We know that collision detection is harder in wireless networks due to the “hidden-terminal” problem. But we can still use “collision avoidance” mechanisms to ensure that no two hosts transmit simultaneously. Collision avoidance mechanisms can be conservative – that is they have back off timers that gradually increase the back off intervals when an ack is not received. Instead of backing off, we can employ a more aggressive approach, so that frames are transmitted as soon as an idle channel is sensed. If there is an error, then the sender will not hear an ack within the timeout interval and can retransmit.
This technology allows us to use wireless and still have some of the same protection as with a wired network. How Secure is it really? When a client communicates with an access point, this is when the network is most vulnerable to breaches in security. It is at this time that a hacker can access your network. Security issues are what continue to hold Wi-Fi technology back.
Wireless LANs provide all the functionality of wired LANs, without the physical constraints or the wired connection itself. Wireless LAN configurations range from simple peer-to-peer topologies to complex networks offering distribution data connectivity and roaming. Besides offering end-user mobility within a networked environment, wireless LANs enable portable networks, allowing LANs to move with the knowledge workers that use them. One of the aims of the project is to illustrate suitability of a wireless LAN for the in use today. This will allow us to gain a more fundamental insight in the possibilities and restrictions of wireless LAN.
A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users. A firewall is often installed in a specially designated computer separate from the rest of the network so that no incoming request can get directly at private network resources. There are a number of firewall screening methods. A simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. For mobile users, firewalls allow remote access in to the private network by the use of secure logon procedures and authentication certificates.
So, it is important to secure the wireless network by utilizing small time to be saved in future. The security of wireless networks becomes more vital because it is most commonly used in every field. There are number of practices developed for securing wireless networks till now and because of the scope, and its importance, more research is being done for more secure wireless networks in future ( Solms, BV & Marais, E 2004). Wireless Network Security 1. Wireless Networking Basics According to (Vacca, JR 2006) The term wireless networking means the technology that facilitates two or more computers to communicate using standard network protocols, but without network cabling.
I would also suggest not broadcasting the Service Set Identifier (SSID) and to set up the router to filter the Media Access Control (MAC) addresses so that devices that have their MAC addresses registered will be allowed access to the wireless network (Dean, 2013, p. 357). I would restrict access to the proxy, file and print servers by locking them in a secure climate controlled closet. Access would be controlled by a key card that would be held by the network administrator. The packet-filtering firewall will keep out unauthorized data from entering the network and reduce the number of ports that are accessible by the users and outside threats.
Once a user enters an insecure Web site without realizing, the anti-virus and browser will block this malicious Web site automatically so it is a good practice to keep both up to date. Also, guarding the broadband router is crucial for home users. Default password of the router should be replaced by a more complicated password. At the same time, the password should not be too short or the words included in a dictionary otherwise it will be easily broken by the dictionary attack and the preferred DNS server may be changed to the poisoned DNS server that under the control of attacker. A strong password can ensure the security of the router and the users can stay away from Pharming attack.
Each vary in who they protect and the level of protection they offer MAC Address Filtering The first method is Mac Address filtering which most wireless access points (WAP) support. This is a process that allows you to limit the access to your network by using the physical address or wireless NIC’s. In other word the MAC address filtering creates a list of accepted users to limit access to the network. A table is stored in the WAP contains the MAC addresses that are allowed to connect to the wireless network. Any frames that do not contain one of the MAC addresses listed in the table are rejected.
This scenario represents some of the uses of wireless and why there is a lot of confusion when you start to talk about wireless. We will attempt to only touch on the subject of wireless or Wi-Fi, as it pertains to computers and computer networks in this document. According to an article in the San Diego Business Journal, wireless is more like the next dream world. Here are some of the benefits and things to come: “You can add devices to your network very readily. It is almost a no-brainer to get a wireless device (and) turn it on.
Wi-Fi technology and its application in Business organizations Objective To understand the Wi-Fi technology and its applications in Indian business organisations Introduction In today’s high-tech world connectivity to networks is extremely important for organizations to survive. Networking is possible of various machines like computers, laptops, cell phones etc. This term paper talks of Wi-Fi, the wireless technology that allows internet connection to be broadcasted through radio waves. Its purpose serves directly to the users looking for internet access devoid of any cords or wires. What is Wi-Fi?