Wireless Lan Benefits And Applications Essay

1993 words - 8 pages


Wireless networking has numerous benefits. Productivity remarkably enhances due to the higher accessibility to the information resource. Network configuration as well as reconfiguration becomes easier, quicker, and overall less expensive. Nonetheless, this technology also poses new threats as well as brings change in the already existing profile of risk in the information security. Explaining this terminology, as we all know that the communication occurs "through the air" utilizing the radio frequencies, the inception risk are higher in comparison to the wired networks. In case the messages are not encrypted, or just encrypted having a relatively weak algorithm, then the ...view middle of the document...

For any provided networking situation, the wireless Networks might not be as desirable for many reasons. Majority among those have connections with inherent limitations related to this technology. The major disadvantages related to utilizing any wireless network may be: Security concerns, Range, Reliability as well as the Speed.

Wireless Vulnerabilities, Threats and Countermeasures

Wireless networks basically comprise of some prime components as discussed: The first one is the transmission of the data utilizing the radio frequencies; Next is the access points which provide the connection to organizational networks as well as to the devices of the client (laptops, PDAs,); and also to the users. Each one among those components offers a potential avenue for the attack which may very well lead in the compromise of the basic objectives of fundamental security which are confidentiality, integrity as well as the availability.
Fig. 1: Wireless networking components


Cross-Site Scripting vulnerability (XSS)
Cross-Site Scripting (XSS) attacks are such a kind of the injection issues faced by the wireless internet security, in which the scripts which are of malicious content are injected in the relatively benign as well as trusted web sites. Those attacks happen whenever any attacker utilizes a web based application in order to send the malicious codes, usually in the form of any script of the browser side, to any alternate end user. Flaws which permit such attacks to complete are relatively widespread and could occur anywhere the web application utilizes the input from any user within the output generated by it without encoding or validating it.
Any attacker could utilize the XSS in order to send any script of malicious contents to any unsuspecting users. The browsers of the end users have indeed no method to enquire that whether such script shall be trusted or not, and would implement the script. Due to the fact that it assumes the script are from the trusted sources, the script of the malicious content could have an access towards any of the cookies, session token, or any other information which is sensitive retained by the browser as well as used along with that particular site. Such scripts could even re-write the contents of that HTML page.

Fig. 2: Tools Vulnerable to XSS

Contextual output encoding/escaping of string inputs
The basic defense in order to stop the XSS is the contextual output “encoding/escaping”. There happens to be a lot of various escaping schemes which should definitely be utilized as per the requirement where those un-trusted strings are required to be put in the HTML documents including the encoding of HTML entity, JavaScript escaping, the CSS escaping as well as URL/percent encoding. Majority of the web applications which don’t require the acceptances of rich data could utilize escaping for significantly eliminating the risks of...

Find Another Essay On Wireless LAN Benefits and Applications

Information Systems: What We Do With It

758 words - 3 pages , for easier on-site troubleshooting and support. Schools use wireless technology to offer real-time access to study group meetings and research links for students.Even though we love the benefits that wireless technologies can provide it's important to keep in mind that there are some issues that affect the usability and deployment of wireless technology. A major obstacle for deployment of wireless networks is the existence of multiple standards

Wired and Wirless Technology Essay

1635 words - 7 pages transmission rates, however Ethernet is more cost effective and easier to install. Figure 4: Wired LAN Topology Using a NIC or Ethernet adapter, a wired network can be used to connect one or more endpoints or can be used to connect to a wireless network topology, see Figure 5 which depicts a multi-access point topology. Ethernet adapters can be part of the computer’s internal component or built in port, but can also be external. The 3 most

Trends In Wireless Technology

958 words - 4 pages support. The open 5-GHz spectrum offers an opportunity for the industry to create a unified wireless network for a broad range of devices and applications. IEEE 802.11a and ETSI (European Telecommunications Standards Institute) HiperLAN2 wireless LAN standards. This 5-UP (5-GHz Unified Protocol) proposal supports interoperability with the existing standards, while providing for increased scalability both up and down. Whereas the IEEE 802.11a and

Wireless Technology

1994 words - 8 pages anywhere, anytime link to this powerful system. Horizontal integration allows the consumer to connect with legacy systems, data, and custom business applications inside and outside of business. Horizontal integration delivers benefits such as data mining, real-time transaction processing, and decision-support systems. Wireless data-translation protocols allow contrasting devices to efficiently use information from all sources


1339 words - 5 pages Wireless Local Area Networks      A wireless local area network (LAN) is a flexible data communications system implemented as an extension to, or as an alternative for, a wired LAN. It uses radio frequency (RF) technology, to transmit and receive data over the air, minimizing the need for wired connections. A wireless LAN system can combine data connectivity with user mobility.      The data

Wireless Networking

1396 words - 6 pages dynamic and constantly changing type of networking that is capable of providing quick, easy access between computers in virtually any sort of application.At the start of this technology's development, wireless networks were not available for such broad applications because they were slower, more expensive, and often the result of a necessity driven by risk or architectural drawbacks. For example, if a building's walls did not support the cabling

Wireless Network Security

3559 words - 14 pages [4] The Wireless Market ?Over the past ten years or so an alternative to wired LAN structures has evolved in the form of the Wireless LAN. The first generation Wireless LAN products, operating in unlicensed 900-928 MHz Industrial Scientific and Medical (ISM) band, with low range and throughput offering (500 Kbps), subjected to interference came to market with few successes in some applications. But they enjoyed reputation of being

Wireless Networking

991 words - 4 pages as well as data transmission. There are two kinds of wireless networks, Ad-Hoc (Peer to Peer), or access point (base station). Ad-Hoc (Peer to Peer) consists of a number of computers each equipped with a wireless networking interface card. Each computer can communicate to other wireless enabled computers. They can share files and printers, but may not be able access wired LAN resources unless one computer acts as a bridge to connect to a wired

Effects of wireless computing technology

4566 words - 18 pages AbstractWireless technology can provide many benefits to computing including faster response to queries, reduced time spent on paperwork, increased online time for users, just-in-time and real time control, tighter communications between clients and hosts. Wireless Computing is governed by two general forces: Technology, which provides a set of basic building blocks and User Applications, which determine a set of operations that must be carried

ict advancement

1785 words - 7 pages networking allows for impromptu meetings in cafeterias, hallways, courtyards, or wherever inspiration strikes while providing real-time LAN connectivity for business applications such as sending e-mail, working on spreadsheets on shared drives, and conducting market research.Wireless LANs in the HomeWireless networking has become commonplace, and with prices reduced to a fraction of what they were, it is no wonder that wireless networking products have

section 2

1888 words - 8 pages differences and benefits. (n.d.). Retrieved December 2, 2013, from Server Racks and Cable website: http://www.serverracksandcable.com/ArticleCat5eCat6DifferencesandBenefits.php ("Cat 5e and Cat 6 Differences," n.d.). Cat6 rj45 modular connector plug with load bar, solid or stranded conductor round cat6 wire [PDF]. (n.d.). Retrieved from http://www.tripplite.com/shared/product-pages/en/N230100.pdf (Cat6 Rj45 Modular Connector, n.d.). Cisco aironet

Similar Essays

Product Review: The Creative Zen X Fi 16 Gb Video Mp3 Player With Wireless Lan And Built In Speaker

559 words - 2 pages Technology is developing day by day and we can see the advancement too. The Creative Zen X-Fi 16 GB Video MP3 Player with Wireless LAN and Built-In Speaker (Black/Silver) is one of the best gadgets you can use for listening music. It has an inbuilt wireless LAN system which can be connected for accessing internet. Well no one guessed that we would be accessing internet on the mp3 player. It has other features too which work perfect and ensure

Networked Applications, Notes From Business Data Communication Csi120, Describes Applications Used For Networking Ther Functions, Benefits, And How They Work. (Download Document For Ease Of Reading)

3068 words - 12 pages CHAPTER 11 MY NOTES NETWORKED APPLICATIONS Application architectures         How application layer functions are spread among computers to deliver service to users Thanks layering ability to separate function at different layers most application architecture can run over TCP/IP, IPX/SPX and other standards below the application layer Note: if you use TCP it does not care what application architecture you are using. Important networked

Wireless Area Networks Essay

1978 words - 8 pages in the end. The final advantage of a Wireless LAN system, scalability, refers to the variety of topographies in which a wireless LAN can be configured. The specific needs of a workplace, as a far as access to certain applications and installations, can be set up with relative ease. Configurations ranging from peer to peer, to client-access points, allow a wireless network to adapt to a small number of users or a vast

Investing In The Future: Why The Medical Field Should Invest In Wireless Networks

1264 words - 6 pages . It would cost more money to reinstall wired networks. This report offers a recommendation to the IT specialists and business managers in hospitals for wireless network as the preferred investment. Wireless Benefits the Radiology Department: Wireless networks have the advantage of convenience. Wireless access points can support many wireless users at the same time, so enterprises are not required to build multiple network ports. Employees can