Wireless Fidelity
Essay by Bigkuzuna • February 2, 2018 • Essay • 1,532 Words (7 Pages) • 934 Views
Research Paper: Wireless Fidelity
April 1, 2017
Table of Contents
Abstract………………………………………………………………………………………….. 3
Wi-Fi, Where Can It Be Found………..……………………………………………………….…3
IEEE 802.11………………………………………………………………………………….…3-4
Wi-Fi Network……………………………………………………………………………………4
Wi-Fi Network Security…………………………………………………………………………. 5
WEP, Wired Equivalent Privacy..................................................................……………………...5
WPA, Wi-Fi Protected Access…………………………………………………….………………5
WPA2, Wi-Fi Protected Access 2……………………………………………….………………...5
AES, Advanced Encryption Standard…………………………………………………………..5-6
Figure 1: Time To Crack Cryptographic versus Key Size………………………………………..6
Moore’s Law………………………………………………………………………………………6
Closing…………………………………………………………………….………………………7
References…………………………………………………………………………………………8
Research Paper: Wireless Fidelity
Wireless Fidelity, or Wi-Fi, is a generic term for “the standards for a local wireless network” (Andrews, J., Dark, J., & West, J. 2017) and “their technical name is IEEE.802.11” (Andrews, J., Dark, J., & West, J. 2017). Wireless technology is commonly used for connecting via radio waves and it provides access to the internet while moving from one area to another without loss of coverage. This paper will discuss where Wi-Fi is located, the architecture of IEEE 802.11, advantages and limitations of Wi-Fi and system security.
Wi-Fi can be found almost anywhere these days. It is in the places where we live, like homes and apartment buildings, even in our automobiles we use to commute. We can find it in the corporate world at our workplace, at the schools or universities we attend and also around town in our local coffee shop. Most electronic devices these days are also designed with Wi-Fi so it is commonly found in our cellular phones, television sets and in gaming devices such as the Sony PlayStation and Microsoft Xbox. Lastly, public locations offer Wi-Fi in areas called a hotspot. “Hotspots are essentially wireless access points providing network and/or internet access to mobile devices like your laptop or smart phone, typically in public locations” (Pinola, M. 2017). You would most likely see hotspots in airports, hotels, restaurants, bookstores and shopping malls to name a few but the list is long and the demand is so high that it will be harder to name places without a hotspot as we advance our culture of technology.
Now that we have discussed Wi-Fi, let’s talk about the IEEE 802.11 standard and how this relates to our topic. The Institute of Electrical and Electronic Engineers (IEEE) drafted the
802.11 standards for wireless local area networking, “Wi-Fi is the common name” (Andrews, J., Dark, J., & West, J. 2017) and several 802.11 protocols have been developed throughout the years. The architecture of 802.11 utilizes the smallest building block of a wireless LAN which is a Basic Service Set (BSS). A BSS is comprised of two or more stations executing the same protocol and competing for access to the same shared wireless signal. It may be an isolated set or may connect to a distribution system by way of an Access Point (AP). The 802.11 protocol may also be introduced through a portal utilizing a bridge or router, this portal is then attached to the distribution system to allow integration of wired LAN. A BSS that does not have an AP would be called “ad hoc (Andrews, J., Dark, J., & West, J. 2017), this would be used for things such as Wi-Fi printers.
The Wi-Fi network works via a connection with a transmitting antenna that is attached to an internet connection. The antenna on the bridge or router transmits radio signals through a specific range normally 2.4 GHz, 5 GHz or both. Range depends upon the 802.11 protocol. On the other end another antenna located on whatever type of device is trying to connect, like a laptop, personal computer, etc. receives the signal to connect. Some advantages of Wi-Fi networks are easy to spot. They do not have any wires, they are easy to deploy, and the system is secure and easy to manage, while also having the ability to increase the network as the need arises. However, there are some disadvantages like range of the signal coupled with interference from walls and electronic devices like telephones. Power consumption also needs to be monitored for mobile devices which have battery usage, as well as heat concerns for devices such as laptop computers. Moreover, data security should always be monitored so setting up the system with this in mind will minimize possible penetrations of the system.
System security for a wireless network is paramount and there are a few different protocols and associated pieces to a wireless network to discuss.
WEP, or Wired Equivalent Privacy, “is an encryption protocol used to secure transmissions on a Wi-Fi wireless network” (Andrews, J., Dark, J., & West, J. 2017) but technically it is no longer considered secure because the encryption key does not change. WEP was replaced with WPA, or Wi-Fi Protected Access, which is “a data encryption method for wireless networks that us the TKIP (Temporal Key Integrity Protocol) encryption method and the encryption keys are changes at set intervals while the wireless LAN is in use” (Andrews, J., Dark, J., & West, J. 2017). WPA is stronger than WEP so it makes sense that WEP would only be used on lesser systems where security was not of a concern or if limitations exist with the technology being used. Lastly, WPA2, or Wi-Fi Protected Access 2, “is currently the strongest wireless encryption standard” (Andrews, J., Dark, J., & West, J. 2017). WPA2 utilizes a data encryption standard compliant with the IEEE 802.11i standard that uses the Advanced Encryption Standard, or AES, protocol.
...
...