Ask a question from expert

Ask now

COMP 101 - Wireless Networks & Security Assignment

13 Pages2744 Words127 Views
   

Franklin University

   

Wireless networking (COMP 101)

   

Added on  2020-02-24

About This Document

The below document discusses the Wireless Network and technology. The various concepts which have been discussed in this assignment are WIFI based LANs, RFID, WiGig, Bluetooth, cellular network, WMAN,satellite and many others.

COMP 101 - Wireless Networks & Security Assignment

   

Franklin University

   

Wireless networking (COMP 101)

   Added on 2020-02-24

BookmarkShareRelated Documents
Running head: WIRELESS NETWORKS AND SECURITYWireless Networks and SecurityName of Student-Name of University-Author Note-
COMP 101 - Wireless Networks & Security Assignment_1
1WIRELESS NETWORKS AND SECURITYTable of ContentsSection 1:........................................................................................................................1Introduction....................................................................................................................1Identification..................................................................................................................1Analyzing.......................................................................................................................2Examples and case study of RFID technology..............................................................4Case Study- Liverpool Hospital RFID Case Study........................................................4Other information related to RFID.................................................................................5Section 2:........................................................................................................................6References......................................................................................................................8
COMP 101 - Wireless Networks & Security Assignment_2
2WIRELESS NETWORKS AND SECURITYSection 1:IntroductionWireless technology or communication deals with the transfer of information amongseveral points, which are not connected physically or by any electrical conductor. Use ofwireless technology is increasing day by day and people are becoming more dependent ontechnology for improving the quality of living [1]. The wireless technology enhances thequality of work done and makes the work easier. The most commonly used wirelesstechnologies include WIFI based LANs, RFID, WiGig, Bluetooth, cellular network, WMAN,satellite and others [2]. Wireless Security is the security process that protects the networkfrom unauthorized access or some damage to the system or computer network is the wirelesssecurity. IdentificationImportant issues of RFID technology are-1.The systems of RFID can be disruptedRFID uses electromagnetic spectrums that are easy to accumulate by the useof energy at right frequency [3]. This is not so much useful in stores but theseelectromagnetic spectrums are highly in use in hospitals or in fields likemilitary. The RFID tags that use battery are interrupted to due to break downof battery which hampers the system.2.Reader Collision of RFIDWhen signals from more than one reader overlap, then reader collisionhappens [4]. If such thing happens, the tag cannot respond to queries thata re
COMP 101 - Wireless Networks & Security Assignment_3
3WIRELESS NETWORKS AND SECURITYsimultaneous. To avoid this issues, many system uses protocol that are anticollision.AnalyzingSecurity Issues- 1.Even after the item that leaves the supply chain, the RFID tag can be readThe scanners of RFID are portable that is they cannot make any difference betweendifferent readers [5]. The tags of RFID can be read from a minimum distance that may be afew yard or inches. This enables a person standing some distance from the tag to know all thebelongings of the person in his purse.2.The tags of RFID are difficult to removeCustomers face difficulty to remove the RFID tags. This is because they are verysmall in size or they are inside the product which is invisible for the customers to see.Customers are unable to remove the tags.3.The tags of RFID can be read without the permission of the ownerThe codes that are present in the belongings of the customers can be read by anyintruder as they can be read from a distance part the person. This creates a problem forcustomers as others get to know what is present in their purse.4.With high frequency antenna, RFID tags can be read from a far distanceRFID tags are made in such a way so that the tags can be read by the reader atminimum distance between tag and reader [6]. High frequency antennas are used to read theRFID tags from a far distance which leads to an issue.
COMP 101 - Wireless Networks & Security Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Challenges with RFID Tags in Internet of Things
|6
|1157
|279

Working of Radio Frequency Identification (RFID)
|10
|2235
|202

RFID & NFC and Wireless Network Design
|25
|885
|138

RFID Implementation in Walmart and Metro Group Research 2022
|7
|2255
|22

TECH 1000 - Radio Frequency Identification | RIFD
|6
|1335
|88

Report on the Business Information System
|11
|2489
|272