PRESENTED BY MUMUNI RASHEED OLUBUNMI
Matric No: NOU222051625
Course Code: CIT 803
Course Title: Seminar on Emerging Technologies
NATIONAL OPEN UNIVERSITY OF NIGERIA
ABUJA, NIGERIA
SEMINAR ON
A CASE STUDY OF NOUN ABEOKUTA STUDY CENTREA CASE STUDY OF NOUN ABEOKUTA STUDY CENTRE
Wired and Wireless Network
IEEE Wireless Networking Standards
Wireless Network Security
Wireless Network of NOUN Abeokuta Study Centre
Wi-Fi Protected Access (WPA & WPA2)
Summary
A wired network uses physical cables to send
data between different devices and computer
systems.
A wireless network is a technology that enables
an electronic network device to receive, transmit
and exchange data or connect to the internet
wirelessly through radio waves.
A wireless network facilitates mobility – It associates
data connectivity with user freedom of
movement through a simple pattern and enable
network mobility
IEEE Standard Frequency Speed Topology Transmission Range Access Method
802.11 2.4GHz 1 to 2Mbps Ad Hoc/Infrastructure 20ft Indoors CSMA/CA
802.11a 5GHz Up to 54Mbps Ad Hoc/Infrastructure 25 to 75ft Indoors CSMA/CA
802.11b 2.4GHz Up to 11Mbps Ad Hoc/InfrastructureUp to 150ft Indoors CSMA/CA
802.11g 2.4GHz Up to 54Mbps Ad Hoc/InfrastructureUp to 150ft Indoors CSMA/CA
802.11n 2.4/5GHz Up to 600Mbps Ad Hoc/InfrastructureAbove 175ft Indoors CSMA/CA
The wireless network radio waves allow anyone to
track packets traffic with the aid of “hacker’s tools”
to break the encryption and authentication of
wireless data.
The Wireless Network Security Features are:
1.Service Set Identifier (SSID)
2.Wired Equivalent Privacy (WEP)
3.Mac Address Filters (MAF)
The two recommended security approaches are:
WPA (Wi-Fi Protected Access)
WPA2 (Wi-Fi Protected Access, Version 2)
WPA also has two generations named
Enterprise (suitable for business environment)
Personal (suitable for home network)
The Encryption standards are:
Temporary Key Integrity Protocol (TKIP)
Advanced Encryption Standard (AES)
Pre-Shared Key (PSK): A key of 8-63 characters
Change all possible default router settings
Use encryption (WPA/WPA2)
Use long and complex keys/passphrases
Change router default user name and password
Change the internal IP subnet if possible
Change default name and hide broadcasting of the
Service Set Identifier (SSID)
None of the attack methods are faster or effective when
a larger passphrase is used.
Restrict access to your wireless network by filtering
access based on the MAC (Media Access Code)
addresses