Wednesday, November 20, 2013

Wireless Security

AbstractThe advent of Information and Communications Technology has brought a quite a little of changes in today s upstart world . Many technologies be available in the market today that brings improvement in almost whole aspects of development . One of these technologies is the establishment of a cyberspaceA net income is , basically , consists of calculating machines or thickener uniteed unneurotic to share resources . One internet can interconnect an early(a)(prenominal) ne cardinalrk either through wired or tuner confabulation paths . A network should have these four things - HUB to practise barter control , CABLE which is apply to connect all intermediate , Network Interface Card (NIC ) which is plugged into the computer to be able to send and receive substances and PROTOCOL which is the style utilise to overhaul among nodes in the network (Jelen , 2003In a network , processes whitethorn institute a session to exchange information . on that point are contrary ways to connect processes to pass over the network . One common scheme is roundabout transmutation which establishes a permanent physical railroad tie amid computers . This link is allocated for the replete(p) duration of the communication . On the other hand , message switching is also utilized to communicate from one node to another . In this scheme , a temporary link is built during the transfer of information . other scheme used is packet switching which divides the message into a number of packets and all(prenominal) packet is sent to its destination independently (Silberschatz Galvin , 1998 p489IntroductionWireless LAN is experiencing formidable change in today s stylusrn world since in that location is an increase in bandwidth provided by IEEE 802 .11 standard . The table to a lower place shows the chara cteristics of WLAN technologyTable 1 : Key C! haracteristics of WLANCharacteristicsPhysical stage Direct rank Spread Spectrum (DSSS , Frequency Hoping Spread Spectrum (FHSS , extraneous Frequency office Multiplexing (OFDM , Infrared (IRFrequency Band 2 .4 gigahertz (ISM band ) and 5 GHzData Rates 1 Mbps , 2 Mbps , 5 .
bestessaycheap.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
5 Mbps , 11 Mbps , 54 MbpsData and Network Security RC4-based stream encoding algorithmic program for confidentiality , authentication and integrity . Limited Key managementOperating regurgitate Up to 150 feet indoors and 1500 feet outdoorsPositive Aspects Ethernet speeds without wires numerous different products from galore(postnominal) diff erent companies . Wireless client cards and access consign cost are decreasingNegative Aspects Poor security in subjective mode throughput decrease with distance and load (Karygiannis Owens , 2002 , p24Wireless Network plat enroll 1 : Wireless Network DiagramThe above common anatomy tree shows the diagram of a wireless network . This involves the use of wireless router which must possess a working network transcriber A broadband modem which is connected to the wireless router enables the overlap of a high-speed internet connection . This wireless router allows many computers to connect over WiFi links (z .about .com /1 /7 /g /3 /wireless-diagram-1 .jpgSecurity Threats and IssuesThe figure below shows the taxonomy of security attacks in WLANFigure 2 : Taxonomy of Wireless Attacks (Karygiannis Owens , 2002 , p24Network Security attacks are divided into two attacks - passive voice and active . Passive attacks happen when an unauthorized party gains in full access...If you want to get a full essay, order it on our website: BestEssayCheap.com

If you want to get a full essay, visit our page: cheap essay

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.