Wireless Networks2 Wired Network ------------ Application ------------ Transport ------------ Internet ------------ Link ------------ Physical ------------

Slides:



Advertisements
Similar presentations
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Advertisements

Presented by Serge Kpan LTEC Network Systems Administration 1.
Overview r Ethernet r Hubs, bridges, and switches r Wireless links and LANs.
IEEE Overview and Meshed Networking ELEC6076 Computer Networks Alan Ford
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
Service Providers & Data Link & Physical layers Week 4 Lecture 1.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
IEEE Wireless LAN Standard
Network and Internet Security
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Basic Networking Components
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Network Components 101 Travis Hill.
ECE 4450:427/527 - Computer Networks Spring 2015
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Chapter 1 Overview Review Overview of demonstration network
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Module 2: Information Technology Infrastructure
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Presented by: Dr. Munam Ali Shah
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Chapter 3.  Upon completion of this chapter, you should be able to:  Select and install network cards to meet network connection requirements  Connect.
WLAN.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Networking Components
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Wireless Networking Devices. wireless LAN adapter cards wireless access Points wireless bridges wireless routers.
Chapter 3.  Help you understand what hardware is required to allow networks to work including: ◦ Repeaters ◦ Hub ◦ Switch ◦ Bridge ◦ Gateway (not needed.
IEEE Wireless LAN Standard
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
ICT Unit 4: Network and the effects of using them
Module 1: Understanding Local Area Networks
Instructor Materials Chapter 6 Building a Home Network
Semester 2 1 JEOPARDY CHAPTER 1 REVIEW S2C01 Jeopardy Review.
CSE 4905 Network Security Overview
Wireless Networking Chapter 23.
CS 457 – Lecture 7 Wireless Networks
Topic 5: Communication and the Internet
Presentation transcript:

Wireless Networks2 Wired Network

Application Transport Internet Link Physical Wireless Networks3

 IEEE – Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)  "WiFi" refers to an wireless network  Specifies the physical and media access control Link layers  Radio vice wires  Different medium access control scheme  Everything else is the same  Host still has an IP address  Uses TCP or UDP  Uses application-layer protocols  HTTP to browse the web  DNS to resolve hostnames  Etc. Wireless Networks4

Wired Wireless same- Application -same same- Transport -same same- Internet -same e.g. Ethernet → Link ← e.g e.g. cables → Physical ← e.g. radios Wireless Networks5

 Several iterations of the standard  Most differ by frequency and data rate Wireless Networks6 StandardData Rate (Mbps) Frequency (GHz) , a6, 9, 12, 18, 24, 36, 48, 545, b5.5, g6, 9, 12, 18, 24, 36, 48, n 7.2, 14.4, 15, 21.7, 28.9, 30, 43.3, 45, 57.8, 60, 65, 72.2, 90, 120, 135, , 5

 Station : Anything with a radio that can play  Note that radios have MAC addresses just like ethernet cards  Base station : The base station acts like a hub in a wireless network. The other stations send any network traffic to it, which it then broadcasts out for all stations to receive.  WAP - Wireless Access Point - is more or less a synonym.  We will refer to the other stations on the network as host stations.  BSS : A base station and the hosts stations that are communicating with/through it is called a BSS (Basic Service Set).  BSSID: The BSS can be uniquely identified by the MAC address of the base station Wireless Networks7

8 A base station with a collection of host stations is very similar to a single wired network with hosts and a hub/switch. Hosts must have IP Address and Subnet masks set. In order to communicate with another host on the network, a host has to label each packet with the MAC address of the recipient host. Without a Gateway Router there is no communication with other networks Since we have radios not wires, this is a hub-like situation: every stations hears everything broadcast by the base station

 Stations joined into local area networks (LANs)  Basic Service Set (BSS)  Group of wireless stations that can communicate with each other  Basic building block of LANs  Two types of BSSs  Independent BSS (IBSS) – Ad Hoc  Infrastructure BSS  Each BSS identified by a basic service set identifier (BSSID) Wireless Networks9

 Most basic LAN  Two or more stations communicating directly with one another  No Base Station  BSSID is randomly generated (not the MAC of a base station …which we don’t have in this case)  Often formed without pre-planning  Commonly referred to as an “ad-hoc” network  All stations must be within range of each other  Typically only used for peer-to-peer file sharing/communications Wireless Networks10

Wireless Networks11

 All stations communicate via an access point (AP)  Access point referred to as a wireless access point (WAP)  Hosts do not communicate directly  BSSID is the MAC address of the AP  AP relays transmitted frames between stations  Stations do not need to be within range of each other  Only within range of the AP  Often bridged to a wired network  Connect multiple infrastructure BSSs  Provide access to the wired LAN  Internet access Wireless Networks12

Wireless Networks13

 Collection of BSSs connected via a distribution system  Distribution system is usually a wired network  Identified by the extended service set identifier (ESSID)  The network “name”  1-32 byte alphanumeric sequence  Sometimes abbreviated to service set identifier (SSID) Wireless Networks14

Wireless Networks15

 Device that performs the job of a router and wireless access point  Functions are physically co-located  Inside the same casing  Logical separation  Wireless access point performs link-layer and physical-layer functions  Local area network connectivity  Router performs Internet-layer functions  Routing between networks Wireless Networks16

Wireless Networks17 =

 What if there are multiple base stations within range of my radio... which network am I on?  There is no analogous problem in a wired network since the hub/switch you're plugged into is unambiguous. Wireless Networks18

 The solution is to give each wireless network a name, called it's ESSID, so that a host can identify by name which wireless network it wants to join when multiple base stations are within range.  You may have seen a dialogue box pop up to ask you which wireless network you want to join. If so, what you got to choose from was a list of ESSIDs. Wireless Networks19

 What if a base station's (or host's) signal strength is insufficient to allow all the host stations I want on the network to communicate with the base station?  In the wired world I could just grab a longer cable, but the maximum range of a base or host's radio is pretty much set. Wireless Networks20

 To solve this, allows multiple base stations to act as a single network.  So although there are different base stations, they share a common ESSID and all host stations connected to any one of these base stations is on the same network.  Conceptually, this works as if we had one super base station, even if that isn't literally true, so we will continue as if there is always one base station for a network. Wireless Networks21

 One can't effectively control who transmits and receives on wireless network's frequency, so anyone within range can listen in on traffic or broadcast traffic.  Contrary to a wired network, where a hacker would need to be physically located at the corporate premises to gain access through a network drop, —with a wireless network, the intruder can access the network from a location outside the building.  With wireless, anyone near enough to a base station can send and receive, therefore, we need to: a) control who can join our network b) provide privacy from people who have not joined our network but are none-the-less snooping (i.e. listening to the radio traffic). Wireless Networks22

 Wireless networks akin to shouting a message across a room  Anyone within audible range can hear your message  Anyone with an antenna (and the right hardware and knowledge) can intercept wireless traffic  Privacy is a concern  Solution: encryption  Several encryption schemes available  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Wi-Fi Protected Access 2 (WPA2) Wireless Networks23

 WEP (Wired Equivalent Privacy)  Oldest encryption scheme  Uses a 40-bit key  Weak (by today’s standards)  Can be cracked in less than 60 seconds  Should NOT be your first choice for encryption  WPA (Wi-Fi Protected Access),  Same encryption algorithm as WEP  Uses a stronger 128-bit key  WPA2  Strongest encryption currently available  Newer (stronger) encryption algorithm  Use a 256-bit key  Note that this encryption goes on in the Link Layer, so that all the layers above are unaware that anything was ever encrypted Wireless Networks24

 Infrared  Satellite (COMSAT and MILSAT)  Bluetooth  IEEE  WiMAX  IEEE  Wireless Regional Area Network (WRAN)  IEEE  Navy-specific applications  Bridge-to-Bridge  Voice comms  Link 11/16/22  Tactical data links  HF radio  Voice and data comms Wireless Networks25

 The base station needs to be connected to a router — which will become the gateway router for the host stations on the network.  When sending data to a host outside of the network, data is: 1. sent via radio to the base station 2. from there by wire to the gateway router 3. from there things work just as before: the gateway router uses the IP address on the packet it receives to send the packet in the direction of the recipient.  When data is sent from outside to a host station, 1. the gateway router for that host-station's network receives the packet 2. Since the gateway is on the same network (connecting to the base station by a wire rather than wirelessly, but still on the same network), it associates the recipient host station's IP address with the host-station's MAC address via its ARP table. 3. Then, the data is sent to the host-station, addressed by its MAC address, via the base station. Notice that the base station acts as a regular wired switch to the gateway router in this example. Wireless Networks26

 There are a number of base stations spread throughout the 2nd deck of Michelson that all belong to ESSID usna-wap.  The network uses WPA2, which requires a 256-bit key; here's what's actually going on: 1. The initial communication with the base station is not encrypted (scrambled) at the link layer using WPA2, because you don't initially know the key. 2. However, your laptop and a server in Ward Hall communicate about your logging on (i.e. send/receive username & password) using TLS, the same protocol that sits in between the Application Layer and the Transport Layer encrypting data to provide HTTPS (i.e. secure web traffic). 3. So your PC and authentication server go through the logging in process, sending over the wireless network unencrypted packets that any snooper can see — but the contents of those packets are scrambled by TLS. So they see the IP address of the recipient from the packet, and they see the data in the packet, but they can't make sense of the data. 4. If your credentials (username & password) are OK, the server will send you back the WPA2 key to use, and the rest of your session will then be encrypted at the Link Layer level using WPA2. Wireless Networks27

Wireless Networks28 ESSID: usna-wap

Wireless Networks29

Wireless Networks30

Wireless Networks31

Wireless Networks32