© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.

Slides:



Advertisements
Similar presentations
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Advertisements

Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Fundamentals of Networking Discovery 1, Chapter 7.
7: Wireless Technologies Networking for Home & Small Business.
Wireless Communication Systems
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
WLAN What is WLAN? Physical vs. Wireless LAN
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Securing a Wireless Network
© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Wireless Networking.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES.
After completion of this chapter, you should be able to :  Describe wireless technology  Describe the various components and structure of a wireless.
Wireless Technologies
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Wireless Networking and Security
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
LANs and WLANs Chapter 5. 5 Chapter 5: LANs and WLANs 2 Chapter Contents  Section A: Network Building Blocks  Section B: Wired Networks  Section C:
Wireless Networking.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Chapter 8 Connecting Wirelessly
Sybex CCNA Chapter 12: Wireless Networks.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Computer Concepts 2014 Chapter 5 Local Area Networks.
OV Copyright © 2015 Logical Operations, Inc. All rights reserved. Unbounded Network Media  Wireless Networking  Wireless Network Devices and Components.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless Local Area Networks (WLANs)
Presented by: Dr. Munam Ali Shah
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
PRESENTATION ON WI-FI TECHNOLOGY
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
7: Wireless Technologies Networking for Home & Small Business.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
 Today’s networks are no longer limited to using cabled, or wired, devices.  Today’s networks have a mix of wired systems along with wireless systems.
Chapter 10.  Upon completion of this chapter, you should be able to:  Understand.
Chapter-7 Basic Wireless Concepts and Configuration.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
TERMINOLOGY Define: WPAN
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Networking Chapter 23.
Wireless LAN Security 4.3 Wireless LAN Security.
Presentation transcript:

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7 Spring Mr. Specter

2 CCNA 1 - Chapter 7 - Mr. Specter Objectives:  Describe wireless technologies.  Describe the various components and structure of a WLAN  Describe wireless LAN security issues and mitigation strategies  Configure an integrated wireless access point and a wireless client.

3 CCNA 1 - Chapter 7 - Mr. Specter Electromagnetic Frequencies  All use waves in the Electromagnetic spectrum to transfer information from device to device.  Electromagnetic spectrum includes bands used for radio, TV, and visible light.

4 CCNA 1 - Chapter 7 - Mr. Specter Wireless Technologies  Infrared Band (IR) –Low energy and unable to penetrate walls (line of sight) Could this be a benefit? –Used for PDAs, PCs, wireless mice, keyboards and remote controls –IrDA (Infrared Direct Access) port used for 1 to 1 connections  Radio Frequency (RF) –Goes through walls and other obstructions, better range –Different frequencies assigned to different types of unlicensed devices (900MHz, 2.4GHz, 5GHz) Cordless Phones –Problem with 900MHz? –Used for military and civilian emergency bands outside US Wireless LANs Computer Peripherals Bluetooth uses 2.4 GHz band for low-speed, short-range, many devices at once

5 CCNA 1 - Chapter 7 - Mr. Specter Wireless Technologies  Pros –Anytime, anywhere connectivity with hotspots –Easy and cheap installation –Device prices dropping –Data rate capabilities increasing –Easy expansion  Cons –Unlicensed RF which is crowded with other devices Bluetooth Microwaves Cordless phones –Security is difficult because there is no way to limit who can intercept the wireless signal Encryption helps, but can be defeated –Fluctuations in temperature and humidity can really affect transmission range.

6 CCNA 1 - Chapter 7 - Mr. Specter Wireless Network Categories  Wireless networks are difficult to categorize because boundaries cannot be precisely defined.

7 CCNA 1 - Chapter 7 - Mr. Specter Wireless Network Technologies  Technologies used for the different network types:

8 CCNA 1 - Chapter 7 - Mr. Specter WLAN Standards  Many different standards have been adopted for wireless networks –IEEE n is latest standard adopted (except for y) –Wi-Fi Alliance tests devices from various manufacturers to make sure they operate together. ProtocolRelease Date RF Freq. Through put Data Rate (Max) Max Range Notes & Comments GHz0.9 Mbps2 MbpsUndefinedLegacy a GHz23 Mbps54 Mbps50m  Not compatible with b, g, n  Expensive b GHz4.3 Mbps11 Mbps100mFirst 2.4 GHz Technology g GHz19 Mbps54 Mbps100mBackward compatible with b Shares range with b n 2009 * 2.4 & 5 GHz 74 Mbps248 Mbps250mNewest Standard y 2008 * 3.7 GHz23 Mbps54 Mbps5000mNewest Standard

9 CCNA 1 - Chapter 7 - Mr. Specter Structure of a WLAN  Wireless Components –Wireless Clients or STAs (Wireless STAtion) –APs (Access Points) –Wireless Bridges  Types of Antennas –Omni send all directions Used in APs –Directional send in one direction Used for longer links to bridge distances

10 CCNA 1 - Chapter 7 - Mr. Specter WLAN Types  The Service Set Identifier (SSID) used by components to connect to a particular WLAN. –32-byte Alphanumeric String –Used in Frame Headers  Two forms of WLAN Installations –Ad-hoc - IBSS Equal Peer-to-peer No AP –Infrastructure - BSS STAs communicate through APs BSS is an area with a single AP

11 CCNA 1 - Chapter 7 - Mr. Specter Wireless Channels  Channels are created by giving each a part of the RF spectrum –Each one can carry on a separate conversation (Think of a TV) –Can be set manually or automatically  Channels will often overlap frequencies, but conversations cannot overlap  Newer technologies combine channels into a wider one for better bandwidth

12 CCNA 1 - Chapter 7 - Mr. Specter CSMA/CA  A WLAN technology designed to make collisions impossible  Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). –Reserves a channel for use by a conversation –No other devices can transmit on that channel  CSMA/CA Reservation Process –For a Device to use a channel, it asks the AP by using a Request To Send (RTS) message. –If channel is not in use, AP will send Clear To Send (CTS) message to all devices in the BSS so they know the channel is being used. –Data is sent from STA –After conversation is done, an Acknowledgement (ACK) is transmitted.

13 CCNA 1 - Chapter 7 - Mr. Specter Wireless Access Point Configuration  Integrated wireless access point –Network Mode b, g, or a different technology –SSID Name of your wireless network –Standard Channel Default is AUTO, but this decides which channel will be used –SSID Broadcast Sends out the SSID to the world Default is ENABLE

14 CCNA 1 - Chapter 7 - Mr. Specter Wireless Client Configuration  Client software allows hardware to connect to the WLAN.  For connection to occur, the SSID, security settings, and channel must match the AP.  Wireless Utility Software usually comes with the NIC  Some features –Link Information: strength and quality of signal –Profiles: specify configuration options –Site Survey: checks for all WLANs in the area –To use the vendor software, Windows XP wireless software must be disabled.  For most purposes, XPs built-in wireless drivers can be used.

15 CCNA 1 - Chapter 7 - Mr. Specter Wireless LAN Security Issues & Mitigation Strategies  One large benefit to Wireless networks is also biggest vulnerability: transmission of information through the air.  Attacks don’t need physical access to equipment, just be in range. –War Driving or Walking to discover insecure networks  If they gain access, an attacker can: –Use your Internet for free –Hack your computers or files  Special security protocols have been developed to protect networks, but there are simple steps as well. –Disable the SSID broadcast so that your network isn’t public. –Change your default settings IP Address Router Name Admin Password

16 CCNA 1 - Chapter 7 - Mr. Specter Wireless LAN Security - MAC Address Filtering  Controls exactly which devices have access to the LAN  Uses MAC addresses to ID clients authorized to access WLAN.  Limitations: –MAC addresses for authorized clients must be input manually. –This makes adding new clients difficult –MAC Address cloning or spoofing can allow an unauthorized user to get into the WLAN.

17 CCNA 1 - Chapter 7 - Mr. Specter Wireless LAN Security - Authentication  This process requires a client to present credentials in order to use the network.  Most common is a username and password, but for a wireless network, this is handled differently.  Because the transaction is wireless and can be “heard” by anyone, the authentication is done before connecting.  Three Types of Authentication: –Open Used for Public Networks Networks where another method of authentication is used. –PSK –EAP

18 CCNA 1 - Chapter 7 - Mr. Specter Wireless LAN Security - Authentication  PSK (Pre-Shared Key) –Both client and AP are configured with a shared key –Password is encrypted by client using shared key, then sent to AP, where it is decrypted using the same key. –Doesn’t authenticate AP or User, only one way  EAP (Extensible Authentication Protocol) –Authentication is 2-way –Client communicates through AP to (usually) a RADIUS server which has list of authorized users and clients. –Both user and client must authenticate.

19 CCNA 1 - Chapter 7 - Mr. Specter Wireless LAN Security – Data Encryption  Use of Wireless Authentication –Authentication can prevent unauthorized users from accessing WLAN, but data is still transmitted to anyone with a receiver. –Encryptions methods were developed to encrypt wireless communications to prevent snooping by outsiders.  Two main encryption methods: –WEP (Wired Equivalency Protocol) Uses pre-configured 64, 128, or 256 bit keys to encrypt data before transmission. WEP keys are just a string of letters or numbers and can also be automatically generated using a passphrase. WEP is not a secure protocol and can easily be cracked by a knowledgeable wireless hacker. –WPA (Wi-FI Protected Access) Also uses a 64 to 256 encryption key. WPA doesn’t always use the same key, but generates new, dynamic keys each time a client connects. WPA is considered the current standard of encryption for wireless networks.

20 CCNA 1 - Chapter 7 - Mr. Specter Wireless LAN Security – Traffic Filtering  Allows control of traffic types sent across WLAN  Blocks undesirable traffic from entering or leaving network  Filtered using –MAC Addresses –IP Addresses –Port Numbers

21 CCNA 1 - Chapter 7 - Mr. Specter Planning the WLAN  Planning a WLAN is important so that the administrator can determine –Wireless standard –Most Efficient Layout –Installation and Security –Backups for Devices  Standard Used is Affected by: –Number of users –Size of Area Covered –Current Network –Budget  Number of users –WLAN Bandwidth is shared between all users, so number of clients and APs matters.  Size of Area Covered –Different technology has different areas of coverage: –E.g. 2.4 GHz band used in b/g/n has a great radius than the 5Ghz used in the a tech. –Larger BSS  Budget –Cost is always a factor –TCO (Total Cost of Ownership) must be considered for any installation –Size needed, existing equipment, interference of signal, etc. must all be considered during planning phase.

22 CCNA 1 - Chapter 7 - Mr. Specter WLAN Security Measures  Security should be planned and configured before installing into network or ISP  Basic measures: –Change Defaults for SSID, usernames, and PWs –Disable SSID broadcast –MAC Address Filtering  Advanced Measures –WPA or WEP Encryption –Authentication –Traffic Filtering

23 CCNA 1 - Chapter 7 - Mr. Specter Backup and Restoring AP Configurations  Configuration files for APs are stored in their non-volatile memory  Any stored memory can be corrupted, so it’s important to backup the configuration in case of problems.  Backup –Save the configuration file to a secure location  Restore –Use the restore button to upload the file to the AP  Setting to Factory Default –Menu option –Hold RESET button for up to 30 seconds.

24 CCNA 1 - Chapter 7 - Mr. Specter Updating Firmware  Firmware is a basic OS for the AP or Router stored in flash memory  Can be updated using the GUI on the AP/Router –Download from manufacturer’s website –Make sure to check version currently being used  NEVER interrupt an update while it is being uploaded, it may make the AP/Router unusable.

25 CCNA 1 - Chapter 7 - Mr. Specter Summary  Wireless technologies use electromagnetic radiation in the form of radio signals to carry information between devices.  Ease and convenience of connecting devices wirelessly creates security concerns that need to be addressed.  Before installing wireless devices, an installation plan should be created which includes strategies for layout and security.

26 CCNA 1 - Chapter 7 - Mr. Specter