wireless c lient tease and access signal costs are decreasingNegative Aspects Poor gage in infixed mode throughput decrease with distance and load (Karygiannis Owens , 2002 , p24Wireless Network plot Figure 1 : Wireless Network DiagramThe supra project shows the diagram of a wireless network . This involves the use of wireless router which must possess a working network transcriber A broadband modem which is connected to the wireless router enables the communion of a high-speed internet connection . This wireless router allows many computers to connect over WiFi links (z .about .com /1 /7 /g /3 /wireless-diagram-1 .jpgSecurity Threats and IssuesThe figure below shows the taxonomy of security attacks in WLANFigure 2 : Taxonomy of Wireless Attacks (Karygiannis Owens , 2002 , p24Network Security attacks are divided into two attacks - peaceable and active . Passive attacks happen when an unauthorized ships company gains total access...If you want to get a full essay, tell it on our we bsite: OrderCu! stomPaper.com

If you want to get a full essay, visit our page: write my paper

No comments:

Post a Comment