1 Chapter Overview Wireless Technologies Wireless Security.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
A Wireless Local Area Network (WLAN) is a network that interconnects devices using radio waves. Wireless networking technologies allow devices to communicate.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Click to edit Master subtitle style Chapter 12: Wireless Networkimg Instructor:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Networks Olga Agnew Bryant Likes Daewon Seo.
7: Wireless Technologies Networking for Home & Small Business.
© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Wireless Networking.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Computer networks 6: Wireless and Mobile Networks.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Chapter 11: Wireless LANs Business Data Communications, 6e.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Wireless Networking.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Chapter 8 Connecting Wirelessly
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Sybex CCNA Chapter 12: Wireless Networks.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Chapter 7- Mobile and Wi-Fi Networks Taking signals on and off the air Connections to other networks Need to manage spectrum Managing and billing for services.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless Local Area Networks (WLANs)
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
PRESENTATION ON WI-FI TECHNOLOGY
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Ryan Heaton Dick Al-Bayaty Wi-Fi How Wireless Communication works.
Sybex CCNA Chapter 12: Wireless Networks Instructor & Todd Lammle.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
7: Wireless Technologies Networking for Home & Small Business.
Submitted By:- Raushan Kr. Chaurasiya(68) Santu Thapa(75) Satyanarayan Prajapat(76)
Wireless Networking Devices. wireless LAN adapter cards wireless access Points wireless bridges wireless routers.
 Today’s networks are no longer limited to using cabled, or wired, devices.  Today’s networks have a mix of wired systems along with wireless systems.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
IEEE Wireless LAN Standard
Chapter 10.  Upon completion of this chapter, you should be able to:  Understand.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Wireless Access Point Product Overview
TERMINOLOGY Define: WPAN
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Local Area Network (WLAN)
Chapter 4: Wireless LANs
Wireless Networking Chapter 23.
Presentation transcript:

1 Chapter Overview Wireless Technologies Wireless Security

Wireless communication Wireless communication is the transfer of information over a distance without wire Short distance – TV remote Long distance – radio Wireless communication can be via: radio frequency communication, microwave communication, for example long-range line-of-sight via highly directional antennas, or short-range communication, or infrared (IR) short-range communication, for example from remote controls or via Infrared Data Association (IrDA). Applications may involve point-to-point communication, point-to-multipoint communication, broadcasting, cellular networks and other wireless networks. 2

Wireless networking Use various types of unlicensed 2.4 and 5 GHz WiFi (Wireless Fidelity) devices Is used to connect computers (mostly laptops) users Another common use is for mobile networks that connect via satellite. We use wireless network: To span a distance beyond the capabilities of typical cabling to overcome situations where wiring is difficult or financially impractical, To link portable or temporary workstations, To remotely connect mobile users or networks. Generally, we refer them as IEEE

Basic operation model Half-duplex Broadcast Using 2.4 and 5 GHz radio frequencies These are FCC released for public use The 900MHz and 2.4 GHz are referred as ISM (Industrial, Scientific, and Medical) The reason you cannot use cell phone in hospitals The 5 GHz is knowns as (UNII) Unlicensed National Information Infrastructure 4

Where is 2.4 GHz 5

network standards (Wiki) Release Freq.Bandwidth Data rate per stream Allowabl e Modulation Apx. indoor range Apx. Outdoor range Protoco l (GHz)(MHz)(Mbit/s) MIMO streams (m)(ft)(m)(ft) –Jun , 21DSSS aSep , 9, 12, 18, 24, 36, 48, 541OFDM ,00016,000 bSep , 2, 5.5, 111DSSS gJun , 2, 6, 9, 12, 18, 24, 36, 48, 541OFDM, DSSS nOct-092.4/ , 14.4, 21.7, 28.9, 43.3, 57.8, 65, OFDM , 30, 45, 60, 90, 120, 135,

In door range 7

Channels 8

Benefits of n Up to 250 Mbps 40 Mhz channels Waste less “real estate” MAC Efficiency Less protocol communication overhead Multiple-Input Multiple-Output (MIMO) support (pronounced my-moh or me-moh) Need support of both NIC and AP Great for home video $$$, with little business values 9

MIMO 10

Wireless Network Components Wireless Access Points Can be very different for an enterprise vs. home usage Always has a port to connect to wired network Wireless Network Interface Card Many types Build in PCI USB 11

Antennas Omni directional Directional (Yagi) Point to point Longer range 12

Installing a wireless network Add an access point (AP) Configure it with its IP address and a browser or software cames with it At least add a name for your network You can select not to broadcast the network name, but it must have a name (also called Service Set ID, SSID) May consider not to set the security initially Make sure the wired ports work NIC part Turn on the Wi-Fi button and let your computer search for a Wi-Fi network Move it up the list of networks if necessary 13

Infrastructure Mode: Basic Service Set (BSS) 14

Security Open access out of the box Basic security Service Set ID – need to know the network to access The device name Does not have to broadcast SSID is sent clear text in client messages (required ) Shared key authentication Wired Equivalent Privacy (WEP) A key entered at the NIC config AP sends client a message and asks the client to encrypt with the key and authenticated only if it can do that It is possible to decipher the key with the clear text and the respond Or just “replay” if the same message is sent for authentication 15

Security (2) Wired Equivalent Privacy (WEP) A key entered at the NIC config and AP config Key must match in order to communicate with the AP Save enough for home network, not suitable for large networks May have multiple so you can issue a few temporary ones Still has holes MAC address authentication The MAC address of NICs are entered to communicate 16

Security (3) RADIUS (Remote Authentication Dial In User Service) Authentication, Authorization, centralized access, and accounting supervision User ID and password in clear text on the RADIUS server 17

Security (4) TKIP (Temporal Key Integrity Protocol) Build on top of WEP Use up to 128-bit encryption Each package has it own key = Basic Key + Mac Address + 48-bit packet serial number Cannot replay Can still be attacked (differ from our book) Wi-Fi Protected Access (WPA and WPA2) Use an encryption mode with mathematically proven security when select AES as the encryption method 18

WPA/WPA2 19

Locking things down Once you have tested the AP and NIC with open access – no security, locking everything down with WPA 20

Wireless for enterprise Very different game APs need to have 10% overlap in terms of coverage areas Security considerations Keys MAC Accounting 21

The ad hoc mode Computer and computer can communicate without access points Generally not recommended Need to change setting at the NIC configuration level 22

? Will wireless networks replace wired networks 23