You are on page 1of 3

Lab 7 Wireless Network Lab Report

Student Name: Wen Shi

Due: MyCourses Drop Box Date

Use this lab report template to answer your questions. You must submit the report electronically in Microsoft word format with all the questions answered and may only share data or screen shots with your partner. Any other sharing will result in a 0. Activity 2 Ad-hoc Wireless Network 1. What are the advantages and disadvantages to an ad-hoc network? Give 2 Advantages and 2 Disadvantages. (10 points) Ad-hoc networks dont need routers and can be more affordable than a regular network; they are also easy to set up. The disadvantage is that there is no connection without a gateway, and that the security is limited. 2. We created the ad-hoc network without adding any security. Is this a good practice or not? Explain (10 points). This is not good practice as ad-hocs are limited in security. Outsiders have little to no difficulty accessing information if they are within the ad-hoc range. In addition, most users are unaware that the ad-hoc connection is unsecure. 3. Are we able to add wireless security to an ad-hoc network? Explain (10 points) Protection is available via encryption methods like AES/TKP (see: more explanation in question 7). Activity 3 Unsecured Infrastructure Wireless 4. Provide a network diagram of the Infrastructure wireless network. Remember to include all IP addresses, MAC addresses, types of cables, patches, ports, etc. (10 points).

5. We created our wireless network using the Linksys Wireless device. How does this differ from an ad-hoc network. Note: You may not say that the ad-hoc doesnt use a wireless AP and an infrastructure based one does! Hint: Think services and security (10 points) With ad-hoc networks, if one device is acting as the internet gateway and disconnects, the internet for everyone on the network disconnects as well. With the Linksys wireless, the signal scale is much higher than the ad-hoc one. Activity 4 Secured Infrastructure Wireless 6. In this activity, we created a secure wireless infrastructure network. Give 1 advantage and 1 disadvantage to this. (10 points). Wireless networks are convenient and quick to set up, but signals can overlap with other wireless signals and its expensive as well. 7. When we had you setup a personal WPA2 security setting, we had you set the encryption level to AES versus TKIP. What is the difference between the encryption schemes? (10 points). AES and TKIP are both encryption methods for improving security on wireless networks. TKIP primarily is used for upgrading security on devices with WEP by using the RC4 stream encryption algorithm and includes four addition algorithms, but does not address all security issues with WLANs. AES is a separate system that features a 128/192/256bit block and is generally faster/more secure.

8. Are there any issues with the various encryption schemes (WEP, WPA, WPA2)? Hint: Think lecture and Operating Systems. (10 points) Not all OS and devices support one type of security (for example, its simpler to use WEP for Macs and WPA/WPA2 for Windows). Activity 5 Connecting to another Wireless Network 9. In this activity we had you connect to another benches network. We then had you do an nmap scan. What information were you able to gather and why is this important? (10 points). No information was able to be gathered in the lab. 10. Based on the answer from question 9, why do we need to worry about wireless security when it comes to our business, home, consoles, etc.? (10 points). Based on the answer, we do not need to worry about security since there was no information gathered. However, many users are unaware of how unsecured networks are and how easily information can be transmitted to third-party sources so keeping a lookout for questionable activity or taking extra security measures when it comes to connection towards a network is advantageous.

You might also like