Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Record WLAN access points at a public place (such as at a shopping centre, public  place, home network etc. of your choice). Gather technical information about wireless network at three different locations with minimum 10 APs for each location.


Test the WLAN sniffing tool and report your observation and recommend how to secure and/or manage WLAN. Your report should include:
a. Tables for each location containing all technical details about WLAN setup from your findings. 
b. Screenshots  (as  an  evidence) and  detail  explanation  to  report  working mechanism (the step by step process) of the identified technique.
c. Explain  the  use (evaluation) of the technique  to  secure  and/or manage WLAN. 
i. Discuss dual bands and it’s advantages
ii. Security implications
iii. Others aspect such as special network, multiple SSIDs and vendors etc.

Information of the Wireless network

The WLAN interface is recorded for a public place near the home and technical data is gathered from the access point for proceeding with a vulnerability testing of the wireless networks. The various risk associated with the wireless network are identified and Acrylic Wi-Fi Home version is used for the detailed analysis of the wireless network. There are different other tools available also that can be applied for the analysis of the wireless network at the public place [12]. The quality of signal MAC address, RSSI, Channel, standards used, maximum speed, WEP, WPA, WPA2, WPS, Vendor, First, Last and Type can be analyzed using the tool.

Moreover the strength of the signal, quality of the network, channels working in 2.4 GHz or 5 Ghz can be known and it helps to generate a statistics of the network. The sniffer can be used for generate the access point list and create a statistic of the wireless network. The area of coverage of the network can also be found from the sniffing tool and it can find the flow of data and find the spectrum to choose the best wireless connection installed in the network [7]. The signal quality and the coverage area provided by the signal is also analyzed by the network sniffing tool. The number of channels provided by the wireless access point can also be found using the Acrylic Wi-Fi tool and it can be used for analyzing the performance of the wireless network.

The wireless network found near the home are analyzed and a penetration testing is done on the network for finding the vulnerability and the risk associated with the network. The access point are secured with different encryption algorithm such as WPA, WPA2 and the version of the WPS used can also be analyzed using the network sniffer. The coverage area of the wireless signal are required to be segmented for identification of the transmission capacity and bandwidth allocated to the network. The setup process of the tool is shown below with the sniffing of the network.

For the planning of the Wireless system distinctive criteria are required to be viewed as, for example, testing of the flag scope, testing of the execution of the system, testing of the security weakness, confirmation and acknowledgment testing and pilot testing of the system [5]. The Wi Fi signals are produced from the remote access focuses and for testing the scope of the flag a flag meter is utilized and it quantifies the flag esteems that are required for covering the territories. The useful necessity of the business is dissected for testing the usefulness of the remote arrangement and the security approach took after for the advancement of the system is additionally investigated [2]. The strategy comprises of the blueprint of the structure and principles and conventions took after for the advancement of the remote system.

Using sniffing tool for testing

The present system utilizes the 802.11 standard and WPA/AES convention is taken after for securing the entrance point [6]. There is a necessity of security evaluation and checking the security status of the system and the inadequately arranged access point. The Wi fi get to point is required to be broke down with wire shark and the entrance point is arranged with the default security settings i.e. the latency time out and limit parameters are not arranged [9]. The entrance point is required to be secured and the unused administration conventions are required to be handicapped for expanding the security of the system. The SSID are shown as the name of the system and the system is fragmented for playing it safe from the pernicious system.

The present system is produced following the customer to customer method of transmission and subsequently the remote stations are associated in the system by means of the entrance point. The correspondence of the customer are controlled utilizing distinctive system correspondence conventions and there is a necessity of key security patches.

Acrylic Wi-Fi Home is utilized for sniffing the remote system near the home network and an underlying testing is done on the present system situation and distinguish the dormancy of the system. A system score is created and the points of interest of the transmission capacity, dormancy, jitter, ping misfortune and security of the system can be gotten from the device. The impediment of the remote system is talked about and hazard moderation technique that can be connected for expanding the security of the remote system is examined in the report. Distinctive encryption systems that can be connected is additionally examined and the best practice that the association can apply for the advancement of the remote system is likewise talked about in the report.

The channels provide by the network is analyzed for finding the area of coverage and analyzing the vulnerability. The technical information about the channels in the 2.4 Ghz can be found and shown above. The operating frequency is also found from the analysis of the current network.

The figure shows the 5 Ghz access point channels within the range of the wireless network and it is used for the identification of the vulnerability. The channels can be helpful for finding the strongest access point.

There is a requirement for the implementation of wireless intrusion detection program for restricting the intruders to access the internal network components and secure the network.

Recommendation for increasing the security of WLAN

A table is created for each of the location and documented below:

Network Technology

Data Rate

Range

Frequency

WWAN

GSM

Distance of the base station 100m to 35 km

0.009 to 0.014

~ 900 MHz

GPRS

0.160

UTMS

0.384 to 2.0

WLAN

IEEE 802.11a

50 meter

54

~ 2.4 & 5 GHz

Ultra wideband

10 meter

100

IEEE 802.11b

100 meter

11

Bluetooth

10 meter

1

WPAN

Infrared IrDA

1 to 1.5 meter

1 to 16

~2.4 GHz

Home RF

50 meter

10

The network testing is done using the Wizard Net rank and the bandwidth, latency, jitter, ping loss and security of the network is analyzed.

The network packets captured using the Acrylic Wi-Fi network traffic sniffer can be used for analyzing the attack on the network and can be used as an evidence in future for reporting against the attack. In the above case an intruder attack is performed in the network for accessing the university content of a network and the packets captured from the network is used for finding the source of the attack.

A frame can be captured using the Acrylic Wi-Fi network traffic sniffer and it can be further analyzed for getting the source and the destination address in the network. The epoch time and the arrival time of the data packets can also be found by analyzing the data packets.

i. Discussion of the dual bands and its advantage

The dual band wireless network have the support for communication in two different frequencies i.e. 2.4 Ghz and 5 Ghz. It can also cover a more area than the single band with strong network signal strength and thus have good speed of transmission of the data packets in the network. The remote system distinctive issues may emerge and a large portion of the issue emerges because of establishment of the modest switch utilizing single band. The establishment of the double band correspondence direct in the remote system that expands the speed of the system.

A test is performed on the current network scenario and the external factors affecting the wireless network is analyzed for application of the security in the network. The remote access to the network is required to be restricted for the unknown users and disabling the ARP protocol would reduce the risk. A strong encryption password and algorithm is required to be used for securing the access point and restrict the hacker to gain the direct access of the network.

Distributing a remote system scope outline- It is the obligation of the system manager to cover the region of the wireless network by examining the entrance point and SSID. The system guide can be utilized for taking care of and investigating the system for dissecting the security episode in the system.

Advancement of the security setup of Access Point- All the entrance indicates are required be secured for ensuring the entrance point. The gauge security setup is required to be produced and a reinforcement is required to be made for reestablishing the gadget in crisis condition. The standard settings are required to be re-designed for expanding the security of the entrance point.

Keeping a stock of all the remote gadget associated in the system- The stock of the system is required to be overseen and approval of the gadget is required to be reported for expanding the assortment of errand.

Instructing the clients about the diverse hazard related with the remote system- The client utilizing the remote access point is required to be taught in regards to the variables influencing the data security of the system. A decent arrangement may bomb because of absence of client mindfulness. 

Assessing the Audit at a customary interim of time-The logs are required to be checked at a general interim of time for guaranteeing the honesty and the culmination of the logs. Any variation from the norm in the system are required to be recognized and researched for expanding the productivity of the system.

  • Andrews, J.G., Zhang, X., Durgin, G.D. and Gupta, A.K., 2016. Are we approaching the fundamental limits of wireless network densification?. IEEE Communications Magazine, 54(10), pp.184-190.
  • Asrodia, P. and Sharma, V., 2013. Network monitoring and analysis by packet sniffing method. international Journal of Engineering Trends and Technology (IJETT), 4(5).
  • De Judicibus, D., Leopardi, S., Modeo, L. and Pergola, N., Toshiba Global Commerce Solutions Holdings Corporation, 2013. Method and system for secured transactions over a wireless network. U.S. Patent 8,352,360.
  • Falk, R. and Kohlmayer, F., Siemens Enterprise Communications Gmbh & Co. Kg, 2013.Method and arrangement for providing a wireless mesh network. U.S. Patent 8,495,360.
  • Girdhar, P. and Malik, V., 2016. A Study on Detecting Packet Using Sniffing Method. Journal of Network Communications and Emerging Technologies (JNCET) www. jncet. org, 6(7).
  • Hu, W.H., Wang, C. and Bagherzadeh, N., 2015. Design and analysis of a mesh-based wireless network-on-chip. The Journal of Supercomputing, 71(8), pp.2830-2846.
  • Islam, N.N. and Zareen, F., 2014. Comparison analysis of wireless network audits using open source tools (Doctoral dissertation, BRAC University).
  • Liang, C. and Yu, F.R., 2015. Wireless network virtualization: A survey, some research issues and challenges. IEEE Communications Surveys & Tutorials, 17(1), pp.358-380.
  • Loo, J., Mauri, J.L. and Ortiz, J.H. eds., 2016. Mobile ad hoc networks: current status and future trends. CRC Press.
  • Öncü, S., Ploeg, J., van de Wouw, N. and Nijmeijer, H., 2014. Cooperative adaptive cruise control: Network-aware analysis of string stability. IEEE Transactions on Intelligent Transportation Systems, 15(4), pp.1527-1537.
  • Stallings, W. and Tahiliani, M.P., 2014. Cryptography and network security: principles and practice (Vol. 6). London: Pearson.
  • Swapna, B.T., Eryilmaz, A. and Shroff, N.B., 2013. Throughput-delay analysis of random linear network coding for wireless broadcasting. IEEE Transactions on Information Theory, 59(10), pp.6328-6341.
Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). WLAN Sniffing: Technical Details And Network Security In The Essay.. Retrieved from https://myassignmenthelp.com/free-samples/bn303-wireless-networks-and-security/sniffing-tool.html.

"WLAN Sniffing: Technical Details And Network Security In The Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/bn303-wireless-networks-and-security/sniffing-tool.html.

My Assignment Help (2021) WLAN Sniffing: Technical Details And Network Security In The Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/bn303-wireless-networks-and-security/sniffing-tool.html
[Accessed 25 April 2024].

My Assignment Help. 'WLAN Sniffing: Technical Details And Network Security In The Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/bn303-wireless-networks-and-security/sniffing-tool.html> accessed 25 April 2024.

My Assignment Help. WLAN Sniffing: Technical Details And Network Security In The Essay. [Internet]. My Assignment Help. 2021 [cited 25 April 2024]. Available from: https://myassignmenthelp.com/free-samples/bn303-wireless-networks-and-security/sniffing-tool.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close