Preview

Lab 6 assignments

Good Essays
Open Document
Open Document
519 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 6 assignments
Lab 6.1
Standard
Frequency (GHz)
Max Transmission Rate (Mbps)
Standard Indoor Transmission Range (m)
Standard Outdoor Transmission Range (m)
802.11a
5
54
35
120
802.11b
2.4
11
38
140
802.11g
2.4
54
38
140
802.11n
2.4.5
600
70
250

Lab 6.2

Lab 6.3

Mine spoke with all at a 100% ratio
Lab 6.4
The AP placement in a home or office would be affected depending upon home layout and network setup (device placement) as well as trying to keep others from accessing your network from outside the home.
The AP placement will be affected with a stronger antenna, because the in a larger building the AP placement can be shifted to reach all of the necessary areas.
Lab 6.5

Wireless security as pertains to the wireless LANs. The needs for it are depending upon the information used on the devices utilizing the LANs. There are different levels of encryptions all with pros and cons. The encryption method is not the only method to provide security to your wireless LAN connections.
Wired Equivalent Privacy (WEP) is the most widely used Wi-Fi security algorithm in the world. Wi-Fi Protected Access(WPA) was the Wi-Fi Alliance’s direct response and replacement to the increasingly apparent vulnerabilities of the WEP standard. It was formally adopted in 2003, a year before WEP was officially retired. The most common WPA configuration is WPA-PSK (Pre-Shared Key). The keys used by WPA are 256-bit, a significant increase over the 64-bit and 128-bit keys used in the WEP system. WPA has, as of 2006, been officially superseded by WPA2. One of the most significant changes between WPA and WPA2 was the mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) as a replacement for TKIP (still preserved in WPA2 as a fallback system and for interoperability with WPA).Unfortunately, the same vulnerability that is the biggest hole in the WPA armor, the attack vector through the Wi-Fi Protected Setup (WPS),

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1210 LAb6.1

    • 401 Words
    • 2 Pages

    Its bad to have lots of wireless network around you cause it could cause lag around you it depend on the people.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Standard wireless network security that runs on matching wep keys for example. Transmisions are also encrypted ahead of time as privacy is priority here.…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    Another way to protect your WLAN is with WPA (WI-FI Protected Access). WPA is an upgrade to the WEP(Wired Equivalent Privacy). WEP regulates access to wireless network through a devices hardware-specific MAC address.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    AES-An encryption standard used by WPA2 and is currently the strongest encryption standard used by Wi-Fi.…

    • 1630 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Check Understanding

    • 1457 Words
    • 6 Pages

    5. Which three WLAN client authentication types require a preprogrammed network key to be set on the client?…

    • 1457 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Telecommunications HW

    • 486 Words
    • 2 Pages

    WPA is no longer viewed as a safe solution because in 2009 a partial crack appeared. This means the standard was not as safe as it was before.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Wlan Security Threats

    • 373 Words
    • 2 Pages

    I heard that you were installing a wireless LAN in your small business, but you were concerned about security. Well when it comes to installing a wireless LAN, there are several security threats that you should be aware of beforehand. There are four common security threats, which are drive-by hackers, war drivers, unprotected access points, and rogue access points.…

    • 373 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    6. What are FOUR (4) basic wireless settings for client wireless device to connect to an AP?…

    • 1463 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Communication is always necessary in building relations to mankind, when two persons meet they need some medium to interchange their views but due to distance barriers some tools are required to communicate each other. At the end of 19th century, reckoned \scientist Graham Bell laid the first stone in the field of communication using different tools regardless of distance. He invented first wired base telephony equipment. It was the solution for the voice communication for the people how far apart they are. After this radio based communication systems Era started. It was an extension of wired based networks. In the beginning it was developed for some special purposes like military and police usage. With the passage of time these systems emerged to allow common peoples to communicate with each other, rather then using wired based network. After this the age of faster communication and capabilities of voice get started and evolved into new telecommunication system.…

    • 14228 Words
    • 57 Pages
    Powerful Essays
  • Powerful Essays

    ieee

    • 8461 Words
    • 36 Pages

    access and the RTS/CTS access mechanisms. In addition, it also applies to a combination of the two schemes, in which packets longer…

    • 8461 Words
    • 36 Pages
    Powerful Essays
  • Good Essays

    IT/241 Wireless Security

    • 391 Words
    • 2 Pages

    With the talk about the categories of attackers, the issue of wireless security and how to protect your network comes up. There are three types of security protection, MAC filtering, WEP, and authentication. Each has a different way to secure the network against unauthorized access. MAC filtering allows only traffic from specific client stations to pass through the network based on their unique MAC addresses (Coleman & Westcott, 2012). This gives the administrator the ability to lock the network down to only the devices they want on the network, giving another layer of security. WEP, or wired equivalent privacy, uses a hexadecimal or ASCII character key to secure traffic on the network. Finally, authentication is done by the access point sending a challenge to be encrypted by the client and finally sent back to the access point for verification. Looking at all three, MAC filtering would be the best way to secure a wireless network. While people can spoof MAC addresses, allowing the hacker to change the MAC address of the client, that person…

    • 391 Words
    • 2 Pages
    Good Essays
  • Good Essays

    IEEE 802.11n

    • 800 Words
    • 4 Pages

    IEEE 802.11n specification is the most significant change in wireless environment. It differs from its predecessors in terms of its modes and configuration that provide maximum data rate. IEEE 802.11n is builds on the previous 802.11 standards by modification to the Physical Layer and also in the Medium Access Control Layer.…

    • 800 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    - Security features of WAP allow end users to do comfortable transaction of passwords etc over wireless network.…

    • 435 Words
    • 2 Pages
    Satisfactory Essays