ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Wireless Networks and Security

Verified

Added on  2022/12/16

|12
|2030
|236
AI Summary
This document discusses wireless networks and security, including WLAN sniffing tools, recent wireless technologies, and their real-time applications. It also explores the strengths, weaknesses, and security issues of these technologies.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: WIRELESS NETWORKS AND SECURITY
Wireless Networks and Security
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1WIRELESS NETWORKS AND SECURITY
Table of Contents
Part A:............................................................................................................................2
Level of Complexity:.................................................................................................2
Included Features:......................................................................................................2
Comparison of models in functionalities:..................................................................3
Advantages and Disadvantages:.................................................................................3
Summarization of Findings:.......................................................................................4
Part B:.............................................................................................................................4
Most Recent Wireless Technologies:.........................................................................4
Use of these technologies in Real Time:....................................................................4
Strength, Weaknesses and Security issues:................................................................5
Conclusion:................................................................................................................6
References:.....................................................................................................................7
Document Page
2WIRELESS NETWORKS AND SECURITY
Part A:
Here the two selected WLAN sniffing tools are the Wireshark and another one is the
Wi-Fi Sniffer.
Level of Complexity:
Considering the level of complexity, it is somehow complex for the normal peoples to
use. For the expert peoples who are very good at the networking using Wireshark seems to be
easy for them. Eventually the Wireshark is one of the most popular WLAN sniffing tools that
is available in the market [1]. The Wireshark is also an open source WLAN sniffing tool.
Also, this tool is very easy to navigate.
(Figure 1: Installing Wireshark)
(Source: Created by the Author)
Another WLAN sniffing tool in this case is the Tcpdump which is also an open source
type of WLAN sniffing tool [2]. The tcmdump is actually a UNIX packet sniffers. This is a
Document Page
3WIRELESS NETWORKS AND SECURITY
classic type of utility and does not consists any type of graphical user interface. Due to this
reason the complexity level of tcpdump is comparatively higher than the Wireshark. All the
functionality of the tcpdump is done through command line interface.
Included Features:
The Wireshark is consisting various of features in terms of WLAN sniffing. The
Wireshark is able to identify the structure of different types of networking protocol which is
one of the main important features of it. With that the other features of the Wireshark are the:
Wireshark is capable of capturing data from wire of a live connection [3].
This live data can be read from various types of networks which includes PPP,
Ethernet and IEEE 802.11.
Captured data through Wireshark can be browsed via the GUI of it.
Wireshark is also capable of capturing the traffics from the VoIP calls.
(Figure 2: Capturing Data Packets Using Wireshark)
(Source: Created by the Author)

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4WIRELESS NETWORKS AND SECURITY
The Tcpdump is also an important WLAN sniffing tools with having some important
features. The main important features are the:
Tcpdump is capable of printing contents of the network packets.
Tcpdump is capable of reading packets in two ways. First it can read the packets
from a network interface cards and secondly this can read the packets from a
saved packet file.
Tcpdump can intercept and display communication of some another computer
system.
Document Page
5WIRELESS NETWORKS AND SECURITY
(Figure 3: Tcpdump on Windows CLI)
(Source: Created by the Author)
Comparison of models in functionalities:
While model of functionality is compared of the Wireshark with the tcpdump it is
determined that the Wireshark is very much similar compared with the tcpdump. The main
differences in this case is that the Wireshark is having a graphical user interface while the
tcpdump does not have this kind of GUI, instead of it tcpdump uses a CLI [3]. The Wireshark
Document Page
6WIRELESS NETWORKS AND SECURITY
is also dissimilar with the tcpdump in the case of some integrated filtering and sorting
options. Wireshark is capable of putting the network interface controller into the mode of
promiscuous so that the users of Wireshark can all the traffic visible on the interface of the
Wireshark [4]. For the case of tcpdump it is capable of applying the BPF filter for limiting the
packets number. The tcpdump is functional within the networks that are having a high
volume of traffic and renders output from it.
Advantages and Disadvantages:
Both of the Wireshark and the Tcpdump is having some advantages and
disadvantages. Here the main advantages of the Wireshark is that it is actually an open
sourced product and a free software. With that this is available is multiple of platforms
including Windows and UNIX. Also, detailed information can be fetched regarding the
packets within a network. The main disadvantages of the Wireshark are it is only capable of
gathering the information from the network but no information can be sent to the network [5].
In the case of the Tcpdump the main advantage is that it provides some additional
access to attributes of traffic which are just more than the port and the host information. Also,
the tcpdumps does not transmits any type of traffic to the network. The main disadvantage of
the tcpdump is that it does not have any type of GUI which makes this software harder to
handle.
Summarization of Findings:
Thus from the above discussion it is conformed that the Wireshark is comparatively
better than the tcpdump in the sense of WLAN sniffing. Tcpdump is actually a basic type of
WLAN sniffing tool and misses many advanced functionality compared with the Wireshark.
Also, the tcpdump does not consists any type of graphical user interface which makes
handling of this software more challenging.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7WIRELESS NETWORKS AND SECURITY
Part B:
Most Recent Wireless Technologies:
The three most recent wireless technologies are the Radio-Frequency identification,
Near Field Communication and the Wi-Fi Direct.
Use of these technologies in Real Time:
All of the three wireless technologies can be used in the real time applications. For the
real time application, RFID is very much essential in the logistic and supply chain
management [6]. RFID tags can be used in this case for tracking the logistics and the supply
chain in a real time so the organization can plan their business strategy in a proper way. This
RFID is also useful for real time inventory tracking. Inventory of an organization can be
tracked in real time wirelessly so that organization can determine when to replenish the stock
for a better business efficiency.
The NFC or the Near Field Communication is also a very much important wireless
technology and currently this is having the real time application on smart cards and in the e-
wallet system. Both the applications are related with the payment system. The NFC
integrated smart cards can be utilised in real time which offers cash free transaction
wirelessly [7]. This type of transaction is actually easy to follow and it is also easier
compared with the traditional method of payment. The payment service providers such as the
VISA and the MasterCards are providing NFC payment services through their cards. In this
case the e-wallet can be also utilised for the payment related services wirelessly. For this
system the smartphone need to have the NFC wireless sensors and the users will be able to
pay directly through their mobile wirelessly in a real time.
The Wi-Fi direct is another important wireless technology which can be used for the
real time data transferring among the devices. Through the use of Wi-Fi direct the files can
Document Page
8WIRELESS NETWORKS AND SECURITY
transferred among devices wireless and seamlessly with a high speed [8]. For this two
devices need to connect with each other through the Wi-Fi direct and then file can be shared
among them on real time basis. There are various of applications which utilises the Wi-Fi
direct for the data transfer among various of devices.
Strength, Weaknesses and Security issues:
The main strength of RFID is that its scanning range is very much high. The main
weakness in this case is that RFID faces scanning issues many times regarding metal and
water. The security issue in this case is that unauthorised devices are capable of reading and
changing the data of RFID tags.
The main strength of the NFC is that it is very much versatile. It can be used for
various purposes within various industries. The main weakness of the NFC is that it is very
much expensive and it restricts the usage of NFC. The main security issue related with the
NFC is that hackers can get unauthorised access to the NFC devices to see the stored data
within it.
The main strength of the Wi-Fi direct is that it provides a faster data transfer rate. The
main weakness in this case is that the Wi-Fi direct consumptions a high amount of energy [9].
The security issue related with the Wi-Fi direct is that it uses the WPA security which
requires the pin based authentication. Here the pin can be cracked by the Brute Force attack.
Conclusion:
Thus from this report it can be stated that the RFID wireless technology will be
standout among these three technologies. It is stated as the RFID security have better security
structure compared with the NFC and the Wi-Fi direct. Also, the RFID is currently used
various of sectors while the NFC and the Wi-Fi direct is having some limited applications.
Document Page
9WIRELESS NETWORKS AND SECURITY
This shows the usability of all the three devices thus it can be stated that the RFID will be
succeed more in the near future.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10WIRELESS NETWORKS AND SECURITY
References:
[1] Sanders, Chris. Practical packet analysis: Using Wireshark to solve real-world network
problems. No Starch Press, 2017.
[2] MartinGarcia, Luis. "TCPdump." (2016).
[3] Chappell, Laura. Wireshark 101: Essential Skills for Network Analysis-Wireshark
Solution Series. Laura Chappell University, 2017.
[4] Iliofotou, Mario. "Tcpdump filters." (2014).
[4] Lamping, Ulf, Richard Sharpe, and Ed Warnicke. "Wireshark User’s Guide for Wireshark
2.1." (2014).
[5] Ndatinya, Vivens, Zhifeng Xiao, Vasudeva Rao Manepalli, Ke Meng, and Yang Xiao.
"Network forensics analysis using Wireshark." International Journal of Security and
Networks 10, no. 2 (2015): 91-106.
[6] Amendola, Sara, Rossella Lodato, Sabina Manzari, Cecilia Occhiuzzi, and Gaetano
Marrocco. "RFID technology for IoT-based personal healthcare in smart spaces." IEEE
Internet of things journal 1, no. 2 (2014): 144-152.
[7] Coskun, Vedat, Busra Ozdenizci, and Kerem Ok. "The survey on near field
communication." Sensors 15, no. 6 (2015): 13348-13405.
[8] Duan, Yufeng, Carlo Borgiattino, Claudio Casetti, Carla Fabiana Chiasserini, Paolo
Giaccone, Marco Ricca, Fabio Malabocchia, and Maura Turolla. "Wi-Fi Direct multi-group
data dissemination for public safety." In WTC 2014; World Telecommunications Congress
2014, pp. 1-6. VDE, 2014.
Document Page
11WIRELESS NETWORKS AND SECURITY
[9] Pyattaev, Alexander, Jiri Hosek, Kerstin Johnsson, Radko Krkos, Mikhail Gerasimenko,
Pavel Masek, Aleksandr Ometov et al. "3GPP LTEAssisted WiFiDirect: Trial
Implementation of Live D2D Technology." Etri Journal 37, no. 5 (2015): 877-887.
1 out of 12
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]