Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. While many of us already use wireless networking at home or at Internet cafes

ID: 3655219 • Letter: 1

Question

1. While many of us already use wireless networking at home or at Internet cafes and hotspots, there is a growing interest in using wireless technology to access company networks. Are wireless LANs a good thing? Do they offer any advantages of wired LANs? Any drawbacks? Assuming a company wanted to implement a wireless LAN, what would they need to purchase hardware wise? How would they secure access (be specific)? 2. There are a variety of routing algorithms used in networks. Choose a routing algorithm and explain how it works, what its advantages are, and its disadvantages. Do not choose an algorithm already discussed by a classmate. To avoid working on the same algorithm as someone else, you can post of "placeholder" message containing the algorithm you want to discuss. You can then edit this "placeholder" post when you are ready to finalize your discussion.

Explanation / Answer

We need to begin here with an important truth, however: there is no such thing as absolute security. Any security mechanism of any form can be compromised, because security, again, of any form, is simply designed to allow access only to authorized individuals, not block it altogether. Wireless-LAN security was a major problem in the early days of the technology, with the security mechanism in the standard (known as WEP) easily compromised. Today's WPA2-based security, however, is quite good, and works well to protect data as it traverses the airwaves. It is not, however, sufficient for enterprise-class applications. And the reason for this is that only the airwaves are protected. The airlink (as it is known) between client and AP is consequently difficult to compromise, but data on either side of the link (e.g., stored on a mobile device or moving over the non-WLAN part of the network) isn't secured by WPA2. For this reason, we recommend that all effective security mechanisms (a) use good airlink encryption, with WPA2-Enterprise sufficient in most cases), (b) use strong authentication (some form of 802.1x is usually acceptable for this purpose, but we recommend two-factor authentication wherever possible), (c) use an end-to-end VPN covering all network links between client and server, and (d) that sensitive data (as defined in a firm's Security Policy - you do have one of those, and review it every six months, right?) be encrypted wherever it resides - on a server, or on a mobile device. As you can see, wireless security pales in comparison to network security, and that a good network-security strategy is essential no matter what wireless security is in place.