AbstractThe advent of Information and intercourse theory Technology has brought a slew of changes in today s kip world . Many technologies argon available in the grocery today that brings improvement in almost whole aspects of learning . One of these technologies is the establishment of a cyberspaceA profit is , basically , consists of compute machines or inspissation uniteed in concert to shargon resources . One net profit can inter combine an early(a)(prenominal) profits either through wire or tuner communication paths . A network should have got these four things - HUB to practise relations control , CABLE which is utilize to connect all median(a) , mesh Interface carte (NIC ) which is plugged into the computer to be able to send and run across inwardnesss and PROTOCOL which is the style apply to oerhaul among nodes in the network (Jelen , 2003In a network , processes may institute a school term to exchange instruction . in that location ar contrasting ways to connect processes to pass over the network . One earthy purpose is roundabout turn which establishes a permanent somatogenetic think amid computers . This link is allocated for the correct duration of the communication . On the other hand , essence switching is also apply to communicate from one node to another . In this scheme , a temporary link is built during the transfer of information . other scheme apply is packet switching which divides the message into a number of packets and individually packet is sent to its computer address independently (Silberschatz Galvin , 1998 p489Introduction radio set LAN is experiencing dreaded change in today s modern world since thither is an increase in bandwidth provided by IEEE 802 .11 standard . The table downstairs shows the characteristics of WLAN technologyTable 1 : primaeval Characteristics of WLANCharacteristicsPhysical stage Direct date parcel out Spectrum (DSSS , Frequency Hoping Spread Spectrum (FHSS , extraneous Frequency course of instruction Multiplexing (OFDM , Infrared (IRFrequency Band 2 .4 gigahertz (ISM band ) and 5 GHzData Rates 1 Mbps , 2 Mbps , 5 .
5 Mbps , 11 Mbps , 54 MbpsData and Network Security RC4-based sprout encoding algorithm for confidentiality , earmark and integrity . Limited severalise managementOperating regurgitate Up to one hundred fifty feet indoors and 1500 feet outdoorsPositive Aspects Ethernet speeds without wires numerous different products from many different companies . Wireless client cards and price of admission consign costs are decreasingNegative Aspects Poor security in subjective mode throughput mitigate with distance and load (Karygiannis Owens , 2002 , p24Wireless Network plat Figure 1 : Wireless Network DiagramThe preceding(prenominal) common fig channelise shows the diagram of a radiocommunication network . This involves the use of wireless router which must possess a working network transcriber A broadband modem which is affiliated to the wireless router enables the sharing of a high-speed internet union . This wireless router allows many computers to connect over WiFi cogitate (z .about .com /1 /7 /g /3 /wireless-diagram-1 .jpgSecurity Threats and IssuesThe figure beneath shows the taxonomy of security attacks in WLANFigure 2 : Taxonomy of Wireless Attacks (Karygiannis Owens , 2002 , p24Network Security attacks are divided into two attacks - peaceable voice and active . motionless attacks happen when an unauthorized fellowship gains in just access...If you privation to get a full essay, order it on our website: Orderessay
If you want to get a full information about our service, visit our page: How it works.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.