Isnin, 1 Mei 2017

explain wireless network and wifi, identify the advantages of wireless network.

list all of the wireless devices in your home and college. briefly explain the purpose of each device.

research the IEEE 802.11g and 802.11n standards. explain the key points of each standard including the data rates & make comparison between the two standards.

explain the different wireless network security risks and give the possible solution in order to avoid these risks.

find at least four (4) wireless networking protocols and explain each protocols.

answer


Wireless networks are computer networks that are not connected by cables of any kind. WiFi is a technology that uses radio waves to provide network connectivity. 


  • Wireless Networks Are Scalable
  • Wireless Networks Can Be Used by Guests
  • Wireless Networks Are Mobile
  • Wireless Networks Work With Multiple Devices
  • Wireless Networks Increase Efficiency


Wireless Router - A wireless repeater is a wireless networking device that is used to extend the range of a router. A repeater receives wireless signals and then re-emits them with increased strength. By placing a repeater between a router and the computer connected to the router, signal strength can be boosted, resulting in faster connection speeds.

Wireless Adapters - Wireless adapters are hardware devices installed inside computers that enable wireless connectivity. If a computer does not have a wireless adapter, it will not be able to connect to a router in order to access the Internet. Some computers have wireless adapters built directly into the motherboard while it is also possible to install stand-alone wireless adapters to add wireless capability to a computer that did not come with an adapter built in.

Wireless Repeater - A wireless repeater is a wireless networking device that is used to extend the range of a router. A repeater receives wireless signals and then re-emits them with increased strength. By placing a repeater between a router and the computer connected to the router, signal strength can be boosted, resulting in faster connection speeds.

Wireless Phones - Cellular and cordless phones are two more examples of device that make use of wireless signals. Cordless phones have a limited range, but cell phones typically have a much larger range than local wireless networks, since cell phone providers use large telecommunication towers to provide cell phone coverage.Satellite phones make use of signals from satellites to communicate, similar to Global Positioning System (Gps) devices.

The 802.11g specification is a standard for wireless local area networks (WLANs) that offers transmission over relatively short distances at up to 54 megabits per second (Mbps)

802.11n is a specification for wireless LAN (WLAN) communications. 802.11n, an addition to the 802.11 family of standards, will increase wireless local area network(WLAN) speed, improve reliability and extend the range of wireless transmissions.


[hide]
802.11 network PHY standards
802.11
protocol
Release
date[6]
Fre-
quency
Band-
width
Stream data rate[7]Allowable
MIMO streams
ModulationApproximate
range[citation needed]
IndoorOutdoor
(GHz)(MHz)(Mbit/s)(m)(ft)(m)(ft)
802.11-1997Jun 19972.4221, 2N/ADSSSFHSS2066100330
aSep 19995206, 9, 12, 18, 24, 36, 48, 54N/AOFDM35115120390
aSep 19993.7[A]206, 9, 12, 18, 24, 36, 48, 54N/AOFDM5,00016,000[A]
acDec 2013520400 ns GI : 7.2, 14.4, 21.7, 28.9, 43.3, 57.8, 65, 72.2, 86.7, 96.3 [B]
800 ns GI : 6.5, 13, 19.5, 26, 39, 52, 58.5, 65, 78, 86.7 [C]
8MIMO-OFDM35115[9]
acDec 2013540400 ns GI : 15, 30, 45, 60, 90, 120, 135, 150, 180, 200 [B]
800 ns GI : 13.5, 27, 40.5, 54, 81, 108, 121.5, 135, 162, 180 [C]
8MIMO-OFDM35115[9]
acDec 2013580400 ns GI : 32.5, 65, 97.5, 130, 195, 260, 292.5, 325, 390, 433.3 [B]
800 ns GI : 29.2, 58.5, 87.8, 117, 175.5, 234, 263.2, 292.5, 351, 390 [C]
8MIMO-OFDM35115[9]
acDec 20135160400 ns GI : 65, 130, 195, 260, 390, 520, 585, 650, 780, 866.7 [B]
800 ns GI : 58.5, 117, 175.5, 234, 351, 468, 702, 780 [C]
8MIMO-OFDM35115[9]
adDec 2012602,160Up to 6,912 (6.75 Gbit/s) [10]N/AOFDM, single carrier,
low-power single carrier
3.310[11]
ahEst. Dec 2016[6]0.9Up to 20
ajEst. Jul 2017[6]45/60
axEst. Dec 2018[6]2.4/5Up to 10.53 Gbit/sMIMO-OFDM
ayEst. Nov 2019[6]608000Up to 100,000 (100 Gbit/s)4OFDM, single carrier,60
azEst. Mar 2021[6]60
bSep 19992.4221, 2, 5.5, 11N/ADSSS35115140460
gJun 20032.4206, 9, 12, 18, 24, 36, 48, 54N/AOFDM38125140460
nOct 20092.4/520400 ns GI : 7.2, 14.4, 21.7, 28.9, 43.3, 57.8, 65, 72.2 [B]
800 ns GI : 6.5, 13, 19.5, 26, 39, 52, 58.5, 65 [C]
4MIMO-OFDM70230250820[8]
nOct 20092.4/540400 ns GI : 15, 30, 45, 60, 90, 120, 135, 150 [B]
800 ns GI : 13.5, 27, 40.5, 54, 81, 108, 121.5, 135 [C]
4MIMO-OFDM70230250820[8]


Wireless phishing is any technique by which an attacker attempts to convince wireless network users to divulge sensitive information

solution: 
  • Educate yourself. Read up on the latest scams. Be familiar with what a phishing scam looks like so you can recognize common tricks when you see them.
  • Use common sense. Read your emails carefully, checking to make sure you know the sender. Be suspicious of any email that asks for your personal or financial information. Also be very cautious when downloading any attachments or files from an email, unless you know and trust the sender.
  • Practice smart browsing. Make sure that the website you're visiting is secure before you enter any information. If you have any doubts, enter a fake password since phony sites accept false information. 
  • Use technology to protect you. Comprehensive security software with anti-phishing technologies, like AT&T Internet Security Suite, can help protect you. Just make sure that your software is up-to-date with the latest security protections by enabling automatic updates or selecting the Update button on your security software control panel.
  • Be vigilant both offline and online. Monitor your bank and credit card statements for any suspicious charges or transfers. Consider changing your passwords regularly. Make sure you create strong passwords that use a combination of letters, numbers, and special characters. Don’t use nicknames, birthdays, or other information that other people may know.
  • Report anything you think is suspicious. If you do come across what looks to be a phishing attempt, help yourself and others by reporting it.

 Evil Twin  is a rogue wireless access point that masquerades as a legitimate Wi-Fi access point so that an attacker can gather personal or corporate information without the end-user's knowledge.

solutions:
  • Use wireless intrusion detection to spot or block out-of-policy associations. Network WIPS products can provide these services for in-house WLANs. Host-resident agents can extend WIPS beyond your own WLAN, monitoring users that connect to wireless at home or on the road. For example, see Motorola AirDefense Personal and AirTight SAFE.
  • Centrally-manage wireless device configurations to avoid mistakes and prevent users from adding unsecured wireless network entries. For example, Windows Active Directory Group Policy Objects can be used to manage 802.11 and 802.1X parameters on Windows PCs.
  • Require 802.1X for your own WLAN, using an EAP Type that provides mutual authentication, and always verify server certificates. Although this actually proves the identity of the RADIUS server, that server authenticates your APs with a RADIUS secret, making it hard for an Evil Twin to successfully pose as a legitimate AP. EAP Types that let stations verify the server's certificate include EAP-TLS, EAP-TTLS and PEAP (see our companion tip, Choosing the right flavor of 802.1X).
  • Supply mobile workers with secure hotspot clients to avoid Web page login. For example, T-Mobile's Connection Manager uses 802.1X with EAP-TTLS when connecting to "Enhanced WPA Networks." Because the Connection Manager automatically checks the T-Mobile server's certificate, a user cannot accidentally connect to an Evil Twin, so long as that user never accepts any offer to connect to another SSID (including the older "tmobile" SSID).
  • Finally, educate teleworkers about options for using 802.1X in home WLANs. For example, some SOHO-class wireless APs have an on-board RADIUS server and local user list that can be used to support 802.1X without an external RADIUS server..

 Data Interception is When packets travel across a network, they are susceptible to being read, altered, or “hijacked.” Hijacking occurs when a hostile party intercepts a network traffic session and poses as one of the session endpoints.

solutions:
  • Monitoring the packets to save your server from the entrance of the counterfeit packets.
  • Timely upgrading of the security patches on your host’s operating system.
  • Beware of running of your server very close to the last level of the capacity.



 The Misconfigured APs are a type of security surface, that are the easiest to breach, if its detected. The place, where you will most likely meet misconfigured AP's are home wireless network or very small businesses. Large wireless environments are most likely using centralized management platforms that control hundreds or thousands of AP and keep them synchronized, therefore it is less likely to meet any configuration error there.


Wireless protocols; technologies including 802.11, WLAN, WPA, WEP, Wi-Fi and wireless broadband; and deployment issues such as access points, security and troubleshooting are discussed in this guide designed to provide a basic introduction to wireless protocols and technologies.

wireless local area network (WLAN) is a wireless distribution method for two or more devices that use high-frequency radio waves and often include an access point to the Internet.

Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections, or Wi-Fi.

Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN.

wifi is a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.

Wireless broadband is high-speed Internet and data service delivered through awireless local area network (WLAN) or wide area network (WWAN). ... The service is similar to that provided through digital subscriber line (DSL) or cable modem but the method of transmission is wireless.


Techopedia.com. (2017). What is Wireless Network? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/26186/wireless-network [Accessed 2 May 2017].

Newegg.com. (2017). Wireless Adapters, PCI Adapter, Wireless-G Adapter - Newegg. [online] Available at: https://www.newegg.com/Wireless-Adapters/SubCategory/ID-31 [Accessed 2 May 2017].

SearchNetworking. (2017). Wireless protocols learning guide. [online] Available at: http://searchnetworking.techtarget.com/tutorial/Wireless-protocols-learning-guide [Accessed 5 May 2017].

www.tutorialspoint.com. (2017). Misconfigured Access Point Attack. [online] Available at: https://www.tutorialspoint.com/wireless_security/wireless_security_misconfigured_access_point_attack.htm [Accessed 5 May 2017].

Rabu, 19 April 2017

Topic:2 Lecture 4. internet

give the difference between a MAC and an IP address.

explain each section of the IP address header.-

list the different IP address classes with its corresponding detail.

identify the IP version 4 public addresses and IP version 4 private addresses.-

identify the difference between IP version 4 and IP version 6 address.

give the differences between TCP and UDP.

explain what us a subnet and subnet addressing.

explain VLSM and identify its purpose.


An Ip address or Internet Protocol adress is the address assigned to your mobile,printer or computer by the network that uses Internet protocol for communication . Your IP can change with the change in network.IP addresses are divided into classes . A,B,C,D,E mostly we use class B and D 

Mac address is your machine address . This address will never change . It is the unique machine address given to your device . Your device will have communication with the local area network or any network using this address . Once you use the network your mac adress is tored in the network table so that network does not have to search your mac address again and again and shortest path towards it will be stored in routing table .

reference: https://www.quora.com/What-is-the-difference-between-an-IP-address-Mac-address-and-gateway-address



  • Version (always set to the value 4 in the current version of IP)
  • IP Header Length (number of 32 -bit words forming the header, usually five)
  • Type of Service (ToS), now known as Differentiated Services Code Point (DSCP) (usually set to 0, but may indicate particular Quality of Service needs from the network, the DSCP defines the way routers should queue packets while they are waiting to be forwarded).
  • Size of Datagram (in bytes, this is the combined length of the header and the data)
  • Identification ( 16-bit number which together with the source address uniquely identifies this packet - used during reassembly of fragmented datagrams)
  • Flags (a sequence of three flags (one of the 4 bits is unused) used to control whether routers are allowed to fragment a packet (i.e. the Don't Fragment, DF, flag), and to indicate the parts of a packet to the receiver)
  • Fragmentation Offset (a byte count from the start of the original sent packet, set by any router which performs IP router fragmentation)
  • Time To Live (Number of hops /links which the packet may be routed over, decremented by most routers - used to prevent accidental routing loops)
  • Protocol (Service Access Point (SAP) which indicates the type of transport packet being carried (e.g. 1 = ICMP; 2= IGMP; 6 = TCP; 17= UDP).
  • Header Checksum (A 1's complement checksum inserted by the sender and updated whenever the packet header is modified by a router - Used to detect processing errors introduced into the packet inside a routeror bridge where the packet is not protected by a link layer cyclic redundancy check. Packets with an invalid checksum are discarded by all nodes in an IP network)
  • Source Address (the IP address of the original sender of the packet)
  • Destination Address (the IP address of the final destination of the packet)
  • Options (not normally used, but, when used, the IP header length will be greater than five 32-bit words to indicate the size of the options field)

reference:  Erg.abdn.ac.uk. (2017). Iv4P Packet Header. [online] Available at: http://www.erg.abdn.ac.uk/users/gorry/course/inet-pages/ip-packet.html [Accessed 20 Apr. 2017].




ClassStart addressFinish address
A0.0.0.0126.255.255.255
B128.0.0.0191.255.255.255
C192.0.0.0223.255.255.255
D224.0.0.0239.255.255.255
E240.0.0.0255.255.255.255

reference: Abrams, L., Abrams, L., Abrams, L., Abrams, L., Abrams, L. and Abrams, L. (2017). IP Addresses Explained. [online] BleepingComputer. Available at: https://www.bleepingcomputer.com/tutorials/ip-addresses-explained/ [Accessed 20 Apr. 2017].


IPv4 (Internet Protocol Version 4) is the fourth revision of the Internet Protocol (IP) used to to identify devices on a network through an addressing system. The Internet Protocol is designed for use in interconnected systems of packet-switched computer communication networks  IPv4 uses a 32-bit address scheme allowing for a total of 2^32 addresses (just over 4 billion addresses).

IPv6 (Internet Protocol Version 6) is also called IPng (Internet Protocol next generation) and it is the newest version of the Internet Protocol (IP) reviewed in the IETF standards committees to replace the current version of IPv4 (Internet Protocol Version 4). IPv6 addresses are 128-bit IP address written in hexadecimal and separated by colons.

reference: Webopedia.com. (2017). What is The Difference Between IPv6 and IPv4? - Webopedia.com. [online] Available at: http://www.webopedia.com/DidYouKnow/Internet/ipv6_ipv4_difference.html [Accessed 20 Apr. 2017].



                                   TCP                   UDP
Acronym forTransmission Control ProtocolUser Datagram Protocol or Universal Datagram Protocol
ConnectionTCP is a connection-oriented protocol.UDP is a connectionless protocol.
FunctionAs a message makes its way across the internet from one computer to another. This is connection based.UDP is also a protocol used in message transport or transfer. This is not connection based which means that one program can send a load of packets to another and that would be the end of the relationship.
UsageTCP is suited for applications that require high reliability, and transmission time is relatively less critical.UDP is suitable for applications that need fast, efficient transmission, such as games. UDP's stateless nature is also useful for servers that answer small queries from huge numbers of clients.
Use by other protocolsHTTP, HTTPs, FTP, SMTP, TelnetDNS, DHCP, TFTP, SNMP, RIP, VOIP.
Ordering of data packetsTCP rearranges data packets in the order specified.UDP has no inherent order as all packets are independent of each other. If ordering is required, it has to be managed by the application layer.
Speed of transferThe speed for TCP is slower than UDP.UDP is faster because error recovery is not attempted. It is a "best effort" protocol.
ReliabilityThere is absolute guarantee that the data transferred remains intact and arrives in the same order in which it was sent.There is no guarantee that the messages or packets sent would reach at all.
Header SizeTCP header size is 20 bytesUDP Header size is 8 bytes.
Common Header FieldsSource port, Destination port, Check SumSource port, Destination port, Check Sum
Streaming of dataData is read as a byte stream, no distinguishing indications are transmitted to signal message (segment) boundaries.Packets are sent individually and are checked for integrity only if they arrive. Packets have definite boundaries which are honored upon receipt, meaning a read operation at the receiver socket will yield an entire message as it was originally sent.
WeightTCP is heavy-weight. TCP requires three packets to set up a socket connection, before any user data can be sent. TCP handles reliability and congestion control.UDP is lightweight. There is no ordering of messages, no tracking connections, etc. It is a small transport layer designed on top of IP.
Data Flow ControlTCP does Flow Control. TCP requires three packets to set up a socket connection, before any user data can be sent. TCP handles reliability and congestion control.UDP does not have an option for flow control
Error CheckingTCP does error checking and error recovery. Erroneous packets are retransmitted from the source to the destination.UDP does error checking but simply discards erroneous packets. Error recovery is not attempted.

reference: Diffen.com. (2017). TCP vs UDP - Difference and Comparison | Diffen. [online] Available at: http://www.diffen.com/difference/TCP_vs_UDP [Accessed 20 Apr. 2017].



A subnet (short for "subnetwork") is an identifiably separate part of an organization's network. Typically, a subnet may represent all the machines at one geographic location, in one building, or on the same local area network (LAN). Having an organization's network divided into subnets allows it to be connected to the Internet with a single shared network address. Without subnets, an organization could get multiple connections to the Internet, one for each of its physically separate subnetworks, 

Subnet addressing allows us to split one IP network address into smaller multiple physical networks known as subnetworks. Some of the node numbers are used as a subnet number instead. A Class B address gives us 16 bits of node numbers translating to 64,000 nodes. Most organizations do not use 64,000 nodes, so there are free bits that can be reassigned. Subnet addressing makes use of those bits that are free,

reference: Documentation.netgear.com. (2017). Subnet Addressing. [online] Available at: http://documentation.netgear.com/reference/nld/tcpip/TCPIPBasics-3-08.html [Accessed 20 Apr. 2017].


Variable Length Subnet Mask, abbreviated as VLSM, is a means to specify a different subnet mask for the same network number on different subnets. With VLSM, a network administrator can use a long mask on networks with few hosts and a short mask on subnets with many hosts. To use VLSM, the routing protocol must support it.

reference:  Webopedia.com. (2017). What is variable length subnet mask? Webopedia Definition. [online] Available at: http://www.webopedia.com/TERM/V/variable_length_subnet_mask.html [Accessed 20 Apr. 2017].

explain wireless network and wifi, identify the advantages of wireless network. list all of the wireless devices in your home and college....