Preview

Wired and Wireless

Powerful Essays
Open Document
Open Document
4256 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wired and Wireless
Wireless Networks Security

Prepared for
Dr. Wibowo
IFMG 250

Submitted by
Joshua Muscatello
Joshua Martin

April 20, 2005

I. Introduction II. Major Networking Hardware Components a. Network Interface Cards b. Modems c. Routers d. Hubs e. Switches f. Access Points g. Print Server III. Wired Networks a. Definition b. Types c. Range d. Benefit IV. Wireless Networks a. Definition b. Types c. Transmission Standards d. Range e. Benefit V. Wired Networks vs. Wireless Networks a. Mobility b. Cost c. Range d. Speed e. Security VI. Wireless Network Security a. What is at Risk? i. Confidentiality ii. Integrity iii. Availability b. Intrusion Methods i. Trojan Horse ii. Denial of Service (DOS) iii. Email Spoofing iv. Email-Borne Viruses v. Packet Sniffing c. Preventative Methods i. Firewalls ii. Encryption iii. Anti-virus Applications iv. Anti Spy ware applications VII. Conclusion

Abstract As technology advances in society the need for wired and wireless networking has become essential. Each of these types of networking has their advantages and disadvantages according to security. Wired networking has different hardware requirements and the range and benefits are different. Wireless networking takes into consideration the range, mobility, and the several types of hardware components needed to establish a wireless network. As you read on you will understand different types of configurations of networks and the security measures that need to be taken to ensure a secure network.

Introduction Organizations

You May Also Find These Documents Helpful

  • Best Essays

    IEEE 802.11 – Wireless LAN • http://www2.rad.com/networks/2005/wirelesslan/main.htm • Up-to-date information on Wireless LANs. Technical/Magazines Articles…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    a. Wireless networks are less secure than wired networks, both in terms of access and in terms of user information. Because the information to and from the computer is broadcast instead of traveling over a wire, it is much easier to intercept.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Activity 1

    • 667 Words
    • 3 Pages

    Wired networking connections provide the foundation of the Local Area Network. Incoming connections, Data Center interconnections, IT closet facilities, and stationary computing devices have all traditionally been connected to the network via a series of cables. The primary benefit to a wired connection is that the wire provides a standard level of service (performance, security, reliability) which can be relied upon in all situations. Typically, wired connections (correctly installed) have an extremely low failure rate and provide a standard of service which helps provide a very low cost for support per connection. Once…

    • 667 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN).…

    • 920 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Networking is everywhere one of the main benefits is that we can share devices such as printers, scanners, CD-ROM drives and many more. Also, we can connect to networks as Meyers (2003, p3) said “one network can be connected to another network and become a more powerful tool because of the great resources”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Timeline

    • 3694 Words
    • 15 Pages

    Whittaker, Z. (2008, November 27). Wired vs. wireless - security vs. speed. Retrieved from http://www.zdnet.com/blog/igeneration/wired-vs-wireless-security-vs-speed/624…

    • 3694 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    The University has recently leased a building in Adelphi, Maryland to house offices, classrooms, library, and computer labs. The goal of this proposal is to design a network for these facilities. The Student computers are to be on a separate network from the staff computers. The facility will share one Internet connection (T-1 link from Verizon). With a T-1 link the network will be able to function with the speed of 1.544 mbps over 24 channels each running 64 kbps (Labsim). Security is always a big concern and has been taken into consideration. Additional considerations for each floor/classroom/lab/office include printing capabilities and the WiFi (Wireless Access) in the Student Lobby.…

    • 2562 Words
    • 15 Pages
    Better Essays
  • Satisfactory Essays

    Describe why an application developer might choose to run an application over UDP rather than TCP…

    • 195 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab 6 assignments

    • 519 Words
    • 3 Pages

    Wireless security as pertains to the wireless LANs. The needs for it are depending upon the information used on the devices utilizing the LANs. There are different levels of encryptions all with pros and cons. The encryption method is not the only method to provide security to your wireless LAN connections.…

    • 519 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Effective data encryption comes standard on your home network wireless router and information transmitted cannot be read without the correct encryption key. Password protection can be enabled on all devices and users should choose strong passwords of adequate length. Thefts of wireless devices are on the rise. Users can learn ways protect themselves and the device from crime, and make a loss or theft known the employer or carrier for fast action.…

    • 864 Words
    • 4 Pages
    Good Essays
  • Better Essays

    A wireless policy for a medium-sized banking organization will need to deploy a wireless LAN to the network and there will not need to be onsite IT staff as that can be outsourced to various vendors and business specializing in such. The remote access can be manage by a standalone intelligent access point which will integrated the wireless LAN by streamline the configuration and management the system.…

    • 1375 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Wlan Security Threats

    • 373 Words
    • 2 Pages

    I heard that you were installing a wireless LAN in your small business, but you were concerned about security. Well when it comes to installing a wireless LAN, there are several security threats that you should be aware of beforehand. There are four common security threats, which are drive-by hackers, war drivers, unprotected access points, and rogue access points.…

    • 373 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Network Technologies provides students with the fundamental concepts of data communications. This course teaches practical approaches when designing and implementing a network environment of varying sizes. It includes an analysis of the physical and logical aspects of the network infrastructure and the various industry standards and models available. The material also consists of the common tools and techniques utilized to optimize the performance and secure the core network components and resources. Throughout this course the students will develop and build their analytical and problem solving skills. Specific topics covered include: network architectures, topologies, media…

    • 2167 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Security exists on many layers. Network security considerations begin with (but are not limited to) a range of factors including: [ALE96]…

    • 2543 Words
    • 11 Pages
    Powerful Essays