Share on Google+
Share on Tumblr
Share on Pinterest
Share on LinkedIn
Share on Reddit
Share on XING
Share on WhatsApp
Share on Hacker News
Share on VK
Share on Telegram

Wireless Technology In Networks

The following article presents an overview about the emerging technology of wireless broadband networks. It focuses on the history, equipment, standards and implementation of Wi-Fi networks. The main objective of this research paper is to understand the various problems associated with the implementation of these WLANs and propose recommendation and measures to solve these problems and minimize the potential risks.

Table of Contents

Introduction

Telecommunication has become an integral part of our daily lives and is widely contributing to advancement in various fields. One of the emerging modes is wireless broadband technology which transmits multiplexed information over a wide band of frequencies. The deployment of wireless broadband services is done by weighing the geographical population density against bandwidth limitation. Wireless technologies are designed to reduce the time and different types of constraints created by cables and are more convenient than wired networking. In 1997, ‘Wireless Fidelity-popularly known as Wi-Fi technology was developed by the IEEE 802.11 standards, which provided users the freedom to connect to the internet from any location. But this service was very expensive until 2002, however the new 802.11g standards in 2003 have made WiFi enabled devices available to the masses, resulting in a Wi-Fi router becoming a household item in most modern homes in India today.

Since its inception, Wi-Fi technology has come a long way in providing quick wireless access to internet applications by transmitting data across a radio network, making the access process faster than traditional modems. Radio bands such as 2.4GHz and 5GHz depend on wireless hardware such as Ethernet protocols for Wi-Fi technology and CSMA enabled devices such as laptops, mobiles, tablets, etc. Many organizations and users have found that wireless communication and devices are convenient, flexible and easy to use. Users of wireless local area network (WLAN) devices have the flexibility to move their laptop computers from one location to another while maintaining connectivity with the network. Wireless personal networks allow users to share data and applications with network systems and other users, without being tied down by printer cables and other peripheral device connections. Users of handheld devices such as personal digital assistants (PDAs) and cell phones can synchronize data between PDAs and personal computers and use network services such as wireless email, web browsing, and Internet access. In addition, wireless communication can help organizations cut down on their wiring costs.

A. WiFi – Software Tools

Windowusers: knsgem2, NetStumbler, Omnipeek, Stumbverter, Wifi Hopper, Aptools.

Unix users: AirCrack, AirCrack-PTW, AirSnort, Cowpatty, Karma. Mac users: MacStumble, Kismac, Kismet.

(Users can select a Wi-Fi software tool that is compatible with their computer or else it must be built in)

B. To connect to Wi-Fi

A wireless adapter card is required. SSID infrastructure, and data encryption are also required.

Wi-Fi security methods include -MAC ID filtering, static IP addressing, and WEP encryption.

C. Wi-Fi network technology is based on the IEEE 802.11 protocol. As per the different Wi-Fi standards:

1) 802.11A technology has a range of 5.725 GHz to 5.850GHz with a data rate of 54Mbps.

2) 802.11b with a data rate of 11Mbps at 2.4GHz

3) 802.11E addresses QOS issues and is excellent for quality streaming of video, audio, and voice channels.

4) 802.11F addresses multivendor interoperability.

5) 802.11g deals with high data rate extensions in 2.4GHz to 54Mbps.

6) 802.11h deals with dynamic frequency selection and transmit power control for operating 5GHz products.

7) 802.11i addresses enhanced security issues.

8) 802.11J addresses channelization in Japan’s 4.9GHz band.

9) 802.11k enables the medium and network resources to be used more efficiently.

10) 802.11 deals with wireless network management which is still a work in progress.

Existing Technologies and Problems

The basic existing technology for implementation of wireless networks (WLAN) in residential and enterprise setups can be understood from these explanatory diagrams alone.

However our major concern in this research paper is that there are many issues associated with the deployment and management of WLAN. These include scalability, provisioning, real-time and non-real time data flow, accessibility range, power management interference from other systems operating in the same spectrum such as Bluetooth. The major problems that we need to address are- 1.Security Management 2.QOS (Quality of Service) and centralized management of WLAN.

Risk Environment

While wireless networks are exposed to many of the same risks as wired networks, they are also vulnerable to additional risks. Wireless networks transmit data via radio frequencies, and unless protected, are open to intruders. Intruders exploit this openness to access systems, destroy or steal data, and launch attacks that consume network bandwidth and deny service to authorized users. Another risk is the theft of the small and portable devices themselves.

Wireless networks and handheld devices are vulnerable to many of the same threats as traditional wired networks. Intruders who gain access to information systems via wireless communications can bypass firewall protection. Once they access systems, intruders can launch denial of service attacks, steal identities, violate the privacy of legitimate users, insert viruses or malicious code, and disable operations. Sensitive information transmitted between two wireless devices can be intercepted and disclosed if not protected by strong encryption. Handheld devices, which are easily stolen, can reveal sensitive information.

Solutions Based on Research

Recommendations for Secure Wireless Networks

• Maintain a complete understanding of the topology of the wireless network. • Keep an inventory of labeled and fielded wireless and handheld devices. • Frequently create backups of data. • Perform periodic security testing, audits, and evaluations of the wireless network. • Perform a risk assessment, develop a security policy, and determine security requirements before purchasing wireless technologies. • Carefully implement security management practices and controls to maintain and operate a secure wireless network after installation • The information system security policy should directly address the use of 802.11, Bluetooth, and other wireless technologies. • Configuration/change control and management practices should ensure that all devices have the latest software release, including security feature enhancements and patches for discovered vulnerabilities. • Standardized configurations should be employed to reflect the security policy, and to ensure consistency of operation and changes to default values. • Security training is essential to increase awareness of the threats and vulnerabilities inherent in the use of wireless technologies. • Strong cryptography is essential to protect data transmitted over the radio channel, and theft of equipment is a major concern • Enable, use, and regularly test built-in security features, such as authentication and encryption methods available in wireless technologies. • Firewalls and other appropriate security mechanisms should also be employed.

Conclusion

Organizations and individuals benefit when they protect wireless networks and devices. After assessing the risks associated with wireless technologies, organizations can mitigate the risks by implementing countermeasures to address specific threats and vulnerabilities. These countermeasures include management, operational, and technical controls that will not prevent all penetrations and adverse events, they can be effective in reducing many of the common risks associated with wireless technology.

Read Also:

  1. Overview Of Wi-Fi Technology
  2. Wi-Fi And Hotspots: Emerging WLAN Technology In Indian Context
  3. Negative Impacts Of Science And Technology
  4. Benefits Of Science And Technology
  5. General Architecture Of Wireless Technology
91140cookie-checkWireless Technology In Networks

Hey!

I’m Bedrock. Discover the ultimate Minetest resource – your go-to guide for expert tutorials, stunning mods, and exclusive stories. Elevate your game with insider knowledge and tips from seasoned Minetest enthusiasts.

Join the club

Stay updated with our latest tips and other news by joining our newsletter.

Tags

000 000 Home Guard Posts 000: This Will Ease The Burden Of Small Loan Recipients; RBI's New Guidelines Come Into Effect From April 1 10th Pass Can Apply; Recruitment For 200 Posts In CSIR 50MP Main Camera And 5500mah Battery; Starting Price ₹11 499 Adopt These 7 Most Effective Strategies Air Pollution And Your Health and Uses Apple iOS 18.4 New Release Date: Sweeping iPhone Update Drops Anytime Now Artificial Intelligence In Agriculture Artificial Intelligence In Banking Causes Of Environmental Pollution Difference between Blogging and Vlogging Do Not Panic Due To Heavy Fluctuations In The Stock Market: Focus On Fundamentals Instead Of Hearsay Effects Of Environmental Pollution Environmental Pollution Facebook And Instagram Were Down For 3 Hours:Users Had Trouble Logging-In And Posting Comments features Golden Opportunity To Become Agniveer Health Risks Due To Mobile Phone Use History India's Growth Will Help The Whole World: Bill Gates Said – India Will Be A Developed Nation By 2047 Infinix's Budget Smartphone Note 50x Launched: It Has 6.77 Inch HD+ Display It Was Down 6 Days Ago Mobile Phones Risks On Health Musk Accuses Ukraine Of Being Behind Cyber Attack On X: Attacks From IP Addresses There; Social Media Platform Was Down For Three And A Half Hours Negative Effects And Prevention Methods No Interest On Loans Up To ₹50 Not Able To Pay AGR-Spectrum Dues No Tension Of Battery Backup Now You Will Have To Pay ₹ 19 Charge For Withdrawing Cash After The Free Limit Oppo K13 5G Smartphone Private Job: Vacancy For Associate Content Writers In Physics Wallah; 1 Year Experience Required Recruitment For 15 Tesla Recalls Almost All Of Its Cybertrucks: The Outer Panel Can Separate While Driving The Eighth And Largest Recall Of The Model Types Vodafone-Idea Sought Help From The Government: May Get Relief Of ₹ 52 Thousand Crores What is Microsoft What Is Money What Is Sarkari Naukri When Your Samsung Galaxy Phone Will Get Android 15-Based One UI 7 Withdrawing Money From ATM Will Be Expensive From May 1: RBI Increased The Fee By ₹ 2 Work From Home Job

error: Content is protected !!

Discover more from Altechbloggers

Subscribe now to keep reading and get access to the full archive.

Continue reading