Results 1 to 4 of 4

Thread: Information on Wireless network security

  1. #1
    Join Date
    May 2008
    Posts
    27

    Information on Wireless network security

    WiFi is a technology to create wireless computer networks (Wireless). This is a standard called IEEE 802.11.

    Its range varies from one device to another between a few tens of meters to several hundred meters, making it a technology of choice for the home network with internet connection.

    It is increasingly used by various equipment, computers, organizers (PDAs), game consoles and even portable printers also use them to simplify their Wifi connection.

    A WiFi network can operate in two different ways:

    The Ad-Hoc mode: in this mode, you do not need an access point to manage the network, each member of the network relays the information it receives to other network members. The problem with this type of network is that on the one hand, network bandwidth is based on the speed of the slowest host on the other hand, network bandwidth is divided by the number of hosts on the network, which can quickly become disabling. However, this method can be used in a home for a simple network, it has the advantage of not expensive (also known as computer to computer).

    Infrastructure mode: in this mode, everything is managed by an access point, the host broadcasts a data transmitted to it and it only refers to other network members. Thus, bandwidth is saved. In addition, several access points can be linked together (by cable or by wifi relay) to increase the range of WiFi network. This mode is the most used because it is much more reliable.

  2. #2
    Join Date
    May 2008
    Posts
    27

    Re: Information on Wireless network security

    Network Infrastructure

    The following list represents the minimum necessary for the establishment of a wifi:
    • A wireless router or access point (necessary only for the infrastructure mode).
    • One or more wifi cards (generally plug into a USB port, PCI or PCMCIA). There are also adapters Ethernet / Wifi which are used mainly for game consoles with only an Ethernet port.


    This material corresponds to a standard. Currently, the most common is the maps 802.11g or 802.11b routers are compatible with the latest equipment. The 802.11b standard allows a theoretical maximum throughput of 11 Mbps 802.11g and 54 Mbps. There is also 802.11g +, which runs at speeds of 108 Mbps.

  3. #3
    Join Date
    May 2008
    Posts
    27

    Re: Information on Wireless network security

    Security

    Here are the most important and often overlooked cause of problem. It is easy to set up a network, but do not forget to close the door, whether or not you are in your apartment.

    Various options: WEP, WPA, MAC, etc..

    The SSID or network name "identifies the network, gives a name to differentiate it from others. If you do not run, you're the only one to know and it immediately more difficult to connect to your network.

    WEP / WPA two possibilities to encrypt data exchanged on the network. The problem with WiFi is that you have no control of the medium on which data flows in contrast to wired networks. So you do not know who is listening. Encrypt the data to ensure confidentiality. This is done by using what is called a key. This key also allows secure access to the network, if you do not know, impossible to communicate, unable to read the frames and / or send the proper format.

    WEP is set by default to the LiveBox for example, but this type of encryption consumes more resources and is easily craquable (including Linux).

    WPA is better and much less easily craquable. For added security, it is advisable to change the codes every month.

    The MAC address filtering on each network card has a unique identifier: the MAC address (to know, under Windows (remove quotes): Start> Run> type cmd then in the window ipconfig / all). The wireless router can typically create a list of MAC addresses of network adapters that allows them to connect to our network. It is an effective filter, but which also can be circumvented.

    DHCP (Dynamic Host Configuration Protocol) is a mechanism to automatically assign the values needed to communicate on the network (IP address, subnet mask, gateway, DNS). It's convenient but also very practical for an attacker who will not have to guess the configuration of your subnet.

    Once the network is up and running, all is set fixed ip (you choose your ip and you keep), this will more easily share files and printers.

    It is important to note that each point can be circumvented in one way or another. In fact, it is the combination of all these points that will make your network a very secure network. We should not base the security of your network on one of these. The minimum is to advise the WEP and MAC address filtering.

  4. #4
    jodo_institute Guest

    Re: Information on Wireless network security

    as per our expert for Security career one should have sound knowledge of Networking because to secure any network one should know the network first. for more info. regarding career in the security field you can contact us on
    jodoinstitute dot com

Similar Threads

  1. Tricks for the wireless network security?
    By hANIMA in forum Networking & Security
    Replies: 4
    Last Post: 12-05-2011, 08:15 PM
  2. information about wireless IP security camera
    By ZewrI in forum Portable Devices
    Replies: 5
    Last Post: 30-03-2011, 07:32 AM
  3. How to get network security key for wireless computer
    By Auspicious in forum Networking & Security
    Replies: 6
    Last Post: 10-10-2010, 12:20 AM
  4. Security on wireless network
    By SKREECH in forum Networking & Security
    Replies: 3
    Last Post: 04-03-2009, 02:37 PM
  5. Wireless Network Security follow up
    By axel1 in forum Networking & Security
    Replies: 7
    Last Post: 25-10-2008, 03:20 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,582,423.23465 seconds with 16 queries