You are on page 1of 14

Madan Mohan Malaviya Univ.

of Technology, Gorakhpur

Wireless LAN Technology


HIMANSHU KUSHWAHA
Electronics and Communication Engineering
Madan Mohan Malviya University of Technology,
Gorakhpur (UP State Govt. University)

Email: 2020041072@mmmut.ac.in

26-04-2023 Side 1
Madan Mohan Malaviya Univ. of Technology, Gorakhpur

CONTENTS
• INTRODUCTION
• Wireless LAN Components
• CONCERNS IN WIRELESS LAN
• RISKS
• SECURITY OPTIONS
• MERITS
• DEMERITS
• Conclusion
• References

26-04-2023 Side 2
Madan Mohan Malaviya Univ. of Technology, Gorakhpur

INTRODUCTION

 With Wireless Networking, no cables or


wires are needed to network your
computers and share your Internet
connection.

 WLANS offer a quick and effective


extension of a wired network or standard
LAN.

 With a simple access point attached to


26-04-2023 Side 3
Madan Mohan Malaviya Univ. of Technology, Gorakhpur

Wireless LAN Components


ACCESSPOINT
BRIDGE
NIC
ANTENNA
AAA SERVER
NMS SERVER

26-04-2023 Side 4
Madan Mohan Malaviya Univ. of Technology, Gorakhpur

LAN Connection:

26-04-2023 Side 5
Madan Mohan Malaviya Univ. of Technology, Gorakhpur

CONCERNS IN
WIRELESS LAN
 Anyone within the geographical network range of an open,
unencrypted wireless network can 'sniff' or record the traffic,
gain unauthorized access to internal network resources as
well as to the internet.

 If router security is not activated or if the owner deactivates


it for convenience, it creates a free hotspot.

26-04-2023 Side 6
Madan Mohan Malaviya Univ. of Technology, Gorakhpur

RISKS
INTERNAL RISKS:
 Rogue WLANS
 Insecure WLANS
 WLAN Policy violation

EXTERNAL RISK:
 Network Eavesdropping
 Theft of WLAN credentials

26-04-2023 Side 7
Madan Mohan Malaviya Univ. of Technology, Gorakhpur

RISKS
KNOWN RISK:
 Insertion attacks.
 Interception & unauthorized monitoring.
 Jamming.
 Client to client attacks.
 Brute force attacks.▸
 Encryption attacks.
 Misconfigurations

26-04-2023 Side 8
Madan Mohan Malaviya Univ. of Technology, Gorakhpur

SECURITY OPTIONS
 For closed networks (home users and
organization)configure access restrictions in
the access points.
 For commercial providers it should be isolated
wireless network.
 End to end encryption.

26-04-2023 Side 9
Madan Mohan Malaviya Univ. of Technology, Gorakhpur

ADVANTAGES
 It is easier to add or move workstations.
 It is easier to provide connectivity in areas where it
is difficult to lay cable.
 Installation is fast and easy, and it can eliminate the
need to pull cable through walls and ceilings.
 Access to the network can be from anywhere within
range of an access point.
 Portable or semi permanent buildings can be
connected using a WLAN.

26-04-2023 Side 10
Madan Mohan Malaviya Univ. of Technology, Gorakhpur

DISADVANTAGE
 As the number of computers using the network increases, the data
transfer rate to each computer will decrease accordingly.
 As standards change, it may be necessary to replace wireless cards
and/or access points.
 Lower wireless bandwidth means some applications such as video
streaming will be more effective on a wired LAN.
 Security is more difficult to guarantee and requires configuration.
 Devices will only operate at a limited distance from an access point.

26-04-2023 Side 11
Madan Mohan Malaviya Univ. of Technology, Gorakhpur

Conclusion

 Like most advances, wireless LANs poses both opportunities and risks.
 The technology can represent a powerful complement to an
organization's networking capabilities, enabling increased employee
productivity and reducing IT costs.

26-04-2023 Side 12
Madan Mohan Malaviya Univ. of Technology, Gorakhpur

References

1. J. M. Kahn, R. H. Katz, K. S. J. Pister: Next Century Challenges: Mobile


Networking for "Smart Dust"
2. An Introduction to Micro electro mechanical System Engineering: Nadim
Maluf, Kirt William
3. B.A. Warneke, M.D. Scott, B.S. Leibowitz: Distributed Wireless Sensor
Network

26-04-2023 Side 13
Madan Mohan Malaviya Univ. of Technology, Gorakhpur

Thank
THANK YOU You

26-04-2023 Side 14

You might also like