0% found this document useful (0 votes)
7 views4 pages

Lab1 Networking

The document outlines the components and features of wireless networks, including devices such as wireless adapters, routers, antennas, and repeaters, as well as the differences between infrastructure and ad hoc networks. It also discusses mobile app security, highlighting vulnerabilities and considerations for protecting mobile applications, and introduces CM Security, a mobile security app that offers antivirus and privacy protection features. The content aims to educate users on setting up wireless networks and understanding mobile security applications.

Uploaded by

Haronamery
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views4 pages

Lab1 Networking

The document outlines the components and features of wireless networks, including devices such as wireless adapters, routers, antennas, and repeaters, as well as the differences between infrastructure and ad hoc networks. It also discusses mobile app security, highlighting vulnerabilities and considerations for protecting mobile applications, and introduces CM Security, a mobile security app that offers antivirus and privacy protection features. The content aims to educate users on setting up wireless networks and understanding mobile security applications.

Uploaded by

Haronamery
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Lab-1: Study of Different Wireless Network Components and Features of a Mobile

Security App

1.0 Learning Objectives

At the end of the session, you should be able to:

• Know about the devices and components in a wireless network.

• Know about the network security issues in different types of network devices.

• Identify a mobile security app and how it works for mobile security.

1.1 Introduction

As long as you have all the hardware, you can quickly set up any wireless network. Here is
everything you need to know about the hardware you need to have in place before you use
Windows to configure the wireless network. There are two types of wireless networks:
infrastructure and ad hoc. The infrastructure network is most likely the type of wireless
setup you have in your home or office. It’s laid out similarly to a wired network, but without
wires.

Done By Dr. Sara abu Gazalah


The basic wireless, peer-to-peer network consists of these components:

• Wireless Network Adapters (Wireless NICs or Wireless Network Cards):


Required for each device on a wireless network. All newer laptops incorporate
wireless adapters as a built-in feature. No wireless hardware other than adapters is
required to build a small local network. However, to increase performance,
accommodate more devices, and extend the network range, additional hardware
may be needed.

• Wireless Routers:
Wireless routers function similarly to traditional routers for wired Ethernet networks.
They are typically deployed when building an all-wireless network from scratch.
Access points, which allow wireless networks to join an existing wired network, are
often used to expand existing networks.

• Wireless Antennas:
Access points and routers use antennas to improve the communication range of
wireless signals. Optional, removable, or aftermarket antennas can also enhance
the range of wireless adapters.

• Wireless Repeaters:
Also known as signal boosters or range expanders, these devices connect to a
router or access point and extend the range of wireless signals, helping devices
connect to the network from farther distances.

• Wire-based Connections:
Most wireless routers include Ethernet ports for connecting to broadband modems
and wired devices. This feature allows for a hybrid setup of wired and wireless
components.

• Wireless NICs (Network Interface Cards):


Desktop PCs require a wireless NIC to connect to the network. These can be
internal expansion cards or USB plug-ins. Laptops typically have built-in wireless
NICs.

Infrastructure Networks vs. Ad Hoc Networks

• Infrastructure Networks: Include central hubs like routers or access points,


enabling structured communication.

• Ad Hoc Networks: Feature peer-to-peer communication without a central hub.


Devices connect directly to share files or resources and may not include internet
access.

Done By Dr. Sara abu Gazalah


Benefits of Wireless Networks

• Flexibility and Portability: Easy to relocate and set up, especially useful for
apartments or frequent moves.

• Integration with Wired Components: Add switches to expand Ethernet ports as


needed.

• Terminology:

o WLAN (Wireless Local Area Network): Another term for wireless networks.

o Wi-Fi (Wireless Fidelity): Commonly used name for wireless networking.

o AP (Access Point): Refers to the hub connecting wireless devices, not the
Associated Press.

1.2 Mobile App Security

Mobile app security refers to the protection of mobile applications against malware and
unauthorized access. With mobile devices being composed of numerous components,
vulnerabilities can arise from architectural flaws, device theft, platform weaknesses,
permission issues, and application-specific weaknesses.

Security Considerations for Mobile Apps:

• How do users obtain the app?

• Should companies create their own app store?

• How is the app vetted before being offered for sale?

• What protections exist against malware?

• How can users identify legitimate apps?

• Can automatic updates be hijacked?

• What measures prevent jailbreaking risks?

• How should app permissions be managed?

• Can other apps track the usage of certain apps?

Done By Dr. Sara abu Gazalah


1.2.1 CM Security

CM Security (Clean Master) is a free app developed by Cheetah Mobile, offering various
features to protect devices from threats.

Features of CM Security:

• Anti-Virus: Scans for malware and threats.

• Browsing Protection: Secures internet activity.

• Battery Saving: Optimizes device performance.

• Privacy Protection: Secures apps and personal data.

CM Security uses a straightforward approach to identify and address potential threats.


However, it includes frequent prompts to use other Cheetah Mobile apps. Despite this, the
app provides significant value as a free service.

Done By Dr. Sara abu Gazalah

You might also like