It has a lot of scope for usage from networking to pairing devices, it provides a wireless connections. There are many other devices, like Smartphone, tablets, Laptops, etc which have Wi-Fi client so that they can access any of the Wi-Fi access point or hotspot to access data services or internet. Research Wi-Fi is a known technology and works on the protocols as defined by IEEE (Institute of Electrical and Electronics Engineers) 802.11 standards. The name Wi-Fi is used as a synonym for Wireless LAN or WLAN. Normally the range of any wireless access point is few meters, however as it work on microware, the range reduces with any kind of obstacles such as wall.
Our Project demonstration is based solely on wireless internet technology. Basically, what we set out to do was to prove that a wireless internet connection could actually be made, and that it could made to be, at least somewhat, secure. Our goals are listed below: 1.-Setup a wireless connection to the internet. 2.-Ensure that the connection can be made and that the signal will remain constant. 3-Using WEP(wired equivalent privacy), ensure that the wireless connection can be made secure.
Wireless Networking The term wireless networking is a technology that enables two or more computers to communicate using standard network protocols without network cabling. The industry standard mainly used for wireless networking is IEEE (Institute of Electrical and Electronic Engineers) 802.11. What this standard is could be described as a wireless network with hardware that requires the use of technology, which deals with radio frequencies as well as data transmission. There are two kinds of wireless networks, Ad-Hoc (Peer to Peer), or access point (base station). Ad-Hoc (Peer to Peer) consists of a number of computers each equipped with a wireless networking interface card.
How does Wi-Fi work? Radio waves are the keys which make Wi-Fi networking possible. These radio signals are transmitted from antennas and routers and are picked up by Wi-Fi receivers such as computers and cell phones that are equipped with Wi-Fi cards. Whenever a computer receives any of the signals within the range of a Wi-Fi network which is usually 300 – 500 feet for antennas and 100 – 150 feet for routers, the Wi-Fi card will read the signals and thus create an internet connection between the user and the network without the use of a cord. Usually the connection speed is increases as the computer gets closer to the main source of the signal and decreases when the computer gets further away.
The IT, or Information Technology has become a standard and very critical part of today’s society. Wireless technology came from the basic just cellular usage to sensors in the medical field. Wires are now a thing of the past in today’s world with forever revitalizing technology. Wi-Fi (Wireless Network) or 802.11 networking is a phenomenal way of providing Internet wirelessly at a low cost. Using radio waves, a wireless network connects a PC, mobile phone or just about anything that connects to the internet wirelessly by a router.
This approach consists of two tokens: Passport (identification token) and Visa (authorisation token) to provide a flexible authentication method for foreign network to authenticate mobile users. The security analysis indicates that our proposal is more secure and suitable for ubiquitous mobile communications specially in roaming agreement-less enviroment. Keywords: authentication, ubiquitous wireless access, security protocols, roaming agreement, telecommunication security. Introduction The advanced capabilities of mobile devices and wireless technologies facilitate accessing variety of services over the Internet: e-mail, mobile commerce and mobile banking. It becomes more desirable to mobile users (MU) to access these services wirelessly while they are o... ... middle of paper ... ...munications Magazine, vol.
No machine plays a special r... ... middle of paper ... ...physical cables from one location to another; the installation is fast and inexpensive. It is also easier to provide network connectivity in difficult locations to access, such as warehouses or manufacturing plants. • Scalability: a wireless LAN can usually be extended with existing equipment, so that a cable network may require extra cables or other equipment. • Safety: the control and management of access to your wireless LAN network are important aspects for the success of its implementation. The latest advances in WiFi technology provide robust protection and allow you to ensure that your data are easily accessible through the wireless LAN network only to authorized persons.
By relying on industry standard protocols like TCP/IP, HTTP, SMTP and TAP, Mobile Services supports many of the major wireless networks currently in operation. This standards-based approach also provides MSD with a common security model that can operate across wireless networks, while at the same time taking some of the complexity out of doing business with different wireless network providers (Braden 1997). However, it is important to understand that there is currently no industry-wide security standard that will work on every mobile device and on every wireless network, in the way that X.509 and SSL span the PC universe. MSD bridges this gap wherever possible by adding its own security features (Freeburg 1991). Mobile Device Security Most mobile devices currently provide only a simple username/password combination to block use of the device (a few also offer local data encryption).
The total area of that particular commercial area should be accessible. This is only possible with installing huge number of access points. The various components of the WLAN are a) Wireless LAN NIC (Network Interface Card) b) Access points Wireless LAN NIC (Network Interface Card): Wireless LAN NIC is card that helps the devices to get connected to the WLAN. Today the systems are built with the Wi-Fi certified NIC’s, they can operate with any of the access points as well as the WLAN. There are some vendors who include NIC’s with additional features so that it can operate with the other networks as well.
These functions include configuring the DHCP server, security settings, firewalls, access restrictions, etc. Configuration the wireless access point is also done via a similar interface; a USB cable us used to connect to the access point firmware and configure the SSID on the network as well as the WEP key for secure wireless communications. The operating systems present on the various computers include Microsoft Windows 98, NT, 2000 and XP Professional. These provide a friendly user interface to the operators and, because they are from the same vendor, they interoperate efficiently. Because of their age, Windows 98 and NT are in the process of being phased out in favor of Windows XP Professional.