C ISCO ’ S W IRELESS T ECHNOLOGIES :. Introduction to Wireless Technology Wireless LANs (WLANs) use radio frequencies (RFs) that are radiated into air.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Advertisements

Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Chapter - 11 CWNA Certified Wireless Network Administrator Introduction to Wireless LANs.
CS 350 Chapter-12 Wireless Technologies. Wireless Agencies & Standards AgencyPurposeWeb Site Institute of Electrical and Electronics Engineers (IEEE)
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Exploring Wireless Networking.
Wireless Networks and Spread Spectrum Technologies.
Wireless Fundamentals Chapter 6 Introducing Wireless Regulation Bodies, Standards, and Certifications.
Wireless networking technology By Abbas Izadpanah January 2007.
Click to edit Master subtitle style Chapter 12: Wireless Networkimg Instructor:
Wireless Local Area Networks By Edmund Gean August 2, 2000.
Wireless Networking IEEE Standards Module-03B Jerry Bernardini Community College of Rhode Island 6/27/2015Wireless Networking J. Bernardini1.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
Wi-Fi By: Michael Gutierrez. Table of Contents I. Introduction I. Introduction II. Governing Standards Body II. Governing Standards Body III. History.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
WLAN b a Johan Montelius
F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 01. Introduction to Wireless LANs.
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Wireless Local Area Technology.  Garikayi Brasington Madzudzo  Edmund Nartey  Ismeil Ahamed  Jakub Gieryn  Arnaud Fogno.
CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Chapter 11: Wireless LANs Business Data Communications, 6e.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless technologies LAN Switching and Wireless – Chapter 7 and Fundamentals.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
 Midterm 30%  Final 40%  LAB 15%  Assignment 15%  Text Book – Designing and Deploying n Wireless Networks  Jim Geier (ciscopress)
Explaining Wireless LAN Technology & Standards
Chapter 8 Connecting Wirelessly
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Sybex CCNA Chapter 12: Wireless Networks.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
1 Wi-Fi Jason Orgill John Bodily Scott Rowberry. 2 Background Purpose Develop MAC and PHY layer for wireless connectivity of fixed, portable and moving.
OV Copyright © 2015 Logical Operations, Inc. All rights reserved. Unbounded Network Media  Wireless Networking  Wireless Network Devices and Components.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
IEEE Standards. First published in June Defines technologies at the Physical layer and the MAC sublayer of the Data-Link layer. The standard.
Chapter 6-Wireless Networks and Spread Spectrum Technology Frequency bands, channels and technologies.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
Presented by Hampton Smith  An IEEE (Institute for Electrical and Electronics Engineers) protocol ratified in 1997 which defines a standard.
Explaining WLAN Technology and Standards
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
CS 590/490 Wireless Networks IEEE a, b and g Specifications (Part 1) There are other IEEE x standards The above IEEE x standards are.
Sybex CCNA Chapter 12: Wireless Networks Instructor & Todd Lammle.
A presentation On a,b,g Wireless LAN, and Preented By Md.Masum Hossain Pranjal Sinha Md.Munis Varun Jain Anmol Jain Nsumbu Noe.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
CSCI 465 D ata Communications and Networks Lecture 23 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Sybex CCENT Wireless Technologies Instructor & Todd Lammle.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
General Overview IEEE WLAN Standard
Instructor & Todd Lammle
Wireless Networking Chapter 23.
Presentation transcript:

C ISCO ’ S W IRELESS T ECHNOLOGIES :

Introduction to Wireless Technology Wireless LANs (WLANs) use radio frequencies (RFs) that are radiated into air from an antenna that creates radio waves. These waves can be absorbed, refracted, or reflected by walls, water, and metal surfaces, resulting in low signal strength.

TABLE Wireless Agencies and Standards AgencyPurposeWeb Site Institute of Electrical and Electronics Engineers (IEEE) Creates and maintains operational standards Federal Communications Commission (FCC) Regulates the use of wireless devices in the U.S. European Telecommunications Standards Institute (ETSi) Charted to produce common standards in Europe Wi-Fi Alliance Promotes and tests for WLAN interoperability WLAN Association (WLANA)Educates and raises consumer awareness regarding WLANs

The FCC released three unlicensed bands for public use: 900MHz, 2.4GHz, and 5.7GHz. the 900MHz and 2.4GHz bands are referred to as the Industrial, Scientific, and Medical (ISM) bands, and the 5-GHz band is known as the unlicensed National Information Infrastructure (UNII) band.

If you opt to deploy wireless in a range outside of the three public bands, you need to get a specific license from the FCC FIGURE Unlicensed frequencies

Taking off from what you learned in Chapter 1, “Internetworking,” wireless networking has its own 802 standards group- remember, Ethernet’s committee is Wireless starts with , and there are various other up- and-coming standard groups as well, like and And there’s no doubt that cellular networks will become huge players in our wireless future. But for now, we’re going to concentrate on the standards committee and subcommittees The Standards

IEEE was the first, original standardized WLAN at 1 and 2Mbps. It runs in the 2.4GHz radio frequency and was ratified in 1997 even though we didn’t see many products pop up until around 1999 when b was introduced. All the committees listed in Table are amendment to the original standard except for F and T, which are both stand-alone documents.

CommitteePurpose IEEE a54Mbps, 5GHz standard IEEE bEnhancements to to support 505 and 11Mbps IEEE cBridge operation procedures; included in the IEEE 8021D standerd IEEE dInternational roaming extensions IEEE eQuality of service IEEE FInter-Access Point Protocol IEEE g54Mbps, 2.4GHz standard (backward compatible with b) IEEE hDynamic Frequency Selection (DFS) and Transmit Power Control (TPC) at 5GHz IEEE iEnhanced security IEEE jExtensions for Japan and U.S. public safety IEEE kRadio resource measurement enhancements IEEE mMaintenance of the standards; odds and ends IEEE nHigher throughput improvements using MIMO (multiple input, multiple output antennas) IEEE pWireless Access for the Vehicular Environment (WAVE) IEEE rFast roaming IEEE sExtended Service Set (ESS) Mesh Networking IEEE TWireless Performance Prediction (WPP) IEEE uInternetworking with non-802 networks (cellular, for example) IEEE vWireless network management IEEE wProtected management frames IEEE z operation in U.S. TABLE Committees and Subcommittees

2.4GHz (802.11b) It operates in the 2.4GHz unlicensed radio band that delivers a maximum data of 11Mbps. The b standard has been widely adopted by both vendors and customers b used a modulation technique called Direct Sequence Spread Spectrum (DSSS).

2.4GHz (802.11g) The g standards was ratified in June 2003 and is backward compatible with b. The g standard delivers the same 54Mbps maximum data rate a but runs in the 2.4GHz range-the same as b g and a use Orthogonal Frequency Division Multiplexing (OFDM) modulation.

5GHz (802.11a) The a standard delivers a maximum data rate of 54Mbps with 12 non-overlapping frequency channels. The a products allow the person operating at 54Mbps to shift to 48Mbps, 36Mbps, 24Mbps, 18Mbps, 12Mbps, 9Mbps,and finally still communicate farthest from the AP at 6Mbps.

802.11b802.11g802.11a(h) 2.4GHz 5GHz Most commonHigher throughput Up to 11MbpsUp to 54Mbps*Up to 54Mbps DSSSDSSS/OFDMOFDM 3 non-overlapping channels Up to 23 non- overlapping channels **About 25 users per cell About 20 users per cellAbout 15 users per cell Distance limited by multipath Throughput degraded by b clients Lower market penetrations *Runs Direct Sequence Spread Spectrum when also running the802.11b at speeds of 11Mbps and below. ** This happens to be Cisco’s rule of thumb. Know that the actual number of users per cell varies based on many factors. Comparing

Wireless Security Open Access All Wi-Fi Certified wireless LAN products are shipped in “open-access mode, with their security features turned off. Security needs to be enabled on wireless devices during their installation in enterprise environments.

SSIDs, WEP, and MAC Address Authentication Basic security was include the use of Service Set Identifiers(SSIDs), open or shared-key authentication, static Wired Equivalency Protocol (WEP), and optional Media Access Control (MAC) authentication. SSID is a common network name for the devices in a WLAN system that create the wireless LAN. An SSID prevents access by any client device that doesn’t have the SSID. The thing is, by default, an access point broadcasts its SSID in its beacon many times a second. And even if SSID broadcasting is turned off, a bad guy can discover the SSID by monitoring the network and just waiting for a client response to the access point.

Two types of authentication were specified y the IEEE committee: open authentication: Involves little more than supplying the correct SSID. Shared –key authentication: The access point sends the client device challenge-text packet that the client must encrypt with the correct Wired Equivalency Protocol (WEP) key return to the access point. With out correct key, authentication will fail and the client won’t be allowed to associate with the access point. Client MAC addresses can be statically typed into each access point, and any of them that show up without that MAC addresses in the filter table would be denied access.

WPA or WPA 2 Pre- Shared Key WPA or WPA 2 Pre- Shared Key (PSK) is a better from of wireless security than any other basic wireless security method. The PSK verifies users via a password or identifying code ( also called a passphrase) on the client machine and the access point. A client only access to the network if its password matches to access point’s password. The PSK also provides keying material TKIP or AES uses to generate an encryption key for each packet of transmitted data.