Topic Coverage – Consumer Why Wireless? Advantages of Wireless How Does Wireless Work – Consumer? Various Types 802.11x – A vs. B vs. G Which is best for.

Slides:



Advertisements
Similar presentations
SEMINAR ON Wi-Fi.
Advertisements

Wi-Fi Technology.
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
How to Set Up, Secure and Manage A Network
Security in Wireless Networks Juan Camilo Quintero D
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Allied Telesyn Wireless LAN Solutions AT-WL2411 Access Point AT-WR2411 Wireless LAN PCMCIA Card.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Chapter 7 - Wireless Networks1 Chapter 7 Wireless Local Area Networks Some new material added!
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
By Alvin Tse.  FCC – Federal Communications Commission   IETF – Internet Engineering Task Force   IEEE –
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
The Opportunity of WISP’s Mark Levetzow. Topics  WISP’s and how they work  IEEE standards and radio frequency.  Equipment  Good/Bad points about WISP’s.
Securing a Wireless Network
Wireless Networking 102.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
1 Chapter Overview Wireless Technologies Wireless Security.
UNDER THE GUIDANCE OF MR. S.K. DANI (SDE) SUBMITTED BY:
Wi-Fi Technology By Marc Bailey. What is Wi-Fi? Wi-Fi or Wireless Fidelity is a wireless technolgy owned by the Wi-Fi Alliance (formed in 1999) Goal:
Wireless Networks Tamus, Zoltán Ádám
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
PRESENTATION ON WI-FI TECHNOLOGY
Network Systems 3.01 Understand the physical components of a network.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Week Four Rouda’s Sections.  LAN - Local Area Network ◦ small area (e.g. a building) ◦ small number of machines  WAN - Wide Area Network ◦ large area.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
1 Wi-Fi, Wireless Broadband, Sensor & Personal Area Networks –Standards –Applications Broadband Wireless Access –WiMAX –Adapting 3G for WBA: UMTS.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 1 This material was developed by Oregon Health & Science.
N ETWORK S YSTEMS 3.01 U NDERSTAND THE PHYSICAL COMPONENTS OF A NETWORK.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Submitted By:- Raushan Kr. Chaurasiya(68) Santu Thapa(75) Satyanarayan Prajapat(76)
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Wireless Connection. Physical Description / Types When looking at Wi-Fi you are unable to see the frequencies that come off the router. A router looks.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
Wi-Fi Brandon & Jiayang. What is Wi-Fi? Wi-Fi (wireless fidelity) is a wireless networking technology that allows devices to communicate without wires.
Wireless Security By: Bryan M Keller.
Wireless Technologies
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
How To Set Up A Wireless Network
WIMAX Presented By JAGADEESH.S 13X41A0546.
Wireless Networking Chapter 23.
Chapter 12 Communications Security & Countermeasures
Wi-Fi Technology.
Providing Teleworker Services
Presentation transcript:

Topic Coverage – Consumer Why Wireless? Advantages of Wireless How Does Wireless Work – Consumer? Various Types x – A vs. B vs. G Which is best for you? Consumer Costs Security WEP vs. WPA 4 Steps to securing your wireless network A word about antennas… A word about nationwide “Hotspots” and “War Driving”

Topic Coverage – Business Why Wireless? Advantages of Wireless Performing a Site Survey – Business Business Costs and Benefits Why lease a line when you can own the connection? Tsunami® Transmitters – Pictorial Preview Security Access to company intranet limited via VPN or other method Outsiders can still piggy-back on Internet connectivity Example: Corner of Country Club Road and George Street Bottom line on business

Why Wireless? Wireless allows the average person to easily setup a home network Wireless is cheap Go anywhere without the wires How Does Wireless Work? Wireless, also called “Wi-Fi” meaning wireless fidelity, uses radio waves Various frequencies, home consumers will use either 2.4GHz or 5GHz, signals are broadcast to surrounding area Broadcast is susceptible to degradation and attenuation as well as interference from 2.4GHz cordless phones and microwaves 3G or 3GHz is band that requires licensing, used with cell phones

Which Standard is Best for You? A, B, G (IEEE Standards) Depends on factors such as budget, distance desired, speeds, security Wi-Fi is cheap: in order B, G, A (See comparison chart) What Hardware is Needed? Router or Access Point, PC or laptop hardware (See pictorial review) Do I need a router or access point? But What About Security? WEP – “Wired Equivalent Privacy” old standard (see chart) WPA – “Wi-Fi Protected Access” newer standard, replaced WEP WPA can be broken by obtaining (via “sniffing”) 4 key network packets WPA2 to replace WPA

Simple vs. Advanced Protection Basic Protection NAT (Network Address Translation), talked about in class Advanced Protection SPI (Stateful Packet Inspection) firewall VPN (Virtual Private Network) software for secure “tunnel” via encrypted connection 4 Steps to Secure Your Wireless Network Change the default SSID (network name) Example: Linksys, the most widely sold wireless brand, uses the default SSID of “linksys” on all products SSID should be changed on a regular basis

4 Steps Continued Change the default SSID (network name) Example: Linksys, the most widely sold wireless brand, uses the default SSID of “linksys” on all products SSID should be changed on a regular basis Disable SSID broadcast option Won’t allow outsiders to detect or “hear” your network Change default password on device By default, all Linksys devices use a blank user name and “admin” as the password Enable MAC address filtering, set security to WPA Antennas can be changed and/or modified to increase range Homemade antennas can beam signal for miles In lieu of changing/modifying antenna a booster can be used for local network (see picture)

What are “Hot Spots” and “War Driving”? “Hot Spots” are areas in which wireless networks are present “Hot Spots” allow connectivity, either free of charge or for a fee Local “Hot Spots” include Border’s Books and Starbucks Currently over 13,942 known “Hot Spots” in U.S. Maps available online to locate “Hot Spots” to facilitate Internet connectivity in various situations, such as while on vacation Map of “Hot Spots” of U.S. and NY with slideshow “War Driving” is the process of detection “Hot Spots” with mobile equipment “War Driving” can infringe upon others since those that engage in activity piggy-back on bandwidth “War Chalking” is act of using GPS to electronically mark “Hot Spots” which are then posted online for others illegal use

ISP’s can “beam” broadband via wireless to rural locations Wireless provides consumers in rural areas the benefits of broadband Why Do Businesses Use Wireless Networks? Ease of use, no CAT5 cabling to run! Cheaper since no cabling needs installed Allows companies to designate areas for brainstorming sessions which are done with laptops and PDA’s Provide connectivity between buildings especially when fiber optic connection is not feasible Why a Site Survey? Site Surveys are intended to find best locations for antenna placement, to find areas of dead space lacking connectivity and area of low bandwidth

ISP’s can “beam” broadband via wireless to rural locations Wireless provides consumers in rural areas the benefits of broadband “Beam” can be transmitted for long distances, best connectivity is achieved via “line of sight” “Beam” can penetrate trees, buildings, etc. if powerful enough Now onto business usage…

How Do You Perform a Site Survey? Site Surveys are normally performed via one of two methods: Handheld devices that detect wireless signal Via mathematical modeling software that calculates coverage based upon CAD drawings of building layout (see pictures) Wireless connections in business can save money Cheaper connectivity between sites, no need to lease a T-1 or larger lines (no monthly fees) Upgrading from one type of network, such as token ring using coaxial cabling to Ethernet, can be accomplished without incurring expense of cable runs Tsunami® brand wireless devices: 10, 100, 1,000Mbps connectivity

Business and Wireless Security VPN software has become standard to protect company intranet Other measures in place, such as new security measure developed by Cisco®, to further propagate enterprise security through EAP (Extensible Authentication Protocol) L.E.A.P. – Lightweight Extensible Authentication Protocol P.E.A.P. – Protected Extensible Authentication Protocol Both use an authentication algorithm Used in conjunction with RADIUS (Remote Authentication Dial-In User Service) servers

Business and the Bottom Line – Consumer: A Summation Wireless consumer market generated $751.9 million in sales in 4 th quarter 2003, represents a 40% gain over same quarter of 2002 Wireless connectivity provides rural consumers with broadband access Wireless will continue to grow at rapid rate as security measures become better and as public perception changes Business and the Bottom Line – Business: A Summation Businesses will increasingly move towards wireless networks as security improves to an acceptable level Businesses will reap the benefits of wireless network connectivity by saving in expenditures for infrastructure improvement Wireless connectivity provides viable, feasible option for LAN, WAN and MAN connectivity, especially between sites

Questions, Comments?