...A Look at Wireless Networking Abstract Over the last several years technology has continued to evolve and grow exponentially. The need for wired and wireless networks has become vital in both individuals lives and in the work environment. There are several factors to consider when discussing wired and wireless technologies such as hardware requirements and security measures needed to ensure a secure network. Wireless network trends are now offering new technology such as cloud computing and simply being able to work from anywhere you want. As you read on you will understand the benefits of wireless technology in our personal lives and in work situations. A Look at Wireless Networking Many organizations such as universities, retail centers and your own office depend on the ability to share information in an efficient and useful way. Nowadays networks are an integral part of almost every business and in your own personal life. There are two options for setting up a network — wired and wireless. A wired network uses cables to connect to a computer and a wireless network uses radio frequencies to connect to a computer. The components required to set up a wired or wireless network are somewhat similar with a wireless network needing a few additional pieces. Wireless networks are allowing individuals and businesses to become more mobile. For example, people are able to work from home these days and can have a better work-life balance. Businesses such as Starbucks...
Words: 2645 - Pages: 11
...Cue-based Networking using Wireless Sensor Networks: A Video-over-IP Application Yeonsik Jeong ∗ School †‡ , Sriram Lakshmanan∗ , Sandeep Kakumanu∗ , and Raghupathy Sivakumar∗ † Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia of Multimedia System Engineering, SungKongHoe University, Seoul, Korea Email: {ysjeong, sriram, ksandeep, siva}@ece.gatech.edu, ysjeong@mail.skhu.ac.kr Abstract—In this paper we present a new approach called cue-based networking that uses hints or cues about the physical environment to optimize networked application behavior. We define the notion of cues and describe how cues can be obtained using a wireless sensor network as the underlying platform. We identify both the research and system challenges that need to be addressed to realize benefits of the approach under a target application of video delivery over IP networks. In the process, we identify a key challenge of wireless sensor networks, namely the timeliness-robustness tradeoff. We design an adaptive algorithm that balances this tradeoff satisfying both timeliness and robustness requirements. Through an implementation of the video delivery application using the proposed algorithm in a real home environment, we highlight the practical benefits of the proposed approach. I. I NTRODUCTION Optimizing the behavior of application and network protocols has been a continuing endeavor since the origins of the Internet. In this paper we present...
Words: 7488 - Pages: 30
...Networking computers greatly benefits computer users. Networking enables sharing, sending, and receiving information. Whether you are hooked up to a local area network (LAN) or a wide area network (WAN), hooked up to a intranet or the internet, networking is one of today’s most essential products of technology. Many companies, such as Bluetooth Technology, are expanding our networking capabilities to wireless. Wireless networking has its pros and cons, which will be discussed. Why go wireless? Someone may ask what the purpose of adapting and changing to wireless networking is necessary. To start with, it’s simply easier. It is hassle free. Can’t you imagine yourself lying at the beach with your laptop while surfing the net? Money would also be saved in the long run. For a simple home network, the current wiring may not sound so complicated. After all, what’s the big deal about connecting a few computers to a hub? However, schools, companies, buildings, and anything other than a small home network would greatly save money. I walk down the halls of the dormitory or in my school building, and I see wires everywhere - some places they’re hidden better than others. The point is that there are hundreds and maybe, in some cases, thousands of computers hooked up by all types of networks. Can you imagine the cost of installation of those networks? The hardware that it takes to maintain these networks are a fortune. After some time wires need to be changed, and that too...
Words: 310 - Pages: 2
...OpenRadio and Software Defined Cellular Wireless Networking As with most aspects of computer science, wireless network technology has evolved over the years by way of competing proposals and protocols, developed within academia, industry, or often through collaboration of the public and private sectors. As public adoption of computer networks increased, the demand for methods of connecting these networks and allowing users to access their resources led engineers and theoreticians to adapt existing electromagnetic radiation to transmit computer data over the same media which had previously been used to broadcast audio and video signals. For as widespread as the use of these technologies has become, most of the advancement and innovation still comes from within a relatively small community of experts in and around Silicon Valley. The subject of this report is one such collaboration known as the Open Networking Research Center, or ORNC, a joint task force between Stanford University and University of California at Berkeley, sponsored by prominent technology companies such as HP, Intel, Google, Cisco and VMWare. One of the projects that ONRC is working on is to develop a software defined networking solution for cellular wireless data networks, which they refer to as OpenRadio. This report will focus on what ONRC perceives as the problem or shortcoming with the current TCP/IP infrastructure which supports cellular wireless, what they propose as their solution, and how close they are...
Words: 1628 - Pages: 7
...A Comprehensive and Secure Solution ITS310 – Introduction to Computer Based Systems Colorado State University – Global Campus January 28, 2015 Table of Contents Desktops and Server 3 Peripherals 4 Networking 4 Security 5 A Comprehensive and Secure Solution Even small businesses can benefit from a solid network. Due to the unique nature of the site and the number of offices a Microsoft based small business network suits the location perfectly well. For this business I recommend purchasing 20 HP Desktops with standard peripherals, a wireless N based network infrastructure, and a Microsoft Windows 2010 small business server for user authentication, file sharing, and security. Desktops and Server The HP 6305 Small Form Factor desktop is an excellent option for this deployment. IT comes standard with a dual core AMD A4-5300 processor which has a 3.4 GHz core speed and a 1MB cache, built in Radeon HD 7480 Graphics, 8GB of DDR3-1600 RAM and a 1TB HDD. Windows 7 64-bit comes pre-installed; a 64-bit operating system is required to take full advantage of the 8 GB of RAM. Also installed is an Intel 7260NB 802.11a/b/g/n wireless network card to support a wireless network which will be discussed later. These machines will provide plenty of local storage and sufficient processing power to handle all standard business applications with sufficient RAM to handle most multitasking scenarios. For a centralized server an HP ProLiant ML310e Gen 8 will provide 2TB...
Words: 1048 - Pages: 5
...hidden node problem leading to increased interference and consequently reduced spectrum efficiency. In this paper we compare the degree of performance enhancement when a cooperative mode is used to share information about the channel versus when standalone decisions are taken about the state of the channel. Simulation results indicate superior performance of the cooperative mode in terms of the number of observed hidden nodes and probabilities of detection and false alarm. Keywords—Femtocell; Cognitive Radio; Dynamic Spectrum Access; Energy Detection; Hidden Node Problem; Spectrum Sensing; IEEE 802.22. I. INTRODUCTION Recent surveys have shown that indoor traffic accounts for more than 50% of the total data and voice traffic carried in wireless networks with most of the traffic originating from homes, airports, and schools [1] .This skyrocketing growth of indoor traffic coupled with the increased user demand for high broad band services necessitates new solutions that will provide the required indoor coverage and bandwidth. The existing macrocells are not efficient at delivering indoor coverage due to the high penetration losses in walls during signal propagation which leads to low coverage regions (black spots) [2].The promising solution towards satisfying the user requirements lies in the deployment of the low-cost low-power Femtocell Access points (FAP) which will enhance indoor coverage, deliver the required high bandwidth and also offload traffic from the macrocell networks...
Words: 3980 - Pages: 16
...layer plays crucial role in Ad hoc networks. Several routing protocols have already been proposed for MANETs. This paper describes the impact of MAC layer protocols like 802.11 and CSMA on the various routing protocols like AODV, DSR, ODMRP and Fisheye. Numbers of simulation scenarios were carried out by using Glomosim-2.03. The QoS parameters used are Throughput, Delay and PDR. Simulation results found that AODV performs better in 802.11 and CSMA, DSR and ODMRP performs better in only under 802.11. Keywords— MANET, AODV, DSR, FSR, GloMoSim, ODMRP I. INTRODUCTION Wireless communication networks are basically two types as shown in Fig.1. One is infrastructure based and other one is infrastructure less. Infrastructure based is cellular communications whereas infrastructure less is ad hoc networks. Fig.1 Classification of wireless communication networks A. Cellular Networks A Cellular Network is a wireless network distributed over areas called cells, each served by at least one fixed location known as a cell site or base station. The presence of base stations simplifies routing and resource management in a cellular network as the routing decisions are made in a centralized manner with more information about the destination node. The base station...
Words: 2917 - Pages: 12
...System Architecture 1. Define the term system architecture. Define the term scalability, and explain why it is important to consider scalability in system design. * System architecture translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods. Scalability is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise. Scalability is especially important in implementing systems that are volume-related, such as transaction processing systems. 2. When selecting an architecture, what items should a systems analyst consider as part of the overall design checklist? * Before selecting a system architecture, the analyst must consider the following issues: * Enterprise resource planning (ERP) * Initial cost and (TCO) * Scalability * Web integration * Legacy system interface requirements * Processing options * Security issues 3. What is enterprise resource planning (ERP) and why is it important? What is supply chain management? * Enterprise resource planning (ERP) defines a specific architecture, including standards for data, processing, network, and user interface design. It is important because it describes a specific hardware and software environment that ensures hardware connectivity and easyintegration of future applications, including in-house software and commercial...
Words: 1431 - Pages: 6
...NETWORKING Victor P. Mangulabnan Director, Professional Services Division FYI… Ø 1 DAY TRAINING (Informal) Ø BREAK – Lunch Ø Mobile Phone – Off or Silent Mode Ø Raise a hand if there’s a question Ø Introduce yourself NETWORKING Group of Computers connected together by cables or some other medium. Is a connection of two or more components that gives people the ability to share software, peripheral devices, communicate with each other and share processing power. IS ALL ABOUT INFORMATION ! Interconnec(vity and Interoperability q Interconnectivity (hardware) • the means of transporting information between computers, inclusive of the physical media, the data packaging mechanism, and the routing between multiple network equipment pieces from the starting node until reaching the destination node. q Interoperability (software) • the methodology applied to make data understandable to computers that use proprietary or simply different computer operating systems and languages. TOPICS COVERED q Communication Networks q Network Types q Classification Geographic q Protocols and Standards q System Requirements q Labs & Exercises Communication & Networks BASEBAND Network is one in which the cable or other network medium can carry only a single signal at any time. vs. BROADBAND Network can carry multiple signals simultaneously, using discrete frequency for each signal. How Network Communicates ? Server ...
Words: 2163 - Pages: 9
...Labs Lab 6.1: Wireless Broadcast Domains Exercise 6.1.1 – A Basic Service Set does exactly what its name says; basic wireless service, one and only one AP creates the wireless LAN. Extended Service Set extends the wireless functions of a Basic Service Set. The difference is that in a BBS uses one AP to create one wireless LAN while an ESS uses more than one AP to create one wireless LAN. Exercise 6.1.2 – IEEE 802.11 Standards Standard | Frequency (GHz) | Maximum Transmission Rate (Mbps) | Standard Indoor Transmission Range (m) | Standard Outdoor Transmission Range (m) | 802.11a | 5 | 54 | 40 | 100 | 802.11b | 2.4 | 11 | 70 | 150 | 802.11g | 2.4 | 54 | 38 | 140 | 802.11n | 2.4 or 2.5 | 600 | 75 | | Lab 6.1 Review 1. It uses a beacon like transmission to find other devices on IBSS mode and on the same SSID to connect and share. 2. Infrared has a very short range and cannot penetrate walls and other objects making radio frequency superior. 3. Although WLANs have a lower speed they are more convenient than wired LANs. So the trade-off is speed for convenience of not having wires everywhere which is why WLANs are more common in households. Lab 6.2: Identifying WLANs Exercise 6.2.1 - What information about the wireless networks is available using the utility? The utility provides the name, signal strength, and MAC address of the available wireless networks. What information is given on the wireless networks with the Windows wireless connection manager...
Words: 574 - Pages: 3
...Wireless cards. Wireless cards are very different based upon what chipset you have. I personally use Atheros chipset cards which has screwed me up a bit with BackTrack as it has problems with using them for certain attacks. What I will again show is generic commands for setting up and configuring your wireless interfaces. The interface name (ath0 below) is entirely dependant on what chipset you are using, you may have any of the following: ath0 wlan0 wifi0 eth0 You need to find out what you have. To do this you should execute the following bash command: iwconfig -a This will show all wireless extension on your machine. You should see all of your network interfaces, but only the wireless ones will have detailed information next to it. Now you know what your wireless cards name is... Switch on your wireless card: ifconfig ath0 up To connect to an 'open' wireless access point (AP): iwconfig ath0 essid 'nameofnetwork' The 'nameofnetwork' is your Service Set IDentifer (SSID). That is the name of your network. To configure a WEP key: iwconfig ath0 key 3B5D3C7D207E37DCEEEDD301E3 To connect to a specific AP: iwconfig ath0 ap 03:27:A8:BC:0F:F1 Where '03:27:A8:BC:0F:F1' is the MAC address of your AP, also known as the Basic Service Set IDentifier (BSSID). Once you have setup your connection, you can get a DHCP address: dhcpcd ath0 Then check that you have an IP from the wireless network. But what if the network...
Words: 455 - Pages: 2
...Carrera† , Pascal Le Guyadec† † Thomson, Paris, France ‡ Stony Brook University, New York, USA ABSTRACT Sectorized antennas provide an attractive solution to increase wireless network capacity through interference mitigation. Despite their increasing popularity, the real-world performance characteristics of such antennas in dense wireless mesh networks are not well understood. We demonstrate our multi-sector antenna prototypes and their performance through video streaming over an indoor wireless network in the presence of interfering nodes. We use our graphical tool to vary the sender, receiver, and interferer antenna configurations and the resulting performance is directly visible in the video quality displayed at the receiver. Categories and Subject Descriptors C.2.1 [Network Architecture and Design]: Wireless Communication; C.4 [Performance of Systems]: Measurement Techniques We have developed a demonstrator that complements our previous measurement campaigns [3, 4] and its primary goal is to demonstrate the operation, the challenges, and the resulting performance of sectorized antennas in real-world dense 802.11 wireless mesh networks. We have designed a four-sector antenna [2] for operation in the 5GHz band with off-the-shelf 802.11 wireless cards. We equip a number of wireless nodes with these antennas and place them in vicinity of each other. We stream video content from a sender to a receiver in the presence of an interfering node while varying antenna...
Words: 1079 - Pages: 5
...Create databases to manage all audio, video and photo data. | Local Area Network – covered with the modemRequirements met – Connect all required peripheral devices to the system unit. | Video camera- Canon XA20 HD CamcorderRequirements met - Create video files. | Monitor – 24” NEC MultiSync EA244WMiRequirement Met – View video files as well as basic computer necessity. | Wireless Router – Linksys EA6900 AC1900 Smart Wi-Fi Wireless RouterRequirements Met – Have all PC’s connected to the internet. | | Server – 5/ HP ProLiant N40L MicroserverRequirements met- Transfer information between PC machines. | Microphone – Dynex – DX – USBMIC13Requirements met – Create audio files. | Speaker – Edifier SpinnakerRequirement Met – Participate in web courses and hear audio files. | | | | Digital Camera – Nikon– Df D-SLRRequirements met – Take high quality digital photos. | | | | | Scanner – Canon CanoScan 5600FRequirements met – Scan photos | | | | | Mouse – 2.4G Wireless Optical 800 / 1600cpi Requirements met – Basic computer necessity. | | | | | Keyboard – Logitech Wireless Solar K750Requirements met – Basic computer necessity. | | | | | System Unit Feature Processor | RAM | Adapter Cards | Ports | Storage Devices | Intel Core i7 – Requirement met –Superior All-Around...
Words: 413 - Pages: 2
...the internal workings of the system. This type of testing would be done in a penetration test. A gray test the attacker has some knowledge of the system they are trying to access. White box testing is when attacker has full knowledge of the system they are trying to gain access to. White box testing would be more of a vulnerability test. With both types of test being performed it will increase your chances of keeping your network safe. One type of testing would be ok but you would leave yourself open for either a long term or short term problem depending on which method is chosen. (Berkeley, 2014) Question 7-2 WEP stands for Wired Equivalent Privacy. This is a security protocol that is specified in the IEEE Wireless Fidelity standard. It adds security to a wireless local area network that is similar to the security a...
Words: 999 - Pages: 4
...Week 5 Discussion 1 "Wireless Penetration" Please respond to the following: Describe in detail the steps involved in cracking WEP encryption. Discuss the implications of relying on such a legacy protocol today and how essential it is for the IT industry to keep current with technology. Explain how to conduct a man-in-the-middle attack between a client (user’s computer) and their access point (AP). Discuss two trust issues which revolve around any type of wireless (i.e. Wi-Fi, WLAN, 3G, Bluetooth) communication. Wep is the basic security encryption mechanism. WEP is weakened by the use of a 24 bit initialization vector (IV) that is reused in a short period of time, thus rendering WEP vulnerable to attack by several readily available cracking tools. One of the challenges of wireless traffic analysis is the ability to inspect the contents of encrypted data frames. Now wireshark has the ability to decode many different network layer and higher protocols, encrypted traffic limits the ability to analyze packets and troubleshoot network problems. Wireshark offers some options to analyze WEP encrypted data. Wireshark offers some options to analyze WEP encrypted data. When configured with the correct WEP key, Wireshark can automatically decrypt WEP encrypted data. When and dissect the plaintext contents of these frames. This allows the administrator to use display filters, coloring rules and other Wireshark features on the decrypted frame contents. In this day in age WEP...
Words: 491 - Pages: 2