© 2009 Pearson Education, Inc. Publishing as Prentice Hall Wireless LANs (WLANs)

Slides:



Advertisements
Similar presentations
Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs
Advertisements

WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Chapter - 11 CWNA Certified Wireless Network Administrator Introduction to Wireless LANs.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Exploring Wireless Networking.
Wireless Networks and Spread Spectrum Technologies.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter 5 Updated January 2009 Raymond Panko’s Business Data Networks and Telecommunications,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless LAN’s Brent Leopold Geoff Guist. History of WLAN’s Have been around for almost 40 years First WLAN came together in 1971 Project called ALOHNET.
Wireless Fidelity (Wi-Fi)
Conducted and Wireless Media (Part II) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 7, Tuesday 2/21/2007)
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless LANs I Chapter 6 Panko and Panko
WLAN b a Johan Montelius
Chapter 6 Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson Revised August 2013.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
WIRELESS NETWORKING Presenter: Nhan Nguyên Phương.
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Chapter 5 Updated January 2009 XU Zhengchuan Fudan University Wireless LANs (WLANs)
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter 5 Updated January 2009 Raymond Panko’s Business Data Networks and Telecommunications,
Chapter 5 Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only be used by adopters.
CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES.
Duplex Full-duplex transmission: both sides can transmit simultaneously –Even if only one sends, still full-duplex line –Even if neither is sending, still.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Chapter 6 Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson.
Chapter 5 Updated 04, 2009 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only be used by adopters.
Switched and Wireless LANs. 2 Shared media LANs u Limits to Shared Media LANs –FDDI, 100Base-X, 100VG-AnyLAN all shared media LANs v Only one station.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Communication Research Labs Sweden AB Introduction to Wireless communication and WLAN.
Chapter 8 Connecting Wirelessly
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Sybex CCNA Chapter 12: Wireless Networks.
Wireless LANs (WLANs) Chapter 5 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only be used by adopters.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
Wireless LANs Wireless Technologies for LANs –Radio –Infrared light (as in TV remote control) –Ideal for mobile devices –Useful when wiring would.
PRESENTATION ON WI-FI TECHNOLOGY
MASNET GroupXiuzhen ChengFeb 8, 2006 Terms and Concepts Behind Wireless Communications.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Wireless Networks. Wireless Network A wireless network transports data from one device to another without cables or wires – RF signals – Microwaves –
Wireless LANs I Chapter 6 Panko and Panko
Lesson 4—Networking BASICS1 Networking BASICS Network Architectures Unit 2 Lesson 4.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
CSCI 465 D ata Communications and Networks Lecture 23 Martin van Bommel CSCI 465 Data Communications & Networks 1.
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Wireless LANs Chapter 5 Panko’s Business Data Networks and Telecommunications, 5th edition Copyright 2005 Prentice-Hall.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
CS 457 – Lecture 7 Wireless Networks
Wireless LAN Security 4.3 Wireless LAN Security.
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
basics Richard Dunn CSE July 2, 2003.
Conducted and Wireless Media (Part II)
Presentation transcript:

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Wireless LANs (WLANs)

Wireless LANs (WLANs) Wireless LAN Technology – is the dominant WLAN technology today –Standardized by the Working Group –Popularly known as Wi-Fi

Wireless LANs (WLANs) Wireless hosts connect by radio to access points Wireless hosts connect by radio to access points

Wireless Access Points and NICs

Wireless LANs (WLANs) WLANs usually supplement wired LANs instead of replacing them. The access point connects wireless users to the firm’s main wired LAN (Ethernet) WLANs usually supplement wired LANs instead of replacing them. The access point connects wireless users to the firm’s main wired LAN (Ethernet) This gives the mobile client access to the servers on the wired LAN and the firm’s router for Internet access This gives the mobile client access to the servers on the wired LAN and the firm’s router for Internet access 1

Wireless LANs (WLANs) Transmission speed: up to 300 Mbps but usually 10 Mbps to 100 Mbps. Distances between station and access point: 30 to 100 meters. Transmission speed: up to 300 Mbps but usually 10 Mbps to 100 Mbps. Distances between station and access point: 30 to 100 meters.

5-7 Recap of Radio Propagation Concepts Frequency –Radio waves are measured in terms of frequency –Measured in hertz (Hz)—the number of complete cycles per second Most Common Frequency Range for WLANs: –High megahertz to low gigahertz range

5-8 The Frequency Spectrum, Service Bands, and Channels

5-9 Channel Bandwidth and Speed Channel Bandwidth –Channel bandwidth is the highest frequency in a channel minus the lowest frequency –An 88.0 MHz to 88.2 MHz channel has a bandwidth of 0.2 MHz (200 kHz)

5-10 Channel Bandwidth Speed Broadband and Narrowband Channels –Broadband means wide channel bandwidth and therefore high speed –Narrowband means narrow channel bandwidth and therefore low speed –Today, any speed, whether in channels or not, is called narrowband or broadband Narrowband is below 200 kbps Broadband is above 200 kbps

5-11 Licensed and Unlicensed Bands Licensed Radio Bands –If two nearby radio hosts transmit in the same channel, their signals will interfere –Most radio bands are licensed bands, in which hosts need a license to transmit –The government limits licenses to avoid interference –Television bands, AM radio bands, etc., are licensed –In cellular telephone bands, which are licensed, only the central transceivers are licensed, not the mobile phones

5-12 Licensed and Unlicensed Bands Unlicensed Radio Bands –Some service bands are set aside as unlicensed bands –Hosts do not need to be licensed to be turned on or moved – operates in unlicensed radio bands –This allows access points and hosts to be moved freely

in the 2.4 GHz and 5 GHz Unlicensed Bands The 2.4 GHz Unlicensed Band –Defined the same in almost all countries (2.400 GHz to GHz) –This sameness reduces radio costs –Propagation characteristics are good –For 20 MHz channels, only three nonoverlapping channels are possible Channels 1, 6, and 11

5-14 Mutual Interference in the 2.4 GHz Unlicensed Band If two nearby access points operate on the same channel, the access points and their stations will interfere with each other

in the 2.4 GHz and 5 GHz Unlicensed Bands The 5 GHz Unlicensed Band –Radios in the 5 GHz band are expensive because frequencies in different countries are different and because higher-frequency technology is more expensive than lower-frequency technology –Also, smaller market sales mean more expensive devices –Shorter propagation distance than in the 2.4 GHz band because of greater absorptive attenuation at higher frequencies –Deader shadow zones because of higher frequencies

in the 2.4 GHz and 5 GHz Unlicensed Bands The 5 GHz Unlicensed Band –More bandwidth than in the 2.4 GHz band, so between 11 and 24 non-overlapping channels –Allows many nearby access points to operate on non- overlapping channels –Or, some access points can operate on two channels They serve some clients with one channel, some with the other This allows them to serve more clients with good throughput

5-17 Spread Spectrum Transmission Methods Early spread spectrum products used one of two slow methods. In frequency hopping spread spectrum, the signal was kept narrow, but it hopped around in frequency every two or three frames. In direct sequence spread spectrum, the signal is spread over The entire spread spectrum band. Both have technical limits and all newer standards use a different type of spread spectrum transmission.

5-18 Spread Spectrum Transmission Methods Newer standards use OFDM: Orthogonal Frequency Division Multiplexing. OFDM divides the entire channel into smaller subcarriers (subchannels). It sends part of the signal in each subcarrier. Information is sent redundantly among the subcarriers, so the whole message will get through even if some subcarriers are bad Using smaller channels gives more precise signal spreading than spreading the signal over the entire channel. This in turn allows much faster transmission speeds.

5-19 Typical Wireless LAN Operation with Wireless Access Points and have different frames 1. The access point receives an frame carrying the packet 2. The access point removes the packet, places the packet into an frame and passes the frame on to the Ethernet switch 3. The Ethernet switch sends the frame to the server.

5-20 Hosts and Access Points Transmit in a Single Channel The access point and all the hosts it serves transmit in a single channel If two devices transmit at the same time, their signals will collide, becoming unreadable Media access control (MAC) methods govern when a device may transmit; It only lets one device transmit at a time

5-21 CSMA/CA+ACK in Wireless LANs CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) –Sender listens for traffic 1. If there is traffic, the sender waits 2. If there is no traffic: –2a. If there has been no traffic for less than a present amount of time, waits a random amount of time, then returns to Step 1. –2b, If there has been no traffic for more than a preset amount of time, sends without waiting –This avoids collision that would result if hosts could transmit as soon as one host finishes transmitting Box

5-22 CSMA/CA+ACK in Wireless LANs ACK (Acknowledgement) –Receiver immediately sends back an acknowledgement If sender does not receive the acknowledgement, retransmits using CSMA –CSMA/CA plus ACK is a reliable protocol CSMA/CA+ACK must be reliable because radio transmission is unreliable Box

5-23 Request to Send/Clear to Send

5-24 Specific Wireless LAN Standards Characteristic a802.11b802.11g802.11n802.11ac Spread Spectrum Method, etc. FHSSOFDMDSSSOFDMOFDM + MIMO Unlicensed Band 2.4 GHz 5 GHz 2.4 GHz 2.4 GHz and 5 GHz 5 GHz only RemarksDead and gone Little market accep- tance Bloomed briefly Now obsolete Today’s dominant standard Growing rapidly

5-25 Specific Wireless LAN Standards Characteristic a802.11b802.11g802.11n802.11ac Rated Speed2 Mbps 54 Mbps 11 Mbps 54 Mbps 100 to 600 Mbps 433 Mbps to 6.93 Gbps Actual Throughput, 3 m 1 Mbps 25 Mbps 6 Mbps25 Mbps Mbps Closer to rated speed than earlier standards Actual Throughput, 30 m ?12 Mbps 6 Mbps20 Mbps 50 Mbps Mbps

5-26 Specific Wireless LAN Standards g –Obsolete today –54 Mbps rated speed with much slower throughput –Generally sufficient for Web browsing –Inexpensive –All access points support it

5-27 Specific Wireless LAN Standards n –Uses MIMO to give higher throughputs and longer transmission distances –Also uses 40 MHz channels instead of normal 20 MHz channels to further increase throughput –100 Mbps throughputs are common –Today, the dominant standard –802.11ac growing, the wave of the future.

5-28 Mesh Wireless Network In mesh wireless networks, the access points do all routing There is no need for a wired network The s standard for mesh networking is under development In mesh wireless networks, the access points do all routing There is no need for a wired network The s standard for mesh networking is under development

5-29 Smart Antenna

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Security

5-31 WLAN Security Threats Drive-By Hackers –Sit outside the corporate premises and read network traffic –Can send malicious traffic into the network –Easily done with readily available downloadable software War Drivers –Merely discover unprotected access points—become drive-by hackers only if they break in

Core Security Standards Provide Security between the Wireless Station and the Wireless Access Point –Client (and perhaps access point) authentication –Passes key to client –Subsequent encryption of messages for confidentiality Authentication Protected Communication

Core Security Standards Protection Does Not Extend Beyond Access Point –Only protects the wireless client—access point connection Protected Communication No Protection

Core Security Standards Wired Equivalent Privacy (WEP) –Initial rudimentary core security provided with in 1997 –Everyone shared the same secret encryption key, and this key could not be changed automatically –Because secret key was shared, it does not seem to be secret Users often give out freely –Key initially could be cracked in 1–2 hours; now can be cracked in 3–10 minutes using readily available software

Core Security Standards Wireless Protected Access (WPA) –The Wi-Fi Alliance Normally certifies interoperability of equipment –Certified products get to use the Wi-Fi logo Created WPA as a stop-gap core security standard in 2002 until i was finished

Core Security Standards i (WPA2) –Uses AES-CCMP with 128-bit keys for confidentiality and key management –Gold standard in core security –But companies have large installed bases of WPA- configured equipment –Now that WPA has been partially cracked, companies should upgrade to i

Security in 802.1X and PSK Modes 802.1X Mode –Uses a central authentication server for consistency –Wi-Fi Alliance calls this enterprise mode –Both WPA and i use 802.1X mode 5-37

Security in 802.1X and PSK Modes 802.1X Mode –However, with wireless transmission, protection is needed between the wireless supplicant and the access point because radio transmissions are easy to tap 5-38

5-39 WLAN Security Threats Rogue Access Points –Unauthorized access points that are set up by a department or an individual –They often fail to implement core security –This gives drive-by hackers free access to the internal network, bypassing both the border firewall and access point security –Often operate at high power, attracting many hosts to their low-security service

5-40 Evil Twin Access Point An attacker makes his or her computer act as an access point. It operates at very high power. Victim wireless clients within the victim building associate with the evil twin access point instead of with a legitimate access point within the building. An attacker makes his or her computer act as an access point. It operates at very high power. Victim wireless clients within the victim building associate with the evil twin access point instead of with a legitimate access point within the building.

5-41 Evil Twin Access Point 1. The victim sends its authentication credentials to the evil twin. 2. The evil twin passes the credentials on to the legitimate access point. 3. The legitimate access point sends back a secret key. 4. The evil twin remembers the key, then sends it to the client.

5-42 Added Wireless Protection: VPNs and VLANs Virtual Private Networks (VPNs) –VPN protection defeats evil twins because the two devices preshared a key that is never transmitted EAP Protected Communication VPN Protection Preshared VPN Key Preshared VPN Key Frustrated Evil Twin

5-43 Added Wireless Protection: VPNs and VLANs Virtual LANs (VLANs) –With VLANs, clients can only talk to some servers –Wireless clients who first come can be assigned to a VLAN in which they can only connect to a single server- an authentication server –When the client authenticates itself to the authentication server, they are taken off the restrictive VLAN Pre- Authentication VLAN Rest of the network Authentication Server