Vous êtes sur la page 1sur 41

KOLEJ MASA

ASSIGNMENT 1 WIRED AND WIRELESS COMMUNICATION

KALAI ARASI D/O DORAISAMY DIT 04-1009652

MR.SATHIYA MURASAN SINGGAL RAIN SUBMISSION DATE: 16/5/2011

ACKNOWLEDGEMENT

First of all I would like to thank my lecturers,fellow,parents and in the last but not least my friend,who is in a communication company for a good moral support. When I got this assignment I was little nervous but excited as well because I knew that this assignment need a lot of hardwork.search not only soft search but hard search also.

During the search I found some reviews from internet and some from my friends,relatives and etc. about the wired and wirelss communication.then I collect the reviews will be helpful to do my assignment. At last,I again would like to thank all the parties for commitment and cooperation to made this thing possible.thank you.

ABSTRACT

Computer networking or Data communications is the engineering discipline concerned with the message between computer systems or devices. A computer network is any set of computers or devices related to each other with the capability to switch over data. Computer networking is sometimes calculated a sub-restraint of electrical engineering, telecommunications, computer science, information technology and/or computer engineering since it relies a great deal upon the hypothetical and rational submission of these scientific and engineering disciplines. The three types of networks are : Internet, intranet, and extranet. Examples of dissimilar network methods are:
y y y y y

Local area network (LAN), which is frequently a small network unnatural to a small geographic area. An example of a LAN would be a computer network within a shop. Metropolitan area network (MAN), which is worn for medium size area. examples for a town or status. Wide area network (WAN) that is usually a larger network that cover a huge geographic area.

Wireless LANs and WANs (WLAN & WWAN) are the wireless matching of the LAN and WAN

All networks are interconnected to allow communication with a diversity of dissimilar kinds of media, including twisted-pair copper wire cable, coaxial cable, optical fiber, power lines and a selection of wireless technologies. The devices can be not speaking by a few meters e.g via Bluetooth or nearly boundless distances . Networking, routers, routing protocols, and networking over the public Internet have their condition definite in documents called RFC.

Table of content

Topic Network Wired connection Wireless connection Advantages and disadvantages of wired and wireless connection 802 architeture Pie chart conclusion References

Page number 1-4 4-9 9-16 17-22 22-38 39 40 41

Views of networks

Network administrator can see networks from both corporal and reasonable standpoint. The physical outlook involve geographic location, physical cabling, and the network basics (ex., routers, bridges and application layer gateways that interconnect the physical medium. Logical networks, call in the TCP/IP architecture, subnets, map into one or more life form medium. For example, a normal do in a campus of building is to make a put of LAN cable in each array come into view to be a ordinary subnet, using virtual LAN (VLAN) technology. Both users and administrator will be aware, to untrustworthy extents, of the trust and variety characteristics of a network. Again using TCP/IP architectural terminology, an intranet is a group of people of interest beneath private administration usually by an venture, and is only easy to get to by official users .Intranets do not contain to be connected to the Internet, but generally have a restricted connection. An extranet is an extension of an intranet that allows safe communications to users exterior of the intranet. illegally, the Internet is the set of users, enterprise, and happy providers that are organized by Internet Service Providers (ISP). From an engineering point of view the Internet is the set of subnets, and aggregate of subnets, which split the registered IP address space and swap information about the reachability of those IP addresses by the Border Gateway Protocol. characteristically, the human-readable names of servers are translate to IP addresses perceptibly to users, by means of the directory cause of the Domain Name System (DNS). in surplus of the Internet, there be able to be business-to-business (B2B), business-to-consumer (B2C) and consumer-to-consumer (C2C) communications. particularly when money or open information is swap, the communications are appropriate to be tenable by some form of communications security device. Intranets and extranets can be firmly superimpose on top of the Internet, without any right of entry by general Internet user, using protected Virtual Private Network (VPN) technology.

History of computer networks Before the arrival of computer networks that were base upon some kind of telecommunications system, communication between computation machines and early computers was perform by human user by carrying instructions among them. Many of the social behaviors seen in today's Internet were obviously there in the nineteenth century and debatably in even previous networks using diagram signal.
y

y y y

In September 1940 George Stibitz used a teletype machine to send orders for a problem set from his copy at Dartmouth College to his Complex Number Calculator in New York and established consequences back by the similar means. connecting output systems approximating teletypes to computers was an attention at the Advanced Research Projects Agency (ARPA) when, in 1962. was hire and urbanized a operational group he call the "Intergalactic Network", a forerunner to the ARPANET. In 1964, researchers at Dartmouth urbanized the Dartmouth Time Sharing System for spread users of big computer systems. The same year, at Massachusetts Institute of Technology, a research group support by General Electric and Bell Labs used a computer to route and direct telephone connections. all through the 1960 Leonard Kleinrock, Paul Baran and Donald Davies separately conceptualized and urbanized network system which used packets that can be used in a network flanked by computer systems. 1965 THOMAS MERRILL anD Lawrence produced the first wide area network (WAN). The first widely used telephone switch that used truthful computer control was introduce by Western Electric in 1965. In 1969 the University of California at Los Angeles, the Stanford Research Institute, University of California at Santa Barbara, and the University of Utah were associated as the launch of the ARPANET network by 50 kbit/s circuits. profitable services using X.25 were deploy in 1972, and afterward used as an basic communications for increasing TCP/IP networks.

computer networks are the center of current communication. All modern trait of the Public Switched Telephone Network (PSTN) are computer-forbidden, and telephony more and more runs over the Internet Protocol, though not of necessity the public Internet. The range of communication has greater than before considerably in the past decade, and this bang in communications would not have been probable without the gradually advance computer network. Computer networks, and the technology sought to connect and communicate through and stuck between them, continue to drive computer hardware, software, and peripherals industry. This growth is mirror by growth in the information and types of user of networks from the investigator to the home user.

Network .. One way to classify computer networks is by their geographic range, though many real-world networks interconnect Local Area Networks (LAN) via Wide Area Networks (WAN) with wireless wide area networks (WWAN). These three (broad) types are: The history of communiqu dates back to prehistory. Communication can variety from very minor processes of switch over, to full conversations and mass communication. Human communication was change with speech possibly 200,000 years ago. Symbols were urbanized about 30,000 years ago, and writing about 7,000. On a much shorter level, there have been major development in the pasture of telecommunication in the past hardly any centuries.

Histry of telecommunication. The history of telecommunication - the transmission of signals over a coldness for the principle of communication - began thousands of years ago by the use of smoke signals and drums in Africa, America and part of Asia. In the 1790s the first permanent semaphore systems emerge in Europe however it was not awaiting the 1830s that electrical telecommunication systems in progress to become visible. Distance telecommunications Visual signals(non-electronic) y y y y y y y y y y y y y prehistoric:fires,beacons,smoke signals 6th century bc: mail 5th century bc:pigeon post 4th century bc:hydraulic semaphores 490 bc: heliographs 15th century AD: maritime flags 1790 AD: semaphore lines 19th century AD: signal lamps Audio signals: Prehistoric:communication drums,horns 1838 AD:electrical telegraph 1876:telephone 1880:photophone

y y y y y y y y y y

1896:radio Advanced electrical/electrical signals 1927:television 1930:videophone 1964:fiber optic telecommunications 1969:computer networking 1981:analog cellular mobile phones 1982:smtp email 1983:internet 1998:satellite phones

wired link. In telecommunications, cable Internet access, often abridged to cable Internet or simply cable, is a shape of broadband Internet access that uses the cable television communications. Like digital subscriber line and fiber to the premises armed forces, cable Internet access provides network rim connectivity (last mile access) from the Internet service provider to an end user. It is included keen on the cable television communications analogously to DSL which uses the obtainable telephone network. Cable TV networks and telecommunications networks are the two main forms of residential Internet access. newly, both have seen enlarged antagonism from fiber deployments, wireless, and mobile networks.

Ethernet

Ethernet and wireless networks both have advantages and disadvantages depending on your needs, one may hand out you enhanced than the other. Wired networks have the funds for users with bounty of security and the capacity to move lots of data very fast. Wired networks are strangely faster than wireless networks, and they can be very inexpensive. However, the cost of Ethernet cable can add up -- the more computers on your network and the past not together they are, the more exclusive your network will be. In addition, unless you're building a new house and install Ethernet cable in the walls, you'll be bright to see the cables running from place to place roughly your home, and wires can to the highest degree limit your mobility. A laptop owner, for example, won't be able to budge around effortlessly if his computer is tethered to the wall. There are three basic system people use to place up wired networks. An Ethernet system use moreover a twisted copper-pair or coaxial-based transport system. The most generally used cable

for Ethernet is a category 5 unshielded twisted pair (UTP) cable it's useful for businesses who want to connect a number of devices together, such as computers and printers, but it's massive and exclusive, making it less realistic for home use. A phone line, on the other hand, merely uses to be had phone wiring originate in most homes, and can make available fast navy such as DSL. Finally, broadband systems make available cable Internet and use the same nature of coaxial cable that give us cable television. If you plan to connect only two computers, all need is a network interface card (NIC) in each computer and a line to run between them. If you want to connect several computers or other diplomacy, you'll need an additional section of equipment: an Ethernet router. You'll also necessitate a cable to connect each supercomputer or apparatus to the router

Hardware and bits rates Broadband cable Internet access require a cable modem at the customer's location and a cable modem termination system at a cable operator ability, typically a cable television headend. The two are linked via coaxial cable or a Hybrid Fiber Coaxial (HFC) fix. While access networks are now and then referred to as last-mile technologies, cable Internet systems can classically work where the distance among the modem and the execution system is up to 100 miles (160 km). If the HFC network is big, the cable modem killing system can be group into hubs for resourceful management. Downstream, the course en route for the user, bit rates can be as a large amount as 400Mbit/s for business connections, and 100Mbit/s for housing check in some countries. Upstream traffic, originate at the userrange from 384Kbit/s to more than 20Mbit/s. One downstream canal can handle hundreds of cable modems. As grow, the cable modem termination system (CMTS) can be advanced with more downstream and upstream ports, and group into hubs CMTS for proficient management. Most data over cable service interface specificationMost (DOCSIS) cable modems restrict upload and download rates, with customizable limits. These limits are set in configuration archive which are downloaded to the modem using the Trivial File Transfer Protocol, when the modem opening establish a connection to the contributor's equipment.Some users have attempt to take precedence over the bandwidth limit and put on access to the jam-packed bandwidth of the classification (often as much as 30 Mbit/s), by uploading their own arrangement file to the cable modem

Shared bandwidth Like most housing broadband technologies, such as FTTX, Satellite Internet, or WiMAX, a people of users share the on hand bandwidth. Some technology share only their core network, whilst some counting Cable Internet and PON also divide up the access network. This thoughtful allow the network operative to take gain of statistical multiplexing, a bandwidth giving out technique which is in employment to allocate bandwidth somewhat, in order to supply an plenty level of check at an tolerable price. However, the operative has to monitor tradition pattern and degree the network properly, to make certain that customers collect adequate examine even through peak-usage period. If the network operator does not supply adequate bandwidth for a fussy neighborhood, the service can become sluggish if many people are using the service at the same time. Operators have been identified to use a bandwidth cap, or other bandwidth throttling technique users download rate is limited all through peak times, if they have downloaded a large quantity of data that day.

Bundled service offerings

Many cable TV Internet access provider offer Internet access without tying it to a cable television donation, but stand-alone cable internet is determinedly provided at superior rate. the extra charge is said to cover the cable procession contact much like phone companies incriminate a diminutive line access payment for having DSL Internet service without a phone subscription. There are those who contend that the elevated stand-alone charge are not so much to more resourcefully cover in point of fact-improved rate as it is to oblige the customer to bunch it with a cable television payment (and as a result to buy or rent a television earpiece from the company). In the instances where a cable internet customer insist on using stand alone cable internet, the cable TV signals are repeatedly unconcerned by filter at the line beat inside the customer's premises.

for the meantime, internet service providers (ISP) who obtain and then resell high-speed Internet right to use from, or all the way through, cable companies are generally not theme to the cable companies' higher charge, and as a result can pass on usua lmarket rate cable internet to their end user customers (giving the manifestation of a lower price). Billing for such ISP sponsor cable internet services is still handle by the cable corporation, albeit on behalf of the ISP.

Broadband over the telephone network (DSL) The telephone network is one of the oldest and the majority ever-present communications infrastructures. Without any upgrade the same network that bring your grandparents a gathering line can give you admission to the Internet through a dial up modem. The telephone network can also make available broadband examine using Digital Subscriber Lines (DSL). DSL is existing during the local phone company. Call your local phone company to locate out if DSL service is to be had in your community or neighborhood. Advantages: A key advantage of DSL check is that it works with accessible wiring. The only equipment wanted is a modem plugged into an accessible phone jack and filter for each telephone in your house or office. Another advantage of DSL service is that each user has a dedicated link and the alacrity is stable and will not make smaller if more people in your locality are also using DSL. DSL provides steadfast broadband service for suburban and small business regulars but is not likely to be passable for huge businesses. Disadvantages: A major disadvantage of DSL service is the incapability to carry the service advance than 18,000 feet from the central phone office. DSL cannot be deliver to home or businesses away from this distance. Another disadvantage is that upload speed do not equivalent download speeds. Broadband the cable network(cable modem) one more pipe running into most homes is the coaxial cable that conventionally provides television indoctrination. According to the National Cable and Telecommunications Association cable pass by 99% of engaged homes in the United States. Most cable company have upgrade their networks to carry cable modem broadband tune-up over the equivalent network that deliver video programming. Broadband over the electric network (BPL) a different pipe that goes to every house is on or after the electric company. It is now potential to deliver broadband service from beginning to end a technology called Broadband over Powerline or BPL. BPL is a moderately new entry in the rescue of broadband service. quite a lot of electric company have urban pilot projects to establish the profitable possibility of using BPL to distribute broadband. in principle BPL service allow customers to merely cork a special modem into any vent in their home to admission high speed Internet. Fiber to the home (FTTH) Fiber optic cable is an additional type of wired broadband delivery technology. Fiber optic cables hold digital information in the obvious form of light pulse and are proficient of deliver very high level of broadband. The Internet backbone run crossways the earth on fiber optic cable.There are numerous acronyms related with fiber cable put up outs. Below is a brief list of the common fiber acronyms:

y y y y

FTTH FTTN FTTC FTTx

Fiber to the Home, also know as FTTP Fiber to the neighborhood. Fiber to the curb. Fiber to everyplace.

Fiber to the home networks connect a fiber optic string the diameter of a coat to each home or business. The towering bandwidth offered through fiber technology enable delivery of the Triple Play voice video and data over the equivalent network roads. The number of fiber to the home networks is upward. Several large telephone companies are in the course of building fiber to the home networks to transport video prepared forces in adding equally to voice and data services. Most new fiber to the home correlations are to be found in superficial reach and new development where companies get a sufficient amount subscribers to pay for the network exploitation or government support projects such as UTOPIA in Utah that involve quite a few cities.

What is wireless Wireless network refer to any kind of computer network that is not unconnected by cables of any kind. It is a means by which telecommunications networks and endeavor (business), installation avoid the precious process of introducing cables into to a building, or as a association between a blend of equipment locations.Wireless telecommunications networks are by and large execute and administer using a program classification called radio waves. This awareness take place at the substantial level, , of the network configuration.

Type of wireless Wireless PAN Wireless Personal Area Networks (WPANs) interconnect devices within a comparatively small area, generally within a persons reach. For example, both Bluetooth radio and indistinguishable Infrared light provide a WPAN for interconnect a headset to a laptop. ZigBee also chains WPAN applications . Wi-Fi PANs are handsome commonplace (2010) as equipment expensive start to join together Wi-Fi into a selection of shopper electronic devices. Intel "My WiFi" and Windows 7 virtual Wi-Fi capability have made Wi-Fi PANs simpler and easier to set up and build up.

Wireless LAN Wireless local area network (WLAN) links two or more campaign using a wireless distribution means, provided that a connection all the way through an right of entry top to the wider internet. The use of spread-spectrum or OFDM technologies also give user the mobility to budge around contained by a local reporting area, and still stay after unrelated to the network.
y y

Wi-Fi: "Wi-Fi" is a phrase used to depict 802.11 WLANs, even if it is theoretically a confirmed standard of interoperability amid 802.11 devices. Fixed Wireless Data: This rigging point to point links among computers or network at two far-flung locations, often using committed microwave or modulate laser light beams over line of sight path. It is often used in city to unite networks in two or more building without install a restless link.

Wireless MAN Wireless Metropolitan Area Networks are a type of wireless complex that connect quite a few Wireless LANs. WiMAX is a form of Wireless MAN and is describe by the IEEE 802.16 standard.

Wireless WAN Wireless wide area networks are wireless networks that as expected cover fat out-of-doors areas. These networks can be worn to fix branch office of business or as a municipal internet access system. They are regularly deploy on the 2.4 GHz band. A distinctive system contain foot station gateways, admittance point and wireless bridge relays. supplementary configurations are network systems where each access reach your peak acts as a convey also. When collective with renewable joie de vivre system such as photo-voltaic cosmological panel or wind system they can be set single-handedly system. Mobile Device Networking With the expansion of smart phones, cellular telephone networks usually lug data in toting up to phone conversations:
y

Global System for Mobile Communications (GSM) The GSM system is at probability into three major systems the switching system, the base station system, and the procedure and prop up system. The cell phone connect to the base classification station which then connect to the maneuver and support station it then connect to the switching location where the term is transfer to where it requirements to go. GSM is the most general regular and is old for a best part of cell phones.

Personal Communications Service (PCS) PCS is a radio band with the principle of can be dilapidated by mobile phone in North America and South Asia. Sprint happen to be the cavity examine to set up a PCS. D-AMPS: Digital Advanced Mobile Phone Service, an advance elucidation of AMPS, is living wage being phased out wonderful to progression in technology. The newer GSM network are replace the elder system.

Uses

Wireless networks go on to develop, procedure has grown in 2010. Cellular phones are part of everyday wireless networks, allow easy special roads. Inter-continental network system use radio satellites to talk across the world. Emergency services such as the police force make the most of wireless networks to communicate effectively. persons and business use wireless networks to send and share data speedily, whether it be in a minuscule office building or across the world. Another use for wireless networks is a fee efficient means to join to the Internet, in region where the telecommunications infrastructure is both needy and not there in income, normally in pastoral areas and developing countries. Compatibility issues also come up when selling with wireless networks. poles apart campaign may have compatibility issue, or power require modifications to get to the bottom of these issue. Wireless networks are frequently typically slower than those create in current version of Ethernet cable connected installation. A wireless network is more helpless, because a person can grab and sometimes detour a network diffusion gesture when summit to peak connections be used. Many wireless network use WEP Wired Equivalent Privacy safe keeping systems. These have been set up to be unmoving defenseless to infringement. Though WEP does slab some intruder, the protection troubles have cause some businesses to keep on with wired network pending a more relevant wellbeing trial system can be commence. The use of suitable firewalls overcome some haven troubles in wireless network that are unarmed to shot unlawful access.

Broadband application Infrastructure and topography will be very diverse for every the public. unlike communications technology will work bigger in some area than others. anyway of what broadband expertise are on hand in your the public or what communications project your the community may come to a verdict to start, the submission made to be had by broadband scrutinize will support all land

Common broadband uses


y y y y y y y y y

Send / receive large files together with software updates take part in multiplayer network sports meeting a local coffee shop, or on the road divide an internet connection Make free phone calls to anywhere in the world Access video on demand Use Interactive TV share content lay up backup files online

numerous of today's applications require broadband to work properly. The table below shows the least amount and ideal speeds compulsory for some of the more popular application Application Teleworking Videoconferencing E-Learning Telemedicine Video Telephony Near Video on Demand Movies on Demand Audio on Demand Telegaming Home Shopping Electronic Banking Electronic Newspapers Digital Television Minimum Speed 110 kbps 110 kbps 110 kbps 110 kbps 70 kbps 1 Mbps 1 Mbps 110 kbps 40 kbps 40 kbps 40 kbps 40 kbps 1 Mbps Ideal Speed 1.5 - 7 Mbps 800 kbps 1.5 - 7 Mbps 1.5 -7 Mbps 200 kbps 1.5 - 7 Mbps 1.5 - 7 Mbps 700 kbps 600 kbps 1.5 - 7 Mbps 400 kbps 2 Mbps 7 Mbps

Commercial broadband applications


y y y y y telemedicine application for persons teleworking e-government agriculture

y y y y y y y y

distance learning public safety national security utlitity applications small business assistance information gathering tourism entertainment

advantage of wired connection Wired networking use network cables, as well known as Ethernet cable, to attach network campaign such as computers, servers and printers. In addition, recognizable technologies such as the telephone and line up television at a standstill use wired networking widely. Wired network has taken a back stool in remote compute since the prologue of wireless network, but it unmoving offer advantages that give it the periphery more than wireless networking. Faster Wired connections can attain networking speeds of up to 1,000 Mbps, which is additional than 900 times faster than a wireless association that only reach up to 54 Mb. The hyper association speed is compulsory in maneuver big companionship where quite a lot of servers and supercomputer use the network. There is more or less no lag time because each system have its own exact wired correlation to the network, meaning no competitions for obtain signals, which happens a lot in wireless networking. A wired network provide connections to the filled amount of bandwidth to each user, creation it faster. It also does not tie to an transmitter or Wi-Fi (source of signals for wireless networking) that can give puny signals when too far or hindered. Wired networking is also supreme for users who behavior their businesses from home, allow them to download huge video archive and print graphical images. keen gamers also help from wired networking by speed up connections for sport that can be bandwidth hogs.

Reliable Wired networking uses shortest, fixed, physical relatives that do not knowledge intervention and fluctuations of bandwidth. Wired associations also have smaller number drop associations than wireless associations.

Secure Wired networks are not susceptible to network snoopers and eavesdroppers, which are universal harms in wireless networking. To increase contact to a wired network, hackers have to use detailed tools or creep into the location physically, which can be well-appointed, hazardous and time consuming for them. Wired network do not need extra refuge actions that wireless networks need, such as use of encryption and passwords for network setting in regulate to stop others from by means of the connections. With wired networking, do not have to be concerned about others trying to use your relations to get a "free ride" or, worse, admittance your susceptible and individual files. This is a general dilemma with wireless networking since the signal are easy to catch. With wired networking, do not have to worry about your fellow citizen uncertain crossways your files because you do not use a wireless indicator that can reach past your goods line. Disadvantage of wired management the wires from each room within the home can be a complicated task. Network cable can look messy. Network cables can disconnect or turn out to be out of order consequently cause the association to fail. Adding more computers to a wired network may corollary in startling spend if you run out of associations on your network and might slow bringing up the rear the network. All wired networks differ from each other. The nearly all household type of wired network is an Ethernet network. 1)Wired and as a result more complex to setup. drill holes in wall, in a row cables in lofts fitting socket and redecorate. 2) More luxurious to set up 3) More time uncontrollable to set up 4) Not as plastic, can only use where there is a opening - cannot use external for example 5) Wired systems cannot be used in ex listed buildings

Advantage of wireless Having a wireless network opens up many possibilities. Wireless networks supply an economical and easy way to share a solitary Internet connection surrounded by a number of computers. This resources you only need one modem, and you can add supplementary computers to the network just by plug in a wireless card and rotary them on. The new tackle are connected to the Internet without delay. A wireless network also lets you entre files and printers from somewhere in your home. It allows you to orchestrate files you have on your laptop with your home computer, and you can with no trouble send files between computers as well. Using a wireless network to remove files is faster than distribution them through email or flaming them to a CD! Because printers coupled to one of the computers on a network are common by all the computers on that network, you can write papers somewhere in your home, press the print button, and assemble the printed files from a imprinter that is related to another computer. If you are a game player, you have probably noticed that your sports meeting often have an another to play more than a local area network or LAN. Wireless networks are LAN This income you and your family can have fun these games together and do not have to be on computer that are after that to each other to do so. it is more fun to play alongside real people, and it is smooth more fun to play touching people you know as an alternative of stranger on the Internet. Your sports meeting will also play much faster over your LAN. Additionally, you can connect game console to the Internet and start on singing these games online. It is much easier to practice online play from side to side an Xbox or PlayStation 2 that is connected to a wireless complex than have to use a modem. Wireless network relatives are always on. This resources you can connect to the Internet when you want without in the making for your modem to dial in. Laptops can be accepted from room to room, and they will always have right to use to the Internet. Since wireless network work without the call for to log in, you do not need to set up usernames or passwords. The single maximum thing about a wireless network is that it is, well, wireless The biggest motive to have a wireless network is since it eliminates the need for dear, ugly, and treacherous wires sprawling all over your house. You can use your CPU in any room you want no more being attentive near a phone vent or walking over that interweave of wires in your home. The

cost of receiving enough Ethernet cables can add up, and now and again, may even have to make hole in your parapet to set up a wired network. If you are renting, of course, this is impracticable. With a wireless network, you do not have these problems you can even use your computer outer And if move, there is no need to separate and pack up all those wires, and you no longer have to scrutinize all the wires for hurt whenever your Internet connection go down.

Disadvantages of wireless communication The improvement in the communication system and the network has given go up to the wireless networks. The acceptance and flexibility of wireless message has allow us to use person prop up drive to be used everyplace. This has enable the mankind to outperform in every pasture of the life, but at the same time it has numerous pressure as well.

Security threats to wireless networks Besides all the comfort of the life wireless networks poses serious security threats. The major grounds is the signal are stretch in the air and it is fitting for the hackers to grasp wireless signal. Wireless networks have need of very stretched security so that the informal users cannot make use of the in development. As more and users are creation use of the wireless technology, the risk of information being lost is swelling. The existing wireless encryption protocol are easier said than done to handle .moreover the common users are not aware of the ways of addressing wireless security matter. One must build brawny security protocols in order to safe and sound the wireless signal like WPA and WPA2. Moreover wireless imposition obstacle system is another better way to build strapping security system.

Major disadvantages of wireless technology Wireless is a community frequency network as a result its boundary is highly hazardous to be used for administrator private in turn. The speed and the capability of the wireless signal drop as more and more user use the same regularity. Moreover its original throughput is three times less than it claim to deliver. Wireless technology is on hand in only three major channels collection from 2.5 GHz, 11 and 1.6 GHz, Which is much minor than the wired network. They are 50 time slower than the wired network technology. The wireless signals are also in rung by the obstruction such while walls, doors and campaign itself. The set of family of the wireless technology is easier said than done preserve. Hence it an unstable network. Though wireless technologies have the funds for give to use and heave your laptop or any other practical device with you anyplace, but the longer the store up the weaker the signals. The wide-ranging use of

wireless signals over the mobile phone is hazardous to the toughness of the traits beings. The a range of wellbeing evils that wireless can pose are remembrance loss and level cancer.

Wireless signal are lying face down to put out of place by the infrared and radio signals. Wireless technology are four times more limited than wired proficiency due to their complicated setup. If one needs to transfer hush-hush data over the network wireless technology is a demanding risk to be used. Banks, exploration agencies and above-board data should be transfer using wired network technologies, because they are more confined and sound. The wireless technology offer free access points which hinder the well-organized transport of data.

Type of unauthorized access to wireless networks The unauthorized access to the wireless signal is really everyday. The an mixed bag of types of unauthorized access are unkind association, chance association, ad hoc networks, and non traditional networks, man in the focus attack, uniqueness theft and disagreement of service. When a user turn on its PC, and he or she receives unofficial signal from a neighboring building. User might not even signals are budding and make use of it are enclose a indication from where they are budding and make use of it , then we can call it inadvertent connection. When a person uses bananas to access the code word of the wireless network it is term as nasty network. When the wireless technology has no centre gadget to act for it encryption setting are hard to mange thus security can not be achieve. Bluetooth campaign and PDAs are non traditional form of networks they can be easily hack by using cracker technology.

Ethernet card/wireless card -gives computer/lap top wired/wireless capabilities if not already present.

Wireless router/modem -the main control centre of your network. for all operation..

Ethernet cable
-required create a wires network or to connect other hardware.

Wireles A wireless network or Wireless Local Area Network (WLAN) serve the same idea as a wired one to link a group of computers. Because "wireless" doesn't want costly wiring, the main assistance is that it's in general easier, faster and cheaper to set up. By judgment, create a network by pull wires right from beginning to end the embankment and ceiling of an office can be labor intensive and as a result luxurious. But even when have a energetic network formerly in place, a wireless network can be a cost-effective way to enlarge or augment it. In fact, there's in truth no such thing as a solely wireless network, because most link back to a wired network at some point. The essentials Wireless networks function using radio frequency (RF) technology, a frequency within the electromagnetic spectrum linked with radio wave broadcast. When an RF in progress is total to an mast, an electromagnetic countryside is shaped that then is able to promulgate through gap. The foundation stone of a wireless network is a piece of equipment known as an access point (AP). The primary job of an access point is to broadcast a wireless signal that computer can detect and "tune" into. Since wireless networks are habitually connected to wired ones, an admittance point also habitually serves as a link to the property available on the a wired network, such as an Internet connection. In organize to connect to an admittance top and connect a wireless network, computers must be set with wireless network adapters. These are repeatedly built exact into the computer, but if not, just about any computer or notebook can be completed wireless capable all the way through the use of an add-on adapter plug into an vacant expansion slot, USB port, or in the crate of notebooks, a PC Card niche.

Wireless technology standards there are numerous technology standards for wireless networking, it pays to do your homework before business any tools. The most ordinary wireless technology standards enclose the following:

y y

802.11b: The first broadly used wireless network technology, known as 802.11b (more commonly called Wi-Fi), first debuted almost a decade past, but is unmoving in use. 802.11g: In 2003, a follow-on report called 802.11g appear offering larger performance (that is, speed and range) and remainder today's most widespread wireless networking technology. 802.11n: Another enhanced standard called 802.11n is at this time underneath development and is planned to be complete in 2009. But even despite the fact that the 802.11n standard has yet to be finalize, you can still buy goods based on the outline 802.11n standard, which you will be able to raise later to the final set.

All of the Wi-Fi variant (802.11b, g and n products) exercise the same 2.4 GHz radio frequency, and as a result are considered to be well-suited with each other, so you can habitually use devices based on the poles apart values within the same wireless network. The hold is that doing so often require special arrangement to provide somewhere to stay the prior devices, which in rotate can diminish the overall concert of the network. In an superlative scenario you'll fancy all your wireless devices, the admittance point and all wireless capable computers, to be with the same technology average and to be beginning the same wholesaler whenever potential. Wireless speed & range When you buy a section of wireless network hardware, it will often citation performance figures based on the type of wireless networking standard it use, plus any added technological enhancement. In genuineness, these routine figures are exactly always wildly confident. While the administrator speeds of 802.11b, 802.11g, and 802.11n networks are 11, 54, and 270 megabits per second (Mbps) in that order, these figures symbolize a situation that.s purely not possible in the real world. As a general rule, you should take for granted that in a best case scenario you.ll get more or less one-third of the advertise performance. It's also worth note that a wireless network is by classification a shared network, so the more computers you have connected to a wireless access point the less data each will be able to send and receive. Just as a wireless network's speed can be different to a great extent, so too can the series. For example, 802.11b and g officially work over a distance of up to 328 feet indoors or 1,312 feet outdoors, but the key term there is up to. Chances are you won't see anywhere close to those numbers. As you might expect, the closer you are to an access point, the stronger the signal and the faster the connection speed. The range and speed you get out of wireless network will also depend on the kind of environment in which it operates. And that brings us to the subject of interference. Wireless interference nterference is an issue with any outward appearance of radio message, and a wireless network is no exception. The likely for interference is in particular great inside, where unlike types of building equipment can absorb or imitate radio waves, upsetting the strength and steadiness of a wireless network's signal. Similarly, plans like microwave ovens and some battery phones can

cause prying because they activate in the same 2.4 frequency sequence as 802.11b/g/n networks. can't avoid prying entirely, but in most cases it's not noteworthy enough to concern the usability of the network. When it do, you can habitually minimize the nosiness by relocating wireless networking hardware or using dedicated antennas.

The IEEE 802.11 protocol is a network access technology for provided that connectivity stuck between wireless station and wired networking infrastructures. By deploy the IEEE 802.11 protocol and connected technologies, allow the mobile user to travel to various places, meeting rooms, hallway, lobbies, cafeterias, classrooms, and so onwards and still have admittance to networked data. Also, further than the corporate workplace, enable right to use to the Internet and even communal sites can be made offered through free wireless hot spot networks. restaurants, rail stations, and familiar areas throughout cities can be configured to make available this service.

802 11 ARCHITECTURE The 802.11 logical architecture contain several main components station (STA), wireless access point (AP), independent basic service set (IBSS), basic service set (BSS), division system (DS), and extended service set (ESS). Some of the mechanism of the 802.11 logical arrangement map frankly to hardware devices,such as STAs plus wireless APs. The wireless STA contain an adapter card, PC Card, or an embedded device to offer wireless connectivity. The wireless AP function as a overpass among the wireless STAs and the to be had network vertebral editorial for network access. An IBSS is a wireless network, consisting of at smallest amount two STAs, used somewhere no inauguration to a DS is existing. An IBSS is also sometimes referred to as an commercial hoc wireless network. A BSS is a wireless network, consisting of a one and only wireless AP at the underside of one or a number of wireless clients. A BSS is also sometimes referred to as an highway and rail network wireless network. every STAs in a BSS community through the AP. The AP provide connectivity to the wired LAN and provide bridging functionality when one STA inaugurate communication to a further STA or a node on the DS. An ESS is a position of two or more wireless APs connected to the same manic network that define a single logical network piece encircled by a router). The APs of many BSSs are unified by the DS. This allow for mobility, because STAs can budge from one BSS to a new BSS. APs can be interconnected with or devoid of wires; nevertheless,

most of the time they are connected with chains. The DS is the logical module used to interconnect BSSs. The DS provide giving out army to allow for the wandering of STAs among BSSs

802.11 OPERATING MODES y y INFRASTRUCTURE MODE AD HOC MODE

In in cooperation operating modes, a Service Set Identifier (SSID), also acknowledged as the wireless network name, identify the wireless network. The SSID is a name configured on the wireless AP or an opening wireless shopper that identify the wireless network. The SSID is once in a while advertise by the wireless AP or the original wireless buyer using a special 802.11 MAC executive frame notorious as a beacon frame. 802.11 infastructure mode In infrastructure mode, there is at smallest amount one wireless AP and one wireless patron. The wireless patron uses the wireless AP to access the property of a conventional wired network. The wired network can be an society intranet or the Internet, depending on the situation of the wireless AP.

wireless clients in AD hoc Mode

In hoc mode wieless clients communicate directly with each other without the use of wireless AP, wireless clients in AD Hoc Mode Ad hoc mode is also call peer-to-peer mode. Wireless clients in ad hoc mode shape an self-determining basic overhaul set (IBSS). One of the wireless clients, the original wireless client in the IBSS, take over some of the household tasks of the wireless AP. These everyday jobs contain the periodic beaconing process and the verification of new members. This wireless client does not act as a overpass to relay in order sandwiched between wireless clients. Ad hoc mode is used to connect wireless clients mutually when there is no wireless AP in attendance. The wireless clients must be plainly configured to use ad hoc mode. There can be a highest of nine members in an ad hoc 802.11 wireless.

protocols The IEEE. 802 standards board define two undo layers, the Logical Link Control (LLC) and media access control, for the Data-Link layer of the OSI model. The IEEE 802.11 wireless standard define the provision for the physical layer and the media access control (MAC) layer that communicate up to the LLC layer.

OSI

All of the components in 802.11 architetcture fall into either the media access control(MAC) sublaver of the data-link layer or the physical layer. MAC frame consists of a MAC header, the frame remains, and a frame check sequence (FCS). The numbers in the following figure signify the number of bytes for each grassland.

Frame control fild The Frame Control field, contains control in order used for crucial the type of 802.11 MAC frame and only if information required for the subsequent fields to comprehend how to process the MAC frame. The statistics in the following stature represent the digit of bits for each field. Frame control fields

description of each Frame Control field subfield


y

Protocol Version provide the current side of the 802.11 protocol used. getting STAs use this value to conclude if the version of the protocol of the established frame is supported. Type and Subtype determine the function of the frame. There are three poles apart frame type fields: control, data, and supervision. There are multiple subtype fields for each frame type . Each subtype determine the specific function to act upon for its coupled frame type. To DS and From DS indicate whether the frame is going to or exit from the DS , and is only used in data type frames of STAs allied with an AP. More Fragments indicate whether more rubbish of the frame, either data or managing type, are to trail. Retry indicate whether or not the frame, for moreover data or supervision frame types, is being retransmitted. Power Management indicate whether the transport STA is in active mode or power-save mode. More Data indicate to a STA in power put away style that the AP has more frame to send. It is also used for APs to designate that additional broadcast/multicast frame are to follow. WEP indicate whether or not encryption and verification are used in the frame. It can be position for all data frames and management frames, which have the subtype situate to authentication.

Order indicates that all acknowledged data frames must be process in order.

Duration/id field This field is used for all be in charge of type frames, not including with the subtype of Power Save (PS) Poll, to specify the lingering duration needed to collect the next frame communication. When the sub-type is PS Poll, the field contain the association distinctiveness (AID) of the transmitting STA. ADDRESS fields.. Depending upon the frame type, the four address field will contain a blend of the following address types:
y

BSS Identifier (BSSID). BSSID uniquely identify each BSS. When the frame is beginning an STA in an road and rail network BSS, the BSSID is the MAC deal with of the AP. When the frame is from a STA in an IBSS, the BSSID is the randomly generate, locally administered MAC address of the STA that initiated the IBSS. Destination Address (DA). DA indicates the MAC address of the final end to receive the frame. Source Address (SA). SA indicates the MAC address of the inventive resource that initially created and transmitted the frame. Receiver Address (RA). RA indicate the MAC address of the next instant STA on the wireless intermediate to receive the frame. Transmitter Address (TA). TA indicate the MAC address of the STA that transmit the frame onto the wireless medium.

For more in turn about the address types and the filling of the address fields in the 802.11 MAC header, see the IEEE 802.11 standard at the IEEE Web site. Sequence control The Sequence Control field contain two subfields, the Fragment Number field and the chain Number field,

Sequence Control field..

Sequence Number indicate the sequence digit of each frame. The progression number is the same for each frame sent for a fragmented frame otherwise, the integer is incremented by one until reaching 4095, when it then begin at zero again. Fragment Number indicate the number of each frame sent of a scrappy frame. The early value is locate to 0 and then incremented by one for each successive frame sent of the scrappy frame.

Frame check sequence The transmit STA uses a cyclic joblessness check (CRC) over all the field of the MAC description and the frame body field to cause the FCS value. The in receipt of STA then uses the same CRC sum to establish its be in possession of value of the FCS field to substantiate whether or not any errors occur in the frame for the duration of the transmission. 802.11 PHY sublayer At the physical (PHY) sublayer, IEEE 802.11 define a series of programming and spread scheme for wireless communications, the most universal of which are the Frequency Hopping Spread Spectrum (FHSS), Direct Sequence Spread Spectrum (DSSS), and Orthogonal Frequency Division Multiplexing (OFDM) spread schemes. the 802.11, 802.11b, 802.11a, and 802.11g standards that stay alive at the PHY sublayer. These standards are describe in the section that follow. Standards for 802.11 PHY Layer

IEEE 802.11 The bit rate for the novel IEEE 802.11 standard is 2 Mbps using the FHSS program scheme and the S-Band Industrial, Scientific, and Medical (ISM) frequency crew, which operate in the frequency choice of 2.4 to 2.5 GHz. on the other hand, under less-than-ideal environment, a subordinate bit rate speed of 1 Mbps is used. 802.11b

The major augmentation to IEEE 802.11 by IEEE 802.11b is the homogeny of the physical layer to support elevated bit rates. IEEE 802.11b chains two supplementary speeds, 5.5 Mbps and 11 Mbps, using the S-Band ISM. The DSSS spread idea is used in order to make available the higher bit duty. The bit rate of 11 Mbps is reachable in ideal environment. In less-than-ideal environment, the slower speeds of 5.5 Mbps, 2 Mbps, and 1 Mbps are used. 802.11a IEEE 802.11a (the first standard to be ratify, but just now being broadly sold and deploy) operate at a bit rate as high as 54 Mbps and use the C-Band ISM, which operate in the regularity series of 5.725 to 5.875 GHz. as a substitute of DSSS, 802.11a uses OFDM, which allows statistics to be transmitted by subfrequencies in analogous and provides superior struggle to nosiness and greater throughput. This higher-speed know-how enables wireless LAN network to make better for video and conferencing application. OFDM and IEEE 802.11a endow with both a elevated data velocity and a cleaner signal. The bit rate of 54 Mbps is reachable in ideal environment. In less than ideal surroundings, the slower speeds of 48 Mbps, 36 Mbps, 24 Mbps, 18 Mbps, 12 Mbps, and 6 Mbps are worn. 802.11g IEEE 802.11g operate at a bit rate as high as 54 Mbps, but use the S-Band ISM with OFDM. 802.11g is also backward companionable with 802.11b and can activate at the 802.11b bit toll and use DSSS. 802.11g wireless network adapters can unite to an 802.11b wireless AP, with 802.11b wireless network adapters can unite to an 802.11g wireless AP. accordingly, 802.11g provide a movement path for 802.11b network to a frequency-attuned standard technology with a higher bit rate. to be had 802.11b wireless network adapters cannot be upgrade to 802.11g by update the firmware of the adapter they must be replace. Unlike migrating from 802.11b to 802, migrate from 802.11b to 802.11g can be done incrementally.

802.1x protocol The IEEE 802.1X standard define port-based, network access control used to supply real network access for Ethernet networks. This port based network access control uses the animal uniqueness of the switched LAN communications to confirm devices close to a LAN port. Access to the port can be shorn of if the substantiation process fails. even though this standard was considered for wired Ethernet networks, it has been bespoke to 802.11 wireless LANs.

Components of 802.1x
y

Port access entity. A LAN port, also known as port admittance entity (PAE), is the logical thing that ropes the IEEE 802.1X etiquette that is connected with a port. A PAE can approve the role of the authenticator, the activist, or both. Authenticator. An authenticator is a LAN port that enforce validation before allowing access to services handy using that port. For wireless connections, the authenticator is the logical LAN port on a wireless AP all the way through which wireless regulars in roads manner expand inauguration to other wireless clients and the wired network. Supplicant. The supplicant is a LAN port that desires access to services reachable on the authenticator. For wireless connections, the lobbyist is the logical LAN port on a wireless LAN network adapter that desires access to the other wireless consumers and the wired network by associate with and then authenticate itself to an authenticator. Whether for wireless connections or wired Ethernet links, the asker and authenticator are connected by a logical or physical point-to-point LAN division.

Authentication server. To verify the certificate of the lobbyist, the authenticator uses an authentication server, which checks the recommendation of the activist on behalf of the authenticator and then respond to the authenticator, signifying whether or not the campaigner is allowed to access the army.

Components of IEEE 802.1X AUNTHETICATION

CONTROLLED AND UNCONTROLLED PORTS The authenticator's port-based admittance control defines the following poles apart type of logical ports that installment the wired LAN by means of a sole physical LAN port:
y

Uncontrolled Port. The uncontrolled port allows an uncontrolled switch over between the authenticator (the wireless AP) and other networking campaign on the wired network anyway of any wireless client's consent state. Frames sent by the wireless consumer are on no account send using the uncontrolled port. Controlled Port. The controlled port allows data to be sent among a wireless consumer and the wired network no more than if the wireless patron is allowed by 802.1X. Before substantiation, the knob is open and no frame are forward between the wireless client and the wired network. When the wireless client is profitably legitimate using IEEE 802.1X, the switch is closed, and frames can be sent amid the wireless user and nodes on the wired network.

CONTROLLED AND UNCONTROLLED PORTS FOE ieee 802.1x

On an authenticate Ethernet knob, the wired Ethernet patron can send Ethernet frames to the wired network as before long as substantiation is entire. The switch identify the traffic of a definite wired Ethernet patron using the physical port to which the Ethernet client is coupled. naturally, only a single Ethernet client is related to a physical harbor on the Ethernet switch. Because many wireless clients put yourself forward for admittance to the same occurrence strait and send data using the same channel, an annex to the basic IEEE 802.1X protocol is mandatory to tolerate a wireless AP to identify the held traffic of a fussy wireless client. The wireless patron and wireless AP do this from first to last the communal purpose of a per-client unicast assembly key. barely true wireless clients have familiarity of their per-client unicast session key. lacking a valid unicast session key united to a successful certification, a wireless AP junk the traffic sent from the wireless user. EAP over LAN To offer a standard authentication machine for IEEE 802.1X, the Extensible verification Protocol (EAP) was select. EAP is a Point-to-Point Protocol (PPP)-base certification machine that was tailored for use on point-to-point LAN segment. EAP letters are normally sent as the consignment of PPP frames. To adapt EAP messages to be sent over Ethernet or wireless LAN segment, the IEEE 802.1X ordinary define EAP over LAN (EAPOL), a standard encapsulation scheme for EAP messages. WEP WEP provide data discretion military by encrypting the data sent connecting wireless nodes. situation a WEP flag in the MAC header of the 802.11 frame indicate that the casing is encrypted with WEP encryption. WEP provide data honor by together with an integrity check value (ICV) in the encrypted section of the wireless frame.

Multicast/global key: multicast/global key is an encryption key that protect multicast and televise traffic from a wireless AP to all of its connected wireless regulars.

Unicast session key: unicast session key is an encryption key that protect unicast traffic among a wireless client and a wireless AP and multicast and broadcast interchange sent by the wireless client to the wireless AP. WEP encryption process

A 32-bit integrity check value (ICV) is intended for the frame data. The ICV is append to the end of the frame data. A 24-bit initialization vector (IV) is generate and append to the WEP encryption key. The recipe of initialization vector and WEP encryption type is used as the enter of a pseudo-random number generator (PRNG) to cause a bit sequence that is the same size as the amalgamation of data and ICV. The PRNG bit string, also famous as the key stream, is bit-wise limited ORed (XORed) with the recipe of data and ICV to bring into being the encrypted portion of the freight that is sent stuck between the wireless access point (AP) and the wireless client.

To create the consignment for the wireless MAC frame, the IV is supplementary to the front of the encrypted blend of the data and ICV, along with other fields.

WEP decryption process

Security issues with wep and IEEE 802.11 The problem with WEP is that the willpower and giving out of WEP encryption keys are not clear. WEP keys must be spread by using a secure strait external of the 802.11 protocol. In put into practice, WEP keys are text string that must be by hand configured using a grand piano for both the wireless AP and wireless clients. However, this key division system does not balance well to an endeavor society and is not safe and sound. moreover, there is no clear mechanism for change the WEP encryption keys any per substantiation or once in a while for an valid connection. All wireless APs and customers use the same by hand configured WEP key for multiple session. With various wireless regulars sending a large quantity of data, an enemy can remotely take into custody large amount of WEP and use cryptanalysis methods to establish the WEP key. The lack of a WEP key administration protocol is a primary check to provided that 802.11 security, especially in roads mode with a large amount of stations. Some example of this type of network include corporate and didactic institutional campus and municipal seats such as airports and malls. The lack of computerized certification and key fortitude services also affect maneuver in ad hoc mode, in which users valor want to use in peer-to-peer mutual announcement in areas such as symposium rooms. Wpa

Although 802.1X addresses many of the security issues of the original 802.11 standard, issues still exist with regard to weaknesses in the WEP encryption and data integrity methods. The long-term solution to these problems is the IEEE 802.11i standard, which is currently in draft form. Until the IEEE 802.11i standard is ratify, wireless vendors have approved on an interoperable provisional standard acknowledged as Wi-Fi Protected Access (WPA). The goals of WPA are the following:
y

To require secure wireless networking. WPA require secure wireless network by require 802.1X confirmation, encryption, and unicast and multicast/global encryption key supervision. To address WEP issues with a software upgrade. The discharge of the RC4 stream cipher within WEP is defenseless to known plaintext attack. Additionally, the data honor provide with WEP is quite weak. WPA solves all the lingering security issue with WEP, yet only require firmware updates in wireless equipment and an keep posted for wireless regulars. Existing wireless tools is not expected to want surrogate. To provide a secure wireless networking answer for small office/home office (SOHO) wireless users. For the SOHO, there is no RADIUS matre d'htel to provide 802.1X substantiation with an EAP type. SOHO wireless clients must use either shared key authentication (highly discouraged) or open system validation with a single standing WEP key for both unicast and multicast traffic. WPA provides a pre-shared key option intended for SOHO configurations. The pre-shared key is configured on the wireless AP and each wireless patron. The opening unicast encryption key is resulting from the validation process, which verify that both the wireless consumer and the wireless AP have the pre-collective key. To be compatible with the upcoming IEEE 802.11i standard. WPA is a rift of the safekeeping facial appearance in the projected IEEE 802.11i standard. All the facial appearance of WPA are describe in the in progress sketch of the 802.11i standard.

WPA Security Features WPA contains y y y Authentication Ncryption Data intergrity

Authentication

802.11 and 802.1X authentication is optional through WPA, 802.1X substantiation is compulsory. Authentication with WPA is a recipe of open system and 802.1X authentication, which uses the subsequent phases:
y

The first phase use open system validation to indicate to the wireless client that it can send frame to the wireless AP. The second phase uses 802.1X to execute a user-level substantiation. For environment without a RADIUS road and rail network, WPA chains the use of a pre-shared key for environment with a RADIUS transportation, WPA supports EAP and RADIUS. Encryption

802.1X, rekeying of nicast encryption keys is voluntary. moreover, 802.11 and 802.1X provide no machine to change the global encryption key that is worn for multicast and broadcast interchange. With WPA, rekeying of both unicast and total encryption keys is essential. The worldly Key Integrity Protocol (TKIP) changes the unicast encryption key for each frame, and each change is matched between the wireless patron and the wireless AP. For the multicast OR global encryption key, WPA include a flair for the wireless AP to puff changes to the allied wireless regulars.

TKIP
y

The substantiation of the safekeeping configuration after the encryption keys are unwavering. The in time changing of the unicast encryption key for both frame. The willpower of a exclusive starting unicast encryption key for every one pre-shared key certification.

AES WPA is describe Advanced Encryption Standard (AES) as an optional replacement for WEP encryption.adding AES support by using a firmware keep informed force not be possible for existing wireless equipment, support for AES on wireless network adapters and wireless APs is not required

Expected output PIE CHART

Number of people using line:14.4 BILLION

USERS
1.2 4.4

8.2
DIGI MAXIS CELCOM

7.8

U-MOBILE

Conclusion..

Its ready to make conclusion. Bottom line, then, which is better - wired or wireless?. If very cost mindful, need maximum act users home system, and don't care much on mobility, then a wired Ethernet LAN is most likely right. If on the other hand, cost is more of an issue, user like living being an early adopter of foremostedge technologies, and user in fact troubled about the mission of wiring users home or small business with Ethernet cable, then user ought to certainly judge a wireless LAN. Many of user will as likely fall somewhere in between these two edges. If user still unsure, regard as asking friends and family about their experiences with building LANs. And, waste just a few added minutes with our interactive Home Network Advisor tool. It should help user choose on the type of network as fit as the equipment user will want to boast.

Wired Installation Cost Reliability Performance Security Mobility moderate complexity a smaller amount high very high-quality sensibly good restricted

wireless easier, but be cautious interference more reasonably high good sensibly good exceptional

References http://www.ciscopress.com/articles/article.asp?p=344242%5c http://www.webopedia.com/DidYouKnow/Computer_Science/2008/wireless_networks_expl ained.asp http://technet.microsoft.com/en-us/library/cc757419%28WS.10%29.aspx http://technet.microsoft.com/en-us/library/cc757419%28WS.10%29.aspx http://www.howstuffworks.com/wireless-network.htm http://computer.howstuffworks.com/home-network2.htm http://en.wikipedia.org/wiki/Celcom http://en.wikipedia.org/wiki/Maxis_Communications http://compnetworking.about.com/cs/homenetworking/a/homewiredless_2.htm http://en.wikipedia.org/w/index.php?title=Special%3ASearch&search=wired+and+wireles s http://computer.howstuffworks.com/home-network2.htm http://www.webopedia.com/DidYouKnow/Computer_Science/2008/wireless_networks_expl ained.asp http://www.webopedia.com/DidYouKnow/Computer_Science/2008/wireless_networks_expl ained.asp http://compnetworking.about.com/cs/homenetworking/a/homewiredless_2.htm

http://en.wikipedia.org/wiki/Wired

http://computer.howstuffworks.com/home-network2.htm

http://www.howstuffworks.com/wireless-network.htm

Vous aimerez peut-être aussi