WI-FI Wireless Communication System (3)


WI-FI Wireless Communication System (3)

Wireless Communication



Network security:

The main issue with wireless network security is its simplified access to the network compared to traditional wired networks such as Ethernet, with wired networking one must either gain access to a building (physically connecting into the internal network) or break through an external firewall.

To enable Wi-Fi, one merely needs to be within the wireless range of the Wi-Fi network. Most business networks protect sensitive data and systems by attempting to disallow external access. Enabling wireless connectivity reduces security if the network uses inadequate or no encryption.

An attacker who has gained access to a Wi-Fi network router can initiate a DNS spoofing attack against any other user of the network by forging a response before the queried DNS server has a chance to reply.

Securing methods:


A common measure to deter unauthorized users involves hiding the access point's name by disabling the SSID broadcast. While effective against the casual user, it is ineffective as a security method because the SSID is broadcast in the clear in response to a client SSID query.

Another method is to only allow computers with known MAC addresses to join the network, but determined eavesdroppers may be able to join the network by spoofing an authorized address.

Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping but it is no longer considered secure. Tools such as AirSnort or Aircrack-ng can quickly recover WEP encryption keys. Because of WEP's weakness the Wi-Fi Alliance approved Wi-Fi Protected Access (WPA) which uses TKIP.

WPA was specifically designed to work with older equipment usually through a firmware upgrade. Though more secure than WEP, WPA has known vulnerabilities.

The more secure WPA2 using Advanced Encryption Standard was introduced in 2004 and is supported by most new Wi-Fi devices. WPA2 is fully compatible with WPA.

A flaw in a feature added to Wi-Fi in 2007, called Wi-Fi Protected Setup, allows WPA and WPA2 security to be bypassed and effectively broken in many situations. The only remedy as of late 2011 is to turn off Wi-Fi Protected Setup, which is not always possible.

Hotspot (Wi-Fi):


A hotspot is a site that offers Internet access over a wireless local area network through the use of a router connected to a link to an Internet service provider. Hotspots typically use Wi-Fi technology.

Hotspots may be found in coffee shops and various other public establishments in many developed urban areas throughout the world.

Types of Hotspot:

ü Free Wi-Fi hotspots

Free hotspots operate in two ways:


·         Using an open public network is the easiest way to create a free hotSpot. All that is needed is a Wi-Fi router. Private users of wireless routers can turn off their authentication requirements, thus opening their connection, intentionally or not, for sharing by anyone in range.



·         Closed public networks use a HotSpot Management System to control the HotSpot. This software runs on the router itself or an external computer. With this software, operators can authorize only specific users to access the Internet, and they often associate the free access to a menu or to a purchase limit. Operators are also now able to limit each user's available bandwidth - each user is therefore restricted to a certain speed to ensure that everyone gets a good quality service. Often this is done through Service Level Agreements.

ü Commercial hotspots

             A commercial hotspot may feature:

                   ·       captive portal / Login Screen that users are redirected to   
              for authentication and payment
·       A payment option using credit cardPayPaliPass, or other
     payment service
·       walled garden feature that allows free access to certain
     sites
·       Service oriented provisioning to allow for improved revenue

ü Software Hotspots:


Many Wi-Fi adapters built into or easily added to consumer computers include the functionality to operate as hotspots.

Manufacturers can enable this functionality through driver-level support. Modern consumer operating systems, including Windows 7 and later and Apple OS X 10.6 and later added features to support this.

------------------------------------------------------------------------


WI-FI Wireless Communications System,wireless Communications channel,
4G Communications,Two-Ray Model In 4G wireless Communications channel
WI-FI Wireless Communications System,wireless Communication channel,
Two-Ray Model In 4G wireless Communications channel,wireless Communications channel,
WI-FI Wireless Communications System in 4G communication,wireless Communication channel in 4G communication ,
Two-Ray Model In 4G wireless Communications channel in 4G communications,wireless Communications channel in 4G communications,
Two-Ray Model In 4G 4G wireless Communication channel,4G wireless Communication channel,


WI-FI Single Cell Systems  intro to WI-FI Cellular Systems 1st & 2nd Generations  2nd Generation Standards WI-FI Phases
Communication System Systems Communications Wireless 4G 



0 comments:

Post a Comment

Powered by Blogger.

Blog Archive