Unit 4 Assignment 2: A Case Study

Decent Essays
802.11b and 802.11a WLAN standards were made official in September of 1999 by the IEEE committee. Included with its ratification was Wired Equivalent Privacy (WEP) technology for authentication and encryption. When utilizing the WEP standard every frame is encrypted before transmission over wireless LAN by using the RC4 encryption technique.
WEP utilized shared key authentication and open system authentication. In open system authentication, there are no credentials required by the user. Basically, anyone can login to the network through an AP.
Shared key authentication is a technique where the user is required to enter his credentials before being able to login to the network. There is a four-step authentication process that must be followed

Related Documents

  • Improved Essays

    2. The IEEE 802.11n:- The IEEE 802.11n standard, appear in 2008, And become popular because the jump in data transfer rates from about 54 Mbps to nearly 600 Mbps. The IEEE 802.11n standard was officially completed in 2009 but most of the technical features were ratified in 2007. Most companies supported for the creation of a 60 GHz based standard for WLANs to succeed the 802.11n standard, and a lot of attention and effort was devoted to this activity.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Pt1420 Unit 3 Assignment

    • 533 Words
    • 3 Pages

    Final Project For my game I am going to make 2048. The user will use the arrows keys to control the movement of the number tiles across the board. The goal of the game is for the user to create the number tile with the value of 2048. The game has servel mechanics at play. First I will have to code a tile generator that creates a two or four numbered tile in a position around the perimeter of the board.…

    • 533 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    1. The question provides us those following weather information of one specific place: Maximum Temperature, Minimum Temperature, Average Temperature, Dew Point, Sunrise, Sunset, and Pressure. The date has been recorded daily for six months from April 1st, 2015 to September 30th, 2015. 2.…

    • 402 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    These wireless access points also come with the newest 802.11ac technology. They are also equipped with dual bank 2.4 and 5 GHz for better bandwidth…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Pt1420 Unit 1 Assignment

    • 970 Words
    • 4 Pages

    Rounding Data When data is gathered and calculated, the final information presented tends to be rounded. On some occasions it may be necessary to round data, especially when rounding non-integer vales to integer values for simplicity and statistical representation. An example of this would be at the end of the calculations in sample weighting, the fractions you get are rounded to integers, since the data is based on physical objects which cannot have fractions, and so is considered extra for rounding purposes. Data may also me rounded in order for it to be understandable if the information is to be presented to other people, or just to keep important digits only to get an idea of scale. Extreme examples of this would be comparing the size of…

    • 970 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Professor Doupé, Thank you for your reply, and for your questions. We are excited to potentially have your guidance in our research, and hope we have provided clear explanations to your questions below: 1. SSL/TLS encryption secures data flowing between client and server. Using SSL during an authentication attempt could provide a secure way for a non malicious server to authenticate with the device, while blocking out sign in attempts from malware. 2.…

    • 682 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Pt1420 Unit 6 Assignment

    • 798 Words
    • 4 Pages

    Megan Douglas Lesson Title: All Aboard! Date: March 5, 2015 Essential Question: Does a pattern exist when finding the different combinations of cars used to create different train lengths using Cuisinaire Rods? If so, what is it and how do you find it? Lesson Rational: In this lesson, the students will use Cuisinaire Rods to create different combinations while having different “car lengths” (individual rods) add up to “trains” (combinations) which are equal to the length of a larger car.…

    • 798 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Pt1420 Unit 3 Assignment

    • 3537 Words
    • 15 Pages

    There exists a game. A game older than time itself. This game is responsible for the genesis of every universe. Once a universe has reached maturity, the game will present itself to members of the species that it deems to be the most sentient and intelligent in that particular universe. Once the game presents itself to them, they will play the game.…

    • 3537 Words
    • 15 Pages
    Superior Essays
  • Improved Essays

    Western Governors University A. Security Faults Describe three of the security faults in this scenario that caused a security breach. 1. Some accounts existed before the electronic health record(EHR) was deployed. Important steps were missed during the import of old accounts. I suggest using a clean base line for the brand new EHR system.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    In each scenario mentioned in previous section, we formulate network topologies as undirected graph $\mathcal{G}=(\mathcal{V},\mathcal{E})$ with $n$ nodes and $m$ edges having demand at a node $i$ in $\mathcal{V}$ given by $d_i$. Here, $\mathcal{V}$ indicates set of nodes and $\mathcal{E}$ indicates set of edges in the topology. A link would exist in the topology between node $i$ and node $j$, if they are in the communication range of each-other satisfying constraint, \begin{equation} P_i - PL_{(i,j)}\geq\delta_j; \forall (i,j)\in\mathcal{V}. \label{eqn:radio sensitivity} \end{equation} In equation~\ref{eqn:radio sensitivity}, $P_i$ is the transmit power (in dBm) at node $i$, $PL_{(i,j)}$ (in dB) is the pathloss between node $i$ and node $j$ and $\delta_j$…

    • 431 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 6 Igms

    • 2070 Words
    • 9 Pages

    IV makes the key stream vulnerable: The 802.11 does not specify how the IVs are set or changed, so some Wireless adapter might generate same IV sequence which is hazardous as attacker can take advantage of this thus making WEP vulnerable 3. No cryptographic integrity protection: Even though WEP uses non-cryptographic CRC to check the integrity of packets. When CRC is used with stream cipher is dangerous. 10.…

    • 2070 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    5G Case Study

    • 989 Words
    • 4 Pages

    ABSTRACT: The cellular industry has already started laying the foundation for 5G, as the 4G deployments are happening worldwide. However, there are few questions that are being discussed among research institutions, standards bodies, operators, the supplier community, trade organizations and governments – What will be the 5G deployment time frame? What will characterize networks beyond 2020? What are the likely technologies that will come in to play for 5G?…

    • 989 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    MANET Case Study

    • 890 Words
    • 4 Pages

    Wireless links between nodes can be unreliable – Wireless nodes have a limited amount of energy available at any given time which could result in a node becoming unavailable for communication when its power is depleted. These wireless links are also susceptible to attacks. Unlike wired networks in which the adversary first needs to gain actual physical access to the network, in wireless ad-hoc networks the adversary can attack from any link and target any node. These ad-hoc networks don’t have a clear defence line, as such each and every node must be prepared to defend itself from threats. 2.…

    • 890 Words
    • 4 Pages
    Improved Essays