Computer Hardware and Software
Networking hardware is hardware that is used to help work stations connect to a server. Although there are many different kinds of hardware like bridges, network cards the networking hardware that I have chosen to use in within my company’s network are routers, firewalls and switches. Using both routers and firewalls will help protect not only wireless networks but also those networks that use Ethernet cabling. I chose this hardware because I felt that it’s the best hardware to use when keeping my company’s network safe. The software that I have chosen to use is McAfee Anti-virus security software. This software along with the …show more content…
WLAN runs on IEEE 802.11x standards “ (The standards 802.11b, 802.11a, and 802.11g are the most commonly used today)p.644 ”, Wi-Fi ( Wireless Fidelity), WLAN security, Voice over WLAN, and Mesh networks. Wi-Fi connection is shared amongst many people in buildings, parks, restaurants, hospitals and other spots within the neighborhood. This network can be used for no cost at accessibility is free. The service is not the best for video and voice communication and may cause delays, higher security threats, and limited service range when it comes to Wi-Fi connections. When it comes to WLAN security there is WEP, WPA, and WPA2. WEP comes in both Static and Dynamic. The static web has a 24 bit starting point and usually results in 64 or 128bits and is supported all current VoWLAN and The Dynamic uses the authentication within the 802.1x standards. The current standards when it comes to WLAN security is the WPA. The three main elements of WPA are:
“Temporal Key Integrity Protocol (TKIP)—TKIP, based on RC4 encryption, uses a 304-bit key (a 128-bit base key plus a 128-bit IV plus the 48-bit MAC address) and generates new encryption keys after various configurable intervals (a time period, a bit quantity, or even every frame), which makes it much more difficult to break.
■ Message Integrity Code (MIC)—MIC introduces a kind of digital signature to each frame to ensure that messages are not tampered with or captured and replayed. It helps to