Enterprise Security of Wi-Fi Networks using Simulation
Journal Title: INTERNATIONAL JOURNAL FOR ELECTRONIC CRIME INVESTIGATION - Year 2018, Vol 2, Issue 2
Abstract
Wireless network setting is developing into the market, and it is the major way of accessing the internet. Design and security of these networks for an organization need to be considered to ensure mobility and access to each individual is accomplished. In this study, simulation effects of 802.1X with flexible authentication via secure tunnelling are performed. Opportunistic key caching which is preferred by many vendors was used to transmit the session information from the posterior access point to the prior access point to minimize the hand-off latency to allow continuous connectivity to avoid poor network performance. The simulation process was applied throughout the write up of this article without setting up the pricy real lab-test. After the successful modelling of the network, the outcome will be transferred to the real-life environment. The network simulator software was used to illustrate roaming while Cisco Packet Tracer was engaged in the layout design of the wireless nodes. This research applies to network administrators and engineers across the globe to save time and the cost for the network appliances.
Authors and Affiliations
Hafiz Muhammad Usman Gull, Zaka Ur Rehman
User Trust on Online Social Network on the basis of Security and privacy
Online social networks have become a popular medium of sharing information and also major source for connecting the people on a network. As we know that the threats related to online social network is affecting people to...
Effective Prosecution to Support Digital Forensic Evidence during Investigation and Court Proceedings
Firstly, the purpose of this work is to highlight the significance of digital evidence that exists in the form of digital data and is to be presented in the court of law. Secondly, how this evidence (the digital informat...
The Reality of Cyber Security
The purpose of this article is to provide information about cyber security. It gives an analysis that would be useful in taking measure to prevent attacks. The judgment of this analysis is made by expertise and knowledge...
Enterprise Security of Wi-Fi Networks using Simulation
Wireless network setting is developing into the market, and it is the major way of accessing the internet. Design and security of these networks for an organization need to be considered to ensure mobility and access to...
Electronic Crimes and Prevention
The basic purpose of this article is to make provision for provision of electronic crimes where as it is expedient to prevent unauthorized acts with respect to information systems, and accommodate related offenses, as we...