Comprehensive Wireless Network Security Report for Auto Parts Company
VerifiedAdded on 2021/05/31
|21
|5842
|24
Report
AI Summary
This report addresses the wireless network security challenges faced by Rare Vintage Auto Parts Ltd, an auto parts supplier with multiple offices and a warehouse. The company's current wireless network faces vulnerabilities, requiring a comprehensive security overhaul. The report begins with an executive summary, then delves into wireless security principles, encryption methods, and the components needed for secure connections. It identifies security threats, including unauthorized access and malicious attacks, and assesses associated risks. The report proposes solutions such as WEP authentication, key management, MAC address filtering, and deployment strategies for 802.11 wireless and PDA devices. The analysis covers hardware and software components, including internet service providers, routers, switches, and access points. The report emphasizes the importance of encryption, authentication, and access control to protect sensitive data and ensure secure communication across the company's network. The conclusion summarizes the findings and recommendations for a robust and secure wireless network infrastructure.

Executive summary
Rare Vintage Auto Parts Ltd supplies automatic parts to car machines, car dealerships,
and the mining industry. It contains totally four offices, and one warehouse. The four offices and
one warehouse from where all stock is stored. The four offices are located in kalamunda,
cottesloe, bays water, and joonalup. The four offices generate a turnover of $50 million per year,
with 150 employees. Over 50 % of business revenue is from credit card transaction.
The company head office is completely wireless based, and is situated in a heritage
building where ever the stores have a mix of wireless or wired connectivity. The organization
network is communicated by wireless connection.
The inventory system is placed at the warehouse and is accessed on and expensive fixed
512 Kbits lines. Recently Rare Vintage Auto Parts Ltd faces some issues like smooth running the
performance or business. The report about the resolution strategies for the customer is assign by
your bass. The wired computer network is stored by Cockburn central. But has wireless
connectivity for the tills which seems to experience intermitted dropouts’.
Additionally each store seems to have an access point, so the employees of each office
can easily use the handheld device. PDAs, Smart device, are the type of handheld device. So that
managers provide the permission for using laptop in their office. Finally this report fully focused
on the multiple vulnerabilities discovered in the current situation. In current wireless devices are
containing multiple block holes that are used to allow the penetration into the network. The
report contains a new design, solution, cost and appropriate implementation for the available
network. Sometimes an additional requirements are needed, so we need to purchase the new
requirements.
1
Rare Vintage Auto Parts Ltd supplies automatic parts to car machines, car dealerships,
and the mining industry. It contains totally four offices, and one warehouse. The four offices and
one warehouse from where all stock is stored. The four offices are located in kalamunda,
cottesloe, bays water, and joonalup. The four offices generate a turnover of $50 million per year,
with 150 employees. Over 50 % of business revenue is from credit card transaction.
The company head office is completely wireless based, and is situated in a heritage
building where ever the stores have a mix of wireless or wired connectivity. The organization
network is communicated by wireless connection.
The inventory system is placed at the warehouse and is accessed on and expensive fixed
512 Kbits lines. Recently Rare Vintage Auto Parts Ltd faces some issues like smooth running the
performance or business. The report about the resolution strategies for the customer is assign by
your bass. The wired computer network is stored by Cockburn central. But has wireless
connectivity for the tills which seems to experience intermitted dropouts’.
Additionally each store seems to have an access point, so the employees of each office
can easily use the handheld device. PDAs, Smart device, are the type of handheld device. So that
managers provide the permission for using laptop in their office. Finally this report fully focused
on the multiple vulnerabilities discovered in the current situation. In current wireless devices are
containing multiple block holes that are used to allow the penetration into the network. The
report contains a new design, solution, cost and appropriate implementation for the available
network. Sometimes an additional requirements are needed, so we need to purchase the new
requirements.
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
Introduction...........................................................................................................................2
1. Wireless security.................................................................................................................3
2. Wireless encryption............................................................................................................4
3. Plan of software and hardware components for secure connection...................................4
4. Security threats in wireless networks.................................................................................5
4.2 Security and information protection................................................................................7
5. Risk assessment in wireless network..................................................................................7
5.1 Risk management approaches..........................................................................................8
5.2 Threads to wireless network security...............................................................................9
6. Deployment of 802.11 wireless and PDA..........................................................................11
WEP authentication.............................................................................................................15
Solutions...............................................................................................................................16
Key management..................................................................................................................16
Integrity Check Value algorithm.........................................................................................16
MAC Address filtering.........................................................................................................16
7. Conclusion........................................................................................................................17
References:............................................................................................................................18
2
Introduction...........................................................................................................................2
1. Wireless security.................................................................................................................3
2. Wireless encryption............................................................................................................4
3. Plan of software and hardware components for secure connection...................................4
4. Security threats in wireless networks.................................................................................5
4.2 Security and information protection................................................................................7
5. Risk assessment in wireless network..................................................................................7
5.1 Risk management approaches..........................................................................................8
5.2 Threads to wireless network security...............................................................................9
6. Deployment of 802.11 wireless and PDA..........................................................................11
WEP authentication.............................................................................................................15
Solutions...............................................................................................................................16
Key management..................................................................................................................16
Integrity Check Value algorithm.........................................................................................16
MAC Address filtering.........................................................................................................16
7. Conclusion........................................................................................................................17
References:............................................................................................................................18
2

Introduction
Background scenario:
Wireless security is known as the process of providing security by the way of
design and implementation for the wireless network. In the scenario explained about the data
safety and how to secure the data through wireless. And in the way the scenario is about one
business industry of auto parts turnover particular amount of money per year with less number of
workers for the transaction. And the head office need to the wireless communication for
communicate with organization. In that wireless communication security is much needed in the
way of authentication. And the computer network is mainly based on wireless security to protect
the network. In that the organization and the small shops need the wireless security and want to
store their details via wireless link and additionally it have the device such as access point for the
wireless access and the devices like smart devices and handheld devices. The incident happened
in that company is related to data stolen like that in the office the data stolen by someone so their
requirement is to save the data by the wireless secure communication in the way of wireless
security. Their storage needs to be more frequency and the positive results and the
communication must between the administrator and head office and deployment of wireless
network and SQL inventory system is used to mainly for the communication and the SQL
inventory system is used to scan the database values and the SQL servers. And this SQL
inventory system used to manage the SQL server environment.
1. Wireless security
Wireless security is defined as the process of make security for wireless network in the way
of design and implementation. Wireless security is one of the network securities also known as
subset and it gives the protection for the wireless network and it is called in the way of wireless
network security. And it generally protects the network from the malicious attacks and this
wireless security is provided through switches and routers and as well as the wireless devices and
it is used to secure the communication (Vela, Kraus, Friedman, Irizarry & Suman, 2018). It
performs some operations like prevention, detection techniques are also used in the form of
wireless security.
3
Background scenario:
Wireless security is known as the process of providing security by the way of
design and implementation for the wireless network. In the scenario explained about the data
safety and how to secure the data through wireless. And in the way the scenario is about one
business industry of auto parts turnover particular amount of money per year with less number of
workers for the transaction. And the head office need to the wireless communication for
communicate with organization. In that wireless communication security is much needed in the
way of authentication. And the computer network is mainly based on wireless security to protect
the network. In that the organization and the small shops need the wireless security and want to
store their details via wireless link and additionally it have the device such as access point for the
wireless access and the devices like smart devices and handheld devices. The incident happened
in that company is related to data stolen like that in the office the data stolen by someone so their
requirement is to save the data by the wireless secure communication in the way of wireless
security. Their storage needs to be more frequency and the positive results and the
communication must between the administrator and head office and deployment of wireless
network and SQL inventory system is used to mainly for the communication and the SQL
inventory system is used to scan the database values and the SQL servers. And this SQL
inventory system used to manage the SQL server environment.
1. Wireless security
Wireless security is defined as the process of make security for wireless network in the way
of design and implementation. Wireless security is one of the network securities also known as
subset and it gives the protection for the wireless network and it is called in the way of wireless
network security. And it generally protects the network from the malicious attacks and this
wireless security is provided through switches and routers and as well as the wireless devices and
it is used to secure the communication (Vela, Kraus, Friedman, Irizarry & Suman, 2018). It
performs some operations like prevention, detection techniques are also used in the form of
wireless security.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

And some of the algorithms are used; these algorithms are act like a security
parameter .And the wireless security is used to prevent the computers which is damaged to us the
wireless networks. In wireless communication the data are shared by using the wireless network
and that wireless communication in the form of mobile and Bluetooth devices. And this wireless
communication has a unique standard. In now a day’s wireless devices are mainly used to
communication the devices such as mobile, smart watch and Bluetooth and using that wireless
communication we can make better at any kind, so the security is needed for the wireless
communication N, 2016).
2. Wireless encryption
In that wireless security it is accomplished by encryption for the authentication.
Encryption is used to secure the data as password. And some information is not having the
protection so encryption is needed everywhere and to keep the valuable information in the form
of wireless security. In that wireless encryption it had the two types one is stream cipher and
another one is block cipher and in the stream cipher is used to convert the plaintext into cipher
text and the block cipher is used to fix the data size (Yi & Batten, 2008). And mainly for the
encryption some algorithm is used like rc4 algorithm and des algorithms in the type of block and
stream cipher (Soo, Ling & Phang, 2013).
In that wireless network wireless security has some standards. They are,
WEP
WPA
WPA2
Access point
Radio frequency
SSID
Secure mounting
VPN
3. Plan of software and hardware components for secure connection
In this scenario the wireless security is needed for the communication in between the head
office and the shops. For that the components such as hardware and software components needed
4
parameter .And the wireless security is used to prevent the computers which is damaged to us the
wireless networks. In wireless communication the data are shared by using the wireless network
and that wireless communication in the form of mobile and Bluetooth devices. And this wireless
communication has a unique standard. In now a day’s wireless devices are mainly used to
communication the devices such as mobile, smart watch and Bluetooth and using that wireless
communication we can make better at any kind, so the security is needed for the wireless
communication N, 2016).
2. Wireless encryption
In that wireless security it is accomplished by encryption for the authentication.
Encryption is used to secure the data as password. And some information is not having the
protection so encryption is needed everywhere and to keep the valuable information in the form
of wireless security. In that wireless encryption it had the two types one is stream cipher and
another one is block cipher and in the stream cipher is used to convert the plaintext into cipher
text and the block cipher is used to fix the data size (Yi & Batten, 2008). And mainly for the
encryption some algorithm is used like rc4 algorithm and des algorithms in the type of block and
stream cipher (Soo, Ling & Phang, 2013).
In that wireless network wireless security has some standards. They are,
WEP
WPA
WPA2
Access point
Radio frequency
SSID
Secure mounting
VPN
3. Plan of software and hardware components for secure connection
In this scenario the wireless security is needed for the communication in between the head
office and the shops. For that the components such as hardware and software components needed
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

to the secure communication. Normally the wireless communication starts with the point of
internet service providers and the router, core switch, demilitarized zone, access points and the
handheld devices. And in that the process will be first the internet service provider give the
internet to the router through the internet cable and the router check the connection errors using
the firewall in that firewall it uses the demilitarized zone in that the secure web servers occupied.
After this zone the internet will pass to the core switch and it separates the network to the
switches and through the switches the internet go to access point and from the access point it will
go the devices such as mobile or laptop (Ibrahim, 2018).These components for a secure
communication described as detailed below.
Internet service provider
For the communication or transaction the internet service provider is mainly needed one and
it is used to provide the internet related routers and the providers are located at many places
convenient to the user. Internet service providers such as airtel provide the network to the routers
using internet cable.
Routers
Routers works to make a path for internet to the switches and make a clear path to the
internet and act like a device (Shang & Lei, 2010).
Switches
In the secure communication switches also take a part and it works as to provide the internet to
the access point and the core switch is also there and it separate the network to many switches.
Access point
Access point is also known as a device and it provide the internet connection to the devices
such as mobile and laptop through wireless communication.
4. Security threats in wireless networks
5
internet service providers and the router, core switch, demilitarized zone, access points and the
handheld devices. And in that the process will be first the internet service provider give the
internet to the router through the internet cable and the router check the connection errors using
the firewall in that firewall it uses the demilitarized zone in that the secure web servers occupied.
After this zone the internet will pass to the core switch and it separates the network to the
switches and through the switches the internet go to access point and from the access point it will
go the devices such as mobile or laptop (Ibrahim, 2018).These components for a secure
communication described as detailed below.
Internet service provider
For the communication or transaction the internet service provider is mainly needed one and
it is used to provide the internet related routers and the providers are located at many places
convenient to the user. Internet service providers such as airtel provide the network to the routers
using internet cable.
Routers
Routers works to make a path for internet to the switches and make a clear path to the
internet and act like a device (Shang & Lei, 2010).
Switches
In the secure communication switches also take a part and it works as to provide the internet to
the access point and the core switch is also there and it separate the network to many switches.
Access point
Access point is also known as a device and it provide the internet connection to the devices
such as mobile and laptop through wireless communication.
4. Security threats in wireless networks
5

In security threats the wireless communication increase the bandwidth for the areas with
the lack of money in that some industries ought to need security with the communication. And
threats and vulnerabilities is causes more the attacks.
In unauthorized access some of the access links are provided by the program code
and violation is one of the major security measures in the accidental areas by the way of
overlapping the network. And it is also known as kind of vulnerability and malicious attacks is
one of the threat and this attack is created in the companies or other by the way of sharing
resources by laptop and file download by website and this is the ways used for malicious attacks
to break the network (Newson, 2005).
Malicious is the kind of viruses and worms and Trojans for that vpn is best
authentication service in the wireless security. And adhoc network also supposed to make a
security threat and it is known as the network between the computers which is wireless by the
way of access point and the lacking of the security here is make by the adhoc networks it does
not have then bridge in that network. In bridging it had direct bridge and indirect bridge. In direct
bridge the person must be configure the bridge between two connections and the personal
networks like Bluetooth may attack from the hacker side even it happens in the printers (Bajwa,
2014).
4.1 How to secure the wireless network
Wireless network security is much needed one in the industries and so have to deploy the
wireless network in that deployment some benefits and drawbacks is there and it is difficult to
deploy the wireless network in the wired network areas. The deployment should be better
connectivity and must have the productivity in the areas for the mobile users the wireless
security is much needed. And wireless network has the benefit of shared bandwidth and security.
And wireless radio access point has the throughput as very high and the network traffic is carried
by the network signal through wireless transmissions (Goldberg, 2014).
And the next step for the security of the network is describes the area range for the
communications and layout of the areas is easy to configure the wireless communications if the
area range is maximum the security is needed more for the wireless communications. Through
the access point the wireless communication is made on those areas.
6
the lack of money in that some industries ought to need security with the communication. And
threats and vulnerabilities is causes more the attacks.
In unauthorized access some of the access links are provided by the program code
and violation is one of the major security measures in the accidental areas by the way of
overlapping the network. And it is also known as kind of vulnerability and malicious attacks is
one of the threat and this attack is created in the companies or other by the way of sharing
resources by laptop and file download by website and this is the ways used for malicious attacks
to break the network (Newson, 2005).
Malicious is the kind of viruses and worms and Trojans for that vpn is best
authentication service in the wireless security. And adhoc network also supposed to make a
security threat and it is known as the network between the computers which is wireless by the
way of access point and the lacking of the security here is make by the adhoc networks it does
not have then bridge in that network. In bridging it had direct bridge and indirect bridge. In direct
bridge the person must be configure the bridge between two connections and the personal
networks like Bluetooth may attack from the hacker side even it happens in the printers (Bajwa,
2014).
4.1 How to secure the wireless network
Wireless network security is much needed one in the industries and so have to deploy the
wireless network in that deployment some benefits and drawbacks is there and it is difficult to
deploy the wireless network in the wired network areas. The deployment should be better
connectivity and must have the productivity in the areas for the mobile users the wireless
security is much needed. And wireless network has the benefit of shared bandwidth and security.
And wireless radio access point has the throughput as very high and the network traffic is carried
by the network signal through wireless transmissions (Goldberg, 2014).
And the next step for the security of the network is describes the area range for the
communications and layout of the areas is easy to configure the wireless communications if the
area range is maximum the security is needed more for the wireless communications. Through
the access point the wireless communication is made on those areas.
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Third one is planning the correct range of bandwidth usage and perhaps the wireless
connection is on the large areas the bandwidth is needed more for example the channel
communication is taken the 54mb per second bandwidth and if access point added the bandwidth
will grow much higher.
And make the requirements of hardware components for wireless local area network
communication for that access point and adapters are needed and the wireless bridge is needed to
network components if the area has no wired connection (Erridge, 2017).
And implement the security is needed to protect the wireless network from the access
which is unauthorized. The wireless network authentication is not present in the communications
the secret information may destroy by the way of malicious attacks. And SSID default is not safe
and this is used to broadcast when need to connect with access point so SSID offline is the better
way during message broadcasting in wireless communications. And one more security control is
to enable the MAC address while authentication and it is used to filter the address of wireless
access points. And encryption access point authentication is the best way foe strongest
authentication and it is an end to end protocol to make a secured communication.
4.2 Security and information protection
Wireless local area network has constrains about the restriction of network access then
only the person can use the network who is authorized. And secure the password by the way of
having confidential data. And by the use of security response procedure the access points may
detected which is unauthorized. And the access point mentors must have an update about the
components of hardware and software from the malicious attacks. And in the encryption and data
protection the protocols are defined for high security for the information ("CSI promotes more
sophisticated security measures", 2008). WPA2 gives the encryption way of protection for data
security. These two protocols are considered as the standard protocols in the wireless security. In
WEP there must be the update kind of access points.
5. Risk assessment in wireless network
In wireless network technology should follow the risk assessment for this security
purpose. Wireless technologies are abuses in many ways. In this technologies must have a risk
7
connection is on the large areas the bandwidth is needed more for example the channel
communication is taken the 54mb per second bandwidth and if access point added the bandwidth
will grow much higher.
And make the requirements of hardware components for wireless local area network
communication for that access point and adapters are needed and the wireless bridge is needed to
network components if the area has no wired connection (Erridge, 2017).
And implement the security is needed to protect the wireless network from the access
which is unauthorized. The wireless network authentication is not present in the communications
the secret information may destroy by the way of malicious attacks. And SSID default is not safe
and this is used to broadcast when need to connect with access point so SSID offline is the better
way during message broadcasting in wireless communications. And one more security control is
to enable the MAC address while authentication and it is used to filter the address of wireless
access points. And encryption access point authentication is the best way foe strongest
authentication and it is an end to end protocol to make a secured communication.
4.2 Security and information protection
Wireless local area network has constrains about the restriction of network access then
only the person can use the network who is authorized. And secure the password by the way of
having confidential data. And by the use of security response procedure the access points may
detected which is unauthorized. And the access point mentors must have an update about the
components of hardware and software from the malicious attacks. And in the encryption and data
protection the protocols are defined for high security for the information ("CSI promotes more
sophisticated security measures", 2008). WPA2 gives the encryption way of protection for data
security. These two protocols are considered as the standard protocols in the wireless security. In
WEP there must be the update kind of access points.
5. Risk assessment in wireless network
In wireless network technology should follow the risk assessment for this security
purpose. Wireless technologies are abuses in many ways. In this technologies must have a risk
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

assessment for their security purpose. Very few rock solid control mechanisms are available in
risks.
Normally wireless networks are rapidly adapted and increase our growth. The available
controls are connected by the underground community. Its need not any additional address layer.
Bluetooth or other professional network topologies are used. It also used for the later issue. In
wireless technology makes so many problems.
Internal auditor, security manager, and IT departments are facing many problems using
wireless network. Protect the integrity, confidentiality, and also business information. Most of
the business information’s are stored in a wireless network. But these valuable information’s are
easily theft by hackers. Information technology risk management is used to tell how the monitor
will be designed, and how to avoid the security risks (Wang, Le & Cheng, 2015).
We know that most of the organizations are connected by the internet. So usually
cybercrime will occur.
5.1 Risk management approaches
Risk management is based on depth approach. The following section consist of the risk
management
1. First we need to avoid the risk possibilities, in this way we can easily avoid the
risk.
2. Then the potential attack will reduce the exposure.
3. No of departments and organizations are used, we can spread the risk between
other departments or organizations
4. Each and every time the risk must have retain and manage.
In cybercrime multiple crimes are send out. Risk management start with looking at the
cybercrime picture and then easily reduce the amount of risk. First the risks are listed then, it
reduces the risk reasoning. In cybercrime it takes so much of time to solve this problem. So the
only way is follow the risk management. Many government groups and organizations are
affected by the cybercrime (Niyato & Hossain, 2008).
8
risks.
Normally wireless networks are rapidly adapted and increase our growth. The available
controls are connected by the underground community. Its need not any additional address layer.
Bluetooth or other professional network topologies are used. It also used for the later issue. In
wireless technology makes so many problems.
Internal auditor, security manager, and IT departments are facing many problems using
wireless network. Protect the integrity, confidentiality, and also business information. Most of
the business information’s are stored in a wireless network. But these valuable information’s are
easily theft by hackers. Information technology risk management is used to tell how the monitor
will be designed, and how to avoid the security risks (Wang, Le & Cheng, 2015).
We know that most of the organizations are connected by the internet. So usually
cybercrime will occur.
5.1 Risk management approaches
Risk management is based on depth approach. The following section consist of the risk
management
1. First we need to avoid the risk possibilities, in this way we can easily avoid the
risk.
2. Then the potential attack will reduce the exposure.
3. No of departments and organizations are used, we can spread the risk between
other departments or organizations
4. Each and every time the risk must have retain and manage.
In cybercrime multiple crimes are send out. Risk management start with looking at the
cybercrime picture and then easily reduce the amount of risk. First the risks are listed then, it
reduces the risk reasoning. In cybercrime it takes so much of time to solve this problem. So the
only way is follow the risk management. Many government groups and organizations are
affected by the cybercrime (Niyato & Hossain, 2008).
8

Risk management methods are given below. Each and every company should follow the
methods, avoid the risks
1. The overall organizational schema is integrated.
2. All the resources are inclusive and also transparent
3. The major decision making are done by factor risk
4. Types are errors are occur like system error, structure error and also human
error
5. They want to monitor the each step continuously.
The risk factors are act like a key to success for many companies. Different range of risk
factors is applicable. Each risk factor is varying based on the hackers. We want to secure the
entry then we need to train the employees.
The money transfer system is the best example hacked by malicious software. The
companies are considering how they manage the best security threads. Because they are
managing the effective security thread, we can easily avoid the risks.
5.2 Threads to wireless network security
There are three types of threads are used
1. Rogue WLAN
2. Spoofing internal communications
3. Theft of network resources
Rogue WLAN
These types of threads are used to check whether the wireless networks are official or not.
We know that basically wireless networks are less expensive. Compare to other threads this type
of threads are minimum cost. In this network the ambitious users may plug unauthorized
equipment (ZHANG, 2009). These types of rogue threads are mostly used in wireless networks.
They have an ability to perform different kind of operations, such as insecure or improperly
secure, and also the network risks are reduced.
Spoofing internal communications
The attacks are done by outside the world or network these thread are used to identify
the attack. The attacker is connected by WLAN the network bandwidth are hijacked. They are
used to leverage the higher bandwidth.
9
methods, avoid the risks
1. The overall organizational schema is integrated.
2. All the resources are inclusive and also transparent
3. The major decision making are done by factor risk
4. Types are errors are occur like system error, structure error and also human
error
5. They want to monitor the each step continuously.
The risk factors are act like a key to success for many companies. Different range of risk
factors is applicable. Each risk factor is varying based on the hackers. We want to secure the
entry then we need to train the employees.
The money transfer system is the best example hacked by malicious software. The
companies are considering how they manage the best security threads. Because they are
managing the effective security thread, we can easily avoid the risks.
5.2 Threads to wireless network security
There are three types of threads are used
1. Rogue WLAN
2. Spoofing internal communications
3. Theft of network resources
Rogue WLAN
These types of threads are used to check whether the wireless networks are official or not.
We know that basically wireless networks are less expensive. Compare to other threads this type
of threads are minimum cost. In this network the ambitious users may plug unauthorized
equipment (ZHANG, 2009). These types of rogue threads are mostly used in wireless networks.
They have an ability to perform different kind of operations, such as insecure or improperly
secure, and also the network risks are reduced.
Spoofing internal communications
The attacks are done by outside the world or network these thread are used to identify
the attack. The attacker is connected by WLAN the network bandwidth are hijacked. They are
used to leverage the higher bandwidth.
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Using this kind of threads, downloads are easily performed. The higher enterprise
networks are used to download the music files, documents, video clips, and some previous
network resources also (Kim, Lee & Kim, 2013).
Secure WLAN access
If you want ensure the unauthorized user the only way is using wireless encryption.
Wireless networks are used to encrypt the wireless data. WEP is an original encryption method.
WEP stands for wired equivalent privacy. They are used to found the fundamental flawed. Using
WEP we can easily generate shared keys, passwords, and also restricted access.
If you want to change the key automatically no key mechanism are specified. But there
was a tool in this mechanism for crack the WEK key. Using this operation the WEP keys are
cracked easily. So in WEP encrypted wireless network have along access process. Using no
encryption, the WEP method is better performance ("A Secure Method to Deliver Access Tokens
to End Hosts", 2018).
The enterprise networks are insufficient. Next generation use the WPA encryption
method. WPA stands for Wi-Fi protect access. 802 .1 X leverage are used to design the
authentication server, also similar to WEP. WPA is used in TKIP. TKIP means temporal key
integrity protocol. They have an ability to dynamically change the key. The dynamic key
changing process is used to prevent the crack operation used to break WEP encryption. The
wireless hardware and also the wireless software are used.
802.11 is an official website for attempt the hardware and software vendors. WPA2 is the
current form of encryption method. The most complex and secure mechanism are provided by
WPA2 technique. In this technique is fully based on AES encryption algorithm. We know the
access the wireless network we can easily protect the wireless data.
Wireless communication based scenario
1)
10
networks are used to download the music files, documents, video clips, and some previous
network resources also (Kim, Lee & Kim, 2013).
Secure WLAN access
If you want ensure the unauthorized user the only way is using wireless encryption.
Wireless networks are used to encrypt the wireless data. WEP is an original encryption method.
WEP stands for wired equivalent privacy. They are used to found the fundamental flawed. Using
WEP we can easily generate shared keys, passwords, and also restricted access.
If you want to change the key automatically no key mechanism are specified. But there
was a tool in this mechanism for crack the WEK key. Using this operation the WEP keys are
cracked easily. So in WEP encrypted wireless network have along access process. Using no
encryption, the WEP method is better performance ("A Secure Method to Deliver Access Tokens
to End Hosts", 2018).
The enterprise networks are insufficient. Next generation use the WPA encryption
method. WPA stands for Wi-Fi protect access. 802 .1 X leverage are used to design the
authentication server, also similar to WEP. WPA is used in TKIP. TKIP means temporal key
integrity protocol. They have an ability to dynamically change the key. The dynamic key
changing process is used to prevent the crack operation used to break WEP encryption. The
wireless hardware and also the wireless software are used.
802.11 is an official website for attempt the hardware and software vendors. WPA2 is the
current form of encryption method. The most complex and secure mechanism are provided by
WPA2 technique. In this technique is fully based on AES encryption algorithm. We know the
access the wireless network we can easily protect the wireless data.
Wireless communication based scenario
1)
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2)
11
11

6. Deployment of 802.11 wireless and PDA
The IEEE 802.11 is used to develop the MAC (medium access control). The data is
transfer in the speed of one megabit per second. But the LAN speed is ten megabit per second.
Later the performance of data transfer will increase; the data is transfer in the speed of 900 MHz,
Using IEEE equipment the transmission process is done by 2.4 GHz. Both the 2.4 GHz ISM and
5.0 GHz UNII are operating by the WLAN. The key management schemes are used by IEEE
802.11 is also known as 4 way handshake. The data configuration and integration process are
done by this key management.
Only one master key is allowed, the security issues are taken by the data confidentiality
and integrity. An IEEE 802.11 is the combination of two or more BSS, BSS stands for basic
service set. Each BSS includes no of resources such as AP, one or more STA. The infrastructure
of IEE 802.11 is contains two API, namely API1 and API 2. The API1 and API2 are connected
by the distributed system. Each API contains two different STA such as STA1 and STA2. At the
same tile API 2 also contains two different STA such as STA3 and STA4. In the wires enterprise
networks are attached by ESS. IEEE 802.11 is provided by ESS, and also maintains the network
connectivity.
The cover range of IEEE 802.11 is depends upon several resources. They are including
data rates, requirements, capacity and RF interfaces. Basically the connection is established in 50
12
The IEEE 802.11 is used to develop the MAC (medium access control). The data is
transfer in the speed of one megabit per second. But the LAN speed is ten megabit per second.
Later the performance of data transfer will increase; the data is transfer in the speed of 900 MHz,
Using IEEE equipment the transmission process is done by 2.4 GHz. Both the 2.4 GHz ISM and
5.0 GHz UNII are operating by the WLAN. The key management schemes are used by IEEE
802.11 is also known as 4 way handshake. The data configuration and integration process are
done by this key management.
Only one master key is allowed, the security issues are taken by the data confidentiality
and integrity. An IEEE 802.11 is the combination of two or more BSS, BSS stands for basic
service set. Each BSS includes no of resources such as AP, one or more STA. The infrastructure
of IEE 802.11 is contains two API, namely API1 and API 2. The API1 and API2 are connected
by the distributed system. Each API contains two different STA such as STA1 and STA2. At the
same tile API 2 also contains two different STA such as STA3 and STA4. In the wires enterprise
networks are attached by ESS. IEEE 802.11 is provided by ESS, and also maintains the network
connectivity.
The cover range of IEEE 802.11 is depends upon several resources. They are including
data rates, requirements, capacity and RF interfaces. Basically the connection is established in 50
12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 21
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.