Free Essay

Wireless

In:

Submitted By asslit226
Words 2559
Pages 11
TERM PAPER

Wireless LAN Security
Enabling and Protecting the Enterprise

INSIDE
INSIDE ∆ Wireless LAN Technology
∆ ∆ ∆ Benefits of Wireless LANs Security Risks and Technical Challenges Recommendations

WIRELESS LAN SECURITY

Contents
Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless LAN Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Benefits of Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Simplified Implementation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Extended Reach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Increased Worker Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Reduced Total Cost of Ownership and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Risks and Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 “Leaky” Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Unapproved Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Exposure of Wireless Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Signal Interference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Evolving IEEE Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Establish Wireless LAN Security Policies and Practices . . . . . . . . . . . . . . . . . . . . . . 7 Design for Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Logically Separate Internal Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Enable VPN Access Only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Remove Unnecessary Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Restrict AP Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Protect Wireless Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

WIRELESS LAN SECURITY

√ Executive summary
Motivated by the need to reduce IT costs while increasing employee productivity, enterprise-wide wireless local area network (LAN) solutions are becoming increasingly viable. Proliferation of mobile computing devices has boosted employee demand for access to their organization’s network beyond the tether of their office workstation. Meanwhile, accelerated wireless transmission rates and increasing vendor adherence to standards-based interoperability are enhancing the practicality of wireless LANs. Yet the same wireless technologies that can erase the physical limitations of wired communications to increase user flexibility, boost employee productivity, and lower cost of network ownership also expose network-based assets to considerable risks. The security embedded in wireless LAN technologies falls short of providing adequate protection. Early-adopting organizations have found that evaluating, and where possible, mitigating these risks before deploying a wireless LAN is beneficial. This white paper summarizes wireless network security planning by providing an overview of the security risks and technical challenges in this area, as well as summarizing key recommendations for secure wireless LANs.

√ Wireless LAN Technology
In 1999, the Institute of Electrical and Electronics Engineers (IEEE) published standard 802.11, which specified a group of technologies governing wireless Ethernet connectivity between client devices—such as desktop computers, laptops, and personal digital assistants (PDAs)—and the wireless hubs connected to the physical network. Wireless LANs typically emulate the wired network’s traditional hub-spoke configuration and comprise two primary components: a wireless network interface card (NIC) and an access point (AP). The 802.11 standard represents a significant step in electronic-data infrastructure evolution, which in the last ten years has proceeded from coax, token ring, and 10/100 BaseT Ethernet cabling to wireless radio transmissions. The best known and most widely used variation of the 802.11 wireless LAN standard is 802.11b. Products conforming to the 802.11b standard are called “WiFi” (pronounced Y-Phi) for “wireless fidelity,” so named by the Wireless Ethernet Compatibility Alliance (www.wi-fi.org). This alliance is an independent organization that promotes interoperability between 802.11b-based devices. Under ideal conditions, WiFi products can receive and transmit data at speeds up to 11 Megabits per second (Mbps). However, in typical conditions, most WiFi devices operate at speeds between 1 and 5 Mbps. Regarding security and 802.11b, transmission encryption—called Wired Equivalent Privacy (WEP)— has been incorporated into WiFi products. The goal of WEP is to provide a level of privacy (via the use of encryption) that is equivalent to wired LAN privacy, which is achieved via various physical security mechanisms. However, encrypted messages can be intercepted and decrypted. As vendors introduce new technologies and products, other security gaps are likely to be revealed. For more WEP security information, visit the UC Berkeley ISAAC Web site (www.isaac.cs.berkeley.edu) or the IEEE Web site (www.ieee.org).

3

WIRELESS LAN SECURITY

IEEE and its member organizations are working to address many of these limitations and vulnerabilities. Efforts include new wireless LAN standards to increase security, bandwidth, and range, as well as reduce power consumption. For example, the 802.11a standard, scheduled for 2002 release, is expected to support speeds up to 54 Mbps. Visit the IEEE Web site for more information on upcoming wireless LAN standards.

√ Benefits of Wireless LANs
A traditionally wired 10/100 BaseT Ethernet LAN infrastructure for 100 people costs about US$15,000 and requires several days to install (see Figure 1). Enterprises that use such an arrangement also incur additional costs and disruptions with every change to the physical office. (Expenses vary according to the physical layout and the quality of the equipment used.) Conversely, wireless LANs are less expensive and less intrusive to implement and maintain, as user needs change.
SIMPLIFIED IMPLEMENTATION AND MAINTENANCE

Wireless APs can be placed in the ceiling, where they can accommodate a virtually endless variety of office configurations (see Figure 2). Wired LANs, in contrast, consume time and resources to run cables from a network closet to user’s desktops and to difficult-to-service areas such as conference room tables and common areas. With a wired LAN, each additional user or modification to the floor plan necessitates adjustments to the cabling system.
EXTENDED REACH

Wireless LANs enable employees to access company resources from any location within an AP’s transmission range. This flexibility and convenience can directly improve employee productivity.
INCREASED WORKER MOBILITY

The roaming benefits of wireless LANs extend across all industries and disciplines. The shop foreman can manage logistics from the warehouse as easily as office-based employees move about the building with their laptops or PDAs. And field sales employees can connect to public wireless LANs in coffee shops and airport lounges.
REDUCED TOTAL COST OF OWNERSHIP AND OPERATION

The cumulative benefits of simplified implementation and maintenance, an extended LAN reach, and the freedom to roam minimize expenses and improve organizational and employee productivity. The result is reduced total cost of ownership and operation.

4

WIRELESS LAN SECURITY

Figure 1. Traditional 10/100 BaseT Ethernet Wired LAN

File, Application and Database Servers

HR

E-Mail

Finance

10/100 BaseT Hub

Laptop

Laptop

Laptop

Workstation

Workstation

Figure 2. Typical Wireless LAN

File, Application and Database Servers

HR

E-Mail

Finance

10/100 BaseT Hub

WiFi Access Points

WiFi Access Points

Workstation

PDA

Laptop

5

WIRELESS LAN SECURITY

√ Security Risks and Technical Challenges
Security is a principal consideration when planning, designing, implementing, and managing a network infrastructure. This is especially true for wireless LANs, which present a unique set of challenges to IT and security professionals. In addition to the typical problems that new network and device technologies engender, including incompatibilities and ongoing support issues, non-secure wireless LANs can expose an organization’s network traffic and resources to unauthorized outsiders. Such individuals may capture data and exploit network-based resources, including Internet access, fax servers, and disk storage. More importantly, wireless access to a network can represent the entry point for various types of attacks, which can crash an entire network, render services unavailable, and potentially subject the organization to legal liabilities.
“LEAKY” BUILDINGS

Wireless LAN radio signals can extend beyond the intended perimeter and “leak” through the physical boundaries of a floor or building. As these transmissions seep into common, public, or private areas such as roads, parking lots, and other buildings, they may fall prey to “war driving” or a “drive-by hacking” attack. Using off-the shelf hardware and freely available Internet software, unscrupulous individuals can defeat WEP encryption capabilities and access corporate wireless data.
UNAPPROVED DEPLOYMENTS

Insiders, including employees and contractors, may choose “not to wait for the IT Department.” They succumb to the low price and easy installation of WiFi starter kits (two wireless NICs and a WiFi Access Point), which can be purchased for about US$300 and set up with minimal technical know-how in under ten minutes. When unapproved technology is plugged into a corporate network, a number of challenges ensue, including end user and equipment support difficulties as well as potential disruptions to existing services. Malicious outsiders who gain office physical access could quickly place an unobtrusive wireless AP in a conference room or lobby area. Such devices are easy to hide and simple to implement; history is replete with stories of such “bugs” even in supposedly secure foreign embassies. Operating from a nearby location, malicious outsiders can capture data, access company resources, and interrupt services.
EXPOSURE OF WIRELESS DEVICES

Many of today’s laptops ship with embedded WiFi capabilities. Hackers can access a device’s data and the organization’s wireless LAN even if that particular device has never been used to send or receive wireless transmissions. Most new machines, including gateway servers, do not ship with optimal security settings. The default settings are intended for easy installation and deployment, not for protecting assets.
SIGNAL INTERFERENCE

Walls, columns, and other building features can reduce signal strength between a wireless NIC and an AP, severely limiting a wireless LAN’s range and connection quality. These problems may be mitigated with additional equipment. Other wireless technologies sharing the same public

6

WIRELESS LAN SECURITY

spectrum—such as Bluetooth, cordless phones, and other wireless equipment—can also adversely impact transmission range and quality.
EVOLVING IEEE STANDARDS

Organizations contemplating a wireless LAN deployment can choose to implement an 802.11b-based wireless LAN today, or wait for upcoming variations, which are intended to address performance and security issues. IEEE and its workgroups are continually defining and refining standards in light of emerging needs and perceived weaknesses in existing technologies. To the extent that vendors’ 802.11 implementations deviate from the various IEEE standards, their equipment can create interoperability challenges.

√ Recommendations
Even as new 802.11 vulnerabilities are identified and exploited, organizations can mitigate or eliminate many of wireless LAN’s security risks with careful education, planning, implementation, and management. The following steps aid this process: • • • • • • • Establish wireless LAN security policies and practices Design for security Logically separate internal networks Enable VPN access only Remove unnecessary protocols Restrict AP connections Protect wireless devices.

ESTABLISH WIRELESS LAN SECURITY POLICIES AND PRACTICES

The cornerstone of an effective wireless LAN strategy involves defining, standardizing, documenting, disseminating, and enforcing wireless LAN security policies and practices. These include specifying the make, model, configuration, and settings of the wireless LAN equipment authorized for use, as well as documenting and managing the APs and connected network infrastructure. Employee education increases awareness of security risks. Some employees may not realize that deploying an unauthorized wireless LAN or using a WiFi product “out of the box” may increase security risks. Clear and frequently conveyed guidelines usually promote active cooperation.
DESIGN FOR SECURITY

When placing wireless APs for strategic coverage, installers should consider signal bleed into uncontrolled areas where transmissions can be intercepted. Wireless coverage should be implemented only where needed.
LOGICALLY SEPARATE INTERNAL NETWORKS

The LAN segments that connect to wireless APs should connect to a corporate Virtual Private Network (VPN) gateway, but not directly to the production network. Eliminating APs from the production network minimizes the risk of attack techniques such as packet sniffing.

7

WIRELESS LAN SECURITY

ENABLE VPN ACCESS ONLY

Requiring users to connect to the wireless LAN via a VPN is recommended. Once authenticated, authorized users communicate using an encrypted tunnel between the connecting device and the LAN, reducing the risk that a transmission will be captured.
RESTRICT UNNECESSARY PROTOCOLS

Restricting unnecessary or redundant protocols from the LAN segments that connect the APs to the VPN gateway reduces the possibility of unidentified holes and vulnerabilities. Retaining the Domain Name System (DNS) and IP Security (IPSec) protocols is recommended to support the VPN.
RESTRICT AP CONNECTIONS

Administrators can use authorization tables to selectively enable LAN connections only to devices with approved NIC addresses. Each NIC has a unique address that can be added to a table of authorized users; most vendors’ APs support Media Access Control (MAC) restrictions through the use of authorization tables. As a result, instead of editing each AP individually, APs can be pointed to a centrally managed database.

Figure 3. Recommended configuration of wireless LAN

File, Application and Database Servers

HR

E-Mail

Finance

10/100 BaseT Hub

VPN/Firewall

WiFi Access Points

10/100 BaseT Hub

WiFi Access Points

VPN

FW FW

Firewall VPN

PDA Laptop

VPN

8

WIRELESS LAN SECURITY

PROTECT WIRELESS DEVICES

Personal firewalls can protect individual devices from attacks launched via the “air connection” or from the Internet. IT administrators should disable all unused features of new client devices (e.g., shared drive access) and reconfigure default settings according to the organization’s particular needs.



Conclusion
Like most advances, wireless LANs pose both opportunities and risks. The technology can represent a powerful complement to an organization’s networking capabilities, enabling increased employee productivity and reducing IT costs. To minimize the attendant risks, IT administrators can implement a range of measures, including establishment of wireless security policies and practices, as well as implementation of various LAN design and implementation measures. Achieving this balance of opportunity and risk allows enterprises to confidently implement wireless LANs and realize the benefits this increasingly viable technology offers.

9

WIRELESS LAN SECURITY



Glossary
802.11: Broad heading for IEEE wireless LAN focus groups 802.11a: Improves 802.11 bandwidth to 5 GHz 802.11b: Wireless LAN standard for up to 11 Mbps at 2.4 GHz Access Point: (AP), wireless network hub Bluetooth: Short-range wireless technology developed by the Bluetooth Special Interest Group

(www.bluetooth.org)
IEEE: Institute of Electrical and Electronics Engineers (www.ieee.org) Ethernet Hub: A connection point between devices on a network LAN: Local Area Network MAC: Media Access Control NIC: Network Interface Card PDA: Personal Digital Assistant VPN: Virtual Private Network WiFi: 802.11b wireless Ethernet standard WEP: Wired Equivalent Privacy

10

WIRELESS LAN SECURITY

√ References
1. Nikita Borisov, Ian Goldberg, and David Wagner, UC Berkeley, “Security of the WE Algorithm,” (http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html) 2. Wayne Caswell, “Wireless Home Networks: Disconnected Connectivity,” Home Toys, April 2000 (http://www.hometoys.com/mentors/caswell/apr00/wireless.htm) 3. Joel Conover, “Wireless LANs Work Their Magic,” Networking Computing, July 2000 (http://www.networkcomputing.com/1113/1113f2full.html) 4. Joel Conover, “First Things First—Top 10 Things to Know About Wireless,” Networking Computing, July 2000 (http://www.networkcomputing.com/1113/1113f2side2.html) 5. John Cox, “LAN Services Set to Go Wireless,” Network World, August 20, 2001 (http://www.nwfusion.com/news/2001/0820wireless.html) 6. Andy Dornan, “Emerging Technology: Wireless LAN Standards,” 2/6/02, NetworkMagazine.com (http://networkmagazine.com/article/NMG20020206S0006) 7. Dale Gardner, “Wireless Insecurities,” Information Security magazine, January 2002 (http://www.infosecuritymag.com/articles/january02/cover.shtml) 8. 9. IEEE Working Group for WLAN Standards (http://grouper.ieee.org/groups/802/11/index.html) Dave Molta, “The Road Ahead for Wireless,” Network Computing, July 9, 2001 (http://www.networkcomputing.com/1214/1214colmolta.html) 10. Practically Networked, “Wireless Encryption Help” (http://www.practicallynetworked.com/ support/wireless_encrypt.htm) 11. Practically Networked, “Securing Your Wireless Network” (http://www.practicallynetworked.com/ support/wireless_secure.htm) 12. Practically Networked, “Mixing WEP Encryption Levels” (http://www.practicallynetworked.com/ support/mixed_wep.htm) 13. Practically Networked, “Should I Use NetBeui?” (http://www.practicallynetworked.com/ sharing/netbeui.htm) 14. Peter Rysavy, “Break Free with Wireless LANs,” Network Computing, October 29, 2001 (http://www.networkcomputing.com/1222/1222f1.html) 15. Search Networking.com, Wireless LAN links (http://searchnetworking.techtarget.com/ bestWebLinks/0,289521,sid7_tax286426,00.html) 16. Vicomsoft Wireless Networking Q&A (http://www.vicomsoft.com/knowledge/reference/ wireless1.html) 17. “Wireless Within Corporate Reach” eWeek, May 3, 2000 (http://techupdate.zdnet.com/ techupdate/stories/main/0,14179,2530201-1,00.html)

11

Similar Documents

Premium Essay

Wireless

...PENYERAHAN DAN PENILAIAN TUGASAN ASSIGNMENT SUBMISSION AND ASSESSMENT KOD KURSUS /COURSE CODE : CBWT3103 TAJUK KURSUS /COURSE TITLE : INTRODUCTION TO WIRELESS TECHNOLOGY SEMESTER /SEMESTER : JANUARI/JANUARY 2011 _________________________________________________________________________ ARAHAN KEPADA PELAJAR / INSTRUCTIONS TO STUDENTS 1. Tugasan ini mengandungi SATU (1) soalan sahaja yang disediakan dalam bahasa modul bercetak kursus ini. / This assignment contains only ONE (1) question that is set in the language of the printed module for the course. 2. Jawab dalam Bahasa Melayu atau Bahasa Inggeris. / Answer in Malay or English. 3. Muatturunkan templet tugasan versi bahasa yang berkenaan daripada MyVLE untuk penyediaan dan penyerahan tugasan anda. / Download the language version of the assignment template concerned from the MyVLE for preparation and submission of your assignment. 4. (i) Bagi soalan Tugasan yang berasaskan esei / For essay based assignment: Tugasan anda hendaklah antara 2500 hingga 3000 patah perkataan tidak termasuk rujukan. Bilangan perkataan hendaklah ditunjukkan di hujung tugasan anda. Jumlah perkataan hendaklah ditunjukkan di penghujung Tugasan. Tugasan anda hendaklah ditaip dengan menggunakan saiz fon 12 Times New Roman dan langkau baris 1.5. Jangan menyalin soalan dan arahan tugasan dalam jawapan anda. / Your assignment should be between 2500 to 3000 words excluding references. The number of words should be shown at the end of your assignment. Your assignment...

Words: 2663 - Pages: 11

Premium Essay

Wireless Technology

...Wireless Technology BIS/221 Wireless Technology Technology has greatly evolved in the past 10 years. There was a time when a paper back book was more common than a cellular or wireless device. Today, however, wireless device are more and more common and are pretty much a must have. Wireless devices simplify how we perform daily task by being easier to access because we can carry these items with us. A few wireless devices that have made my life easier are my wireless printer, GPS, Wi-Fi, Bluetooth, and a few wireless household products. Wireless technology has also allowed disabled individuals to enjoy activities that they normally cannot enjoy. The use of a wireless printer has made it easier to print documents either from my wireless computer or my cell phones. I no longer have to go into the computer room to complete these task. I honestly no longer need a computer room; because I have a wireless computer and printer I no longer have to be in a designated area to complete homework or perform task on the computer. I can now do those things from anywhere in my home. Wi-Fi has also made in possible to surf the web on my computer from anywhere there is a Wi-Fi connected. The use of Wi-Fi has eliminated the need to use cellular data in turn lowering my cell phone bill. The use of GPS has also made it easier to navigate to unfamiliar places by enabling me to easily get direction either from the GPS on my cell phone or a dedicated GPS device...

Words: 537 - Pages: 3

Premium Essay

Wireless Signals

...Wireless Communications are very important in our daily lives. Practically everywhere we turn we can see someone working away on a laptop, an iPad, or some other form of wireless PDA. This form of communication is usually used for personal and professional reasons. There are four main types of wireless technology in play here. The four types of wireless technology is Wi-Fi, Cellular, Bluetooth and WiMAX (Cox, 2013). Wi-Fi is the most popular form of wireless technology that we come to depend on today. Wi-Fi uses IEEE 802.11 specifications to provide secure network connections at home, in the office and in the public at places like libraries, coffee houses. Many business offices have Wi-Fi set up so that their employees can be more mobile using laptops they can retreat from their desk and in to a conference room for a quiet space to work. Wi-Fi connection within a network presents challenges for any IT group with regard to security as well as architecture of the network. Many wireless Routers and AP’s are designed to provide quick speeds and secure connection for Wi-Fi some more powerful than others. Many PDA devices are being designed to act as a hot spot, providing Wi-Fi access to laptops and other devices. This brings me to speak about Cellular technology. When we think of cellular technology, we mostly think about being on the go and needing to make a phone call with a wireless phone. Cellular signals use connected transmitters or cells as Michael Cox calls them to...

Words: 725 - Pages: 3

Free Essay

Wireless Paper

...J. Chem. Chem. Eng. 5 (2011) 897-902 Remote Control of Fed-Batch Fermentation Systems Eric Moreau3, Floyd Inman, III1, Sunita Singh2, Heather Walters1 and Leonard Holmes1* 1. Biotechnology Research and Training Center, University of North Carolina at Pembroke, Pembroke, NC, USA 2. Central Institute of Agricultural Engineering, Bhopal, Madhya Pradesh, India 3.Université de Picardie Jules Verne, Amiens, France Received: June 14, 2011 / Accepted: July 11, 2011 / Published: October 10, 2011. Abstract: Bioreactor operation requires continuous monitoring of fermentation parameters and real-time control over bioreactor devices. Remote monitoring and control of the bioreactor’s computer via the Internet avoids the necessity of personnel being continually onsite during operation. A two liter Sartorius-stedim Biostat® A Plus fermentation system was networked and interfaced with the commercial software from GoToMyPC® to allow remote control of the fermentation system utilizing the internet. The fermentation vessel was equipped with hardware calibrated for monitoring and controlling culture parameters during experimentations. The uniform resource locator controlled night-vision web camera allowed continuous monitoring of the glass fermentation vessel during the day and at night. The main window screen of the laboratory computer can be securely accessed from any portable device (i.e. laptop) capable of establishing an Internet connection and executing the commercial software from GoToMyPC®...

Words: 2136 - Pages: 9

Premium Essay

Wireless

...WIRELESS COMMUNICATION Contents Page No 1. Dedication…………………………………………………………..01 2. Background…………………………………………………………02 3. Acknowledgement………………………………………………….03 4. Abstract.....................................................................................…….04 5. Introduction………………………………………………….….. 05 6. Introduction to Technology……………………………….……. 06 7. Introduction to Wireless Communication……………….……….06 8. Definition of Wireless………………………………………..……..07 9. Wireless Communication Model……………………………..……07 10. Wireless Communication Technologies……………………..……08 11. Wireless Usage……………………………………………..……….10 12. Wireless Security…………………………………………..……….10 13. Security about……………………………………………….……...11 14. Role of Security…………………………………………………….11 15. Wireless Devices…………………………………………….……...13 16. Wireless Prices……………………………………………….……..14 17. Wireless Devices Availability………………….…………………..14 18. Wireless Devices Manufacturers………………………….………14 19. Wireless Service Companies………………………………………15 20. Conclusion…………………………………………………………..15 21. Reference……………………………………………………………16 Dedication We dedicate this project to our loving parents whose prayers are always with us. Furthermore, We confer this project to all the teachers in our whole educational...

Words: 2185 - Pages: 9

Premium Essay

Wireless Information

...Wireless in AmericA Innovative ■ Competitive ■ World Leader is the most innovative and competitive in the world-—the gold standard that others aspire to emulate. The U.s. wireless industry The industry is providing American wireless users with the best value proposition on the planet. We use our devices to talk more, pay less and have more wireless broadband subscribers than any other developed country. The industry’s competition and innovation have also created a fantastic array of choices for consumers, who can select from several national service providers, and many regional and local carriers. They have the option of prepaid or postpaid service. More than 630 handsets are available in the U.S. market. Mobile applications barely existed just three years ago, yet today, there are more than 500,000 from which to choose. Wireless technology is helping us live and work better than ever before, and is having profound impacts in areas such as healthcare, transportation, energy, education and many more. The U.S. wireless industry leads the way in the widespread deployment of high-speed networks… and even in the most challenging of economic times, continues to outpace its counterparts around the world when it comes to investing in infrastructure. The U.S. wireless industry continues to play a key role in our country’s economic development and enriches all of our lives thanks to our hallmark innovation and competition. specTrUm The Lifeblood of Wireless Wireless service...

Words: 9934 - Pages: 40

Premium Essay

Wireless Communication

...With the drastic increase in new technology this past century, I am sure that many people have pondered the question: “I wonder what new technology is going to be part of our lives in the next 10 years or so?” Wireless communications is the one particular technology that has always fascinated me. The convenience and mass usage of cordless phones, cell phones, wireless networking, GPS or navigation systems have always captured my attention. A few years ago I first heard of the name Bluetooth. Along with the interesting name, a “futuristic” scenario was embossed in my memory whereby a cell phone would communicate with one’s fridge at home and then notify the owner that the milk-supply was running low. This may seem a little far-fetched but it may very well be a reality and a standard in a few decades. Bluetooth’s primary purpose is to enable short-range wireless voice and data communications anywhere in the world. The way Bluetooth actually works by allowing users to connect to a wide range of telecommunication and computer devices without cables, namely mobile phones, portable computers, personal handheld devices, as well as connection to the Internet (bluetooth.com, ‘how it works’). In the following, I will further explain what, how and where Bluetooth works and what the potential use of this new technology is. The Bluetooth name comes from a Scandinavian king Harald Blatand, where “Blatand” is translated to “Blue Tooth” (Miller Michael, page 26). This king was known for uniting...

Words: 1942 - Pages: 8

Premium Essay

Wireless Signals

...Wireless Signals Raquel Barthelmes IT/242 September 30, 2012 Randy Guin   Abstract This is a short study of the different types of wireless technologies in common use today. This study will touch on only four types, although there are actually numerous types fulfilling many different uses. Wireless Signals Introduction In the world today, we have begun to rely heavily on various new technologies. Everything from the way our vehicles run to being able to spy remotely on our own houses can be done with the advances made in technology in the last few decades. One of the newest and most frequently used advances today is those that have been made in wireless technology, although that in itself is by no means new. The very first completely wireless system was patented by a man named Marconi in 1897(JPL’s Website, 1995), and a new future in communication was conceived. There are currently numerous wireless technologies available around the world which enable many tasks to be completed more quickly than ever before. From networking to opening a garage door, wireless technology has invaded the every-day lives of billions of people. Businesses are able to employ people to work remotely from home on a scale never before seen, which brings us to the first type of wireless technology I will outline here: Networking. Networking Wireless networking is perhaps the most commonly used type of wireless technology, primarily because every...

Words: 1036 - Pages: 5

Free Essay

Wireless

...Introduction We have been hired to deploy a wireless network for Citizens First National Bank. We are going to design, test and deploy this network. Banks have been slow to adapt this technology because if the high security standards they must follow. Since security has been improved and the benefits are so great more and more companies are starting to deploy wireless networks. It the next couple pages I will go through the scope of the project along with the goals and requirements. There are some initial testing that we have to get down and setup so auditors will be able to test before we can deploy to all branches. By using auditors it helps protect the bank with a paper trail incase an incident ever happened. This would show that we have followed all requirements and made every possible attempt to protect our customers and employees. We will have 60 days to setup and test before we have to purchase equipment. This should provide plenty of time to get a location up and running and have their auditors in to do testing. After initial testing we will then put a plan in place to bring all branches online one at a time while sticking to the budget. Scope and Goals Scope The major driving force of this project is to add a wireless infrastructure to the entire bank that would allow seamless use between all branches, while maintaining the high security standards that the FCC requires to help protect the customers and employees of the bank. The details of the...

Words: 786 - Pages: 4

Premium Essay

Wireless Proposal

...Week 4 Learning Team Wireless Proposal BIS/220 October 21, 2013 Wireless Technology Proposal The following proposal is for Party Plate’s possible introduction of wireless technologies into the work environment. We have identified two wireless technologies that would be beneficial for implementation into the organization. The goal would be for these wireless technologies to help streamline our data management and increase our productivity. Within this proposal we will identify the benefits and the risks of implementing these technologies. In order to succeed and grow in today’s ever-changing business environment it is critical to keep up with changes in new technologies. To be competitive and continue advancing in marketing we must ensure that our staff has the competitive advantage by being able to utilize the latest technologies and data management tools that are available. Our goal as a company is to be able to meet the ever-changing demands of the customer by equipping our staff with the latest marketing data, communication data, and reporting data. Having these abilities would allow for us to research any topic effectively and efficiently.  We must also have a platform that allows our internal staff to share sales and marketing information across all of the departments, both in office and out in the field. Customer interaction must be optimized through emails, video conferencing and phone calls. In order to accomplish our goals here at Party Plates we have put together...

Words: 801 - Pages: 4

Premium Essay

Wireless Signals

...SIGNALS Wireless Signals xxxxxxxx IT/242 xxxxxxxxx xxxxxxxxx Wireless Signals There are many different types of wireless technologies accomplishing a wide variety of solutions as we trend toward a wireless world. The electromagnetic spectrum is being exploited like no other time in history. With so many choices of wireless technologies to discuss, it is difficult to narrow them down to four. The four different types of wireless technologies to be discussed are cellular, satellite, Radio Frequency Identification, and Wireless Fidelity. Cellular communications are rapidly changing as more wireless applications are realized. The potential for cellular use has transcended mere phone communication use as developers delve into other cellular applications. Cellular technology works on the premise of radio communications through lower power base stations known as cells (Brain, Tyson, & Layton). The world has built an extensive and reliable cellular infrastructure and is now midst of significant improvement. With third generation (3G) and forth generation (4G) cellular communication, it is now possible to have mobile broadband technology. Other applications include WAN backup and alarm system transmission. An example of this is the use of 3G backup devices used in all State Farm agencies. This device is connected to the router in lieu of a dial backup. Satellite is another form of wireless technology. This digital signal transmits...

Words: 582 - Pages: 3

Premium Essay

Wireless

...Wireless Security Technical Point-of-View Wireless Security Technical Point-of-View W ireless network (Wi-Fi) is now widely established and utilized at home, offices and everywhere in public areas such as rail stations, streets, and etc. This newsletter provides the technical knowledge of Wi-Fi technologies, relevant threats and countermeasures for building a secure internal Wi-Fi network. For the end user best practices of using Wi-Fi, please refer to another newsletter entitled “Wireless Network, Best Practices for General User”. Wireless Technologies | Classification of Networks Technological advancement in wireless communications has led to the worldwide proliferation of networks. The various kinds of network technologies developed can be classified into the following categories according to their range of coverage: Wireless Wide Area Network (WWAN) WWAN offers the largest coverage. Voice and data can be transferred between mobile phones via messaging apps, web pages and video conferencing. In order to secure the transfer, encryption and authentication methods are adopted. Examples of WWAN are 4G, 3G and 2G networks. Wireless Metropolitan Area Network (WMAN) MAN (Metropolitan Area Network) covers across the entire city and WMAN provides the Wi-Fi network similar to MAN. WiMAX and Wireless MAN are both examples of this kind. Wireless Local Area Network (WLAN) WLAN is an 802.11i wireless network that facilitates the access of corporate environment...

Words: 4503 - Pages: 19

Free Essay

Wireless Technology Upgrade

...Wireless technology upgrade Tony Madrid Keller Graduate School of Management of DeVry University Decatur, Georgia NETW562: Wireless Devices & Apps Table of Contents Introduction 1 Strategic business assessment 3 Competition 4 Tradeoff analysis and rationale 5 System selection 5 Customer devices 6 Design a Wireless System 7 System description 9 Efficient Support 9 Quality of Service (QoS) 10 Service description 10 Network Detection and Selection 10 Service Continuity with Seamless Connections 10 Topology Independence 10 Coverage analysis 11 Initial capabilities and limitations 11 Less Complexity, Faster Transmission 13 Enhanced Mobile Gaming 13 Presence 14 Broadband Access in Remote Locations 14 Financial outlay 16 Conclusion 17 Wireless technology upgrade Introduction In telecommunications, 4G (also known as 4-G) is an acronym used to refer to the fourth generation of technologies for mobile telephony. It is the successor of the technologies 2G and 3G; 4G is based entirely on IP protocol, with a system of systems and a network of networks, which is achieved through the convergence of wired and wireless networks. This technology may be used by wireless modems, smart phones and other mobile devices. The 4th generation technology gives ultra broadband experience over the internet access on mobile devices, like, laptop with USB wireless modems, mobile devices and smart phones. Imaginable application, which includes, the...

Words: 4563 - Pages: 19

Free Essay

Updated Wireless

...Updated Wireless At Reading Room Bookstore/ Café Prepared for: Mrs. Karen Dickens, Owner of Reading Room Bookstore/ Café Prepared by: Wendell Brown, Peter Bacon, and Alex McCurdy Owners of Keep Austin Wireless April 25, 2014 Table of Contents Executive Summary 2 Introduction 2 Methods 3  Which 802.11 specification is best for your specific needs? 3  Should we get a router that works at 2.4 GHz, 5 GHz, or both? 3  What security level is best for your business? 4  What speed router should be considered? 4  What else should our router(s) have for current or future considerations? 4  What would happen if something were to go down? 5  How many UPS-powered outlets do we need? 5  How much power do our devices require? 5  How long do we need to use the battery? 5  How many feet of Ethernet cabling do we need? 5 Results 7 Conclusions 8 Decision Matrix 10 Recommendation 11 Assumptions 13 Installation 15 Equipment Parts List 16 Works Cited 17 List of Illustrations Figure 1: Picture of Linksys EA6900 (Linksys Employee, 2014) 7 Figure 2: Picture of ASUS RT-AC66U (Endgadget Employee, 2014) 7 Figure 3: Picture of Trendnet TEW-812DRU (Softpedia Employee, 2014) 7 Figure 4: Decision Matrix 8 Figure 5: High Level Parts Diagram 10 Table 1: Detailed parts list (Bacon, 2014) 10 Executive Summary This report was developed to summarize the newer, better, and more secure wireless network...

Words: 3845 - Pages: 16

Free Essay

Wireless Technology

...lines, wired and wireless networks and satellite. The main principle of communication is via speech on the relationship between sender, message and receiver. But technology today should not only refer to the voice, but should try to cover a wider gamma of applications, be it data transmission. Given this need is emerging computer networks like the intranet, extranet and internet. Concerning the exchange of voice and data need to be connected to the world via the Internet is essential, where some problems arise concerning the implementation of wired networks because the transportation of equipment is necessary either within a local and within an office. By presenting this need it became part of a group of larger study, from wireless networks, transferring data via infrared, as well as the application of satellite networks. They have failed to meet this need making the connection of users in different parts of the world. The application of wireless technology , is having a boom in transmission speeds , but not compete with the use of wired networks or the use of fiber optics , however satisfactorily meet the need of users movement . Let us start with the definition of wireless, this term refers to the use of wireless technology which allows you to connect multiple computers together. Thus it has been becoming one focus of study for data transmission issues, gaining interest in places where it is not possible to install wired networks. The use of this wireless technology allows...

Words: 404 - Pages: 2