Our Project demonstration is based solely on wireless internet technology. Basically, what we set out to do was to prove that a wireless internet connection could actually be made, and that it could made to be, at least somewhat, secure. Our goals are listed below:
1.-Setup a wireless connection to the internet.
2.-Ensure that the connection can be made and that the signal will remain constant.
3-Using WEP(wired equivalent privacy), ensure that the wireless connection can be made secure.
4.-Test signal strengths at different levels of bandwidth and distances.
Overall, this project was fairly simple. All we really had to do, was to test the signal strengths and resolve security and connectivity issues.
Wi-Fi Facts-
Wi-Fi is an 802.11 IEEE standard. The name 802.11 comes from the IEEE committee that standardized it. Wi-Fi stands for wireless fidelity. The whole idea behind wireless technology would be to create a network in which a group of people can access the network remotely. This enhances usability and in some sense, creativity. Wireless internet isn’t really that hard to setup. You need an access point, a server, and a laptop. After that, it’s all a matter of configurations and you’re in. The only real complaint that we heard about Wi-Fi is that there are security issues. Hackers have been known to drive around accessing people’s wireless networks. So security is an issue. One way to deal with security is to use WEP (wired equivalent privacy). This technology allows us to use wireless and still have some of the same protection as with a wired network.
How Secure is it really?
When a client communicates with an access point, this is when the network is most vulnerable to breaches in security. It is at this time that a hacker can access your network. Security issues are what continue to hold Wi-Fi technology back. A wired network offers a direct access to network jacks. This provides some defense right from the start. But a wireless network is not contained by walls or glass. A DeVry senior project even noted that a client was printing to printers in neighboring offices. This is where WEP comes in. While WEP addresses issues regarding casual hackers, it’s fairly useless against someone who is actually committed to hacking a wireless network.
Properly secure wireless systems: - To prevent data breaches it is very important to secure wireless networks. WI- Fi network security is necessary because it is very easy to hack the data and unauthorized access. Breaches can be prevented by using strong passwords, encryption methods, and strong verification.
In conclusion, the information covered in this paper shows the different types of security that is associated with each level of the standard OSI model. From the physical layer to the application layer, each layer has a different type of security which must be applied at each layer to prevent any security leaks, spoofing, and infinite loops. These are just a few of the different vulnerabilities that must be protected on a WLAN or LAN.
Starting with the current router, the NetGear WGR614 is an 802.11b wireless networking device originally released in 2002 and has an approximate 1650 Ft. range. Outside of no mention of the physical location of the device in the synopsis, which is concerning, a simple review of the device indicates that the device is technologically obsolete. For instance, the NetGear WGR614 came initially with wired equivalent privacy (WEP) only, and did not receive an update to provide it Wi-Fi Protected Access 2 - Pre-Shared Key, until 2 years after its release (). While the use of this router may deter the most basic intrusion attempts from individuals searching for quick access to a network. It was
Wi-Fi facilitates ease of use and is getting increasingly popular with homes and businesses. Multiple Wi-Fi Access Points can be located in a given area. Wi-Fi security issues continue to be a problem, as the number of Access Points grows.
The Wireless Application Protocol (WAP) uses the Internet as a gateway for the transmission of the protocol. WAP has brought the Internet and the sub-services that it provides right into our lives as we are on the move. WAP brings us information right to the screen of our mobile phone.
WLAN (Wireless Local Area network) and its components: The task of developing a WLAN on commercial front possesses a greater challenge. Developing initial design, purchasing and installing components, managing and providing maintenance to the systems are the main basic parts of the WLAN. When we use WLAN on a commercial front then we may face the security and privacy concerns. The total area of that particular commercial area should be accessible. This is only possible with installing huge number of access points. The various components of the WLAN are
Users can connect instantly and easily to the internet through their wireless devices anytime anywhere.
Wi-Fi is a technology that allows the interchange of data and connection to the internet using radio waves. The name Wi-Fi was a brand name which in English is a synonym of the word "WLAN" (Wireless Local Area Network). The Institute of Electrical and Electronic Engineers (IEEE) defines it as any WLAN products on their 802.11 standards that complete the Wi-Fi Alliance interoperability certification test may only use the “Wi-Fi Certified” Trademark. As of today, more and more devices are starting to use the Wi-Fi technology like laptops, Smartphones, and other media devices. This is by connecting a device through a hotspot at home or in different places. (Wikipedia, the Free Encyclopedia) The idea about Wi-Fi started in 1985 when Federal Communications Commission (FCC), an American Telecommunication Regulator decided to open several bands of wireless spectrum after the government allowed them to use it without a licence. Over several years, an engineer namely Michael Marcus took three spectrums from the industrial, medical and scientific bands and leaked it to communication entrepreneurs. (Wil Corp. Inc, 2004) In 1991, NCR Corporation/AT&T in Nieuwegein, Netherlands invented a precursor to Wi-Fi which was intended for the system of cashing. The first wireless devices/products were brought on the market with the name “WaveLAN”. A Dutch engineer, Vic Hayes named ‘father of Wi-Fi’ was with his team designing other Wi-Fi standards. Wi-Fi was used on the market as early as the year 2000 by the company called Interbrand Corporation, were hired by the Wi-Fi Alliance to think of a name that people will like. It was Phil Belanger, a founding member of the Wi-Fi Alliance selected the name “Wi-Fi” (a play for the term “Hi-Fi”) and created the...
There are many reasons why wireless networks are used. One reason is for a temporary backup to an
The propose research will address a problem confronting many two year institutions in the present-day (i.e. how to best plan, design, and implement WLAN technologies). While WLAN technologies offer the benefits of mobility, reduced installation time, and decreased cost, many challenges must be met by institutions deploying them (Geier, 2005). These issues are related to security, speed, interoperability, and equipment selection, ease of use, reliability, signal interference, installation, and health risks.
The radio is a wireless form of communication which is transmitted through sounds or signals by electromagnetic waves directly through space to a receiving set. Some types of radio communications are HAM radios, CB (Citizen Band) radios, Cell Phones, Radio Scanners and Walkie-talkies. Radio communications are widely used in the United States and majority of it is used by law enforcement and emergency services. Police/Sheriff, Fire-Rescue, Highway Patrol, Ambulance and EMS are some of the agencies that use radio communications.
Wireless is everywhere today whether at home working from your WIFI network to work where you might be linked a wireless network or even through your phone through a 3G or 4G network to connecting to an open wireless networks. As you can see for the most part people are connecting to wireless from the moment they leave their home till they get to work and then back. While wireless comm...
...g a connection to the LAN. If a group is using wired networking for their LAN then this is no issue at all, but wireless networking is quite another story. While using normal radio based wireless networking such as any normal wireless router the network is being broadcast in a giant umbrella shape outward from the router. Due to this umbrella shape bypassing all walls and objects in its path anyone can access it if they know how to break in and are within range. However, infrared wireless signals can be considered straight lines and not in a large encompassing shape. Additionally, infrared signals cannot penetrate walls and opaque solid objects and thus cannot be accessed unless within “sight” of the network. Essentially, by using infrared transmission you can be assured that your data will not leave the room or rooms that you have designated as part of your network.
Security for the network will be provided by a network based packet filtering firewall, proxy server and a Wi-Fi Protected Access 2 (WPA2) passphrase. I would also suggest not broadcasting the Service Set Identifier (SSID) and to set up the router to filter the Media Access Control (MAC) addresses so that devices that have their MAC addresses registered will be allowed access to the wireless network (Dean, 2013, p. 357). I would restrict access to the proxy, file and print servers by locking them in a secure climate controlled closet. Access would be controlled by a key card that would be held by the network administrator.
You can do a variety of things over Wi-Fi that you might not expect. For example, you can listen to music in multiple rooms in your home on wireless speakers; print documents anywhere in your house with a wireless printer; and update your Wi-Fi-enabled digital photo frame without even hooking up a camera or memory card. Plus, the possibilities are continuing to grow.