Preview

Telecommunications HW

Good Essays
Open Document
Open Document
486 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Telecommunications HW
2a) War drivers are people who drive around a city looking for working access points that are unprotected. Drive-by hackers park just outside a company's premises and intercept the firm's data transmissions.
b) A rogue access point is an access point that could be set up by a company's department or an individual employee. This access point usually have no security which makes it easy for hackers to get into the system.

5a) 802.11i
b) WPA2
c) AES-CCMP
d) Because it is expensive and there is no cracks with the WPA
e) WPA is no longer viewed as a safe solution because in 2009 a partial crack appeared. This means the standard was not as safe as it was before.

7a) PSK mode uses a shared key initial authentication by everyone who are allowed to use access points without the need of a central authentication server. In 802.1X, every workgroup switch acts as an authenticator. Authentication is done by central authentication server.
b) A pass phrase is used to create a shared key between access point and hosts. If pass phrase is short then it is easy to crack.
c) The pass phrase should be at least 20 characters long.

10a) This is because traveling to each access point for manual configuration would be very costly. So a centralized access point makes it so the management can fix issues from one area, saving them money.
b) Smart Access Points that can add an intelligence to every access point that allows the central management to communicate directly with the access point. Also, wireless LAN switches. This is because the management intelligence can be placed on the WLAN switch rather than in the access point themselves. Then multiple access points can connect to the WLAN switch.
c) The systems should notify the WLAN admins of failures immediately as they happen. They should provide continuous transmission-quality monitoring at all access points. They should help provide security by detecting rogue access points, evil twin access points, and other

You May Also Find These Documents Helpful

  • Good Essays

    The IEEE 802.11n draft standard is intended to improve WLAN data rates and range without requiring additional power or RF band allocation.…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Hit-150-Wk4D1

    • 539 Words
    • 3 Pages

    (1) security features or software that protect information when a wireless network is used. (2) non-redisclosure policies. (3) storage and retention policies.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Week 4 INDP NTC 362

    • 821 Words
    • 3 Pages

    Wireless Networks connect devices without wires, some examples are cellular networks, Wi-Fi networks or terrestrial microwave networks. Wireless LANSs (WLAN) usually connect devices that are very close to each other using the IEEE 802.11 WLAN standards that are marketed under the Wi-Fi name. Kudler plans to utilize WLANs in each location to connect their office computers and printers to the main network. A wide area network will be setup to connect each locations LAN enabling the centralization of the company’s servers and afford real time access to database information.…

    • 821 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This article gives a high level overview into the 802.11ac wireless standard. 802.11ac is also referred to as “gigabit Wi-Fi” and will be capable of significantly faster data transfer speeds than the current 802.11n. This article includes information on frequency, channels, spatial streams, beam forming and backwards compatibility. PC World is an internationally renowned computer magazine that is published monthly in print and digital form. PC World was established in 1983. The company offers advice, recommendations and information on a wide variety of technological hardware and software. The information in this article shares content that is relevant to the main points of the thesis statement (Bradley, 2012).…

    • 1693 Words
    • 7 Pages
    Good Essays
  • Good Essays

    When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network. true…

    • 602 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 6 assignment

    • 378 Words
    • 2 Pages

    Basic Service Set – In Wireless LAN’s a single wireless access point and the client devices that send data to/from that access point…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Standard wireless network security that runs on matching wep keys for example. Transmisions are also encrypted ahead of time as privacy is priority here.…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Unit 3 P3

    • 1666 Words
    • 7 Pages

    A wireless access point (WAP) is a device that usually connects to a router and acts like a switch. WAPs utilise wifi to connect to devices to allow communication between them. WAPs are used to extend the wireless reach of a network or to allow wireless access to that network. Unlike a router or switch, the WAP does not filter data and has no inbuilt firewall, so does not add to the security of the…

    • 1666 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN).…

    • 920 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ISM 4220

    • 2410 Words
    • 10 Pages

    MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.…

    • 2410 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    SEC 435 Wk 11 Final Exam

    • 513 Words
    • 3 Pages

    ____ is a free stumbler application for Mac OS X that puts the computer’s wireless card into monitor mode.…

    • 513 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IEEE 802.15 deals with the subject of Wireless personal area networks (WPANs) which includes standards for Bluetooth, co-existence of WPANs with other wireless devices, high-rate and low-rate WPANs, and mesh networking.…

    • 577 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    There are employee and guest wireless (wifi) networks that are available for leadership and clients that need to access the Internet on their wireless devices and laptops. There is also an additional wifi network that is set-up for other employees to use on personal laptops, ipads, tablets, etc.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    So its just design is to break the N level PDU into sections and reassemble them in the request they were available before. The division happens at (N- 1) layer. It breaks the N level PDU into different (N-1) level PDUs. Additionally they do not need to hold a duplicate of header as it disregards the guideline of layer separation itself.…

    • 1413 Words
    • 6 Pages
    Good Essays