R.Sridevi (Asst.Prof)
Department of Computer Science
PSG College of Arts & Science
Coimbatore, TN. srinashok@gmail.com Abstract -This paper addresses the internal and the external security challenges in organizations that implements wireless networks. Distributed security is designed to provide a more secure data communication among faculty members, staff and students. A description of the technique used to protect and keep PC 's up and running is illustrated with applications.
Keywords: Access point, LAN.
1. INTRODUCTION The market for wireless communications has experienced incredible growth over recent years and wireless LANs have rapidly become a very important network architecture offering benefits of increased flexibility and mobility. Unlike a traditional wired LAN, users can access servers with much greater freedom. Mobility in IP architecture as well as mobility between wireless LANs and wireless WANs enhances these benefits even further. Such benefits of mobility and access come with significant security and performance requirements. The importance of maintaining secure and reliable connections between 'the communicating parties is often underestimated or even ignored. Security risks in wireless networks are equal to the sum of the risk of operating a wired network plus the new risks introduced as a result of the portability of wireless devices [I]. To reduce these risks, organizations need to adopt security measures and practices, which lower such risks to a manageable level. WLANs do not replace wired solutions but complement them. It provides network connectivity in difficult wiring areas and allows mobile users to work with Traditional wired applications with high throughput for both indoor and outdoor environments. Although WLANs came into the market almost a decade ago, standardized WLANs have been available since the late 1990s when IEEE 802.11 was born. There
References: [1]Karygiannis, T., and Owens, L., (2002). Drof: Wireless Nerwork Securir) ' -802.11, Bluetooth and Hond held Devices. USA. National Institute of Standards and cchnalagy [2]Hunt, R., Vargo, J., Wang, J., Impact of Security Architectures on Wireless Network Performance, 51h IEEE International Conference an Mobile and Wireless Communications Networks (MWCN 2003), Pages 331-334, Singapore 27-29 October, 2003 [3]Lewis Z. Kock, "Outsourcing Security", ZDNet Interactive week, 2000. .t. Markbam T. & Payne C. "Security at the network Edge: A Distributed Firewall Architecture", IEEE-CNF, 2001. [4]S. Harris, "ALL IN ONE CISSP Certification ", McGraw / Osborne, 2002. [5]. 2278- 6643) | Volume-1 Issue-3, December 2012 IJRREST: International Journal of Research Review in Engineering Science and Technology (ISSN Subhash Kumar, Arun Kumar Rathode, Rajesh Singh M.Tech. Scholar, Bhagwant University, Ajmer, Rajasthan, India