Network Infrastructure Basics - Wireless Technology

Verified

Added on  2022/11/18

|7
|1739
|462
AI Summary
This report is a guide to help one understand the wireless network, the way they are set up, their usage and how they can be affected without forgetting how they have developed for the last half a decade.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: Network Infrastructure Basics 1
Network Infrastructure Basics
Wireless Technology
Student Name
Institution Affiliation

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Network Infrastructure Basics 2
Introductions
Ideally, in this era, technology has advanced and evolved in all corners of the world. Each
day there must be a new development with regards to the technology world. It has developed its
heights in essence that nowadays it is very hard to see an office without internet or computer
hardware’s depending on what they deal with. Technology has been used as a key element in
driving the business in achieving it objectives. Any business desire is to achieve its objectives in
all aspects using few resources in maximizing their benefits or anticipated profits. Notably, to
understand the network infrastructure basics, it is better for one to know what lies behind the
topic and what is needed.
Internet can be termed to be a global system of interconnected computers that usually
allows one to be able to interact with all the connected computers which are in different
locations, able to download and upload files, data among others. Internet can be much visible
when it is used to interact with the websites by use of infrastructures such as PC, Smartphones
and cellphones among others. Ideally, to connect via the internet, one must need an internet
connection that is usually provided by the internet Service provider. There exist two ways
through which one can access the internet from the ISP and that is through the ethernet and the
Wireless technologies. This report is a guide to help one understand the wireless network, the
way they are set up, their usage and how they can be affected without forgetting how they have
developed for the last half a decade.
Ethernet and Wireless Technologies
In my home the technology used is the wireless technology, however it has an extension
of using ethernet cable when need be. Ethernet technology can be referred as the system for
connecting to computers directly or to other gadgets such as PCs, laptops, printers, cameras or
Document Page
Network Infrastructure Basics 3
the wifi access points which might be close to the building. Ethernet does not entirely need ot be
connected to the internet. It is usually used to connect to devices in a LAN where devices can
communicate with each other via the internet. It usually cable that runs up to 100m or it can be
wireless where it uses Bridges or Hubs which are usually located on one property where they can
be extended to move to even several kilometers which is referred to amplification.
WI-FI usually allows to connect wirelessly to many devices within the given range. There
is a key feature of the Wi-Fi that usually allows wireless communication standard and which is
applied by many devices. This usually makes the devices to make the devices easy to connect.
There exist various Wireless technologies such as Bluetooth, Cellular among others.
The most known similarity for both Wireless and Ethernet technologies is that they both
connects computers to the internet together. They are like the same thing as they achieve the
same thing and that is the way they connect the devices to the router. In the wired they are more
susceptible to interference while in the wireless there is less interference. The flagging is
likewise unique, Wireless proselytes it to radio waves on a particular recurrence and shoots it out
every which way while wired sends an electrical sign over copper wire and is directional.
Furthermore the gadget can send and get information while working at 100Mbps full duplex or
more. When you go further back on things like center point and talked topologies and ring
topologies the PCs would pause and tune in before sending information.
Step for setting up a wireless Technology
In any set up, one must sit down think hard and make decisions based on what is
available and what is needed in the present and much more in the future. One must also
understand the major steps that will be needed so that the implementation can be beneficial to the
organization. The steps are be explained as follows.
Document Page
Network Infrastructure Basics 4
Step 1: Understanding the Network. One must know the benefits of the technology and
how this can help the business in saving money and thus being more productive.
Step 2: Plan it. This will help one in conducting an assessment which may include the
return on investment which may be anticipated (Sorensen, 2017). Some of the advantages are
such as what will be the reduced installation cost, flexible and convenient information access.
Step 3. Do it. The moment the plan has been defined then it is good to go ahead and
implement it making consideration that the network will consist of the two main components.
Wireless clients and the access points.
Step 4: Use it. This will be the configuration of the wireless specific security measures
that will ensure that the network is secure. This can be used through the WAP encryption, MAC
addressing and use of VPN.
Step 5: Support it. This can be done by feeding any additional help or support such as
planning a larger scale implementation such as the various suppliers and other immediate
consultants who can help in giving information and support.
Challenges of Using Wireless Technology
There is an existence of the Wi-Fi dead spots which usually causes trouble for the users
and sometimes affecting the customer satisfaction with the provider. Sometimes there are slow
and connections which are unstable (Mica, 2018). Sometime when there are many members
connected via the network, the users may not be satisfied fully as the will be inefficient
bandwidth usage. Lastly is the case of connection safety and the cyber security.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Network Infrastructure Basics 5
Vulnerabilities of WPA2 Encryption and their countermeasures
Ad-hoc networks, this usually pose a lot of security issues to a network. They are usually
identified as the peer to peer network between the computers connected wirelessly that rarely
have an access point between them (Tejaswi and Umar, 2015). They usually have very little
protection and thus the countermeasure for such a threat is by use of encryption methods which
will be applied in offering security to the network. Another vulnerability is when the cracker can
be able to listen on in which is referred to as MAC spooling (Tsitroulis, Lampoudis and
Tsekleves, 2014). Another attack is the Man-in-the Middle attacker that entices itself on the
computer to log in the computer they are set in. This makes the hotspots to be vulnerable to all
the attack since there is too little security (Vanhoef, 2013). Lastly is the denial of service of
attack (DOS) which is usually occurs when an attacker simultaneously bombards a targeted
Access Point or the network with requests and thus premature successful.
Ideally, in any network the following countermeasures can be used in securing a wireless
network.
This can be used by the use of encryption
Using anti-virus and the spyware software’s
Turning off the broadcasting form identifier.
Changing the router preset password for admin
Avoid assumption that the public hotspots are always secure.
Document Page
Network Infrastructure Basics 6
Impacts of Wireless Technology
Wireless Technology enables staff to share and access data in a hurry. Workers can team
up from anyplace and whenever (Hwang, 2014). Subsequently, it quickens the working
procedure and gets enough opportunity to business activities.
In the current era, many people have progressed in a manner that they need to be always
informed. Ideally, this has been estimated to be about 63.4% of the smartphone clients who
always get online using their phones. Notably, many people idea is to hope that they are
associated with internet which is growing rapidly. In this case, the use of Wi-Fi has been offered
by many customers especially to those visiting business premises and thus opeing plenty of
chances and opportunities in the business.
Wireless Connection has enabled people to be able to develop their workplace without
much more problems. Ideally, through the use of the wireless technology, clients have included
in the business effectively. (Scheck, 2016). Nevertheless, when rebuildimg an office, doing
some extensions, this can be overseen effectively. In the workplace where there is wireless
technology, this usually makes it simpler when there is need for any configuration. Another
concept is that the movement and the expense for such migration and supplanting will not be
there anymore and thus improving the cost of productive.
Document Page
Network Infrastructure Basics 7
List of References
Hwang, G. (2014). Applications, impacts and trends of mobile technology-enhanced learning: a
review of 2008–2012 publications in selected SSCI journals. International Journal of
Mobile Learning and Organization, 8(2), 83-95.
Mica, Z. (2018, December 07). Eight Challenges for Business Wireless Connection. Retrieved
from Zyxel.com: https://www.zyxel.com/objects/newsletters/zy4u/issue31/Eight-
Challenges-for-Business-Wireless-Connection.html
Scheck, S. (2016). Impact of Wireless Technology in the Workplace. Retrieved from
Smallbiztrends.com: https://smallbiztrends.com/2016/11/wireless-technology-in-the-
workplace.html
Sorensen, H. (2017, Nov 12). 5 Steps to Setting Up a Wireless Network. Retrieved from
Entrepreneur Insider: https://www.entrepreneur.com/article/71518
Tejaswi, K., & Umar, S. (2015). A Review of Issues and Challenges in Wireless Technology.
Tsitroulis, A., Lampoudis, D., & Tsekleves, E. (2014). Exposing WPA2 security protocol
vulnerabilities. IJICS, 6(1), 93-107.
Vanhoef, M., & Piessens, F. (2013, May). Practical verification of WPA-TKIP vulnerabilities.
In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and
communications security (pp. 427-436). ACM.
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]