...Technical Writing Project Cover Sheet Capstone Proposal Project Name: Wireless Home Network Student Name: Degree Program: Information Technology Mentor Name: Signature Block Table of Contents Capstone Proposal Summary 1 Review of Other Work 2 Rationale and Systems Analysis 3 Project Goals and Objectives 5 Project Timeline and Milestones 6 Project Deliverables 8 References 10 Appendix 1: Competency Matrix 11 1 Capstone Proposal Summary This project is going to entail upgrading and installing new components to an existing wireless home network. This is a two story home with attic and basement. Inside this home, there are 8 rooms. A living area, an office area, kitchen, laundry room, 1 ½ bathrooms and 3 bedrooms. Following an interview and on site evaluation to assess what the current needs are, along with the direction of technology in the future. The new network needed to be focused on wireless connectivity of their various devices, which included smart phones, tablets and laptops. There also needed to be easy access for guests who wanted to connect to the wireless network for their own tablets, smart phones and laptops. Currently, the home has DSL internet service, with a basic wireless G router. The DSL service was adequate for the current network setup, but with more and more online content, they were having a problem with lag between devices. The current speed...
Words: 2803 - Pages: 12
...Wireless Sensor Networks and Their Usage Ali Raza,Shahid Rasheed & Shazib Javeed University Of Central Punjab Abstract Innovations in industrial, home and automation in transportation represent smart environments. Wireless Sensor Networks (WSNs) provide a new paradigm for sensing and disseminating information from various environments, with the potential to serve many and diverse applications Networks (WSN), where thousands of sensors are deployed at different locations operating in different modes .WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication capability and sufficient intelligence for signal processing and networking of the data. Wireless Sensor Networks (WSN) are used in variety of fields which includes military, healthcare, environmental, biological, home and other commercial applications. With the huge advancement in the field of embedded computer and sensor technology, Wireless Sensor Networks (WSN), which is composed of several thousands of sensor nodes which are capable of sensing, actuating, and relaying the collected information, have made remarkable impact everywhere? Key Words Wireless Sensor Network (WSNs) Structural Health Monitoring (SHM) Micro Electro-Mechanical Systems (MEMS) Introduction Sensor network is capable of sensing, processing and communicating which helps the base station or command node to observe and react according to the condition in a particular environment (physical...
Words: 2659 - Pages: 11
...RUNNING HEAD: Wireless network trends Wireless Network Trends Prepared by: Rossell Powell Professor Yana Todorova ISSC321 I002 Win 12 American Public University 02-25-2012 Networking abilities in households is an important feature as an increasing number of students attend school online and still others work from home. With this increase, an increase in the number of computers in the household increases and all are dependent upon one Internet source. There are advantages and disadvantages to household network set-ups ( Dubendorf, V. A. (2003) The advantages in the ability to form a home network are numerous. The three main advantages to home networking are: sharing a single Internet connection among multiple computers, sharing files among computers, and using a printer or other device connected to another computer. Another advantage is that less wiring is needed when additional computers have wireless capabilities (Freeze, J. T. 2000). “The addition of wireless capabilities to these gateway devices gives the user the convenience of taking a computer anywhere in the house, and not have to worry about running wires through walls and crawl spaces and attics to connect computers in various parts of the house” .While the student is doing homework, the parent can continue to do work online and access their e-mails. Security issues are the biggest disadvantage to home networking. From , there are at least four types of security issues that exist. The first is...
Words: 1005 - Pages: 5
...WIRELESS LOCAL AREA NETWORK: SECURITY ISSUES AND COUNTERMEASURES IN ORGANISATION Nor Rasyidah Binti Haminudin2011634444M. Sc. (Information Technology)Faculty Of Computer And Mathematical SciencesUniversity Technology MARA, Malaysianorrasyidah.haminudin@gmail.com | | | ABSTRACT Every organisation today is looking to implement Wireless Local Area Network (WLAN) infrastructure to improve its communication capabilities by providing access anywhere for employees, and more importantly, convenient access for customers and other users. WLAN provides users many benefits such as portability, flexibility, reduced hardware need and lower installation cost. Without a doubt, the benefits of WLAN enhance an organisation’s overall productivity. However, WLAN is not without its own security problems. WLAN infrastructures that are not secured would actually affect the security posture of the LAN environment as well. Having an unsecured WLAN can result in a loss of service, or can be used as a staging area to launch attacks against other networks. The significant challenges faced today in securing wireless LANs are maintaining privacy, data confidentiality, and preventing unauthorized access using proper access control mechanisms. This paper will mainly focus on the wireless access points (APs) as devices that act as a central transmitter and receiver or WLAN radio signals. It will begin by introducing the concept of WLAN. The introductory section gives brief information on the WLAN...
Words: 3541 - Pages: 15
...4G Wireless Networks: Opportunities and Challenges Hassan Gobjuka Verizon 919 hidden Ridge Irving, TX 75038 Abstract With the major wireless service providers planning to start deployment of 4G wireless networks by mid 2010, research and industry communities are racing against time to find solutions for some of the prominent still open issues in 4G networks. The growing interest in 4G networks is driven by the set of new services will be made available for the first time such as accessing the Internet anytime from anywhere, global roaming, and wider support for multimedia applications. In this paper describe some of the key opportunities will be made available by 4G networks, present key challenges and point to some proposed solutions. Index Terms—4G networks, Wireless Networks, Security and Privacy, Quality of Service, Architecture I.INTRODUCTION The existence of 4G Networks in today’s technology-driven society is important indicators of advancement and change. 4G, or Fourth Generation networks, are designed to facilitate improved wireless capabilities, network speeds, and visual technologies. It is anticipated that as these networks continue to thrive, the demand for advanced related technologies will also grow, thereby creating new alternatives for savvy technology users to exceed their desired expectations. The following discussion will evaluate the current state of 3G Networks and will examine the future potential of these networks in expanding technology-based capabilities...
Words: 2759 - Pages: 12
...with a great potential to grow in the market. In order to grow in the current market, Party Plates needs to continue to make technological advances. Through the increase in technology in the work place we can boost communications and cut costs. A great option for Party Plates to increase technology is to start utilizing wireless technologies. Personal Area Networks (PAN) PAN deals with short –range wireless networks. The main use for this technology is to eliminate cables connecting devices to peripherals. Usually, PAN include cordless products and Bluetooth. Wireless technology frees up floor space. With Bluetooth capability the company can wirelessly control equipment. In all technology, there are some pros and cons. The pros and cons for PAN are listed below. PROS • These wireless technologies are efficient. • They are also cost-effective. • Personal Area Networks are suitable for the business. CONS • If there are some technologies with the same radio bands some wireless technology can have interference. • Bluetooth is use for short range and is not capable of larger distances. Global Positioning Systems (GPS) The GPS is a wireless system that uses satellites to enable users to determine their position anywhere on earth (Rainer, 2011). PROS • Keeping Track of your company vehicles o Ability to see where and how far out a vehicle is (Mira, 2007). • The safety of your employees • Recovering of stolen merchandise • Routing o The GPS equipment is design...
Words: 664 - Pages: 3
...Wireless Networks Wireless media has affected the world in a major way. It is said that technology, media, and telecommunications are in for a big change over the next 10 years. This is happening because of the new social wireless change ("Wireless Social Networking To Transform Tech, Media, Telecom", 2012). Companies now have to shift their strategies if they want to stay in competition. Wireless media is so dominant in the twenty-first century. Wireless media advances so fast it is hard for companies to keep up. It is said that technology advances to the likes of a dog. When a dog turns one year old, they are technically seven years old. Every year technology advances seven times further then technology was the previous year. There are many challenges that are faced the advancing new technology and social wireless media. The biggest challenge is security. Many companies and individual users would like to know that once they let their information leak wirelessly that the information is secure. Hackers are more present than ever before in the world of wireless communications. If a company wants to have wireless media for their telecommunications then they are going to have some pretty good security protecting all of their information. The government even has problems trying not to let any information get leaked over the web. Many of these companies that have chosen to have all of their communications go wireless also have chosen to do a lot of their business over...
Words: 470 - Pages: 2
...Wireless Network Connections NT1110 Computer Structure and Logic Debbie Beals, Bill Fry, Donald Phillips Introduction If you find yourself in a fast food restaurant, trendy coffee shop or Hotel, your chances of being around a wireless network in the world today are very good. You may connect your computer at home or other electronic devices to a wireless network, also called WiFi or 802.11 networks. Wireless networks are easy to set up and mostly inexpensive. Very soon wireless networking may be available from just about anywhere and at any time. Bluetooth is a universal wireless standard for connecting various digital devices. Bluetooth is simply a way to connect devices to one another without the use of cables that transmits the signal over short distances. Bluetooth is “cable elimination technology”. Wireless Connections What is Wireless? Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. The most common wireless technologies use radio. With radio waves distances can be short, such as a few meters for television or as far as thousands or even millions of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples of applications of radio wireless technology include GPS units, garage door openers...
Words: 2795 - Pages: 12
...Wireless Network xxxxxxxxxxx Strayer University CIS 341 Professor Kevin Jayne My name is xxxxxxx from IT-Vets. Today we will go over the transfer of paper to electronic documentation. We will discuss the use of wireless technology and the risk that are involved. I will also provide ways to make sure we are as secure as we can be. I understand you are moving to electronic documentation due to a federal requirement. In 2004, President George Bush proposed a law that all medical documentation will be electronic by 2014. He stated “by computerizing health records, we can avoid dangerous medical mistakes, reducing cost and improve care.” With this said it is better to act now and get you changed over instead of waiting till the last minute. First thing we will do is go over the plan of attack. With any wireless network the first thing to think about is security. You don’t want just anyone in your network, especially with the sensitive information we will be housing on our network. One of the best ways to do this is to remain invisible. When you drive around with your phone and you have WiFi enable and you pickup signals all over, this is an example of broadcasting your signal. With only authorized users on this network, there is no need to publicly broadcast we have a wireless network. This to me is like a company broadcasting “come see if you can get into my network”. Without the carrot dangling in front of your company you will have less rabbits trying to nibble. Another...
Words: 610 - Pages: 3
...Wireless Networks & Network Security ISSC 340 Professor Vijay Venkatesh James Lange 08/13/2013 Wireless Networks are somewhat new technology in comparison to the know-how that makes them possible. The knowledge regarding wireless technology goes back about 200 years. One of the first individuals deserving recognition for today’s wireless networks is a scientist, inventor and politician named Benjamin Franklin. In 1747 he had built a model that showed how electricity could move through the air unaided by any type of wiring. In the early 1750’s Mr. Franklin started experimenting with electricity and the rest is history. Franklin was under the belief that lightening was an electrical current. So with the famous kite and key experiment he proved to himself and others that he was right. His fascination with electricity led him to later experiments with an electrical tube given to him by a friend. A second individual that played a part in today’s wireless technology is Hans Christian Oersted. In 1819 he had found that a compass needle had movement if it was presented with electrical current. This relationship between the needle and the electricity is an essential part of electromagnetism. It is said that this discovery by Oersted happened completely by chance. While preparing for one of his lectures he was setting up some of his equipment. The compass and battery were in close proximity to each other and the needle moved from magnetic north whenever the switch to the...
Words: 3213 - Pages: 13
...Paper CNT4514 Wireless Vulnerabilities The world of wireless networks as we all know is one of the most rapidly growing areas in our world today. With the massive amount of data that is going on, “the cloud” the security of all of our data is questioned. As well with so many of our day to day tasks relying on our wireless capabilities it make you wonder how safe is it to rely so heavily on something. We have to ask the questions what are the key vulnerabilities of wireless networks and even just of networks in general. Different types of networks have different levels of safety and it is a good idea to know not only which are safe but the vulnerabilities of said networks to keep our information out of the wrong hands and keep our day to day life moving as smoothly as possible. Unlike wired LANs the wireless LAN users are not restricted to the physical area of a wired system. While this may feel beneficial to the user it is also very beneficial to sniffing and eavesdroppers who are listening to the radio waves that are broadcasted through the air. Intercepting these packets they can pick up messages that may contain sensitive information. Seeing how the range of a wireless LAN can extend beyond the building the eavesdroppers don’t even need to be inside the building. A simple thing you can do is open up your wireless adapter on your computer and see how many open wireless networks are around you. From my house I currently have 4 open wireless networks that I can connect...
Words: 1614 - Pages: 7
...INTRODUCTION Wireless Sensor Networks (WSNs) are distributed embedded systems composed of a large number of low- cost, low-power, multifunctional sensor nodes. The sensor nodes are small in size and communicate wirelessly in short distances. These tiny sensor nodes can perform sensing, data processing and communicating. They are densely deployed in the desired environment. A sensor network consists of multiple detection stations called sensor nodes, each of which is small, lightweight and portable. Every sensor node is equipped with a transducer, microcomputer, transceiver and power source. The transducer generates electrical signals based on sensed physical effects and phenomena. The microcomputer processes and stores the sensor output. The transceiver, which can be hard-wired or wireless, receives commands from a central computer and transmits data to that computer. The power for each sensor node is derived from the electric utility or from a battery. Sensors use a signal of some sort, from the environment and convert it to readable form for purpose of information transfer. Each sensor node has multiple modalities for sensing the environment such as acoustic, seismic, light, temperature, etc. However, each sensor can sense only one modality at a time. The sensor nodes in the target tracking WSN use collaboration with the neighboring nodes. This requires data exchange between sensor nodes over an ad hoc wireless network with no central coordination medium. There...
Words: 1981 - Pages: 8
...500 4G Wireless Networks In telecommunications fourth generation (4G) represents the latest stage in the evolution of wireless data technologies. It is the successor to third generation (3G). A 4G system provides mobile ultra-broadband internet access to smartphones and other mobile devices. 4G mobile network standards enable faster data transfer rates than 3G. 4G has significant implications for the cloud. More and more businesses are migrating to Software-as- a-Service (SaaS) model. SaaS is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the internet 4G provides faster service to the applications while on the move. The data input for 3G is up to 3.1 with an average speed range between 0.5 to 1.5. The data input for 4G is 2 to 12 megabits per second (Mbps), but has a potential estimated at a range of 100 to 300 MBPS. 3G has a peak upload rate of 5Mbps compared to 4G 500 Mbps. The network architecture for 3G is wide area cell based. The network architecture for 4G is an integration of wireless local area network (LAN) and wide area. The service and applications for 3G are CDMA 2000, UMTS, and EDGE. The service and applications for 4G are Wimax2 and LTE-Advance. 4G network enables users to freely roam across different communication systems, so the user conception 4G is that they can avoid dropped calls, roaming charges and dead spaces with the 4G network. The...
Words: 885 - Pages: 4
...WIRE LESS MESS NETWORK WITH HRPU ABSTRACT A Wireless mesh network is a mesh network created through the connection of wireless access points installed at each network user’s locale. Each user is also a provider, forwarding data at next node. The networking infrastructure is decentralized and simplified because each node need only transmit as far as the next node. Wireless mesh networking could allow people living in the remote areas and small businesses operating in rural neighborhoods to connect their networks together for affordable Internet connections. Here we discuss a hybrid routing algorithm for wireless mesh networks. In HRPU, the mesh portal periodically broadcasts a mesh update message, which allows all nodes to have a route towards the mesh portal stored semi permanently in their routing table. Whenever a node has data to be sent to backbone network, it sends the data without any route establishment delay using the route to the mesh portal. In HRPU the mesh portals and mesh points are intelligent which further improves the performance. INTRODUCTION The Beginning: Wireless Mesh Networking (WMN) was developed as a quick way to set-up wireless networks during military operations. Since then it has grown considerably in popularity based on its advantages in both metropolitan and rural applications. WMNs are being applied as Hot Zones, which cover a broad area, such as a downtown city district. By 2010, municipal Wi-Fi networks will cover over 325...
Words: 4177 - Pages: 17
...SECURE ROUTING IN WIRELESS SENSOR NETWORKS By [Name] The Name of the Class (Course) Professor (Tutor): The Name of the School (University): The City and State The Date: Abstract. Wireless sensor networks (WSANs) are a group of sensors and actors that are linked by a wireless medium for the purpose of performing distributed sensing and action on a given task. This involves the sensors collecting information about the surrounding physical environment and sending the information to the actors which take the decisions and perform some needed action basing on the information received from the sensors about the surrounding environment. These sensor networks are sometimes referred to as wireless sensor and actuator networks. They monitor physical or environmental conditions such as sound, pressure, temperature among others and send the collected data to the required location. Effective sensing and acting requires a distributed local coordination methods and mechanism among the sensors and the actors in addition to this, sensor data should be valid in order for right and timely actions to be performed. This paper describes secure routing in wireless sensor networks and outlines its threats on security. Keywords: Wireless sensor and actor networks; Actuators; Ad hoc networks; Sybil attack; Real-time communication; Sinkhole; Routing; MAC; adversary. Introduction With the recent rapid improvement on technology, many networking technologies have been created to make...
Words: 5106 - Pages: 21