Share on Google+
Share on Tumblr
Share on Pinterest
Share on LinkedIn
Share on Reddit
Share on XING
Share on WhatsApp
Share on Hacker News
Share on VK
Share on Telegram

Wireless Technology In Networks

The following article presents an overview about the emerging technology of wireless broadband networks. It focuses on the history, equipment, standards and implementation of Wi-Fi networks. The main objective of this research paper is to understand the various problems associated with the implementation of these WLANs and propose recommendation and measures to solve these problems and minimize the potential risks.

Table of Contents

Introduction

Telecommunication has become an integral part of our daily lives and is widely contributing to advancement in various fields. One of the emerging modes is wireless broadband technology which transmits multiplexed information over a wide band of frequencies. The deployment of wireless broadband services is done by weighing the geographical population density against bandwidth limitation. Wireless technologies are designed to reduce the time and different types of constraints created by cables and are more convenient than wired networking. In 1997, ‘Wireless Fidelity-popularly known as Wi-Fi technology was developed by the IEEE 802.11 standards, which provided users the freedom to connect to the internet from any location. But this service was very expensive until 2002, however the new 802.11g standards in 2003 have made WiFi enabled devices available to the masses, resulting in a Wi-Fi router becoming a household item in most modern homes in India today.

Since its inception, Wi-Fi technology has come a long way in providing quick wireless access to internet applications by transmitting data across a radio network, making the access process faster than traditional modems. Radio bands such as 2.4GHz and 5GHz depend on wireless hardware such as Ethernet protocols for Wi-Fi technology and CSMA enabled devices such as laptops, mobiles, tablets, etc. Many organizations and users have found that wireless communication and devices are convenient, flexible and easy to use. Users of wireless local area network (WLAN) devices have the flexibility to move their laptop computers from one location to another while maintaining connectivity with the network. Wireless personal networks allow users to share data and applications with network systems and other users, without being tied down by printer cables and other peripheral device connections. Users of handheld devices such as personal digital assistants (PDAs) and cell phones can synchronize data between PDAs and personal computers and use network services such as wireless email, web browsing, and Internet access. In addition, wireless communication can help organizations cut down on their wiring costs.

A. WiFi – Software Tools

Windowusers: knsgem2, NetStumbler, Omnipeek, Stumbverter, Wifi Hopper, Aptools.

Unix users: AirCrack, AirCrack-PTW, AirSnort, Cowpatty, Karma. Mac users: MacStumble, Kismac, Kismet.

(Users can select a Wi-Fi software tool that is compatible with their computer or else it must be built in)

B. To connect to Wi-Fi

A wireless adapter card is required. SSID infrastructure, and data encryption are also required.

Wi-Fi security methods include -MAC ID filtering, static IP addressing, and WEP encryption.

C. Wi-Fi network technology is based on the IEEE 802.11 protocol. As per the different Wi-Fi standards:

1) 802.11A technology has a range of 5.725 GHz to 5.850GHz with a data rate of 54Mbps.

2) 802.11b with a data rate of 11Mbps at 2.4GHz

3) 802.11E addresses QOS issues and is excellent for quality streaming of video, audio, and voice channels.

4) 802.11F addresses multivendor interoperability.

5) 802.11g deals with high data rate extensions in 2.4GHz to 54Mbps.

6) 802.11h deals with dynamic frequency selection and transmit power control for operating 5GHz products.

7) 802.11i addresses enhanced security issues.

8) 802.11J addresses channelization in Japan’s 4.9GHz band.

9) 802.11k enables the medium and network resources to be used more efficiently.

10) 802.11 deals with wireless network management which is still a work in progress.

Existing Technologies and Problems

The basic existing technology for implementation of wireless networks (WLAN) in residential and enterprise setups can be understood from these explanatory diagrams alone.

However our major concern in this research paper is that there are many issues associated with the deployment and management of WLAN. These include scalability, provisioning, real-time and non-real time data flow, accessibility range, power management interference from other systems operating in the same spectrum such as Bluetooth. The major problems that we need to address are- 1.Security Management 2.QOS (Quality of Service) and centralized management of WLAN.

Risk Environment

While wireless networks are exposed to many of the same risks as wired networks, they are also vulnerable to additional risks. Wireless networks transmit data via radio frequencies, and unless protected, are open to intruders. Intruders exploit this openness to access systems, destroy or steal data, and launch attacks that consume network bandwidth and deny service to authorized users. Another risk is the theft of the small and portable devices themselves.

Wireless networks and handheld devices are vulnerable to many of the same threats as traditional wired networks. Intruders who gain access to information systems via wireless communications can bypass firewall protection. Once they access systems, intruders can launch denial of service attacks, steal identities, violate the privacy of legitimate users, insert viruses or malicious code, and disable operations. Sensitive information transmitted between two wireless devices can be intercepted and disclosed if not protected by strong encryption. Handheld devices, which are easily stolen, can reveal sensitive information.

Solutions Based on Research

Recommendations for Secure Wireless Networks

• Maintain a complete understanding of the topology of the wireless network. • Keep an inventory of labeled and fielded wireless and handheld devices. • Frequently create backups of data. • Perform periodic security testing, audits, and evaluations of the wireless network. • Perform a risk assessment, develop a security policy, and determine security requirements before purchasing wireless technologies. • Carefully implement security management practices and controls to maintain and operate a secure wireless network after installation • The information system security policy should directly address the use of 802.11, Bluetooth, and other wireless technologies. • Configuration/change control and management practices should ensure that all devices have the latest software release, including security feature enhancements and patches for discovered vulnerabilities. • Standardized configurations should be employed to reflect the security policy, and to ensure consistency of operation and changes to default values. • Security training is essential to increase awareness of the threats and vulnerabilities inherent in the use of wireless technologies. • Strong cryptography is essential to protect data transmitted over the radio channel, and theft of equipment is a major concern • Enable, use, and regularly test built-in security features, such as authentication and encryption methods available in wireless technologies. • Firewalls and other appropriate security mechanisms should also be employed.

Conclusion

Organizations and individuals benefit when they protect wireless networks and devices. After assessing the risks associated with wireless technologies, organizations can mitigate the risks by implementing countermeasures to address specific threats and vulnerabilities. These countermeasures include management, operational, and technical controls that will not prevent all penetrations and adverse events, they can be effective in reducing many of the common risks associated with wireless technology.

Read Also:

  1. Overview Of Wi-Fi Technology
  2. Wi-Fi And Hotspots: Emerging WLAN Technology In Indian Context
  3. Negative Impacts Of Science And Technology
  4. Benefits Of Science And Technology
  5. General Architecture Of Wireless Technology
91140cookie-checkWireless Technology In Networks

Leave a Reply

Your email address will not be published. Required fields are marked *

Hey!

I’m Bedrock. Discover the ultimate Minetest resource – your go-to guide for expert tutorials, stunning mods, and exclusive stories. Elevate your game with insider knowledge and tips from seasoned Minetest enthusiasts.

Join the club

Stay updated with our latest tips and other news by joining our newsletter.

Tags

Air Pollution And Your Health and Uses Artificial Intelligence In Agriculture Artificial Intelligence In Banking Artificial Intelligence In Healthcare Best Website For Startup Business News Of India Difference between Blogging and Vlogging features Google Gemini What Is It Use How To Use History How Else Can You Earn Money From Blog Site Other Than Adsense How Much Traffic Should There Be On The Website For Adsense Approval How To Apply Website For Adsense Approval? Step-By-Step Guide How To Do Image SEO? Learn To Do Image SEO For Blog Article How To Earn Money With Affiliate Marketing How To Fast WordPress Blog Site How To Fix Low Value Content Error In Google Adsense How To Increase Traffic To Blog From Instagram How To Setup It? How To Start Blogging How To Take Care Of Health In Blogging How To Write SEO Friendly Blog Post? Rank Top In Google Introduction To Air Quality And Pollution Control In Which Language Should I Do Blogging? Hindi Or English Rank Math VS Yoast? Which Is The Best WordPress Plugin For SEO See Important Information Should We Start Blogging In 2025? Or Not Top 10 Free Blogging Platforms That Every Blogger Should Know About Top 10 Tips For Adsense Approval | You Will Get Adsense Approval In Just 24 Hours Top 10 WordPress Plugin For Blog Top Free Plugin For WordPress What Are The Types Of Artificial Intelligence Tools What Is Backlink? Ways To Create High Quality Backlink What Is Blogging? What Is A Blog? What Is A Blogger? What Is Blogging Business? Information Related To It What Is Copyright Act? What Problems Does A Blogger Face When Copyright Comes What Is CTR? How To Increase CTR? What Is Google Site Kit Plugin What Is Keyword Density? Every Blogger Should Know What Is Semrush? How To Do Keyword Research With It? Semrush SEO Tool Where To Get Content Ideas For Blogging? Unlimited Ideas Which Is Better Between Free Domain And Paid Domain Which One Earns More Money Which One To Start Blogging With? Difference Between WordPress VS Blogger Which Topic Should I Start Blogging With

error: Content is protected !!

Discover more from Altechbloggers

Subscribe now to keep reading and get access to the full archive.

Continue reading