Wireless Area Networks
Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN).
A wireless local area network, or LAN is a flexible data communications system implemented as an augmentation to, or an alternative for a, wired local area network. These networks rely on electromagnetic airwaves to transmit and receive over a defined area, usually a few hundred feet. (Yahoo-wireless) In
…show more content…
The key to making this possible is variation of frequencies. As long as concurrent frequencies are no being broadcasted in a given area, it is possible to have any number of radio transmissions taking place at a given time. One might ask with countless number of transmissions that could be occurring at a given time how is it possible to focus on just one stream of data? The answer again is achieved through radio frequency characteristics. Once data has been encoded into a given radio carrier, all one has to do to extract the information is have a receiver tuned into one specific frequency, while rejecting all others. These receiving and transmitting nodes are known as access points. In typical wireless LAN settings, these access points are in the form of small rectangular transmitting stations. Receiving access points, or LAN adapters, defined using 802.11EE coding, are implemented as PC cards in notebooks, palm pilots, and desktops, or as additional access points that serve to extend the area of the network. These adapters provide an interface between the network operating system and the radio waves. (Rho Wireless/ Home Networking and Internet Connection Sharing)
Because wireless technology has its roots in military applications, all wireless systems contain varying degrees of security for their users. More often then not each individual network with have a unique encryption
The network level security will form the relationships of authentication, encryption and authorization for the wireless network and its connectivity between wireless clients to the internal network. Some recommendations are:
Wireless Routers is a wireless local area network (WLAN) that determine the next route of the packet should travel to the destination (Rouse, 2005). It converts the internet connection that was received from phone lines into radio signals and brings convenience to the portability devices that has built-in network card to gain the radio signals to get to the Internet connection (Switcher, 2015). Table 2 refers to the comparison of three models of wireless router.
LAN stands for Local Area Network. LAN is a type of network that interconnects computers and devices either wired or wireless and covers a greater distance. LAN is mainly used in private organisations such as college or university. More or less everyone uses wireless router at home these days and the user is able to connect between 5-10 devices wirelessly. The user can share the broadband or the connection with ADSL by using Ethernet cables. Smaller LANs can connect at least
In the recent years, wireless technologies have taken a new dimension in the ways society lives. Wireless broadband is available to everyone. Whether the users are at home, driving the car, sitting in the park, and it would even work while people are a pleasure boat ride in the middle of a lake. And because of this, the need to have information at any time and be connected in all places, all the time has been satisfied.
Wireless networks have become a major part in the operation of businesses and in people’s lives. Wireless networks can provide fast speed internet connections without having to use wired connections. Businesses are doing much better with wireless networks because they don’t have to pay the costs of installing wired networks and people can work easier because they do not have wires running all over the place. Now with wireless networks in place, businesses are able to connect to their other branches and buildings within their area as well.
The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security
The first version of the 802.11 protocol was released in 1997, and was updated to 802.11b in 1999 to permit 11 megabits to be transmitted. But Wireless WANs (WWANs) network cover broader areas then WLANS and includes such things as cellular networks, cellular digital packet data, satellite networks, microwave networks, and much more. But Both WWANS and WLANs rely on the RF spectrum as there communication medium. The security measure for wireless users is strict, even though it can be accessed by walking near a building. Wireless signals are easy too pickup especially with a cellular device but it is usually password but still can access from intruders. But there are many way of preventing these hackers from entering in which will be explained later. Also for Mobile network/and its network security, its network operates on a radio frequency consisting of radio cells, each served by a fixed transmitter, and for both wireless and mobile networks, they have the advantage of mobility, flexibility, ease of installation, and low cost. But some drawbacks for both systems include Limited Throughput, Limited Range, in building penetration problems, vulnerability, and lastly security.
A wireless network could be useful in many places like a home or business/workplace to be able to share a variety of files such as printers and scanners.
Within this article, the authors states that in order to provide a safe and secure wireless network, they outlined the counter attacks and measures for the security of wireless networks. Some of the counter attacks that the authors have listed includes, system security - which breakdowns to administrative level security, physical level security, and technical level security, and information security (Ameen et al, 2012). For the purpose of answering the previous question, the main counter attack that would best defend against the problems would be system security - particularly the administrative level security. At this level of security, administrative control over the system by establishing a well defined user hierarchy plus a strong authentication measures, can prevent security breaches of WLANs from
A local area network (LAN) is a computer network that connects computers in an area with limited space such as a home, school, computer laboratory, or office building, using network media.
A wireless network is any type of computer network that uses wireless data connections for connecting network nodes .Wireless networking is a method by which homes, telecommunications networks and enterprise (business).Installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI model network structure.
Initially, to ensure security in 802.11 standard networks WEP algorithm (Wired Equivalent Privacy) was applied, including RC4 encryption algorithm with 40-bit or 104-bit key and means of key distribution between users, but in 2001 it found a basic vulnerability allowing get full access to the network for a finite (and very short time), regardless of the length of the key. Strongly not recommended for use this security mode at the moment.
LAN (Local Area Network) is a local area network, which can be extended to multiple computers or other devices, e.g. a larger office, hotel or apartment building. LAN allows its users to use the same resources and applications, as well as transfer or exchange files. Communication can take place using copper wires or wireless Wi-Fi, and can be independent of the Internet - as long as a network card is available.
Wireless LAN (WLAN) is being very helpful to connect the more than one devices and it provides the easy internet connection. So that more than one or two PCs (Personal computers) can be connect to Wireless Local Area Network to ease in providing internet connection.
Additional VLANs configured on these access points will require encryption (keys delivered through the authentication process) and will not be advertised via beacon broadcasts. In this model, when users activate their wireless network interface, the general use VLAN will be automatically listed as an available connection. Connections to other available networks (such as department VLANs) will have to be explicitly requested by the user in order to gain access. It should be noted that in order to provide a cost-effective centrally managed service it is likely that wireless access points from a single vendor will be required.