StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Secure Wireless Networking - Term Paper Example

Cite this document
Summary
The paper "Secure Wireless Networking" names standard 802.11 as effective principles that ensure to conserve the reliability and compatibility of the products used within a particular WLAN infrastructure that ensures wireless security for each computing device connected with the developed WLAN…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Secure Wireless Networking
Read Text Preview

Extract of sample "Secure Wireless Networking"

A Term paper about Secure Wireless Networking INTRODUCTION The popularity of Wireless Local Area Network (WLAN) has significantly grown in different types of network users encompassing wide range of commercial enterprises. In relation to the present day context, the rapid development of WLAN has becoming a key method in developing strong connectivity for the portable computing devices (Khan and Khwaja 8-53). THESIS STATEMENT The primary purpose of this study is to build a secure wireless network with 802.11 and to ensure wireless security for each computing device connected with the developed WLAN. Moreover, the report also emphasise in developing strong shield that can protect users from external threats such as hacking and build strong security protocols for wireless network. In order to increase the security efficiency of the wireless connectivity, the report would also provide effective Bluetooth standard for Personal Area Networks (PAN) and on the IEEE 802.11 standard for WLANs. BUILDING SECURE WIRELESS NETWORK WITH IEEE 802.11 Although the process of WLAN includes numbers of fundamental principles like the conventional LAN (Local Area Network) interconnectivity, WLAN has further witnessed to involve more attention in order to make successful deployment. The successful deployment of the WLANs highly requires abide by the fundamental guidelines of traditional LAN procedures along with the potential roles and performance of WLAN (Khan and Khwaja 8-53). The standard 802.11 was developed by the Institute of Electrical and Electronics Engineers (IEEE) and is highly focused on the two levels including physical layer and data link layer of a particular International Organization for Standardization (ISO) model (Potter and Fleck 9-16). The design of an effective IEEE 802.11 tends to affect only the physical layer of a particular wireless domain and builds higher amount of data rates with a strong connectivity among the computing devices. In order to clearly depict the different levels of an effective WLAN, the following graphical illustration represents the level associated within the IEEE 802.11 standard. The Different Levels of an Effective WLAN Source: (Laing, “The Security Mechanism for IEEE 802.11 Wireless Networks”) With reference to the IEEE 802.11, the standard basically involves two major types of transmission comprising Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS). The integration of spread spectrum within the IEEE 802.11 tends to empower to build stronger signal, which is comparatively stronger than the narrowband signal and harder to detect by the receiver. It also enables the overall WLAN to increase reliability along with bossts the output and allows bumbers of unrelated products to share the spectrum with a considerably minimal intervention. The FHSS transmission in the IEEE 802.11 signals hops from conveyer frequency at a feasible rate, which can be identified by the receiver and the transmitter in the networking system. On the other hand, the integration of DSSS enables the wireless networking system to sent ‘Chipping Code’ with each signal of the process, which can be decoded only by the receiver and transmitter within the particular WLAN platform (Laing, “The Security Mechanism for IEEE 802.11 Wireless Networks”). The deployment of an effective WLAN can be configured genrally in two types such as Adhoc mode and Client/Server networking mode. The Adhoc or Peer-to-Peer topology is consist of two or ore computing devices furnished by wireless based network interface cards that facilitate the devices to directly connect and communicate with each other. The following graphical representation illustrates the data transaction process of the compuiting devices through a WLAN (The Government of the HKSAR, “Wireless Networking Security”). The Data Transaction Process of the Compuiting Devices Through a WLAN Source: (Laing, “The Security Mechanism for IEEE 802.11 Wireless Networks”) Correspondingly, the Client/Server networking technology extend the existing wired LAN to the wireless devices through connecting them with the access point. In this process, the access point of the network plays an essential role through building connection between wired and WLAN and controlls the overall functions of the networking system. The following figure depicts the data tranmsaction process of the computing devices through a Client/Server networking topology (Holt and Huang 3-7). Data Tranmsaction Process of the Computing Devices Through a Client/Server Networking Topology Source: (Laing, “The Security Mechanism for IEEE 802.11 Wireless Networks”) WIRELESS SECURITY Although the popularity of deploying WLAN has achieved significant growth, the security of transactions along with different data processing functions has become a major concern. As the wired LAN topology, WLAN also essentially requires strong security features during the transaction process or connecting computing devices within a common networking platform (Hewlett-Packard Development Company, L.P., “Planning a Wireless Network”). A good and well-build security system for WLAN should be consisted with firewall along with intrusion detection system which can enable the wireless networking system to prevent various types of external threats (Ijeh, Brimicombe, Preston, & Imafidon, “Security Measures in Wired & Wireless Networks”). Moreover, the process of segmenting the overall networking system in line with the securtity measures can also facilitate the wireless network to avoid different types of potential threats during data transaction process within a particular network infrastructure (Laing, “The Security Mechanism for IEEE 802.11 Wireless Networks”). In relation to the present scenario of the networking system, the deployment of ‘Traffic Shapping Devices’ also plays a criucial role for the organisations to conserve adequate safety of WLAN. Therefore, The deployment of effective network security devices would enable WLAN infrastructure or the entire enterprises to identify and defend potential threats within the network interior. Moreover, the devices also helps WLAN administrators to manage and control network access functions to each client and protect enterprise from suspected visitors. The devices also determined to enhance the risk protecting capabilities of the administrators and help to monitor, report and troubleshoot network related vulnerabilities or problems (Cisco, “All Security Products”). HACK PROOFING YOUR WIRELESS NETWORK The deployment of hack proofing networking tools has long been witnessed to gain a fundamental attention for the enterprises to protect electronic assets from external threats. In order to configure an effective and well-build hack proof infrastructure, WLAN system should highly focus on strengthening physical security of WLAN infrastructure (Russell, Kaminsky, Puppy, Grand, K2, Ahmed, Flynn, Dubrawsky, Manzuik and Permeh, Hack Proofing Your Network 2-7). Building Physical Security. Physical security can be regarded as one of the essential aspects for the government agency while it seeks to build effective network security infrastructure with regard to its vital information (North American Electric Reliability Corporation, 2008). An effective physical security plan is determined as one of the pivotal processes which is generally developed to ensure that all the ‘Cyber Assets’ are integrated within the electronic security perimeter (Cisco, “All Security Products”). The deployment of the physical security enables wireless network administrators to monitor the physical access of each individual user within a particular WLAN. Moreover, it also provides adequate support to the enterprise to document as well as implement adequate procedural measures to effectively manage the accession of physical entity within each access point of the security perimeter(s) (Cisco, “All Security Products”). In this context, the physical security measure would be an effective strategy to build strong shield against the potential threats of hackers. SECURITY PROTOCOLS FOR WIRELESS NETWORKS With reference to the various observations, it has been identified that the security protocol for the wireless network can be classified into different types (Nichols & Lekkas 9-11). In this context, few of the major security protocols for home wireless network includes Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) (He, “Analysis of Security Protocols For Wireless Networks”). Wired Equivalent Privacy (WEP). WEP can be regarded as one of the effective original encryption protocols, which was designed and ensured to provide similar level of security provided by the wired network (He, “Analysis of Security Protocols for Wireless Networks”). Wi-Fi Protected Access (WPA). The protocol includes Pre-Shared Key (PSK), which ensures to enhance the security level of WEP of a particular wireless network. It is generally implemented to increase the security level of wireless network operating under the IEEE802.11i standard (He, “Analysis of Security Protocols for Wireless Networks”). Wi-Fi Protected Access version 2 (WPA2). This security protocol is an upgraded version of WPA which is designed to ensure better security level of the wireless network. The use of Advanced Encryption Standard (AES) for the encryption process of a particular wireless network is the major element of WPA2 that provide adequate security to the enterprise and protect unauthorised access of users (He, “Analysis of Security Protocols for Wireless Networks”). BLUETOOTH STANDARD FOR PERSONAL AREA NETWORKS (PAN) AND ON THE IEEE 802.11 STANDARD FOR WLAN Bluetooth Personal Area Network (PAN) is considered as an advanced form of technological aspect of wireless network that enables the enterprise to build Ethernet network using wireless links among the hand held devices, laptops and mobile phones. In this context, the major type of Bluetooth enabled wireless devices includes Personal Area Network User (PANU) device, Network Access Point (NAP) Device and a Group Ad Hoc Network (GN) device (Microsoft, “What is a Bluetooth personal area network (PAN)?”). With regard to the IEEE 802.11 standard, the integration of a Bluetooth enabled PANU tends to create a strong ad hoc networking structure including the computing and hand held devices within a particular wireless network. Correspondingly, the Bluetooth enabled GN device also creates ad hoc structure within a wireless network and enables the administrators to connect the PANU devices within a particular GN device. The integration of a Bluetooth enabled NAP make strong link of a particular computing device with a large network such as, internet, commercial access or corporate network (Microsoft, “What is a Bluetooth personal area network (PAN)?”). CONCLUSION The concept of Wireless Local Area Network (WLAN) has been identified as advancement over conventional Local Area Network (LAN), which generally requires air-waves rather connecting computers through physical mediums. The standard 802.11 can regarded as effective and widely accepted principles that ensure to conserve reliability and compatibility of the products used within a particular WLAN infrastructure. In the context of a wireless network, it is highly essential for an enterprise to organize layers of protective measures across networking system in order to prevent external threats. The rising numbers of vulnerabilities regarding security of the wireless network has been considered as the major concern for the enterprises to protect the accession of external threats into the network. In this context, the formulation of physical security of the wireless network would be an effective process of the enterprises to protect electronic assets. Moreover, the integration of advanced security protocols such as WPA2 would further enable to build strong shield against the potential vuilnerabilities to a particular WLAN. Works Cited “All Security Products.” Cisco. 2013. Web. 29 Jan. 2014. He, Changhua. Analysis of Security Protocols for Wireless Networks. 2005. Web. 29 Jan. 2014. “Planning a Wireless Network.” Hewlett-Packard Development Company, L.P. 2006. Web. 29 Jan. 2014. Holt, Alan and Chi-Yu Huang. Computer Communications and Networks. United Kingdom: Library of Congress. Print. Ijeh, A. C., Allan J. Brimicombe, David S. Preston, Chris .O. Imafidon. Security Measures in Wired and Wireless Networks. University of East London (2009): 113-121. Khan, Jahanzeb and Anis Khwaja. Building Secure Wireless Networks with 802.11. Canada: Willey Publishing Inc., 2003. Print. Laing, Alicia. ‘The Security Mechanism for IEEE 802.11 Wireless Networks.’ SANS Institute (2001): 1-8. Print. “What is a Bluetooth personal area network (PAN)?” Microsoft. 2014. Web. 29 Jan. 2014. Nichols, Randall K. & Panos C. Lekkas. Wireless Security: Models, Threats, and Solutions. India: Tata McGraw-Hill Education, 2006. Print. Potter, Bruce and Bob Fleck. 802.11 Security. The United States of America: O’Reilly & Associates Inc., 2003. Print. Russell, Ryan, Dan Kaminsky, Rain Forest Puppy, Joe Grand, K2, David Ahmad, Hal Flynn, Ido Dubrawsky, Steve W. Manzuik and Ryan Permeh. Hack Proofing Your Network – Second Edition. Rockland, MA: Syngress Publishing Inc, 2002. Print. “Wireless Networking Security.” The Government of the HKSAR. 2010. Web. 29 Jan. 2014. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Secure Wireless Networking Term Paper Example | Topics and Well Written Essays - 1750 words, n.d.)
Secure Wireless Networking Term Paper Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/information-technology/1807175-a-term-paper-about-secure-wireless-networking
(Secure Wireless Networking Term Paper Example | Topics and Well Written Essays - 1750 Words)
Secure Wireless Networking Term Paper Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1807175-a-term-paper-about-secure-wireless-networking.
“Secure Wireless Networking Term Paper Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/information-technology/1807175-a-term-paper-about-secure-wireless-networking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Secure Wireless Networking

Spread Spectrum in Cellular Technology and WLAN

From the paper "Spread Spectrum in Cellular Technology and WLAN" it is clear that a wireless local area network or WLAN is the technology that links two or more devices through an access point to the internet.... iv) Hybrid systemsSpread spectrum and WLANThe main idea behind spread spectrum is to separate a wireless communication into a set of related transmissions, send the messages over a wide range of radio frequencies, then collect and re-combine signals on the receiving side....
1 Pages (250 words) Essay

Building on prior success

networking, A Beginners Guide, Fifth Edition.... These individuals could utilize modern I-phones, with capability to access VPN connections, as the network connection enables seamless roaming between networks through utilizing wireless connections.... This version comes with a secure socket tunneling protocol from Microsoft, which would work efficiently with other supporting security protocols in providing secure connections....
2 Pages (500 words) Assignment

Telecommunications in information system

Firewalls and security codes in addition to spam alerts will be provided to all the networking equipment to avoid loss of any information.... This will be necessary because of the use of the public internet facilities such as wireless connections.... Certified wireless Network Administrator Official Study Guide (Third ed.... In conclusion, MAN and VPN integration will assist in ensuring that the dental offices have access to secure and faster transmission of patients information whenever they need it....
2 Pages (500 words) Essay

Business Data Communication and Networking

This will secure the information of the company and protect the copy rights and secrets behind the success of the company.... This paper tells that the company needs a network to connect the four departments that are in different headquarter locations by using a network that is applied to the wide geographical areas....
6 Pages (1500 words) Term Paper

Wireless Home Networking Simplified

?Wireless Home networking Simplified.... ?Take Control of Ipad networking & Security.... WPAThe Wi-Fi Alliance (WPA), an intermediate measure meant to take place of WEP was implemented through upgraded firmware on wireless network interface cards, purposely designed for WEP (Doherty 137).... However, because changes in the wireless access points (WPA) were more extensive compared to those needed on the network cards, it was impossible to upgrade most of the pre-2003 WAPs....
1 Pages (250 words) Assignment

Unit 4 Case Project Qeustions

Cisco networking Academy.... They have also expressed interest in wireless technology, as well as… All their employees are allowed to access the Internet.... They have also expressed interest in wireless technology, as well as an overall concern for security of their network.... What suggestions do you have for implementing wireless capabilities in the company?... ogan Enterprises Implement wireless networks utilizing a VLSM IP address scheme; using RIPv2 (classless routing protocols) in disseminating both network addresses, and their subnet masks....
1 Pages (250 words) Coursework

Network Implementation

It includes a list and cost of all material required to complete the networking job.... It includes a list and cost of all material required to complete the networking job.... Materials needed are wireless ADSL Router (NETGEAR DGN1000 N150 wireless ADSL Router at a market cost of $100) and others.... wireless ADSL Router (NETGEAR DGN1000 N150 wireless ADSL Router at a market cost of $100)2.... With a secure server being the central data storage point, there will be less data redundancy....
2 Pages (500 words) Coursework

Medical Informatics and Decision Making

A secure wireless network is important and can solve the issues associated with cell phones.... he use of Internet Social networking (ISN) platforms should also be implemented.... “Internet social networking (ISN) or online social networking is the use of web-based technologies to provide a virtual forum for internet users however diverse and afar to communicate and share ideas and information” (Cheng-Ming, Chan and Adnan, 2009 p....
1 Pages (250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us