Wireless Networking. Wi-Fi or 802.11 Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

WIRELESS NETWORKS - A.HARIKA Y5CSO28. INTRODUCTION It refer to a telecommunication networks whose interconnections between nodes is implemented without.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Wireless Networking TGIF, April 18th, 2003 Alvin Chew Kent Reuber
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Securing a Wireless Network
SOHO Wireless Networking SCATA Nov 2005 Dr Duncan Hancox.
Module 6.6 Networking. Internet Connectivity By default, new computers typically come with the network cards installed, the proper drivers installed,
Wireless Networking 102.
WIRELESS NETWORKING. What are the advantages to wireless networking? How has society changed?
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
A History of WEP The Ups and Downs of Wireless Security.
Thornbury U3A Computer Group Wireless Networking (Part 1) September 2006 Mike Farquhar.
Wi-Fi Technology By Marc Bailey. What is Wi-Fi? Wi-Fi or Wireless Fidelity is a wireless technolgy owned by the Wi-Fi Alliance (formed in 1999) Goal:
Wireless Networks Tamus, Zoltán Ádám
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
EDT 661 Kelly Maurer. (((DS))) (((WIRELESS PRINTER))) ((( NETBOOK ))) DESKTOP ROUTER MODEM INTERNET /DLS (FROM WALL)
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Wi-Fi Standards Lucy Nguyen Corey Trouard Zack Wepasnick.
Presented by: Dr. Munam Ali Shah
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
CS101 Lecture 9 Network Basics. Computers love bytes and a factor of ____ Up to now we have been using bytes as our main unit of measurement with a factor.
Setting Wireless Network At Home By: Parveen Sharma.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Securing A Wireless Home Network. Simple home wired LAN.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Securing your Personal Wireless Networks By: Bryan Oxendale.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Access Point Extender/bridge Radio card SSID - Service Set Identifier “An identifier attached to packets sent over the wireless LAN that functions as a.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
ICT Unit 4: Network and the effects of using them
Module Overview Overview of Wireless Networks Configure a Wireless Network.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
CS101 Home Network Basics.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Securing A Wireless Network
Wireless Network Security
Wireless Networking Chapter 23.
Technology, Issues, and Solutions by David Clark
CS101 Home Network Basics.
CS101 Home Network Basics.
CS101 Home Network Basics.
Presentation transcript:

Wireless Networking

Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot is a place where wireless networking is available Hot spots need access points to propagate signals.

Access Points Each access point has a service set identifier (SSID) which is its name to distinguish it from other access points. All access points come with a default SSID. If you install a home network you should change its SSID to something more cryptic. Access points also have channels (1 to 11) which allows multiple access points to operate in the same area for different networks. The default channel is typically 6. Changing the channel on your home access point may improve your network’s performance since it will be less likely to interfere with your neighbor’s network.

Wireless Security Wireless networks need more security than wired networks because anyone with a computer with wireless service can connect to your network if they are within range. There are three types of wireless security: o Broadcast o MAC Filtering o Encryption

Broadcast If your access point has broadcast turned on then it will continuously broadcast its identity and availability. For example, if your access point has an SSID of NetFred, then it will broadcast its identity. “Hi! I’m NetFred, would you like to join my network?” This will allow your computer to detect that there is a hot spot and try to join it. If broadcast is turned off then your computer can still connect to it if it knows its name. “I’m looking for NetFred. Are you around?” So turning broadcast off on your home network will make it more difficult for a passerby to find it and use it.

MAC Filtering Each network interface card has a MAC address. This address is a hardware address associated with a particular network controller. All controllers have unique addresses. The address is a six byte hexadecimal number. So if you turned mac filtering on in your access point and specified the MAC address of each of your wireless computers then no other computer could join your home network (unless they could spoof the MAC address of one of your computers.)

Encryption Encryption is the process of coding your messages so that they cannot be understood. WEP, wired equivalency privacy, uses an encryption key, which some vendors (I’m looking at you Apple) misname as a password. WEP is not very secure from a dedicated attack WPA, wi-fi protected access, is a better method of protection which uses a username and password to allow one to log on to a network. There are several modes of WPA currently available. The curious can look them up.

Wireless Signal Strength Like your cell phone. Your computer will change access points (If one is available) when the signal on the current connection becomes sufficiently weak. It will not always use the strongest signal but only change when its current signal degrades to a significant degree.