Wireless Network Security

Read Complete Research Material

WIRELESS NETWORK SECURITY

Secure Wireless Network

Abstract

Wireless technology can provide many benefits to computing including faster response to queries, reduced time spent on paperwork, increased online time for users, just-in-time and real time control, tighter communications between clients and hosts. Wireless Computing is governed by two general forces: Technology, which provides a set of basic building blocks and User Applications, which determine a set of operations that must be carried out efficiently on demand. This paper summarizes technological changes that are underway and describes their impact on wireless computing development and implementation. It also describes the applications that influence the development and implementation of wireless computing and shows what current systems offer.

Table of Content

ABSTRACTII

RESEARCH METHODOLOGY1

Research Design1

Interview3

Research Goals And Method4

Narrow-band technology:5

Spread Spectrum technology (SSR):5

(1)Frequency hopping Spread Spectrum (FHSS):6

(2)Direct Sequence Spread Spectrum (DSSS):6

Infrared Technology (IR):7

Wireless services7

Findings8

ESTABILISHING AND MAINTAINING WIRELESS9

Environmentally safe14

Network Requirements:15

Wireless LAN Configuration:Simple networks16

Client and Access Point (AP):17

REFERENCES19

APPENDICES21

Research Methodology

Research Design

The emphasis on subjecting all theoretical concepts, hypotheses, and expectations to empirical demonstration—that is, of testing our ideas—is basically what distinguishes the scientific method from other forms of inquiry. And the principles of scientific methodology, which lend structure to the manner in which such inquiries occur, is what this paper is connected with.

Primary or secondary

The emphasis on subjecting all theoretical concepts, hypotheses, and expectations to empirical demonstration—that is, of testing our ideas—is basically what distinguishes the scientific method from other forms of inquiry. And the principles of scientific methodology, which lend structure to the manner in which such inquiries occur, is what this paper is connected with.

A primary source is a record created as part of, or during an event, crisis, or time period. For instance a letter, diary, governmental report, newspaper, or speech would be a primary source. While a memoir of the war written after the fact could also be considered a primary source it would not be as valid as those produced at the time the event took place (memory can blur or embellish events). A book written about the topic by an researcher would be considered a secondary source. A secondary source is the compilation or interpretation of events by an individual; often one who has used primary sources to produce the work.

Primary research is collected in a research “instrument” designed to record information for later analysis. Marketing researchers use many types of instruments from basic methods that record participant responses to highly advanced electronic measurement where research participants are connected to sophisticated equipment.

Secondary research occurs when a project requires a summary or collection of existing data. As opposed to data collected directly from respondents or "research subjects" for the express purposes of a project, (often called "empirical" or "primary research"), secondary sources already exist.

These secondary soures could include previous research reports, newspaper, magazine and journal content, and government and NGO statistics. Sometimes secondary research is required in the preliminary stages of research to determine what is known already and what new data is required, or to inform research design. At other times, it may make be the only research technique ...
Related Ads