Wireless Network And Security - Desklib
VerifiedAdded on 2023/06/08
|20
|864
|401
AI Summary
This article discusses the technical information and WLAN sniffing tool for wireless network and security. It also provides recommendations for managing and securing WLAN. The article covers topics such as record WLAN access points, filtering network traffic, monitoring network security, identifying configuration issues, and more. The subject is Wireless Network And Security, and the course code and college/university are not mentioned.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Wireless Network And
Security
Security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
1 Task - 2..............................................................................................................................2
1.1 Record WLAN access points....................................................................................2
1.2 Technical Information...............................................................................................3
1.3 WLAN sniffing tool...................................................................................................7
1.3.1 Evidence..............................................................................................................7
1.3.2 Evaluations........................................................................................................12
1.3.3 Recommendation for manage and secure WLAN.........................................18
References...............................................................................................................................19
1
1 Task - 2..............................................................................................................................2
1.1 Record WLAN access points....................................................................................2
1.2 Technical Information...............................................................................................3
1.3 WLAN sniffing tool...................................................................................................7
1.3.1 Evidence..............................................................................................................7
1.3.2 Evaluations........................................................................................................12
1.3.3 Recommendation for manage and secure WLAN.........................................18
References...............................................................................................................................19
1
1 Task - 2
1.1 Record WLAN access points
WLAN access point detail is shown below [1].
For Home Network,
For Public Network,
2
1.1 Record WLAN access points
WLAN access point detail is shown below [1].
For Home Network,
For Public Network,
2
For Work Network,
1.2 Technical Information
Technical Information for Home network is illustrated as below [2].
3
1.2 Technical Information
Technical Information for Home network is illustrated as below [2].
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Home wireless network connection properties is shown below.
Wireless network connection detail is shown below [3].
4
Wireless network connection detail is shown below [3].
4
Technical Information for Public network is illustrated as below [2].
5
5
Technical Information for Work network is illustrated as below [2].
6
6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1.3 WLAN sniffing tool
The wireless sniffer is one of packet analyser and it is designed to intercept the data as it
is transmitted over a network and decode the data into a format which is readable for humans.
The wireless sniffer is specifically designed for capturing the data on wireless networks. This
tools has the various uses in IT environments. It has following ability like decode, intercept
and monitor the data that are transmitted which is useful for following aspects,
Filtering the network traffic
Monitoring the network security, activity and usage.
Identifying the configuration issues
Identifying the network bottle necks
Investigating and diagnosing the network problems
Here, we are using the Wire shark sniffing tool to capture the home network details [4].
1.3.1 Evidence
To capture the packets by follows the below steps.
First, open the wire shark and choose the home wireless network connection. It is shown
below.
7
The wireless sniffer is one of packet analyser and it is designed to intercept the data as it
is transmitted over a network and decode the data into a format which is readable for humans.
The wireless sniffer is specifically designed for capturing the data on wireless networks. This
tools has the various uses in IT environments. It has following ability like decode, intercept
and monitor the data that are transmitted which is useful for following aspects,
Filtering the network traffic
Monitoring the network security, activity and usage.
Identifying the configuration issues
Identifying the network bottle necks
Investigating and diagnosing the network problems
Here, we are using the Wire shark sniffing tool to capture the home network details [4].
1.3.1 Evidence
To capture the packets by follows the below steps.
First, open the wire shark and choose the home wireless network connection. It is shown
below.
7
For Public Network,
8
8
For Work Network,
Packet capturing is shown below.
For Home Network,
For Public Network
9
Packet capturing is shown below.
For Home Network,
For Public Network
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
For Work Network,
10
10
Captured packet details are shown below.
For Home Network,
For Public Network,
11
For Home Network,
For Public Network,
11
For Work Network,
1.3.2 Evaluations
1.3.2.1 Capture Time
The below screenshot is used to display the time taken for the packet capturing.
For Home Network,
The total time takes for the packet capturing is 5 minute 28 seconds [4].
12
1.3.2 Evaluations
1.3.2.1 Capture Time
The below screenshot is used to display the time taken for the packet capturing.
For Home Network,
The total time takes for the packet capturing is 5 minute 28 seconds [4].
12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
For Pubic Network,
For Work Network,
1.3.2.2 Total number of Captured Packets
The total number of captured packets is 11750. The average number of packets
received per second is 97.583 and the average size of the packets is 431.848 bytes.
For Public Network,
13
For Work Network,
1.3.2.2 Total number of Captured Packets
The total number of captured packets is 11750. The average number of packets
received per second is 97.583 and the average size of the packets is 431.848 bytes.
For Public Network,
13
For Work Network,
1.3.2.3 Protocol
The home network captured the following protocol. It is illustrated as below.
For Public Network,
14
1.3.2.3 Protocol
The home network captured the following protocol. It is illustrated as below.
For Public Network,
14
For work Network,
1.3.2.4 Throughput
The captured packets has the high throughput to provide the high network quality and
performance. The throughput graph is illustrated as below.
15
1.3.2.4 Throughput
The captured packets has the high throughput to provide the high network quality and
performance. The throughput graph is illustrated as below.
15
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
For Public Network,
For Work Network,
16
For Work Network,
16
1.3.2.5 Round Trip Time
The captured packets has the medium round trip time and it is influenced by various
factors like response time, number of hops, transmission medium and distance of the server.
It also influenced by the traffic level. The captured packet round trip time is shown below.
For Public Network,
17
The captured packets has the medium round trip time and it is influenced by various
factors like response time, number of hops, transmission medium and distance of the server.
It also influenced by the traffic level. The captured packet round trip time is shown below.
For Public Network,
17
For Work Network,
1.3.3 Recommendation for manage and secure WLAN
Wireless LANs (WLANs) convey surprizing profitability and new efficiencies to
associations everything being equal. Advances in WLAN highlights and capacities enable
associations to offer the advantages of wireless to their workers without sacrificing security.
Acceptably carried, WLANs can be as secure as wired systems. To secure and manage the
WLAN by follows the below steps [5].
Modify the default SSID
Use Strong Encryption
Deploy the authentication between the network and client
Use alternative security strategies
Ensure the management ports are secured
Monitor the Exterior Building and Site
18
1.3.3 Recommendation for manage and secure WLAN
Wireless LANs (WLANs) convey surprizing profitability and new efficiencies to
associations everything being equal. Advances in WLAN highlights and capacities enable
associations to offer the advantages of wireless to their workers without sacrificing security.
Acceptably carried, WLANs can be as secure as wired systems. To secure and manage the
WLAN by follows the below steps [5].
Modify the default SSID
Use Strong Encryption
Deploy the authentication between the network and client
Use alternative security strategies
Ensure the management ports are secured
Monitor the Exterior Building and Site
18
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References
[1]E. Geier, "5 Ways to Secure Wi-Fi Networks", Network World, 2018. [Online]. Available:
https://www.networkworld.com/article/3224539/mobile-wireless/5-ways-to-secure-wi-
fi-networks.html. [Accessed: 10- Sep- 2018].
[2]"How to secure a wireless LAN", SearchSecurity, 2018. [Online]. Available:
https://searchsecurity.techtarget.com/answer/How-to-secure-a-wireless-LAN. [Accessed:
10- Sep- 2018].
[3]"WLAN security: Best practices for wireless network security", SearchSecurity, 2018.
[Online]. Available: https://searchsecurity.techtarget.com/WLAN-security-Best-
practices-for-wireless-network-security. [Accessed: 10- Sep- 2018].
[4]C. Sanders, Practical packet analysis. San Francisco, Calif.: No Starch Press, 2017.
[5]"Wireshark · Go Deep.", Wireshark.org, 2018. [Online]. Available:
https://www.wireshark.org/. [Accessed: 10- Sep- 2018].
19
[1]E. Geier, "5 Ways to Secure Wi-Fi Networks", Network World, 2018. [Online]. Available:
https://www.networkworld.com/article/3224539/mobile-wireless/5-ways-to-secure-wi-
fi-networks.html. [Accessed: 10- Sep- 2018].
[2]"How to secure a wireless LAN", SearchSecurity, 2018. [Online]. Available:
https://searchsecurity.techtarget.com/answer/How-to-secure-a-wireless-LAN. [Accessed:
10- Sep- 2018].
[3]"WLAN security: Best practices for wireless network security", SearchSecurity, 2018.
[Online]. Available: https://searchsecurity.techtarget.com/WLAN-security-Best-
practices-for-wireless-network-security. [Accessed: 10- Sep- 2018].
[4]C. Sanders, Practical packet analysis. San Francisco, Calif.: No Starch Press, 2017.
[5]"Wireshark · Go Deep.", Wireshark.org, 2018. [Online]. Available:
https://www.wireshark.org/. [Accessed: 10- Sep- 2018].
19
1 out of 20
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.