Preview

Lab 6 assignments

Good Essays
Open Document
Open Document
519 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 6 assignments
Lab 6.1
Standard
Frequency (GHz)
Max Transmission Rate (Mbps)
Standard Indoor Transmission Range (m)
Standard Outdoor Transmission Range (m)
802.11a
5
54
35
120
802.11b
2.4
11
38
140
802.11g
2.4
54
38
140
802.11n
2.4.5
600
70
250

Lab 6.2

Lab 6.3

Mine spoke with all at a 100% ratio
Lab 6.4
The AP placement in a home or office would be affected depending upon home layout and network setup (device placement) as well as trying to keep others from accessing your network from outside the home.
The AP placement will be affected with a stronger antenna, because the in a larger building the AP placement can be shifted to reach all of the necessary areas.
Lab 6.5

Wireless security as pertains to the wireless LANs. The needs for it are depending upon the information used on the devices utilizing the LANs. There are different levels of encryptions all with pros and cons. The encryption method is not the only method to provide security to your wireless LAN connections.
Wired Equivalent Privacy (WEP) is the most widely used Wi-Fi security algorithm in the world. Wi-Fi Protected Access(WPA) was the Wi-Fi Alliance’s direct response and replacement to the increasingly apparent vulnerabilities of the WEP standard. It was formally adopted in 2003, a year before WEP was officially retired. The most common WPA configuration is WPA-PSK (Pre-Shared Key). The keys used by WPA are 256-bit, a significant increase over the 64-bit and 128-bit keys used in the WEP system. WPA has, as of 2006, been officially superseded by WPA2. One of the most significant changes between WPA and WPA2 was the mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) as a replacement for TKIP (still preserved in WPA2 as a fallback system and for interoperability with WPA).Unfortunately, the same vulnerability that is the biggest hole in the WPA armor, the attack vector through the Wi-Fi Protected Setup (WPS),

You May Also Find These Documents Helpful

  • Satisfactory Essays

    nt1210 lab 7.1-3

    • 420 Words
    • 3 Pages

    2. It’s because the signal still has to be able to be picked up by the AP it would have to depend on the router to pick up the signal…

    • 420 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 LAb6.1

    • 401 Words
    • 2 Pages

    Its bad to have lots of wireless network around you cause it could cause lag around you it depend on the people.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This article gives contrasts between the 802.11ac standard and the 802.11ad standard. While both are still in development, they will both be an upgrade to the existing 802.11n standard. Currently, 802.11ac will utilize the 5GHz frequency, whereas, 802.11ad will use 60GHz. The idea is that the localized but high-bandwidth 60GHz network can be used for specific, highly demanding tasks, keeping the standard 5GHz frequency free for normal use for laptops, tablets, smartphones and other peripheral devices. Network World is a leader in the networking industry when it…

    • 1693 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Lab 6 4

    • 386 Words
    • 2 Pages

    A AP’s signal would fade naturally the farther from the signal source you go but with the signal going through walls will further degrade the signal depending on the thickness of the wall. So you would have to account for walls or objects that could further degrade your signal from the source.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    For a business setting up a WLAN security is very important and should be top priority. If you do not secure your WLAN you are opening your business up to hackers that can ruin your business. Before you set up the WLAN a site survey should be done. This will determine what level of exposure your company is at and help decide how much security is needed.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    AES-An encryption standard used by WPA2 and is currently the strongest encryption standard used by Wi-Fi.…

    • 1630 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Wlan Security Threats

    • 373 Words
    • 2 Pages

    I heard that you were installing a wireless LAN in your small business, but you were concerned about security. Well when it comes to installing a wireless LAN, there are several security threats that you should be aware of beforehand. There are four common security threats, which are drive-by hackers, war drivers, unprotected access points, and rogue access points.…

    • 373 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Telecommunications HW

    • 486 Words
    • 2 Pages

    This is because traveling to each access point for manual configuration would be very costly. So a centralized access point makes it so the management can fix issues from one area, saving them money.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    - Security features of WAP allow end users to do comfortable transaction of passwords etc over wireless network.…

    • 435 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Communication is always necessary in building relations to mankind, when two persons meet they need some medium to interchange their views but due to distance barriers some tools are required to communicate each other. At the end of 19th century, reckoned \scientist Graham Bell laid the first stone in the field of communication using different tools regardless of distance. He invented first wired base telephony equipment. It was the solution for the voice communication for the people how far apart they are. After this radio based communication systems Era started. It was an extension of wired based networks. In the beginning it was developed for some special purposes like military and police usage. With the passage of time these systems emerged to allow common peoples to communicate with each other, rather then using wired based network. After this the age of faster communication and capabilities of voice get started and evolved into new telecommunication system.…

    • 14228 Words
    • 57 Pages
    Powerful Essays
  • Good Essays

    IEEE 802.11n

    • 800 Words
    • 4 Pages

    Improved coding and modulation: 802.11n modify the OFDM method used by 802.11a and offer a maximum data rate of 65Mbps.…

    • 800 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    6. What are FOUR (4) basic wireless settings for client wireless device to connect to an AP?…

    • 1463 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    ieee

    • 8461 Words
    • 36 Pages

    access and the RTS/CTS access mechanisms. In addition, it also applies to a combination of the two schemes, in which packets longer…

    • 8461 Words
    • 36 Pages
    Powerful Essays
  • Good Essays

    IT/241 Wireless Security

    • 391 Words
    • 2 Pages

    With the talk about the categories of attackers, the issue of wireless security and how to protect your network comes up. There are three types of security protection, MAC filtering, WEP, and authentication. Each has a different way to secure the network against unauthorized access. MAC filtering allows only traffic from specific client stations to pass through the network based on their unique MAC addresses (Coleman & Westcott, 2012). This gives the administrator the ability to lock the network down to only the devices they want on the network, giving another layer of security. WEP, or wired equivalent privacy, uses a hexadecimal or ASCII character key to secure traffic on the network. Finally, authentication is done by the access point sending a challenge to be encrypted by the client and finally sent back to the access point for verification. Looking at all three, MAC filtering would be the best way to secure a wireless network. While people can spoof MAC addresses, allowing the hacker to change the MAC address of the client, that person…

    • 391 Words
    • 2 Pages
    Good Essays