IEEE 802.

Slides:



Advertisements
Similar presentations
1CSNW1 Week 4 Computer Netwerken
Advertisements

Ethernet Risanuri Hidayat. Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE standard. Three.
Chapter 9 Local Area Network Technology
IEEE 802 & Overview February 2012
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
Computer Networks & Security
Review on Networking Technologies Linda Wu (CMPT )
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
MESH Implementation With AP5131 version R.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Introducing Network Standards Open Systems Interconnection (OSI) Model IEEE 802.x Standard Device Drivers and OSI 1.
10-01-K.Steenhaut & J.Tiberghien - VUB 1 Telecommunications Concepts Chapter 3.1 Packet Switched Local Area Networks.
Network Security1 – Chapter 5 (B) – Using IEEE 802.1x Purpose: (a) port authentication (b) access control An IEEE standard
Technology Guide 4 Telecommunication & Internet. Agenda Telecommunication terminology Communication media Network architecture concepts Enterprise networking.
Fiber Distributed Data Interface
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
IEEE & Priyanka Vanjani CST 554: Short Presentation ASU Id #
ITED 328 Lecture 4 12 Feb 2004 Loosely covering Chapter 5 Internet and LAN Technology.
Network Basics. Outline Objective Types of Networks LAN Topologies LAN Networking Standards Network Devices Dial-Up Access Ethernet Wiring Summary References.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Lecture 11 Wireless security
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
IEEE &
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
Lecturer: Gareth Jones. What are the principal components of telecommunications networks and key networking technologies? What are the main telecommunications.
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
Local Area Networks: Ethernet. IEEE Background Institution of Electrical and Electronic Engineering (IEEE) A professional non-profit organization Project.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
Chapter One Some Raw Basics of Networking. Objectives Introduce some basic concepts Learn some new vocabulary Get our first glimpse of some networking.
Week Four Rouda’s Sections.  LAN - Local Area Network ◦ small area (e.g. a building) ◦ small number of machines  WAN - Wide Area Network ◦ large area.
Data Communications, Kwangwoon University13-1 Chapter 13 Wired LANs: Ethernet 1.IEEE Standards 2.Standard Ethernet 3.Changes in the Standard 4.Fast Ethernet.
Wired LAN: Ethernet.
Rehab AlFallaj.  Standards determine:  Techniques used in the networks.  Its protocols.  Network specifications and features.
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
LECTURE 10 NET301 11/12/2015Lect 10 NET NETWORK STANDARDS Standards determine: Techniques used in the networks. Its protocols. Network specifications.
ENGS 112 Lecture 3 Packet Switching Chapter 3, Walrand WWW links, eg.
Networks The Big Picture. Three Great Leaps of Civilization.
1 3/13/ :25 Chapter 5Protocol Architecture1 Rivier College CS575: Advanced LANs Chapter 5: Protocol Architecture.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Computer networks. Topologies Point to point Bus (rail) Ring Tree, star, etc.
IEEE Wireless LAN Standard
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
Introduction to Port-Based Network Access Control EAP, 802.1X, and RADIUS Anthony Critelli Introduction to Port-Based Network Access Control.
ETHERNET Yash Vaidya. Introduction Ethernet is a family of computer networking technologies for local area networks (LANs). Ethernet was commercially.
Copyright 2001 Global Wireless Education Consortium 1 1 BASIC DATA NETWORKS.
Data Link Issues Relates to Lab 2.
History and Implementation of the IEEE 802 Security Architecture
Família IEEE802.
Data Link Issues This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point.
History and Implementation of the IEEE 802 Security Architecture
Connecting Network Components
Computer networks.
Data Networking via LANs Packets and Frames
Data Link Issues This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point.
TOKEN BUS & TOKEN RING.
– Chapter 5 (B) – Using IEEE 802.1x
CT1303 LAN Rehab AlFallaj.
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
OSI Model The Seven Layers
TCP/IP Protocol Suite: Review
Presentation transcript:

IEEE 802

CONTENT IEEE802 family Working group IEEE802.1 Connecting to IEEE802.1x network

IEEE 802 Family of IEEE standards dealing with local area networks(LAN) and metropolitan area networks(MAN) Work is done in working groups More on URL: http://www.ieee802.org/ challange: Go to the website and review the contents.

IEEE 802 ARCHITECTURE Basic architecture: bottom: media access Control (MAC) top: logical link layer (LLC) Seperate access to the medium and addressing -> transfer of frames

TRANSPORT AND TOPOLOGY IEEE 802 uniform frame addressing space (local) network has to know how to correctly send frames

IEEE 802 FAMILY IEEE 802.1 Bridging (networking) and Network Management IEEE 802.2 Logical Link Control – LLC IEEE 802.3 Ethernet IEEE 802.4 Token bus IEEE 802.5 Defines the MAC layer for a Token Ring IEEE 802.6 MANs IEEE 802.7 Broadband LAN using Coaxial Cable IEEE 802.8 Fiber Optic TAG IEEE 802.9 Integrated Services LAN IEEE 802.10 Interoperable LAN Security

IEEE 802 FAMILY IEEE 802.11 Wireless LAN (WLAN) & Mesh (Wi-Fi certification) IEEE 802.12 demand priority IEEE 802.13 Used for 100BASE-X Ethernet IEEE 802.14 Cable modems IEEE 802.15 Wireless PAN (Bluetooth, ...) IEEE 802.16 Broadband Wireless Access (WiMAX certification) IEEE 802.17 Resilient packet ring IEEE 802.18 Radio Regulatory TAG IEEE 802.19 Coexistence TAG IEEE 802.20 Mobile Broadband Wireless Access IEEE 802.21 Media Independent Handoff IEEE 802.22 Wireless Regional Area Network IEEE 802.23 Emergency Services Working Group (march 2010)

IEEE 802.1 – BRIDGING AND network MANAGEMENT Bridging (networking) and Network Management Connecting between sub-networks Network management (for example: smallest spanning tree) Network security Working on top of LLC More on URL: http://www.ieee802.org/1/ challange: Go to the website and review the contents.

IEEE 802.1 working group 802.1b: LAN/MAN management (removed) 802.1d: bridges on MAC layer 802.1e – 802.1g: removed 802.1h: Ethernet MAC bridges 802.1q: virtual LAN (VLAN) 802.1x: network access control (Port Based Network Access Control)

IEEE 802.1 Working group 802.1ab: stations, access control of the medium and conectivity searching 802.1ae: security on MAC layer 802.1ar: safe unit identification 802.1as: time synchronization and time-sensitive aplications in networks with bridges 802.1ax: link aggregation 802.1ba: avdio/video systems with bridges

Network conNection management (IEEE 802.1x) Network access is a service, that enables usage of other services Web access, ... more on URL http://www.ieee802.org/1/pages/802.1x-2004.html challange: Go to the website and review the contents.

Network conNection management (IEEE 802.1x) Network access is a service, that enables usage of other services Web access, ... Usage of a service can be free or controled For controled usage of service we need to: Find out, who is a potential user; and if he has premission for usage of service. authentication and authorisation (logging also somewhere) task: somehow insert AAA into establishment ofconecting to network

authentication server IEEE 802.1x arhitektura There are three building blocks: supplicant authenticator authentication server supplicant signs in to authenticator, that checks his identity on authentication server and if he is authorised for access to the network task: embend EAP on data link layer challange: How(!) authenticator really enables access to network for supplicant? EAP RADIUS authentication server supplicant authenticator

IEEE 802.1x EAPOL standard IEEE 802.1x defines EAP on data link layer – EAP over LAN -> EAPOL Later EAPOL was also used in other work groups IEEE 802.1x: 802.1ae: security on MAC layer 802.1ar: safe identification of units EAPOL is defined so that his content is sent directly in Ethernet frames with contents badge 0x888E: Preamble (7-bytes) Start Frame Delimiter (1-byte) Dest. MAC Address (6-bytes) Source MAC Address (6-bytes) Length / Type (2-bytes) MAC Client Data (0-n bytes) Pad(0-p bytes) Frame Check Sequence (4-bytes)

EAP – FOR REFreshment Defined in RFC 3748 Support for different authentication protocols stepping protocol

IEEE 802.1x – HOW DOES IT operate inicialization: when avtenticator (usualy also switch, WLAN access point etc.) detects new supplicant, he enables him only IEEE 802.1x comunication From here on EAP protocol starts EAP RADIUS authentication server supplicant authenticator

IEEE 802.1x – HOW DOES IT operate (continued) invitation: authenticator (periodicaly) sends invitation to supplicant, to introduce himself Supplicant introduces himself to authenticator, which sends introduction to avtentication server (RADIUS) Avtenticator is now just an in between server for avtentication server –avtentication server is the one that actualy performs the authentication trust!! between authenticator and autentication server challange: How to program that trust? EAP RADIUS authentication server supplicant authenticator

IEEE 802.1x – HOW DOES IT operate (continued) negotiation: is performed between supplicant and authenticator in accordance with EAP protocol which authenticacion protocol, challange and response, ... EAP RADIUS authentication server supplicant authenticator

IEEE 802.1x – HOW DOES IT operate (continued) authentication: supplicant authentication alone authenticator, when server authenticates supplicant, he grantes him access to the local network EAP RADIUS authentication server supplicant authenticator

EDUROAM federations authentication servers, who trust each other user of wichever server can authenticate himself at wichever authenticator in federation Challange: Where is now asimetric criptography, that EDUROAM uses in protocol for authentication? For authentication of who do we use it? Answer in the forum for extra points.

Thank you for your attention and good luck!