StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Detecting rogue access point using Omnipeek software to analyze the wireless network - Essay Example

Cite this document
Summary
According to (Lexicon, 2008), a network can be defined as "any set of interlinking lines resembling a net" a computer network is thus a system of interlinked computer systems. Several protocols are defined and implemented to govern the operation and control of computer network systems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful
Detecting rogue access point using Omnipeek software to analyze the wireless network
Read Text Preview

Extract of sample "Detecting rogue access point using Omnipeek software to analyze the wireless network"

Download file to see previous pages

The Open Systems Interconnect reference model formulated by the International Standards Organization (ISO), defines at least seven layers to enable communication through the network. These layers are the physical layer, the data link layer, the network layer, the transport layer the session layer. According to peter and scarfone (2007), the TCP/IP layer provides network communication and is made up of four main layers. These are the 2.0.2 Transport layer: Provides connectionless services and connection oriented services between various elements.

It ensures reliability of communication and uses Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).2.0.3 Internet Protocol layer (IP): this layer routes packets across the network. The IPv4 is the fundamental network protocol for TCP/IP layer. Other commonly used protocols are the Internet Group Management Protocol (IGMP) and the Internet Control Message Protocol (ICMP).The four main layers inter-work to transfer information between the hosts. The information is passed from the highest layer to the lowest layer with each layer adding more information.

The lowest layer sends the information through the physical network the information is then passed upwards to its destination.Network security encompasses the various provisions made to a computer network infrastructure and the policies adopted by the network system administrator to protect the network and the resources accessed through that network (Nazario, 2003). Various network security systems are in use. . Other commonly used protocols are the Internet Group Management Protocol (IGMP) and the Internet Control Message Protocol (ICMP). 2.0.

4 Hardware layer; also known as the data link layer and handles communication on the physical network component. The Ethernet is the best known protocol. The four main layers inter-work to transfer information between the hosts. The information is passed from the highest layer to the lowest layer with each layer adding more information. The lowest layer sends the information through the physical network the information is then passed upwards to its destination.Network security encompasses the various provisions made to a computer network infrastructure and the policies adopted by the network system administrator to protect the network and the resources accessed through that network (Nazario, 2003).

Various network security systems are in use. The simplest involves one factor authentication through the use of the username and password, two factor authentications by using an ATM card or a mobile phone or three factor authentication using fingerprint or retinal scan. The intrusion prevention systems detect and inhibit any attacks posed by malwares, Trojans and worms (Simmonds et al, 2004). The intrusion detection systems on the other hand detect threats and inform the system administrator.

As stated by Crothers (2002), the main methods used to detect the attacks on network systems are; Signature based detection Anomaly based detection State full protocol analysis Different network systems have different network security technologies. The different network security technologies can be classified into four major groups. These are; Network based intrusion detection and prevention system (IDPS): monitors

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Detecting rogue access point using Omnipeek software to analyze the Essay”, n.d.)
Detecting rogue access point using Omnipeek software to analyze the Essay. Retrieved from https://studentshare.org/information-technology/1534615-detecting-rogue-access-point-using-omnipeek-software-to-analyze-the-wireless-network
(Detecting Rogue Access Point Using Omnipeek Software to Analyze the Essay)
Detecting Rogue Access Point Using Omnipeek Software to Analyze the Essay. https://studentshare.org/information-technology/1534615-detecting-rogue-access-point-using-omnipeek-software-to-analyze-the-wireless-network.
“Detecting Rogue Access Point Using Omnipeek Software to Analyze the Essay”, n.d. https://studentshare.org/information-technology/1534615-detecting-rogue-access-point-using-omnipeek-software-to-analyze-the-wireless-network.
  • Cited: 0 times

CHECK THESE SAMPLES OF Detecting rogue access point using Omnipeek software to analyze the wireless network

Wireless networking

)wireless network Adapters(Mitchell, 2009, p.... These wireless routers may have some LED lights in the front in order to indicate different functions, connecting ports at the back and a built in antenna Wireless access points (WAP) connect the wireless computers to the wired Ethernet.... )Wireless adapter is another key element in the wireless networking of home computer systems.... Wireless print server is connected to the printer and the wireless router using network cables....
5 Pages (1250 words) Essay

A Wireless Local Area Network

A wireless network interface card (NIC) is required to access a wireless network that is available in various forms.... There are one or more devices known as 'access points' through which the wireless devices communicate.... An access point (AP) is a simple transmitter/receiver or 'Transceiver'.... The paper entitled 'A Wireless Local Area network' presents a data communication system where two or more computers that are joined together using radio frequency (RF) transmissions....
7 Pages (1750 words) Term Paper

Wireless Network Active Attacks

An attacker takes advantage of this and unleash large amount of noise by using these devices and jam the airwaves so that the signal to noise go down, in the result wireless network stop to function.... Unauthorized access to wireless network can occur from different ways for example, when a user turns on a computer and it latches on to a wireless admittance point from a neighboring company's overlapping network, the user may not even know that this has occurred....
2 Pages (500 words) Essay

Wireless Intrusion Detection Systems

The 'Wardriver' moves near the wireless network area expecting to detect IEEE 802.... Intruder by means of AirSnort would clandestinely gather wireless network traffic of the intended network.... The active systems can transmit signals to inquire the status of the network and also put in malicious data into the network to create interruptions.... The Wardriver may also get other details of the network such as the Service Set Identifier (SSID)....
4 Pages (1000 words) Essay

Rogue Access Point Network Security Paper

This paper ''rogue access point Network Security Paper'' tells what the main concern was the understanding of ways by which organizations network securities can be exposed to any form of network dangers, and the assessment of the security requirements and approach needed to fully comprehend.... rogue access point refers to a wireless access point mounted on a safe network without explicitly receiving authorization form the administrator of the local network....
6 Pages (1500 words) Term Paper

Border Control Using Wireless Sensor Technology

Gateways on the other hand are proxies for the wireless border control systems.... The task managers are the receiving ends of the wireless border control sensor network architecture.... Wireless border control sensor network architecture is made up of three main components: sensor nodes, gateways, and task managers.... wireless Sensor Networks, WSN, is an emerging technology that uses distributed sensors with a communications infrastructure to monitor or record environmental conditions....
4 Pages (1000 words) Research Paper

Leach and Energy Usage in Wireless Networks

The discussion in the below paper will analyze five reviewed academic journals to analyze the thesis statement that; the low energy adaptive clustering hierarchy protocol (LEACH) detects the faults on the network by transmitting and analyzing the periodical queries from the centralized node and increases the life span of the sensor nodes by balancing the energy consumption of the entire system with the help of cluster heads, which will significantly improve the energy efficiency....
6 Pages (1500 words) Literature review

Wireless Home Network

I will use a step based approach regarding the development and establishment of the wireless network.... he initial point to build and wireless network is to outline a list of equipment that we need for the wireless network development.... This paper represents the particular view on wireless network that transmits data through air or space devoid of any physical link has appeared as a significant substitute to tethered transmission channels for instance twisted wire, coaxial cable, and fiber optics....
7 Pages (1750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us