Essay about Security: Wi-fi and Wireless Access Point
Submitted By Otieno2
Words: 5748
Pages: 23
Thesis
What is my project (http://www.statistics.gov.uk/cci/nugget.asp?id=8)
The UK has a very intensive Rail network system which spreads out across the whole country.
It is used by millions of users. There is currently 21000 miles of track lied out across the network.
According to statistics.gov.uk in the year 2010 1.32 billion people used the trains.
This is statistic show the magnitude off the rail and that there is hugh potential in using is client base.
According to national statistics 30.1 million adults in the UK where using internet every day, this is more then 60 percent of the adult population.
In line with the amount of users now online they has also been a rise in users watching TV and Listening to the radio over the internet which in 2010 reached 17.4 million a day.
Social networking has also risen in popularity with more then 65 percent of those online users using different types of social networking websites, chat rooms and blogs.
What this shows is that we are living in the digital age were 70 percent of us need to be able to access information from the web.
Now we now that there was 1.2 billion user of the rail network and we also now that more then half of the UK adult population use internet daily. We therefore argue the point that more then half of the rail network users use internet which means more then 600 million users of the rail network are internet users.
Another statistic tells us that a recent study has shown that more then 80 percent of the adult population carry a mobile phone and 40 percent of those are wifi enabled.
While on a trains user mostly access the internet via their mobile network provider, and this service is not great while on a fast moving train.
User encounter loss of signal poor reception and rarely seem to have a good connection at all.
The aim of my project is to provide a constant internet signal on a moving train utilising wireless connectivity. This will aloow users to connect to the internet while on the train using any wireless enabled devices such as Tablet Pc, mobile phone, laptop exe....
As wifi signal from one router is limited I will be intending to use many routers which will run along the train track.
Power to them will be provided by the power terminals already existing along train track and phone-line.
This will provide train customers to access internet constantly through out their journey with no loss of signal and speed.
What will I use:
Types of technology available for accessing the internet
(http://en.wikipedia.org/wiki/Broadband_Internet_access) accessed on 16-02-2011
Mobile Broadband (http://www.explainthatstuff.com/mobilebroadband.html)
There are two ways in which you can connect to a mobile broadband, if you have a smart phone which has HSPDA you can access fast mobile broadband or you can purchase a USB Dongle from most mobile network providers.
Most major cities in the UK are covered by the 3G network
Advantage
The advantage of using mobile Broadband is that it has a larger coverage then wireless network. Where ever you can get a reasonable mobile connection you are more than likely to get a good mobile broadband connection.
Disadvantage
Mobile broadband has its downsides, as you are using the mobile phone provider’s network the quality of the signal you receive can vary from a good signal to a very poor signal, thus loss of connection occurs. When using mobile broadband on a train you can expect to lose connection very often as trains go under tunnels and bridges, this makes for a bad user experience.
Satellite Broadband (http://computer.howstuffworks.com/question606.htm) (http://www.pcworld.com/article/17617/how_it_works_satellite_internet_access.html)
High speed internet that uses a satellite dish on the receiving side similar to what satellite TV uses.
The way in which internet is accessed is very similar to how Satellite television is received, a BIRD orbiting the earth beams down data to your dish.
The way it works is you
Related Documents: Essay about Security: Wi-fi and Wireless Access Point
technologies, there's wireless communication that was developed to supply a quicker and easier means of transferring knowledge from one device to different with none use of wires. Wireless technology is extremely economical and is straightforward to be used because the innovative thinking step by step, new methods for remote systems administration has been advanced of that our arranged subject Wi-Fi is that the most acknowledged innovation. Wi-Fi is an acronym for Wireless-Fidelity which is considered…
Information Security – 3153020 Assignment: Wireless Security Done by: Abdullah Ali Alwan 201410419 Wireless Communications: Wireless communications are defined as the transmission of digital data while connected to some type of data network, without the use of any cabling. A device that utilizes wireless communications would be a smartphone, as it can connect to a network without using a wire. There are different technologies that uses wireless communications, such as: 1. Wi-Fi: The…
11 February 2015 Homework 7 Survey 1. What kind of precautions do you take when connecting to a wireless network of any kind outside your home? 2. Are you ever asked for payment information when using these services? 3. Are you aware of the dangers of connecting to a wireless network? 4. Do you know the difference between an ad hoc and a secure wireless connection? 5. When connected to these wireless networks, do you typically leave it in an always on state? Similarly, do you have any particular…
Busn-247 Marry-Ann M. Boyce Monday, March 19, 2012 Wi-Fi in the Sky People have been using airplanes to travel for many years, and weather it is for business or pleasure people always prepared themselves to be isolated from the world for the length of their flight because once they are in the airplane the know that they would not be able to communicate with the outside world. But all of that might be coming to an end with the introduction of wireless internet in many airplanes. Most airlines are now…
Wireless router A wireless router is a router that connection wireless device to the access wireless Internet by connecting to a wired access point. It is a device that performs the functions of a router but functions as a wireless device. It connection via radio waves and does not require a wired connection. All devices connecting to a wireless router must possess a working network adapter. This is connected to a broadband modem that has one or more built in adapters which enables sharing…
Information Security Unauthorized Access Abstract Security is an enduring issue in Information Technology and can be hard to deal with at times with all of the diverse areas that it affects along with impacts that it can have on a corporation from day one. Unethical actions cause a huge risk on all aspects of security and needs to be well maintained. A deep leap into information security related to unauthorized access will be discussed by going into greater detail in…
Information Technology Risk Assessment Name Professor Institution Course Date Identify And Describe The Organizational Authentication Technology And Network Security Issues. Global Asset Inc. experiences numerous network security issues. These issues have spoiled the company’s reputation to its customers, reduced the company’s profit, and make it to be less competitive than the competitors make. Global Asset Inc needs to solve out these issues for it to remain competitive, regain back its…
Internet security as well as company server security are of great importance to KFF. Company files, proprietary inventories, and customer information all need to be accessed by company employees, and thus must be secure from outside sources. An additional explanation of the Local Area Network, needs to be offered to better understand the use of the new technologies including routers, switches and cabling techniques. We are installing equipment to provide WLAN services to each location, a wireless router…
SECURITY MYTHS MAC filtering: This is like handing a security guard a pad of paper with a list of names. Then when someone comes up to the door and wants entry, the security guard looks at the person's name tag and compares it to his list of names and determines whether to open the door or not. Do you see a problem here? All someone needs to do is watch an authorized person go in and forge a name tag with that person's name. The comparison to a wireless LAN here is that the name tag is the MAC…