.

Saturday, October 5, 2013

Wireless Security

AbstractThe advent of Information and Communications Technology has brought a lop of changes in today s in advance(p) world . Many technologies be available in the market today that brings improvement in almost only aspects of development . unrivalled of these technologies is the establishment of a cyberspaceA meshwork is , basically , consists of data processors or node depute in concert to share resources . One meshwork understructure interconnect few separate ne twork either through with(predicate) wired or radiocommunication communication paths . A network should have these four things - HUB to actualize traffic control , job which is white plagued to connect all medium , electronic network porthole Card (NIC ) which is plugged into the computer to be able to ventilate and receive centres and PROTOCOL wh ich is the lyric used to announce among nodes in the network (Jelen , 2003In a network , processes may institute a session to exchange information . There are assorted ways to connect processes to overstep over the network . One common proposal is racing circuit switching which establishes a permanent physical tie-up between computers . This link is allocated for the entire duration of the communication . On the other hand , message switching is also used to communicate from one node to another . In this scheme , a temporary link is built during the transfer of information . some other scheme used is packet switching which divides the message into a add of packets and each packet is sent to its destination one by one (Silberschatz Galvin , 1998 p489IntroductionWireless LAN is experiencing tremendous change in today s modern world since there is an increase in bandwidth provided by IEEE 802 .11 bar . The table below shows the characteristics of WLAN technologyTable 1 : nam e Characteristics of WLANCharacteristicsPhys! ical forge Direct Sequence sprinkle Spectrum (DSSS , Frequency Hoping Spread Spectrum (FHSS , orthogonal Frequency Division Multiplexing (OFDM , Infrared (IRFrequency Band 2 .4 gigacycle (ISM band ) and 5 GHzData Rates 1 Mbps , 2 Mbps , 5 .
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
5 Mbps , 11 Mbps , 54 MbpsData and Network auspices measure RC4-based stream encryption algorithm for confidentiality , authentication and integrity . limited Key managementOperating blow Up to 150 feet indoors and 1500 feet outdoorsPositive Aspects Ethernet speeds without wires some different products from umpteen different companies . Wireless client tease and access signal cos ts are decreasingNegative Aspects Poor security in infixed mode throughput decrease with distance and load (Karygiannis Owens , 2002 , p24Wireless Network plot Figure 1 : Wireless Network DiagramThe above project shows the diagram of a wireless network . This involves the use of wireless router which must possess a working network transcriber A broadband modem which is connected to the wireless router enables the manduction of a high-speed internet connection . This wireless router allows many computers to connect over WiFi links (z .about .com /1 /7 /g /3 /wireless-diagram-1 .jpgSecurity Threats and IssuesThe figure below shows the taxonomy of security attacks in WLANFigure 2 : Taxonomy of Wireless Attacks (Karygiannis Owens , 2002 , p24Network Security attacks are divided into two attacks - peaceable and active . Passive attacks happen when an unauthorized company gains total access...If you want to get a full essay, identify it on our website: OrderCustomPaper.com

If you! want to get a full essay, visit our page: write my paper

No comments:

Post a Comment