Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication.

Similar presentations


Presentation on theme: "Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication."— Presentation transcript:

1 Wireless

2 Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication link Base station: Responsible for sending and receiving data (access point)

3 Standards LetterSpeedRangeFrequency No letter2 Mbps150 ft2.4 GHz A54 Mbps150 ft5 GHz B11 Mbps300 ft2.4 GHz G54 Mbps300 ft2.4 GHz N108 Mbps300 ft2.4 GHz

4 Range Limiters Cordless telephones Large electrical appliances such as refrigerators Fuse boxes, metal plumbing, metal studing and air conditioning units Sun spots

5 Not wired is… Decreasing signal strength Interference from other sources Multipath propagation (bounce)

6 Basic Service Set

7 MAC Protocol CSMA with collision avoidance: sense first, then send Collision avoidance (can’t send/receive at same time) Link-layer ACKs and retransmissions due to high bit-error rates

8

9 802.11 frames 3 address fields –Address 2 is MAC address of sending station (host or AP) –Address 1 is MAC address of destination –Address 3 is MAC address of router interface CRC value

10 We are still working on this question Answer is easy if hub is involved Switch has “learned” that H1 is in BSS1 and has to be “taught” to use BSS2

11 Wireless Security Configure a unique SSID then block transmission of it –Unique name is cute, but so what? –If you block transmission, network does not show up and no way to specify name Use MAC filtering. This one makes total sense Change administrator account name and password Why go the extra distance to use WPA2 if you have done the above?

12 Secure Communication Confidentiality: only the sender and intended receiver should be able to understand the contents of transmitted message Authentication: Both the sender and receiver shoul be able to confirm the identity of the other party Message integrity and nonrepudiation: Make sure message is not altered in transit Availability and access control: communication can occur in the first place – only lock out the “bad guys”

13 Cryptography Dates back to Julius Caesar Allow sender to disguise data so that an intruder can gain no information from the data intercepted Send ciphertext (not cleartext or plaintext) Symmetric key systems both keys are identical and are secret Public key systems use two keys. One is known (public); the other is known only by Alice or Bob

14 Symmetric Key Caesar cipher: substitute letter that is k letters removed (alphabet wraps) Monoalphabetic cipher: substitute random letter for letter (fixed chart) Polyalphabetic encryption: two or more mono’s with a random C1,C2,C2,C1 pick pattern

15 DES Data Encryption Standard Encodes plaintext in 64-bit chunks using a 64-bit key (8 bits are odd parity bits; 56 bits long) Two (first and last steps) permutation steps; 16 identical steps in the middle How well does it work? No one knows for sure. First crack was 4-months, then 22 hours

16

17 3DES Encrypt with one key; decrypt with second key; encrypts with third key Advanced Encryption Standard (AES): processes data in 128-bit blocks using keys that are 128, 192 and 256 bits long

18 A core problem Both sides have to know secret key How is this key communicated? Verified? Alternative is the idea of a public key

19 Public Key Cryptography Bob has two keys: one public and one private to him Alice gets Bob’s public key; encrypts message Bob then decrypts message using private key Does this make sense?


Download ppt "Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication."

Similar presentations


Ads by Google