Ask a question from expert

Ask now

Report on Security for Wireless Network

6 Pages757 Words115 Views
   

Added on  2020-04-01

Report on Security for Wireless Network

   Added on 2020-04-01

BookmarkShareRelated Documents
[TYPE THE COMPANY NAME]Report on Security for Wireless NetworkUser_Name
Report on Security for Wireless Network_1
Table of Contents:Topic NamePage NumberCase Study 13Introduction3Steps need to follow to setup the connection3Setup configuration3Advantages4Disadvantages4Case Study 24Introduction4Handoff Theory5Client prevalence on an Access Point Based onUser5Client persistence on Access Point Based on Time4MAC Layer Handoff Process in WLANs5Acknowledgement5References52
Report on Security for Wireless Network_2
Case Study 1:1.The best possible way to help Raju to setup a secured camera through which he can monitorusing his spare is by securing his house with a wireless security camera for long rangetransmission, because by setting up a long range transmission, he can monitor his house atanytime, anywhere using any Wi-Fi enabled device like Laptop, I phone, I Pad, Androidmobile etc.2.Steps need to follow[2] to setup the connection are.a.Determine the computer IP addressb.Connect the Access Point to your networkc.Login to the Access Pointd.Change the default passworde.Configure the AP to Access Point Modef.Turn off MIMO signal transmissiong.Connect the camera to your routerh.Set the Camera's wired IP address to statici.Connect the wireless camera to WiFij.Set your wireless IP address to statick.Finally Test the camera's WiFi connection3.4.As the mobile phone is Wi-Fi enabled he can use it anywhere.5.The different security protocol will be:a.The Router should be configured with WPA-2[4]b.User name and password should be unique.c.SSL certificate need to be created.6.Advantages:a.Cost Effective: It is cost effective as we are going to use less number of wires.b.Setup is reliable: As the setup needs very simple steps to follow it is more reliable.c.High Scalability: Availability is more due to the use of wireless connection.d.High mobility: As the system can be connected through any mobile device the mobility is more.e.More Secured: The connection is more secured due to the use of security certificate.3
Report on Security for Wireless Network_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Proposal
|37
|7825
|351

Issues and Challenges in Wireless Network Security
|10
|2356
|68

Ethical Concerns of Wireless Technology in Global Communication Networks
|26
|8385
|265

Advanced Network Security - Doc
|19
|3116
|36

Network Configuration and Design setup
|21
|2810
|19

Physical Network Design
|7
|2006
|247