Docstoc

wireless

Document Sample
wireless Powered By Docstoc
					              Advantages and Weaknesses Wireless

Preliminary



Local area network technology, or local area network (LAN) is a technology data
communications systems of the most popular in computer network technology. Use of LAN in
connecting two computers and more implemented in all public and private organizations,
schools, colleges and universities, shops and cafes are also residential.



Among the advantages of LAN is to connect two or more computers in a small size until the size
of which depends to a large say computers, servers, printers and peripherals, network
hardware such as hubs, switches and routers.



LAN configuration is very simple and has security features that are appropriate to their needs.
However, connections of each user or node on the LAN requires installation of network wiring.
The length and number of cable networks is dependent on the number and location of each
node in the LAN. If many nodes, the more the number of cable networks are needed.
Meanwhile, if the remote location of a node from another node it is necessary for the extension
cable into a LAN must also be long.



1.0 Wireless Local Area Network



Besides using a network cable connecting node to the LAN, wireless technology or wireless can
also be used. Wireless local area network or wireless local area network (WLAN) is a flexible
data communication system that can be implemented as an alternative to wired LAN network.
By using radio frequency technology, WLANs transmit and receive data through the air, to
minimize dependence on a cable connection. Thus, the WLAN has to incorporate a combination
of data connectivity to mobile users or nodes.
1.1 WLAN Technology



WLANs use electromagnetic airwaves (radio or infrared) to convert information from one node
to another node without having to rely on a physical network cable connection network. Radio
waves are used as carriers because of the easy to send data to the receiver.



Digital data is sent to convert digital signals to analog signals. It is then sent via a carrier wave to
the receiver and extracted it to a digital signal. This data is commonly used as a carrier by
modulating the signal is being transmitted. Thus, the data modulated on a carrier radio wave,
radio signals will take more than one frequency, this happens because the frequency or bit rate
of the information has been added to the modulated carrier signal.




1.2 Wifi



Wi-Fi stands for wireless fidelity, or is the technology that allows for users of

computers and other network hardware that supports technologies such as Personal Digital
Assistan (PDAs) and mobile phones to communicate in a LAN network or Internet access to the
broadband network without a wired network.



By using a Wi-Fi AP or wireless router, a LAN or Internet network can be accessed without a
cable in the range of approximately 300 square feet or within 100 meters.




2.0 Advantages WLAN
With the WLAN, users can access the network communication system without the need to find
a place as a wired connection to the network. In addition, network managers can configure or
build the network without having to install or additional cables. WLAN offers several
advantages such as productivity, comfort, and advantage in terms of cost compared with
traditional network wiring. Here are the advantages of WLAN.




2.1 Mobility



Wireless LAN system to provide easy access to information in real-time, anywhere. Such
mobility can increase productivity and quality of networking services to all people over the LAN
wiring.




2.2 Installation / Setup is fast and simple



Installation and configuration of wireless LAN systems is very simple and easier than installing a
wired network that requires pulling out the cable through the ceiling, floor or wall. Thus, the
installation of LAN will no longer require renovation floor, ceiling and wall because with just
installing an access point (AP) is sufficient in a particular environment.




2.3 Flexibility



Technology enables wireless LAN network can be achieved by the places that can not be
achieved with a wired network. LAN services to participants who are outside the buildings and
areas that do not have a network connection the network cable is no longer possible with the
WLAN. Access to communication systems can be performed in every nook and corner of the
WLAN coverage.
2.4 Reduced Cost-of-Ownership



Although the initial investment cost for the purchase of hardware equipment WLAN is

higher than the cable network hardware, but when calculated as a whole, installation and life-
cycle cost, then it is significantly cheaper. WLAN is used in a working environment that is
dynamic and changes constantly to meet the movement. But long-term benefits of a WLAN is
much higher when compared with wired LAN network. WLAN installation can survive and to
meet the needs of users without installing new cables.




2.5 scalability



WLAN communication system may be configured in a variety of topologies to meet the needs
of users. Configuration can be changed easily by the network peer-to-peer suitable for a small
number of users in a classroom or small hall through to the network infrastructure to serve
thousands of users and allows roaming in large areas.




2.6 Independent Cable



Free cable is the cable refers to a fibrous network, better known by the popular word "Free
Spaghetti." This is because each time a new connection is made, the new network wiring should
be made. If the wiring work is not done with the update, the process of identifying the problem
will be complex, especially in the rack switches. In addition, the existence of many network
cable on the ceiling, the floor and the wall also result in less finish the office space. Therefore,
the use of WLAN is able to solve the problem of the cable arrangement.
3.0 WLAN Weaknesses



Although the WLAN is often the choice of each organization, but there are weaknesses that
could affect the productivity aspects of access, Quality of Service (QoS) and network security.
Among the weaknesses of WLAN is the access speed issues, the performance is not stable,
easily compromised, weak encryption standard configuration and weaknesses.




3.1 Weaknesses Speed Web Access



WLAN access method that uses a wavelength which can be shared by many users resulting in
high-speed access to the affected. This is because the AP does not have a function that is used
to provide broadband service equally accessible by the user. Therefore, an increasing number
of users to access the AP via the bandwidth will be shared by other users.



If a WiFi users to access a big range, so other users would be affected by the access network
through the WLAN. In addition, the access speed of access as per AP location is different. If the
node is located close to the AP, the signal received is high. Conversely, the farther the location
of the node from the AP obtained the weaker signal.




3.2 Performance Signal Flaky



WLAN technology that uses radio waves in the 2.4GHz range easily distracted if here are
disruptions in the signal around. Signal interference, or more accurately known as "interference
signal" is defined as disruption of radio waves transmitted to the node and received from the
node. Some examples of disorders that affect the performance and volatility of the confines of
a sound wave signal is between the AP and the network access node. Sound waves cause the
noise disturbed the WLAN radio signal and thus lead to the data transmission is also affected by
it.



In addition, the interference wave signals also occur when a lot of physical barriers in a location.
This is a physical barrier such as walls, ceiling and floor. WLAN wave signals to be reduced as
the physical barriers and may not be up to the point of obstruction although still within reach of
the distance radius AP. In addition, due to too many people access and use of the heavy chain
of the AP has also resulted in WLAN performance, and it always hangs network instability.




3.3 Exposure to aggression



Access to WLAN usage can not be controlled because it is based on roaming signal.

Therefore, any station or node which is within the roaming signal can access the WLAN. This
will allow the intruder surf through the network or any location outside the area unnoticed.
This will cause the entire network vulnerable to attacks, threats and aggression that could invite
security issues seriously.




3.4 Configuration Weaknesses



The weakness of the configuration is the most significant weakness of the security.

Installation and usage of WLAN products that set the default setting most easily invaded.
Typically, the vendors who manufacture and supply of WLAN products to provide convenience
to customers on products sold primarily in terms of easy installation and installation by using
default settings.



However, the security implications can also cause great risk. This is true if the rule (setting) the
equipment is not changed and is still using the default settings, such as the name Service Set
Identifier (SSID), your Internet Protocol (IP) of APs, remote management, DHCP, and enable
password. This item will give a very big space to the network trespassers to access the network
illegally as trespassers will usually know the default setting for the wireless LAN equipment.




3.5 Weaknesses Encryption Standard



Wired Equivalency Privacy, or WEP encryption is a standard used primarily in the WLAN
communication system. Communications between the AP and the nodes in a WLAN using WEP
encryption has a weakness that may affect network security. The data is encrypted using this
technology can be broken down by network intruders to quickly and easily. In addition to WEP,
another encryption standard is the WiFi Protected Access, or WPA. WPA encryption is stronger
than WEP. However, it can also be broken by the intruders, but not easily and quickly as WEP.




4.0 Proposed WLAN Overcoming Weakness



Despite the obvious weaknesses of WLAN, WLAN implementations still needs to be done to
meet the demands of all users. Therefore, the best approach is to perform the

installation of WLAN AP installations in every corner of the room, and office buildings, with
emphasis on aspects of ICT security. There are many techniques to overcome shortcomings
such as concealment WLAN SSID, WEP or WPA, and so forth. Still only two (2) security approach
used by the Media Access Control address filter (MAC), intrusion detection systems (IDS) and
intrusion barrier system (IPS). This approach is taken because it provides a high level of WLAN
security in line with the convenience to the consumer WLAN to WLAN access at any location
and at any time. In addition, the implementation and architecture of WLANs is in accordance
with guidelines and security policies.
4.1 Filtering Address Media Access Control (MAC)



Media Access Control (MAC) is a method that uses the physical address of the computer
hardware to prevent and identify in the event of invasion. Every computer that uses a WLAN to
be registered to use the physical address of the computer. Each computer has a physical
address of the computer hardware is different and unique. Filter March would allow the MAC
address was registered only in the setting of wireless router that can be networked for LAN and
Internet facilities. Thus, any computer that does not register the MAC address will be denied
access to the WLAN.




4.2 Intrusion Detection Systems and Intrusion Barrier System



The use of intrusion detection systems (IDS) and intrusion barrier system (IPS) for WLAN is very
efficient and effective. Airtight products were used. Installation of the units Airtight done in
every corner of the WLAN signal coverage. Airtight function is to detect unusual signals, such as
patent attacks from the node and prevents the signal from access to the AP. In addition,
Airtight is also able to detect and prevent any ad hoc signals in the environment. Because the
WLAN access can be performed anywhere within the signal coverage of the AP, the actual
location of nodes is difficult to detect.



However, Airtight can solve this problem by providing a map / plan of the location of nodes in a
WLAN with a right to the network administrator. Thus, the location of the intruder can be
detected with the exact position of the location.
5.0 Conclusion



See the development of communication technology in the future, is to ensure that wireless
technologies will dominate the communications sector. Wireless technology has the advantage
of easy to use, portable and cost effective. In addition, this wireless technology is a technology
that has the potential to grow rapidly and have the ability to be upgraded. However, the
implementation of WLAN in government agencies and security measures should be prioritized
and monitored constantly. This is because there is flexibility in the WLAN if not managed
properly will cause problems in the agency's ICT security.

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:7
posted:5/15/2012
language:
pages:9