Free Essay

Wireless Networking

In:

Submitted By corrrtney
Words 2645
Pages 11
A Look at Wireless Networking

Abstract
Over the last several years technology has continued to evolve and grow exponentially. The need for wired and wireless networks has become vital in both individuals lives and in the work environment. There are several factors to consider when discussing wired and wireless technologies such as hardware requirements and security measures needed to ensure a secure network. Wireless network trends are now offering new technology such as cloud computing and simply being able to work from anywhere you want. As you read on you will understand the benefits of wireless technology in our personal lives and in work situations.

A Look at Wireless Networking
Many organizations such as universities, retail centers and your own office depend on the ability to share information in an efficient and useful way. Nowadays networks are an integral part of almost every business and in your own personal life. There are two options for setting up a network — wired and wireless. A wired network uses cables to connect to a computer and a wireless network uses radio frequencies to connect to a computer. The components required to set up a wired or wireless network are somewhat similar with a wireless network needing a few additional pieces.
Wireless networks are allowing individuals and businesses to become more mobile. For example, people are able to work from home these days and can have a better work-life balance. Businesses such as Starbucks, Tim Horton’s and McDonalds now all have free wireless access trying to add value to their customer’s experience. It is important to recognize that with all the benefits of wireless networks and the convenience they offer, there is always security and privacy risks to be taken into consideration. As this paper progresses you will learn how wireless networks have become a crucial component to your life and organizations these days and security risks you should be aware of.
Standards for Wireless Technologies
Wireless networks, as the name suggests, allows a user to connect devices without cables. Instead, a wireless network uses radio frequency waves. In the 1990’s an organization called IEEE (Institute of Electrical and Electronic Engineers) began to develop industry standards for wireless products. The 802.11 standard can be broken down in to four different types — 802.11a, 802.11b, 802.11g and 802.11n. The difference between each generation lies in the frequency that they operate on and the speed or bandwidth in which they operate. As newer products are created, they are tested to make sure that they are compatible with previous products that operate on the same frequency. 802.11b would be considered the slowest, operating on a 2.4 GHz frequency and transmitting data at a rate of up to 11Mbps. The 802.11a operates on a 5 GHz frequency with the 802.11g operating on a 2.4 GHz, both being able to transmit data at a rate of 54 Mbps. The newest and fastest standard of 802.11n can transmit data up to 450 Mbps and can operate on both of the previous frequencies mentioned. You may choose which frequency you wish to operate on. (Discover and Learn | Wi-Fi Alliance. n.d.) Taking these standards into consideration, you will sometimes run into issues that may slow down your actual transmission speeds. For example, if within your home network you are operating several computers, gaming consoles or streaming content from your computer to your TV, you will notice a slower connection.
Wired vs. Wireless Networks
The main difference between these two types of networks is that one uses radio frequencies to operate (wireless) and the other uses a hard connection by using network cables (wired). Wired networks offer faster and more secure connections. You can argue that wireless networks are less secure and transmission speeds can be compromised from physical barriers or the number of devices connected to the network. If you have several computers and other Wi-Fi devices such as smartphones, tablets or gaming consoles connected to the network all at once, you will experience slow connection speeds. I know from my own experience that wired networks will have a faster connection. My home wireless network was set up by my ISP, Telus, with my computer and modem using the latest 802.11n technology. I was noticing that while connected to the wireless network, my home computer was not getting the transmission speeds I would expect from this technology. After Telus came back to inspect my setup, it was determined that physical barriers such as the concrete walls in the apartment building may contribute to interference. I was then set up with a wired connection for my computer only to be able to maximize the technology. I still have the wireless network set up to be able to utilize my Wi-Fi devices such as my iPhone and iPad. As you can see one technology isn’t necessarily better than the other, it depends what works for you in your own situation. In my case, a hybrid of wired and wireless is best.
Cost
Some people may be considerate of the cost of each technology. I am fortunate enough for Telus to provide all the products required to set up my networks. If you don’t have an ISP that provides you with the products you need, you will want to be aware that wired networks are generally less expensive than wireless. Wired networks utilize inexpensive Ethernet cables. Wireless technology is a bit more costly. As new 802.11 products become available, the previous standard products will drop in price considerably. A quick look at any electronic store has wireless routers available from $10-$200, depending on the performance you are looking for. Wireless adaptor cards can be found for under $50. Wired routers are available from around $15-50, depending if you are looking for a broadband router. Simple wired cards can be found for under $30.
Flexibility
Wireless networks have the advantage of mobility. Most people have laptops nowadays and you don’t have to be limited to being secured to a wall with an Ethernet cable. You are able to move freely within the range of the wireless network. Unless you are able to have Ethernet cables built into the walls, you are unfortunately going to have to deal with the unsightly and messy looking Ethernet cables. Many businesses may have existing wired networks and can expand using wireless technology without physically disturbing the office. You can re-configure wireless networks more easily and can expand into other areas of an office such as a reception/lobby area or conference room.
Wireless Network Security
When utilizing a wireless network, you will want to be aware of security risks and ways to mitigate security issues. Whether your home or office network, personal and critical information is stored on your devices and is at risk of being compromised. The first step you should take to secure your wireless network is to employ an access control such as a password. All Wi-fi products support encryption controls. Encryption scrambles and then decodes messages sent over wireless networks so they can’t be easily read by humans. You should be aware that connecting to open Wi-Fi networks can put you at a security risk since you don’t know what measures have been take to protect the connection. Wired networks have a security advantage for the simple reason that no one can monitor your traffic like a wireless network or piggyback on your connection.
Wireless Benefits, Trends in Business and Personal Use
General Office Benefits
More businesses are finding ways to integrate wireless technology in daily operations to benefit both the employee and customer. I believe the main benefit of wireless technology is you are rarely out of touch. You simply need a device like a laptop or smartphone and you can become instantly connected. No need to carry around cables on a business trip and have to worry about making a hard connection. Before wireless technology gained the popularity that it has, employees were limited to doing their jobs from the office. When employees are out of town on business or out in the field productivity is not being maximized. Employees with a laptop, smartphone, tablet or any other wireless devices are able to connect to their work instantly which saves time, and in the end saves money and increases productivity. You are then able to dedicate more time to the client in the end. Physically, wireless networks have a better advantage in the workplace. If you need to re-configure space and add new users or move desks this can be done easily compared to a wired infrastructure.
Cloud Computing
Cloud computing is a wireless trend that is starting to fast emerge on the technology scene. The new Apple iCloud would be the most known form of cloud computing right now. Many people have several Apple devices, computer, iPad, iPhone iTouch — they can all be connected using iCloud. I can take a picture on my iPhone and it will automatically connect wirelessly to the cloud and sync and appear on all my other apple devices without having to plug my iPhone into the computer to transfer the picture. I can share music, documents, photos etc. with all my devices. iCloud saves the hassle of keeping each device up-to-date separately and can give you the peace of mind knowing your data is backed up.
Another cloud computing application I have recently become acquainted with is Dropbox. Dropbox is also a form of cloud computing and can be installed on any device you want. When you place a file in the Dropbox folder, it automatically appears on any device. You can also give authority to other people with Dropbox to view certain folders within your own box. I can share pictures easily with family and friends. Some applications now have Dropbox integrated; a good example would be the Blackboard application. I have the Blackboard app installed on both my iPhone and iPad, I can then download any course material whether power point or word documents into my Dropbox and have them appear on my devices as well as my computer which I also have Dropbox installed on. It saves the hassle from having to transfer a file to a USB stick to move files to different devices. It’s also very handy to have my iPad in class with course material available at my fingertips. Dropbox has also been helpful to me at work. I have a client who is a land developer and I handle the sale of the individual lots to builders. There are hundreds of lots that I need to have a separate file open for each one. Instead of wasting time asking the client for documents such as the Lot Purchase Agreements, I was simply given access to their Dropbox folder with all documents related to each builder and each lot. This saves both of us time and has increased my productivity immensely.
There are some great benefits to cloud computing, but users will want to be aware of security risks. Any data travelling between your device and the cloud is at risk of being compromised if you are using a shared network. You should evaluate what kind of data you are storing in the cloud; you may want to re-think storing sensitive information. Dropbox was recently hacked and a small number of users began receiving spam mail. Since those attacks, Dropbox did a thorough investigation and implemented new security measures such as a new page on your home screen that lets you see recent activity on your account and two-factor authentication. (Kerr, D. 2012, July 31)
The cloud computing trend will no doubt increase tremendously over the next few years. Everything you could want will be available at your hands instantaneously but you will want to educate yourself on the security risks cloud computing faces.
Benefits in the Food, Tourism and Health Industries
Wi-Fi is fast becoming a standard service that customers expect from many businesses. If you want to encourage customers to continue to do business with you, free Wi-Fi is a must. Personally, I take note of what establishments offer free Wi-Fi, especially when travelling. When cell phone providers charge so much for international data roaming, I’m more inclined to find a free Wi-Fi hotspot — my go-to place is Starbucks. I can easily use m iPhone or iPad to keep connected with family and friends. I can also usually count on a mall having free Wi-Fi which is a good strategy to lure customers in. In Kuala Lumpur, Malaysia, City Hall has set a standard for food outlets to have free Wi-Fi for customers. When applying for a licence to open a new food establishment, the owner must agree to provide Wi-Fi for free or for a reasonable fee. (Said, H. 2012, January 2) Another large industry in which Wi-Fi is becoming a standard is the hotel industry. When I travel and need to book a hotel, I always check if the hotel has Wi-Fi. This past April I was in Mexico for my friend Dan’s wedding. His sister was unable to be there because she was nine months pregnant. Because the hotel had Wi-Fi, I was able to use my iPhone to FaceTime his sister and she was then able to watch the wedding in real time which was invaluable to them. With websites like www.tripadvisor.com, Facebook and Twitter pages, I was able to leave positive feedback and tell my experience and gave others the idea to do the same thing for their destination weddings.
Besides tourism, another industry I came across that the wireless revolution is affecting is health care. I came across an article in the Wall Street Journal that discussed new wireless trends in the health field. The article discusses how the smartphone has and will continue to shape the industry. Windslow’s interview (2012) found the following:
You can get an add-on to a smartphone which does eye refraction and then texts the prescription to get your glasses made. If you’re an optometrist, you might be worried about that. You will be able to take a DNA sequence on a USB port and pop it into your smartphone and get data out of it. (R.7)
The possibilities in the medical field are going to be endless. Using apps and tools to gather your own information before an appointment can speed the process along when patient wait times are unbearably long. In the future Dr. Topol predicts that many appointments will be done in person anymore, but rather by FaceTime or Skype from the comfort of your own home. (The Wall Street Journal
Being connected to the Internet is second nature for most of us these days. Businesses must keep up with this trend to stay relevant and keep the customer coming back.

References

Discover and Learn | Wi-Fi Alliance. (n.d.). Wi-Fi Alliance. Retrieved from http://www.wifi.org/discover-and-learn
Said, H. (2012, January 2). Eateries to offer Wi-Fi service in April - Central. New Straits Times. Retrieved from http://www.nst.com.my/streets/central/eateries-to-offer-wi-fi-service-in-april-1.26479
Winslow, R. (2012, Apr 16). Innovations in health care (A special report) --- the wireless revolution hits medicine: Eric Topol talks about the upheaval that's coming as the digitization of health care meets the smartphone. Wall Street Journal. Retrieved from http://search.proquest.com/docview/1000397473?accountid=1343
Kerr, D. (2012, July 31). Dropbox confirms it was hacked, offers users help | Security & Privacy - CNET News. Technology News - CNET News. Retrieved October 28, 2012, from http://news.cnet.com/8301-1009_3-57483998-83/dropbox-confirms-it-was-hacked-offers-users-help/

Similar Documents

Free Essay

Wireless Networking

...WIRELESS NETWORKING Introduction A wireless network is any type of computer network that uses wireless data connections for connecting network nodes .Wireless networking is a method by which homes, telecommunications networks and enterprise (business).Installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI model  network structure. Examples of wireless networks include cell phone networks, Wi-Fi local networks and terrestrial microwave networks. Wireless network made up of There are two kinds of wireless networks: * An ad-hoc, or peer-to-peer wireless network * Access point Ad-hoc or peer-to-peer wireless network It consists of a number of computers each equipped with a wireless networking interface card. Each computer can communicate directly with all of the other wireless enabled computers. They can share files and printers this way, but may not be able to access wired LAN resources, unless one of the computers acts as a bridge to the wired LAN using special software. (This is called "bridging") Each computer with a wireless interface can communicate directly with all of the others. Access point or base station A wireless network can also use an access point...

Words: 1355 - Pages: 6

Free Essay

Wireless Networking

...Cue-based Networking using Wireless Sensor Networks: A Video-over-IP Application Yeonsik Jeong ∗ School †‡ , Sriram Lakshmanan∗ , Sandeep Kakumanu∗ , and Raghupathy Sivakumar∗ † Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia of Multimedia System Engineering, SungKongHoe University, Seoul, Korea Email: {ysjeong, sriram, ksandeep, siva}@ece.gatech.edu, ysjeong@mail.skhu.ac.kr Abstract—In this paper we present a new approach called cue-based networking that uses hints or cues about the physical environment to optimize networked application behavior. We define the notion of cues and describe how cues can be obtained using a wireless sensor network as the underlying platform. We identify both the research and system challenges that need to be addressed to realize benefits of the approach under a target application of video delivery over IP networks. In the process, we identify a key challenge of wireless sensor networks, namely the timeliness-robustness tradeoff. We design an adaptive algorithm that balances this tradeoff satisfying both timeliness and robustness requirements. Through an implementation of the video delivery application using the proposed algorithm in a real home environment, we highlight the practical benefits of the proposed approach. I. I NTRODUCTION Optimizing the behavior of application and network protocols has been a continuing endeavor since the origins of the Internet. In this paper we present...

Words: 7488 - Pages: 30

Premium Essay

Wireless Networking

...Networking computers greatly benefits computer users. Networking enables sharing, sending, and receiving information. Whether you are hooked up to a local area network (LAN) or a wide area network (WAN), hooked up to a intranet or the internet, networking is one of today’s most essential products of technology. Many companies, such as Bluetooth Technology, are expanding our networking capabilities to wireless. Wireless networking has its pros and cons, which will be discussed. Why go wireless? Someone may ask what the purpose of adapting and changing to wireless networking is necessary. To start with, it’s simply easier. It is hassle free. Can’t you imagine yourself lying at the beach with your laptop while surfing the net? Money would also be saved in the long run. For a simple home network, the current wiring may not sound so complicated. After all, what’s the big deal about connecting a few computers to a hub? However, schools, companies, buildings, and anything other than a small home network would greatly save money. I walk down the halls of the dormitory or in my school building, and I see wires everywhere - some places they’re hidden better than others. The point is that there are hundreds and maybe, in some cases, thousands of computers hooked up by all types of networks. Can you imagine the cost of installation of those networks? The hardware that it takes to maintain these networks are a fortune. After some time wires need to be changed, and that too...

Words: 310 - Pages: 2

Premium Essay

Openradio and Software Defined Cellular Wireless Networking

...OpenRadio and Software Defined Cellular Wireless Networking As with most aspects of computer science, wireless network technology has evolved over the years by way of competing proposals and protocols, developed within academia, industry, or often through collaboration of the public and private sectors. As public adoption of computer networks increased, the demand for methods of connecting these networks and allowing users to access their resources led engineers and theoreticians to adapt existing electromagnetic radiation to transmit computer data over the same media which had previously been used to broadcast audio and video signals. For as widespread as the use of these technologies has become, most of the advancement and innovation still comes from within a relatively small community of experts in and around Silicon Valley. The subject of this report is one such collaboration known as the Open Networking Research Center, or ORNC, a joint task force between Stanford University and University of California at Berkeley, sponsored by prominent technology companies such as HP, Intel, Google, Cisco and VMWare. One of the projects that ONRC is working on is to develop a software defined networking solution for cellular wireless data networks, which they refer to as OpenRadio. This report will focus on what ONRC perceives as the problem or shortcoming with the current TCP/IP infrastructure which supports cellular wireless, what they propose as their solution, and how close they are...

Words: 1628 - Pages: 7

Free Essay

Its310 Final

...A Comprehensive and Secure Solution ITS310 – Introduction to Computer Based Systems Colorado State University – Global Campus January 28, 2015 Table of Contents Desktops and Server 3 Peripherals 4 Networking 4 Security 5 A Comprehensive and Secure Solution Even small businesses can benefit from a solid network. Due to the unique nature of the site and the number of offices a Microsoft based small business network suits the location perfectly well. For this business I recommend purchasing 20 HP Desktops with standard peripherals, a wireless N based network infrastructure, and a Microsoft Windows 2010 small business server for user authentication, file sharing, and security. Desktops and Server The HP 6305 Small Form Factor desktop is an excellent option for this deployment. IT comes standard with a dual core AMD A4-5300 processor which has a 3.4 GHz core speed and a 1MB cache, built in Radeon HD 7480 Graphics, 8GB of DDR3-1600 RAM and a 1TB HDD. Windows 7 64-bit comes pre-installed; a 64-bit operating system is required to take full advantage of the 8 GB of RAM. Also installed is an Intel 7260NB 802.11a/b/g/n wireless network card to support a wireless network which will be discussed later. These machines will provide plenty of local storage and sufficient processing power to handle all standard business applications with sufficient RAM to handle most multitasking scenarios. For a centralized server an HP ProLiant ML310e Gen 8 will provide 2TB...

Words: 1048 - Pages: 5

Free Essay

Spectrum Sensing in Cognitive Femtocell Networks

...hidden node problem leading to increased interference and consequently reduced spectrum efficiency. In this paper we compare the degree of performance enhancement when a cooperative mode is used to share information about the channel versus when standalone decisions are taken about the state of the channel. Simulation results indicate superior performance of the cooperative mode in terms of the number of observed hidden nodes and probabilities of detection and false alarm. Keywords—Femtocell; Cognitive Radio; Dynamic Spectrum Access; Energy Detection; Hidden Node Problem; Spectrum Sensing; IEEE 802.22. I. INTRODUCTION Recent surveys have shown that indoor traffic accounts for more than 50% of the total data and voice traffic carried in wireless networks with most of the traffic originating from homes, airports, and schools [1] .This skyrocketing growth of indoor traffic coupled with the increased user demand for high broad band services necessitates new solutions that will provide the required indoor coverage and bandwidth. The existing macrocells are not efficient at delivering indoor coverage due to the high penetration losses in walls during signal propagation which leads to low coverage regions (black spots) [2].The promising solution towards satisfying the user requirements lies in the deployment of the low-cost low-power Femtocell Access points (FAP) which will enhance indoor coverage, deliver the required high bandwidth and also offload traffic from the macrocell networks...

Words: 3980 - Pages: 16

Free Essay

Impact of Mac Layer on the Performance of Odmrp, Fisheye, Aodv and Dsr, Routing Protocols in Mobile Ad Hoc Networks

...layer plays crucial role in Ad hoc networks. Several routing protocols have already been proposed for MANETs. This paper describes the impact of MAC layer protocols like 802.11 and CSMA on the various routing protocols like AODV, DSR, ODMRP and Fisheye. Numbers of simulation scenarios were carried out by using Glomosim-2.03. The QoS parameters used are Throughput, Delay and PDR. Simulation results found that AODV performs better in 802.11 and CSMA, DSR and ODMRP performs better in only under 802.11. Keywords— MANET, AODV, DSR, FSR, GloMoSim, ODMRP I. INTRODUCTION Wireless communication networks are basically two types as shown in Fig.1. One is infrastructure based and other one is infrastructure less. Infrastructure based is cellular communications whereas infrastructure less is ad hoc networks. Fig.1 Classification of wireless communication networks A. Cellular Networks A Cellular Network is a wireless network distributed over areas called cells, each served by at least one fixed location known as a cell site or base station. The presence of base stations simplifies routing and resource management in a cellular network as the routing decisions are made in a centralized manner with more information about the destination node. The base station...

Words: 2917 - Pages: 12

Premium Essay

Cis System Analysis

...System Architecture 1. Define the term system architecture. Define the term scalability, and explain why it is important to consider scalability in system design. * System architecture translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods. Scalability is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise. Scalability is especially important in implementing systems that are volume-related, such as transaction processing systems. 2. When selecting an architecture, what items should a systems analyst consider as part of the overall design checklist? * Before selecting a system architecture, the analyst must consider the following issues: * Enterprise resource planning (ERP) * Initial cost and (TCO) * Scalability * Web integration * Legacy system interface requirements * Processing options * Security issues 3. What is enterprise resource planning (ERP) and why is it important? What is supply chain management? * Enterprise resource planning (ERP) defines a specific architecture, including standards for data, processing, network, and user interface design. It is important because it describes a specific hardware and software environment that ensures hardware connectivity and easyintegration of future applications, including in-house software and commercial...

Words: 1431 - Pages: 6

Premium Essay

Wired Networking, Wireless Networking

...NETWORKING Victor P. Mangulabnan Director, Professional Services Division FYI… Ø  1 DAY TRAINING (Informal) Ø  BREAK – Lunch Ø  Mobile Phone – Off or Silent Mode Ø  Raise a hand if there’s a question Ø  Introduce yourself NETWORKING Group of Computers connected together by cables or some other medium. Is a connection of two or more components that gives people the ability to share software, peripheral devices, communicate with each other and share processing power. IS ALL ABOUT INFORMATION ! Interconnec(vity  and  Interoperability   q  Interconnectivity (hardware) •  the means of transporting information between computers, inclusive of the physical media, the data packaging mechanism, and the routing between multiple network equipment pieces from the starting node until reaching the destination node. q  Interoperability (software) •  the methodology applied to make data understandable to computers that use proprietary or simply different computer operating systems and languages. TOPICS COVERED q  Communication Networks q  Network Types q  Classification Geographic q  Protocols and Standards q  System Requirements q  Labs & Exercises Communication & Networks BASEBAND Network is one in which the cable or other network medium can carry only a single signal at any time. vs. BROADBAND Network can carry multiple signals simultaneously, using discrete frequency for each signal. How Network Communicates ? Server ...

Words: 2163 - Pages: 9

Premium Essay

Networking Labs for Unit 6

...Labs Lab 6.1: Wireless Broadcast Domains Exercise 6.1.1 – A Basic Service Set does exactly what its name says; basic wireless service, one and only one AP creates the wireless LAN. Extended Service Set extends the wireless functions of a Basic Service Set. The difference is that in a BBS uses one AP to create one wireless LAN while an ESS uses more than one AP to create one wireless LAN. Exercise 6.1.2 – IEEE 802.11 Standards Standard | Frequency (GHz) | Maximum Transmission Rate (Mbps) | Standard Indoor Transmission Range (m) | Standard Outdoor Transmission Range (m) | 802.11a | 5 | 54 | 40 | 100 | 802.11b | 2.4 | 11 | 70 | 150 | 802.11g | 2.4 | 54 | 38 | 140 | 802.11n | 2.4 or 2.5 | 600 | 75 | | Lab 6.1 Review 1. It uses a beacon like transmission to find other devices on IBSS mode and on the same SSID to connect and share. 2. Infrared has a very short range and cannot penetrate walls and other objects making radio frequency superior. 3. Although WLANs have a lower speed they are more convenient than wired LANs. So the trade-off is speed for convenience of not having wires everywhere which is why WLANs are more common in households. Lab 6.2: Identifying WLANs Exercise 6.2.1 - What information about the wireless networks is available using the utility? The utility provides the name, signal strength, and MAC address of the available wireless networks. What information is given on the wireless networks with the Windows wireless connection manager...

Words: 574 - Pages: 3

Free Essay

Linux Wlan Config

...Wireless cards. Wireless cards are very different based upon what chipset you have. I personally use Atheros chipset cards which has screwed me up a bit with BackTrack as it has problems with using them for certain attacks. What I will again show is generic commands for setting up and configuring your wireless interfaces. The interface name (ath0 below) is entirely dependant on what chipset you are using, you may have any of the following: ath0 wlan0 wifi0 eth0 You need to find out what you have. To do this you should execute the following bash command: iwconfig -a This will show all wireless extension on your machine. You should see all of your network interfaces, but only the wireless ones will have detailed information next to it. Now you know what your wireless cards name is... Switch on your wireless card: ifconfig ath0 up To connect to an 'open' wireless access point (AP): iwconfig ath0 essid 'nameofnetwork' The 'nameofnetwork' is your Service Set IDentifer (SSID). That is the name of your network. To configure a WEP key: iwconfig ath0 key 3B5D3C7D207E37DCEEEDD301E3 To connect to a specific AP: iwconfig ath0 ap 03:27:A8:BC:0F:F1 Where '03:27:A8:BC:0F:F1' is the MAC address of your AP, also known as the Basic Service Set IDentifier (BSSID). Once you have setup your connection, you can get a DHCP address: dhcpcd ath0 Then check that you have an IP from the wireless network. But what if the network...

Words: 455 - Pages: 2

Free Essay

Wi Fi Sector

...Carrera† , Pascal Le Guyadec† † Thomson, Paris, France ‡ Stony Brook University, New York, USA ABSTRACT Sectorized antennas provide an attractive solution to increase wireless network capacity through interference mitigation. Despite their increasing popularity, the real-world performance characteristics of such antennas in dense wireless mesh networks are not well understood. We demonstrate our multi-sector antenna prototypes and their performance through video streaming over an indoor wireless network in the presence of interfering nodes. We use our graphical tool to vary the sender, receiver, and interferer antenna configurations and the resulting performance is directly visible in the video quality displayed at the receiver. Categories and Subject Descriptors C.2.1 [Network Architecture and Design]: Wireless Communication; C.4 [Performance of Systems]: Measurement Techniques We have developed a demonstrator that complements our previous measurement campaigns [3, 4] and its primary goal is to demonstrate the operation, the challenges, and the resulting performance of sectorized antennas in real-world dense 802.11 wireless mesh networks. We have designed a four-sector antenna [2] for operation in the 5GHz band with off-the-shelf 802.11 wireless cards. We equip a number of wireless nodes with these antennas and place them in vicinity of each other. We stream video content from a sender to a receiver in the presence of an interfering node while varying antenna...

Words: 1079 - Pages: 5

Free Essay

Specs Case Search

...Create databases to manage all audio, video and photo data. | Local Area Network – covered with the modemRequirements met – Connect all required peripheral devices to the system unit. | Video camera- Canon XA20 HD CamcorderRequirements met - Create video files. | Monitor – 24” NEC MultiSync EA244WMiRequirement Met – View video files as well as basic computer necessity. | Wireless Router – Linksys EA6900 AC1900 Smart Wi-Fi Wireless RouterRequirements Met – Have all PC’s connected to the internet. | | Server – 5/ HP ProLiant N40L MicroserverRequirements met- Transfer information between PC machines. | Microphone – Dynex – DX – USBMIC13Requirements met – Create audio files. | Speaker – Edifier SpinnakerRequirement Met – Participate in web courses and hear audio files. | | | | Digital Camera – Nikon– Df D-SLRRequirements met – Take high quality digital photos. | | | | | Scanner – Canon CanoScan 5600FRequirements met – Scan photos | | | | | Mouse – 2.4G Wireless Optical 800 / 1600cpi Requirements met – Basic computer necessity. | | | | | Keyboard – Logitech Wireless Solar K750Requirements met – Basic computer necessity. | | | | | System Unit Feature Processor | RAM | Adapter Cards | Ports | Storage Devices | Intel Core i7 – Requirement met –Superior All-Around...

Words: 413 - Pages: 2

Free Essay

It 234 Unit 7

...the internal workings of the system. This type of testing would be done in a penetration test. A gray test the attacker has some knowledge of the system they are trying to access. White box testing is when attacker has full knowledge of the system they are trying to gain access to. White box testing would be more of a vulnerability test. With both types of test being performed it will increase your chances of keeping your network safe. One type of testing would be ok but you would leave yourself open for either a long term or short term problem depending on which method is chosen. (Berkeley, 2014) Question 7-2 WEP stands for Wired Equivalent Privacy. This is a security protocol that is specified in the IEEE Wireless Fidelity standard. It adds security to a wireless local area network that is similar to the security a...

Words: 999 - Pages: 4

Premium Essay

Sec435 Week 5 Discussion 1 - Wireless Penetration

...Week 5 Discussion 1 "Wireless Penetration" Please respond to the following: Describe in detail the steps involved in cracking WEP encryption. Discuss the implications of relying on such a legacy protocol today and how essential it is for the IT industry to keep current with technology. Explain how to conduct a man-in-the-middle attack between a client (user’s computer) and their access point (AP). Discuss two trust issues which revolve around any type of wireless (i.e. Wi-Fi, WLAN, 3G, Bluetooth) communication. Wep is the basic security encryption mechanism. WEP is weakened by the use of a 24 bit initialization vector (IV) that is reused in a short period of time, thus rendering WEP vulnerable to attack by several readily available cracking tools. One of the challenges of wireless traffic analysis is the ability to inspect the contents of encrypted data frames. Now wireshark has the ability to decode many different network layer and higher protocols, encrypted traffic limits the ability to analyze packets and troubleshoot network problems. Wireshark offers some options to analyze WEP encrypted data. Wireshark offers some options to analyze WEP encrypted data. When configured with the correct WEP key, Wireshark can automatically decrypt WEP encrypted data. When and dissect the plaintext contents of these frames. This allows the administrator to use display filters, coloring rules and other Wireshark features on the decrypted frame contents. In this day in age WEP...

Words: 491 - Pages: 2