Preliminary
Local area network technology, or local area network (LAN) is a technology data communications systems of the most popular in computer network technology. Use of LAN in connecting two computers and more implemented in all public and private organizations, schools, colleges and universities, shops and cafes are also residential.
Among the advantages of LAN is to connect two or more computers in a small size until the size of which depends to a large say computers, servers, printers and peripherals, network hardware such as hubs, switches and routers.
LAN configuration is very simple and has security features that are appropriate to their needs. However, connections of each user or node on the LAN requires installation of network wiring. The length and number of cable networks is dependent on the number and location of each node in the LAN. If many nodes, the more the number of cable networks are needed. Meanwhile, if the remote location of a node from another node it is necessary for the extension cable into a LAN must also be long.
1.0 Wireless Local Area Network
Besides using a network cable connecting node to the LAN, wireless technology or wireless can also be used. Wireless local area network or wireless local area network (WLAN) is a flexible data communication system that can be implemented as an alternative to wired LAN network. By using radio frequency technology, WLANs transmit and receive data through the air, to minimize dependence on a cable connection. Thus, the WLAN has to incorporate a combination of data connectivity to mobile users or nodes.
1.1 WLAN Technology
WLANs use electromagnetic airwaves (radio or infrared) to convert information from one node to another node without having to rely on a physical network cable connection network. Radio waves are used as carriers because of the easy to send data to the receiver.
Digital data is sent to convert digital signals to analog signals. It is then sent via a carrier wave to the receiver and extracted it to a digital signal. This data is commonly used as a carrier by modulating the signal is being transmitted. Thus, the data modulated on a carrier radio wave, radio signals will take more than one frequency, this happens because the frequency or bit rate of the information has been added to the modulated carrier signal.
1.2 Wifi
Wi-Fi stands for wireless fidelity, or is the technology that allows for users of
computers and other network hardware that supports technologies such as Personal Digital Assistan (PDAs) and mobile phones to communicate in a LAN network or Internet access to the broadband network without a wired network.
By using a Wi-Fi AP or wireless router, a LAN or Internet network can be accessed without a cable in the range of approximately 300 square feet or within 100 meters.
2.0 Advantages WLAN
With the WLAN, users can access the network communication system without the need to find a place as a wired connection to the network. In addition, network managers can configure or build the network without having to install or additional cables. WLAN offers several advantages such as productivity, comfort, and advantage in terms of cost compared with traditional network wiring. Here are the advantages of WLAN.
2.1 Mobility
Wireless LAN system to provide easy access to information in real-time, anywhere. Such mobility can increase productivity and quality of networking services to all people over the LAN wiring.
2.2 Installation / Setup is fast and simple
Installation and configuration of wireless LAN systems is very simple and easier than installing a wired network that requires pulling out the cable through the ceiling, floor or wall. Thus, the installation of LAN will no longer require renovation floor, ceiling and wall because with just installing an access point (AP) is sufficient in a particular environment.
2.3 Flexibility
Technology enables wireless LAN network can be achieved by the places that can not be achieved with a wired network. LAN services to participants who are outside the buildings and areas that do not have a network connection the network cable is no longer possible with the WLAN. Access to communication systems can be performed in every nook and corner of the WLAN coverage.
2.4 Reduced Cost-of-Ownership
Although the initial investment cost for the purchase of hardware equipment WLAN is
higher than the cable network hardware, but when calculated as a whole, installation and life-cycle cost, then it is significantly cheaper. WLAN is used in a working environment that is dynamic and changes constantly to meet the movement. But long-term benefits of a WLAN is much higher when compared with wired LAN network. WLAN installation can survive and to meet the needs of users without installing new cables.
2.5 scalability
WLAN communication system may be configured in a variety of topologies to meet the needs of users. Configuration can be changed easily by the network peer-to-peer suitable for a small number of users in a classroom or small hall through to the network infrastructure to serve thousands of users and allows roaming in large areas.
2.6 Independent Cable
Free cable is the cable refers to a fibrous network, better known by the popular word "Free Spaghetti." This is because each time a new connection is made, the new network wiring should be made. If the wiring work is not done with the update, the process of identifying the problem will be complex, especially in the rack switches. In addition, the existence of many network cable on the ceiling, the floor and the wall also result in less finish the office space. Therefore, the use of WLAN is able to solve the problem of the cable arrangement.
3.0 WLAN Weaknesses
Although the WLAN is often the choice of each organization, but there are weaknesses that could affect the productivity aspects of access, Quality of Service (QoS) and network security. Among the weaknesses of WLAN is the access speed issues, the performance is not stable, easily compromised, weak encryption standard configuration and weaknesses.
3.1 Weaknesses Speed Web Access
WLAN access method that uses a wavelength which can be shared by many users resulting in high-speed access to the affected. This is because the AP does not have a function that is used to provide broadband service equally accessible by the user. Therefore, an increasing number of users to access the AP via the bandwidth will be shared by other users.
If a WiFi users to access a big range, so other users would be affected by the access network through the WLAN. In addition, the access speed of access as per AP location is different. If the node is located close to the AP, the signal received is high. Conversely, the farther the location of the node from the AP obtained the weaker signal.
3.2 Performance Signal Flaky
WLAN technology that uses radio waves in the 2.4GHz range easily distracted if here are disruptions in the signal around. Signal interference, or more accurately known as "interference signal" is defined as disruption of radio waves transmitted to the node and received from the node. Some examples of disorders that affect the performance and volatility of the confines of a sound wave signal is between the AP and the network access node. Sound waves cause the noise disturbed the WLAN radio signal and thus lead to the data transmission is also affected by it.
In addition, the interference wave signals also occur when a lot of physical barriers in a location. This is a physical barrier such as walls, ceiling and floor. WLAN wave signals to be reduced as the physical barriers and may not be up to the point of obstruction although still within reach of the distance radius AP. In addition, due to too many people access and use of the heavy chain of the AP has also resulted in WLAN performance, and it always hangs network instability.
3.3 Exposure to aggression
Access to WLAN usage can not be controlled because it is based on roaming signal.
Therefore, any station or node which is within the roaming signal can access the WLAN. This will allow the intruder surf through the network or any location outside the area unnoticed. This will cause the entire network vulnerable to attacks, threats and aggression that could invite security issues seriously.
3.4 Configuration Weaknesses
The weakness of the configuration is the most significant weakness of the security.
Installation and usage of WLAN products that set the default setting most easily invaded. Typically, the vendors who manufacture and supply of WLAN products to provide convenience to customers on products sold primarily in terms of easy installation and installation by using default settings.
However, the security implications can also cause great risk. This is true if the rule (setting) the equipment is not changed and is still using the default settings, such as the name Service Set Identifier (SSID), your Internet Protocol (IP) of APs, remote management, DHCP, and enable password. This item will give a very big space to the network trespassers to access the network illegally as trespassers will usually know the default setting for the wireless LAN equipment.
3.5 Weaknesses Encryption Standard
Wired Equivalency Privacy, or WEP encryption is a standard used primarily in the WLAN communication system. Communications between the AP and the nodes in a WLAN using WEP encryption has a weakness that may affect network security. The data is encrypted using this technology can be broken down by network intruders to quickly and easily. In addition to WEP, another encryption standard is the WiFi Protected Access, or WPA. WPA encryption is stronger than WEP. However, it can also be broken by the intruders, but not easily and quickly as WEP.
4.0 Proposed WLAN Overcoming Weakness
Despite the obvious weaknesses of WLAN, WLAN implementations still needs to be done to meet the demands of all users. Therefore, the best approach is to perform the
installation of WLAN AP installations in every corner of the room, and office buildings, with emphasis on aspects of ICT security. There are many techniques to overcome shortcomings such as concealment WLAN SSID, WEP or WPA, and so forth. Still only two (2) security approach used by the Media Access Control address filter (MAC), intrusion detection systems (IDS) and intrusion barrier system (IPS). This approach is taken because it provides a high level of WLAN security in line with the convenience to the consumer WLAN to WLAN access at any location and at any time. In addition, the implementation and architecture of WLANs is in accordance with guidelines and security policies.
4.1 Filtering Address Media Access Control (MAC)
Media Access Control (MAC) is a method that uses the physical address of the computer hardware to prevent and identify in the event of invasion. Every computer that uses a WLAN to be registered to use the physical address of the computer. Each computer has a physical address of the computer hardware is different and unique. Filter March would allow the MAC address was registered only in the setting of wireless router that can be networked for LAN and Internet facilities. Thus, any computer that does not register the MAC address will be denied access to the WLAN.
4.2 Intrusion Detection Systems and Intrusion Barrier System
The use of intrusion detection systems (IDS) and intrusion barrier system (IPS) for WLAN is very efficient and effective. Airtight products were used. Installation of the units Airtight done in every corner of the WLAN signal coverage. Airtight function is to detect unusual signals, such as patent attacks from the node and prevents the signal from access to the AP. In addition, Airtight is also able to detect and prevent any ad hoc signals in the environment. Because the WLAN access can be performed anywhere within the signal coverage of the AP, the actual location of nodes is difficult to detect.
However, Airtight can solve this problem by providing a map / plan of the location of nodes in a WLAN with a right to the network administrator. Thus, the location of the intruder can be detected with the exact position of the location.
5.0 Conclusion
See the development of communication technology in the future, is to ensure that wireless technologies will dominate the communications sector. Wireless technology has the advantage of easy to use, portable and cost effective. In addition, this wireless technology is a technology that has the potential to grow rapidly and have the ability to be upgraded. However, the implementation of WLAN in government agencies and security measures should be prioritized and monitored constantly. This is because there is flexibility in the WLAN if not managed properly will cause problems in the agency's ICT security.
No comments:
Post a Comment