HANOI UNIVERSITY OF SCIENCE AND TECHNOLOGY
FACULTY OF ELECTRONICS AND TELECOMMUNICATIONS
----------o0o----------
Maybe you are interested!
-
Solutions for tourism development in Tien Lang - 10
zt2i3t4l5ee
zt2a3gstourism, tourism development
zt2a3ge
zc2o3n4t5e6n7ts
- District People's Committees and authorities of communes with tourist attractions should support, promote, and provide necessary information to people, helping them improve their knowledge about tourism. Raise tourism awareness for local people.
*
* *
Due to limited knowledge and research time, the thesis inevitably has shortcomings. Therefore, I look forward to receiving guidance from teachers, experts as well as your comments to make the thesis more complete.
Chapter III Conclusion
Through the issues presented in Chapter II, we can come to some conclusions:
Based on the strengths of available tourism resources, the types of tourism in Tien Lang that need to be promoted in the coming time are sightseeing and resort tourism, discovery tourism, weekend tourism. To improve the quality and diversify tourism products, Tien Lang district needs to combine with local cultural tourism resources, at the same time combine with surrounding areas, build rich tourism products. The strengths of Tien Lang tourism are eco-tourism and cultural tourism, so developing Tien Lang tourism must always go hand in hand with restoring and preserving types of cultural tourism resources. Some necessary measures to support and improve the efficiency of exploiting tourism resources in Tien Lang are: strengthening the construction of technical facilities and labor force serving tourism, actively promoting and advertising tourism, and expanding forms of capital mobilization for tourism development.
CONCLUDE
I Conclusion
1. Based on the results achieved within the framework of the thesis's needs, some basic conclusions can be drawn as follows:
Tien Lang is a locality with great potential for tourism development. The relatively abundant cultural tourism resources and ecological tourism resources have great appeal to tourists. Based on this potential, Tien Lang can build a unique tourism industry that is competitive enough with other localities within Hai Phong city and neighboring areas.
In recent years, the exploitation of the advantages of resources to develop tourism and build tourist routes in Tien Lang has not been commensurate with the available potential. In terms of quantity, many resource objects have not been brought into the purpose of tourism development. In terms of time, the regular service time has not been extended to attract more visitors. Infrastructure and technical facilities are still weak. The labor force is still thin and weak in terms of expertise. Tourism programs and routes have not been organized properly, the exploitation content is still monotonous, so it has not attracted many visitors. Although resources have not been mobilized much for tourism development, they are facing the risk of destruction and degradation.
2. Based on the results of investigation, analysis, synthesis, evaluation and selective absorption of research results of related topics, the thesis has proposed a number of necessary solutions to improve the efficiency of exploiting tourism resources in Tien Lang such as: promoting the restoration and conservation of tourism resources, focusing on investment and key exploitation of ecotourism resources, strengthening the construction of infrastructure and tourism workforce. Expanding forms of capital mobilization. In addition, the thesis has built a number of tourist routes of Hai Phong in which Tien Lang tourism resources play an important role.
Exploiting Tien Lang tourism resources for tourism development is currently facing many difficulties. The above measures, if applied synchronously, will likely bring new prospects for the local tourism industry, contributing to making Tien Lang tourism an important economic sector in the district's economic structure.
REFERENCES
1. Nhuan Ha, Trinh Minh Hien, Tran Phuong, Hai Phong - Historical and cultural relics, Hai Phong Publishing House, 1993
2. Hai Phong City History Council, Hai Phong Gazetteer, Hai Phong Publishing House, 1990.
3. Hai Phong City History Council, History of Tien Lang District Party Committee, Hai Phong Publishing House, 1990.
4. Hai Phong City History Council, University of Social Sciences and Humanities, VNU, Hai Phong Place Names Encyclopedia, Hai Phong Publishing House. 2001.
5. Law on Cultural Heritage and documents guiding its implementation, National Political Publishing House, Hanoi, 2003.
6. Tran Duc Thanh, Lecture on Tourism Geography, Faculty of Tourism, University of Social Sciences and Humanities, VNU, 2006
7. Hai Phong Center for Social Sciences and Humanities, Some typical cultural heritages of Hai Phong, Hai Phong Publishing House, 2001
8. Nguyen Ngoc Thao (editor-in-chief, Tourism Geography, Hai Phong Publishing House, two volumes (2001-2002)
9. Nguyen Minh Tue and group of authors, Hai Phong Tourism Geography, Ho Chi Minh City Publishing House, 1997.
10. Nguyen Thanh Son, Hai Phong Tourism Territory Organization, Associate Doctoral Thesis in Geological Geography, Hanoi, 1996.
11. Decision No. 2033/QD – UB on detailed planning of Tien Lang town, Hai Phong city until 2020.
12. Department of Culture, Information, Hai Phong Museum, Hai Phong relics
- National ranked scenic spot, Hai Phong Publishing House, 2005. 13. Tien Lang District People's Committee, Economic Development Planning -
Culture - Society of Tien Lang district to 2010.
14.Website www.HaiPhong.gov.vn
APPENDIX 1
List of national ranked monuments
STT
Name of the monument
Number, year of decisiondetermine
Location
1
Gam Temple
938 VH/QĐ04/08/1992
Cam Khe Village- Toan Thang commune
2
Doc Hau Temple
9381 VH/QĐ04/08/1992
Doc Hau Village –Toan Thang commune
3
Cuu Doi Communal House
3207 VH/QĐDecember 30, 1991
Zone II of townTien Lang
4
Ha Dai Temple
938 VH/QĐ04/08/1992
Ha Dai Village –Tien Thanh commune
APPENDIX II
STT
Name of the monument
Number, year of decision
Location
1
Phu Ke Pagoda Temple
178/QD-UBJanuary 28, 2005
Zone 1 - townTien Lang
2
Trung Lang Temple
178/QD-UBJanuary 28, 2005
Zone 4 – townTien Lang
3
Bao Khanh Pagoda
1900/QD-UBAugust 24, 2006
Nam Tu Village -Kien Thiet commune
4
Bach Da Pagoda
1792/QD-UB11/11/2002
Hung Thang Commune
5
Ngoc Dong Temple
177/QD-UBNovember 27, 2005
Tien Thanh Commune
6
Tomb of Minister TSNhu Van Lan
2848/QD-UBSeptember 19, 2003
Nam Tu Village -Kien Thiet commune
7
Canh Son Stone Temple
2160/QD-UBSeptember 19, 2003
Van Doi Commune –Doan Lap
8
Meiji Temple
2259/QD-UBSeptember 19, 2002
Toan Thang Commune
9
Tien Doi Noi Temple
477/QD-UBSeptember 19, 2005
Doan Lap Commune
10
Tu Doi Temple
177/QD-UBJanuary 28, 2005
Doan Lap Commune
11
Duyen Lao Temple
177/QD-UBJanuary 28, 2005
Tien Minh Commune
12
Dinh Xuan Uc Pagoda
177/QD-UBJanuary 28, 2005
Bac Hung Commune
13
Chu Khe Pagoda
177/QD-UBJanuary 28, 2005
Hung Thang Commune
14
Dong Dinh
2848/QD-UBNovember 21, 2002
Vinh Quang Commune
15
President's Memorial HouseTon Duc Thang
177/QD-UBJanuary 28, 2005
NT Quy Cao
Ha Dai Temple
Ben Vua Temple
Tien Lang hot spring
div.maincontent .p { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; margin:0pt; } div.maincontent p { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; margin:0pt; } div.maincontent .s1 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; font-size: 16pt; } div.maincontent .s2 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: bold; text-decoration: none; font-size: 14pt; } div.maincontent .s3 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: normal; text-decoration: none; font-size: 14pt; } div.maincontent .s4 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; font-size: 14pt; } div.maincontent .s5 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; font-size: 14pt; } div.maincontent .s6 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; } div.maincontent .s7 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 14pt; } div.maincontent .s8 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 9pt; vertical-align: 6pt; } div.maincontent .s9 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 12pt; } div.maincontent .s11 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; tex -
Standard Teaching Hour Norms of Lecturers at Khxhnv University - Hanoi National University According to Each Position -
Political quality education for students of National Defense and Security Education Center - Thai Nguyen University - 2 -
Completing the training quality assurance system at the University of Economics, Vietnam National University, Hanoi - 16 -
SQL Database Administration - Hanoi University of Business and Technology - 14

WIRELESS LAN SECURITY
WIRELESS LAN SECURITY
Instructor: NGUYEN TRUNG DUNG
Student: NGUYEN HUY BAC
Class: Topic 2B – K44
HANOI - 2004
Nguyen Huy Bac _ Electronics and Telecommunications_University of Science and Technology_Hanoi
INTRODUCTION 7
PART I 9
INTRODUCTION TO WIRELESS LAN 9
I. OVERVIEW OF WLAN 9
1. Overview 9
2. Technology used: 9
3. Target audience: 10
4. Installation location: 11
5. Application potential in Vietnam 11
II/ TECHNICAL SOLUTIONS 11
1. Overview 11
2. Features of WLAN 802.11 14
3. Channel access, CSMA/CA 18 multiple access mechanism
4. Modulation techniques 22
5. Access techniques: 26
6. Radio Engineering 27
7. Security issues 32
III/ TRANSMISSION SOLUTION TO HOTSPOT POINT USING XDSL-WAN 33
1. Transmission plan 33
IV/ CONNECTION MODEL FOR HOTSPOT 34
1. Techniques in Wireless hotspot model 34
2. Deployment model of Subscriber Gateway 35
3. Connection model of hotspots: 36
PART II 38
WIRELESS LAN SECURITY 38
I/ WEP, WIRED EQUIVALENT PRIVACY 38
1. Why Wep is chosen 40
2. Wep 40 key
3. SERVER manages centralized encryption keys 42
4. How to use Wep 43
II/ FILTER 45
1. Filter SSID 45
2. MAC address filtering 46
3. Circumventing MAC Filters 47
4. Protocol Filtering 48
III/ ATTACKS ON WLAN 49
1. Passive Attack 49
2. Active Attack 50
3. Squeeze attack 52
4. Attack by attracting 53
IV/ RECOMMENDED SECURITY SOLUTIONS 55
1. WEP 56 key management
2. Wireless VPNs 56
3. Jump key technique 58
4. Temporal Key Integrity Protocol (TKIP) 58
5. AES 58 based solutions
6. Wireless Gateways 59
7. 802.1x and open authentication protocol 59
V/ PRIVACY POLICY 61
1. Secure sensitive information 61
2. Physical security 62
3. WLAN equipment inventory and security audit 63
4. Use advanced security solutions 63
5. Public Wireless Network 63
6. Controlled and limited access 63
VI/ SECURITY RECOMMENDATIONS 64
1. Wep 64
2. Cell size 64
3. User authentication 65
4. Necessary security 66
5. Use additional security tools 66
6. Tracking unauthorized hardware 66
7. Switches or Hubs 66
8. Wireless DMZ 66
9. Update firmware and software 67
APPENDIX 68
TERMS USED 68
Locating a WLAN 70
Beacons: 70
Synchronization 70
Set of parameters of FH and DS: 70
SSID Information: 70
Endorsements and Links: 70
Open System Certification Process 71
Shared Key Authentication 72
Basic WLAN Devices 73
Access Point 73
Fixed and detachable antennas 75
75 Output Power Converter
Wireless Bridge 75
Wireless Bridge Group 77
WLAN Client Devices 78
PCMCIA & Compact Flash Cards 78
Wireless Ethernet & serial converter 78
USB Adapter 78
PCI & ISA Adapters 79
Wireless Residential Gateways 79
Enterprise Wireless Gateway 80
Basic Network Topologies in WLAN 81
Independent Basic Service Set (IBSS) 81
Basic Service Set (BSS) 81
Extended Service Set (ESS) 81
802.11 Frame Format [34 - 2344 bytes] 82
802.11 Frame Control Field [16 bits] 82
Reference book list 83
List of drawings
Figure 1: Role and position of Orchid 9
Figure 2: Network structure 10
Figure 3: Network scalability 12
Figure 4: Network access without wiring 12
Figure 5: Convenience in building networks in mountainous areas 13
Figure 6: At the place with basin terrain 13
Figure 7: Accessibility on the go 13
Figure 8: Access from home 14
Figure 9: Access from universities 14
Figure 10: Location of WLAN on the 7-layer model 15
Figure 11: Relationship between speed and coverage radius 17
Figure 12: Speed and AP 17
Figure 13: A transmission process from A to B: 19
Figure 14: Hidden terminal 19
Figure 15: Terminal shows 20
Figure 16: Solving the hidden terminal problem 20
Figure 17: Solving the hidden terminal problem 21
Figure 18: Phase states of PSK 22
Figure 19: Modulated signal types 23
Figure 20: BPSK 23 modulation diagram
Figure 21: BPSK modulated signal 24
Figure 22: QPSK 24 modulator
Figure 23: Narrowband signal 27
Figure 24: Frequency hopping 28
Figure 25: Channels in FHSS 28
Figure 26: Spectrum spreading and compression process in DSSS 30
Figure 27: Arrangement of the number of channels in a 31 area
Figure 28: Frequency reuse capability of DSSS method 32
Figure 29: Transmission scheme 34
Figure 30: Gateway 36 Deployment Model
Figure 31: Hotspot connection model 36
Figure 32: Diagram of the encryption process using WEP 39
Figure 33: WEP decryption process diagram 39
Figure 34: Wep 41 key entry interface
Figure 35: WEP 42 multi-key support
Figure 36: Centralized encryption key management configuration 43
Figure 37: MAC address filtering 46
Figure 38: Protocol filtering 48
Figure 39: Passive attack 49
Figure 40: WEP 50 key retrieval process
Figure 41: Active attack. 51
Figure 42: Squeezing attack 52
Figure 43: Man-in-the-middle attacks 54
Figure 44: Before the attack 55
Figure 45: And after the attack 55
Figure 46: Wireless VPN 57
Figure 47: 802.1x-EAP authentication process 60
Figure 48: Wireless DeMilitarized Zone 67
INTRODUCTION
Wireless technology is a method of transmitting information from one point to another without using physical transmission lines, but using radio, Cell, infrared and satellite. Today's wireless networks originate from many stages of development. of radio communications, and applications of telegraphy and radio. Although some inventions appeared in the 1800s, the outstanding development was achieved in the era of electronics technology, and was greatly influenced by modern economics, as well as discoveries in the field of physics. Up to now, wireless networks have achieved significant developments. In some countries with developed information technology, wireless networks have really come into life. With just a laptop, PDA or any wireless network access device, you can access the network anywhere, at work, at home, on the street, in a cafe, on a plane, etc., anywhere within the coverage of WLAN. However, the support for public access, the variety of access means, simple, as well as complex, with many sizes, has brought headaches to administrators in the issue of security. How to integrate security measures into access means, while still ensuring conveniences such as compactness, cost, or still ensuring support for public access, etc.
In this little document we will have an overview of WLAN, its history, implementation standards, some technical features, inherent security methods and recommended solutions.
To complete this document, I would like to thank:
Mr. Nguyen Trung Dung , lecturer of Electronics and Telecommunications Department, Hanoi University of Science and Technology
Mr. Nguyen Dang Hung , Deputy Head of System Integration and Development Department, VDC Company
Mr. Le Minh Duc , Technical Manager, Saigonctt Center
has guided and helped me complete this document.
I would also like to thank my family and friends for their support and encouragement during the writing of this document.
This document is divided into two parts.
Part I: Introduction to WLAN Part II: WLAN Security
Part I presents an overview of Wlan, the technology used, standards, technical characteristics, and application capabilities in the Vietnamese market. This part also discusses multiple access, CSMA/CA, modulation techniques, multiple access techniques, FDMA, TDMA, and CDMA. This part also discusses spread spectrum, direct spread spectrum, and frequency hopping spread spectrum, and briefly introduces security methods.
Part II goes into detail about each security method, the methods that have been recognized as standard as well as the methods that are still under consideration. The risks of network security loss and the measures to overcome them. At the end of the part, some recommendations are given to the implementer, to overcome the inherent disadvantages of the security methods.
During the process, due to limited time and qualifications, and this is a fairly new technology in Vietnam, there are few opportunities to come into contact with actual equipment, so some errors are inevitable.
So we hope you will refer and contribute your comments to gradually complete this document.
For any comments or contributions, please contact: Nguyen Huy Bac, 0953.334337 or via email: bacnh@dts.com.vn.
Thank you very much!
Huy Bac, May 2004





