logo

Wireless Network and Security

   

Added on  2023-04-07

16 Pages4456 Words155 Views
TITLE: WIRELESS NETWORK AND SECURITY
Wireless Network and security

Abstract
A wireless network has become the core in our today life both in businesses and also in our homes.
Good design and implementation should, therefore, be employed to ensure proper working of the
network. Ethics in a network is the most important aspect since these principles will help govern
and prevent its efficiency. IT experts are the personnel's to be relied on. They can help us to secure a
network from unauthorized access. Sensitive information of a business or a company should be kept
undisclosed to malicious people who want to manipulate for there own benefits but against the
businesses or companies wishes [1]. There should be no access to information by anybody except
only the authorized people who can keep data safe and they are responsible in any case. In modern
technology, there are different types of IT experts who use their skills for goodwill and also there
are those who use their skills for malicious purposes. Good design and implementation of the
wireless network is required since this as emerge to be a widely used type of network and many
people have trusted its availability and accessibility. Security of this wireless network is, therefore,
the most important. Information such passwords of the network should be kept confidential, secure
and unavailable to unauthorized people. In case of any malicious act on the network then its
important to consult the IT expert immediately before the malicious person gain access to the most
important and sensitive information [3].
Introduction
The most confidential way of sending data to the intended client is through encryption.
Confidentiality is the most and important way of communicating since the information to be passed
might be very important and agent therefore to avoid misconduct then it should be encrypted only.
WPA2 will generate keys for encryption for data being transmitted and RADIUS will perform the
authentication process. Integrity is paramount for communication in all aspects of life. Real
information should always reach out to the targeted client for communication to be effective. Both
WPA2 and RADIUS performs an important role in ensuring the information being sent is secured
by encrypting and only to be accessed by the authorized users [2]. In our businesses or our personal
lives, we always want information to be available to our clients or partners. The use of RADIUS
and WPA2 will make the availability of the information to be easy and efficient. Through
encryption and authentication of the data to the right people, this availability will be possible.
Sometimes information can be distorted by malicious people hence the communication will be
killed to make the information unavailable. This two methods of wireless security as a played a
major role. Information must always be authenticated to users. RADIUS has made this process very
easy and reliable. WPA2 also performs a key role in the encryption of data. Information must
always reach out to the authorized people. Through encryption of data by WPA2 process, then only
authorized clients will have access to the information [4].

Ethical implications of secure wireless network
A wireless network has become the core in our today life both in businesses and also in our homes.
Good design and implementation should, therefore, be employed to ensure proper working of the
network. Ethics in a network is the most important aspect since these principles will help govern
and prevent its efficiency. IT experts are the personnel's to be relied on. They can help us to secure a
network from unauthorized access. Sensitive information of a business or a company should be kept
undisclosed to malicious people who want to manipulate for there own benefits but against the
businesses or companies wishes. There should be no access to information by anybody except only
the authorized people who can keep data safe and they are responsible in any case. In modern
technology, there are different types of IT experts who use their skills for goodwill and also there
are those who use their skills for malicious purposes. They are known as hackers. Hacking is trying
to access information by breaking into somebody's network either by there knowledge or without
there knowledge. The "black hat" hackers are the malicious experts who want to manipulate the
information with the owns permission and they use such information for there own purposes. The
"white hat" hackers are the good experts whose use their skills to help the business or company to
acquire or have access to the information in case the password is lost or if malicious hackers had
tried to manipulate the companies information. The "white hat" hackers are most trusted experts
when it comes to the ethics of the business network. Security is the most important thing in any
business or company since that's the storage of everything nowadays are found in clouds [5].
Good design and implementation of the wireless network is required since this as emerge to be a
widely used type of network and many people have trusted its availability and accessibility.
Security of this wireless network is, therefore, the most important. Information such passwords of
the network should be kept confidential, secure and unavailable to unauthorized people. In case of
any malicious act on the network then its important to consult the IT expert immediately before the
malicious person gain access to the most important and sensitive information [6].

Wireless network designing using Boson Netsim
The Boson Netsim is a network technique design for simulators in Cisco. It is used to study the
traffics and there scenarios. Network simulation is scenario where a software or any other tool is
used to analyses the traffic or performs in a network concerning certain performance. This will
involve the monitoring and analyzing using network devices like routers, data links and packets in a
network. This is normally done in labs because sometimes it requires certain environments like
isolation. IT experts use it because of its versatility and powerfulness of network simulation. It is a
good software that can be used to simulate network traffic of the real network by designing and
controlling by the network experts. It allows the experts to create a very new topology and also they
can modify the existing ones. This tool helps you to work without packet tracer and therefore this is
the best alternative [7]. NetSim analytics are used for comparison and analyzing several protocols
under several networks like wireless or cellular. The data collected from analysis are presented by
use of graphs. This representations of data will let you compare the difference and note the changes
during the process. Mechanisms of allocating the available resources by each router depends on the
actions implemented by router to monitor the packets being buffered while are on the process of
submission [3]. The packets therefore, must queue in some manners for the buffer to use priority of
first-in-first-out . The packets will get served based on arrival time by the router. Priority technique
is used here so that smart flows of data can be done. Routing Information Protocol (RIP) is a
technique for computing routes where it allows hosts and gateways to interact in IP network.
Algorithm can be used in computation of this process. Routing will be invisible because of this IP
concept. Distance measurements are also included where the data-grams should have destination
entity.
A network model is the simplest and reliable way of showing devices and their relationship on how
they work. This comprises devices like switches, hubs, routers, cables etc. Modeling shows how
they work together and how mutually they depend on each other throughout the process. Netsim
network and its own architecture structures can be drawn using netsim software. It accepts the input
of data by the end-user through the process of configurations the flow of packets in the layers of
network. In every stage in layers then correct configurations and encryption of data is always done
appropriately in those layers hence data is secured. WiFi is more commonly used and its now
around 90% used every where because of its availability, offices and homes prefer it. It is very
simple to connect since you can only power on WiFi in your phone then all available WiFi will pop
up then you choose the one you want. All devices such as phones or laptops uses it. The device
required here is router where it will act like a distributor and the number of users can also be limited
[2].

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security and Design
|17
|3129
|395

Creating a Secure Enterprise Wireless Network with Ethical Implications
|9
|2358
|138

Wireless Network Vulnerabilities and Security Measures - Desklib
|7
|1988
|258

Wireless Network Routing and Switching - Assignment
|9
|1050
|121

Information Security Management Case Study 2022
|4
|646
|34

Design and Implementation of Secure Enterprise Wireless Network
|9
|3003
|441