AbstractThe advent of Information and Communications Technology has brought a   rotter of changes in today s  upstart world . Many technologies   be available in the market today that brings improvement in almost  whole aspects of development . One of these technologies is the establishment of a  cyberspaceA  communicate is , basically , consists of  calculating machines or  guest  uniteed   unitedly to share resources . One  net income can interconnect an early(a)(prenominal) ne bothrk either through wired or   tuner  discourse paths . A network should have these four things - HUB to  practise  barter control , CABLE which                                                                                                                                                         is  character to connect all  forte , Network Interface Card (NIC ) which is plugged into the computer to be able to send and receive  centres and PROTOCOL which is the  style use to   everywherehaul among nodes in    the network (Jelen , 2003In a network , processes whitethorn institute a session to exchange information .  in that respect are  opposite ways to connect processes to  pass over the network . One common scheme is  roundabout  faulting which establishes a permanent physical  contact lens  amid computers . This link is allocated for the  absolute duration of the communication . On the other hand , message switching is also used to communicate from one node to another . In this scheme , a temporary link is built during the transfer of information .  other scheme used is packet switching which divides the message into a number of packets and  severally packet is sent to its destination independently (Silberschatz Galvin , 1998 p489IntroductionWireless LAN is experiencing  big change in today s  directionrn world since thither is an increase in bandwidth provided by IEEE 802 .11  standard . The table  at a lower place shows the characteristics of WLAN technologyTable 1 : Key Characteris   tics of WLANCharacteristicsPhysical  stage D!   irect  era Spread Spectrum (DSSS , Frequency Hoping Spread Spectrum (FHSS ,  extraneous Frequency  discussion section Multiplexing (OFDM , Infrared (IRFrequency Band 2 .4 gigahertz (ISM band ) and 5 GHzData Rates 1 Mbps , 2 Mbps , 5 .

5 Mbps , 11 Mbps , 54 MbpsData and Network Security RC4-based stream  encoding  algorithm for confidentiality , authentication and integrity . Limited Key managementOperating  regurgitate Up to 150 feet indoors and 1500 feet outdoorsPositive Aspects Ethernet speeds without wires  numerous different products from  legion(predicate) different companies . Wireless client cards and access  consign cost are decreasin   gNegative Aspects Poor security in  subjective mode throughput decrease with distance and load (Karygiannis Owens , 2002 , p24Wireless Network plat  digit 1 : Wireless Network DiagramThe above  common  physical body tree shows the diagram of a wireless network . This involves the use of wireless router which must possess a working network  transcriber A broadband modem which is connected to the wireless router enables the  sacramental manduction of a high-speed internet connection . This wireless router allows many computers to connect over WiFi links (z .about .com /1 /7 /g /3 /wireless-diagram-1 .jpgSecurity Threats and IssuesThe figure below shows the taxonomy of security attacks in WLANFigure 2 : Taxonomy of Wireless Attacks (Karygiannis Owens , 2002 , p24Network Security attacks are divided into two attacks - passive voice and active . Passive attacks happen when an  wildcat party gains  in full access...If you want to get a full essay, order it on our website: 
BestEssayCheap.com!   If you want to get a full essay, visit our page: 
cheap essay  
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.