Wireless Infrastructures Wireless. Wireless Infrastructures Wireless LAN Predominantly 802.11 IEEE 802.11 A, B, G, N Wireless MAN WiMax 802.16 and its.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Wireless Technology.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Chapter - 11 CWNA Certified Wireless Network Administrator Introduction to Wireless LANs.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN 6 – 1 & 2 1 BCMSN Module 6 Lesson 1 & 2 Introducing Wireless LANs.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
TPS Reports Presents… A Wireless Report Joy Gibbons Julia Grant Kelsie Kirkpatrick Kevin Moore Byron Williams Image from:
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
IEEE Overview and Meshed Networking ELEC6076 Computer Networks Alan Ford
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
WiMAX Vs Wi-Fi. 2 WiMAX Worldwide Interoperability for Microwave Access Brand licensed by the WiMax Forum. “a standards-based technology enabling the.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
IE 419/519 Wireless Networks Lecture Notes #2 Wireless LAN Technology.
WiMAX Presented By Ch.Srinivas Koundinya 118T1A0435.
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
1 Chapter Overview Wireless Technologies Wireless Security.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless technologies LAN Switching and Wireless – Chapter 7 and Fundamentals.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
The world is going to wireless …
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Wireless Networking.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Explaining Wireless LAN Technology & Standards
Communication Research Labs Sweden AB Introduction to Wireless communication and WLAN.
Sybex CCNA Chapter 12: Wireless Networks.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-3-1 Wireless LANs Implementing a WLAN.
Wireless LANs Configuring Cisco WLAN Clients. Cisco a/b/g WLAN Client Adapters a/b/g dual-band client adapters Supports all three current.
OV Copyright © 2015 Logical Operations, Inc. All rights reserved. Unbounded Network Media  Wireless Networking  Wireless Network Devices and Components.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Presented by: Dr. Munam Ali Shah
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
PRESENTATION ON WI-FI TECHNOLOGY
Wireless Network Design Principles Mobility Addressing Capacity Security.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
WLAN.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Submitted By:- Raushan Kr. Chaurasiya(68) Santu Thapa(75) Satyanarayan Prajapat(76)
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
TERMINOLOGY Define: WPAN
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
Chapter 4: Wireless LANs
Wireless LAN Security 4.3 Wireless LAN Security.
Configure a Wireless Router
Presentation transcript:

Wireless Infrastructures Wireless

Wireless Infrastructures Wireless LAN Predominantly IEEE A, B, G, N Wireless MAN WiMax and its derivatives Fixed Broadband Wireless Access (10–63 GHz) Current : P802.16m Advanced Air Interface with data rates of 100 Mbit/s mobile & 1 Gbit/s fixed

Bluetooth assortments WPAN (Wireless Personal Area Networks) IEEE coexistence of wireless personal area networks (WPAN) with other wireless devices operating in unlicensed frequency bands such as wireless local area networks (WLAN) , is a MAC and PHY standard for high-rate (11 to 55 Mbit/s) WPANs (Low Rate WPAN) ZigBee Mesh networking of WPAN (medical purposes) Body Area Network Technologies. The goal is a low-power and low-frequency short-range wireless standard

Similarities Between WLAN and LAN A wireless LAN is an IEEE 802 LAN. Transmits data using RF carriers vs. data over the wire Looks like a wired network to the user Defines physical and data link layer Uses MAC addresses The same protocols/applications run over both WLANs and LANs. IP (network layer) IPSec VPNs (IP-based) Web, FTP, SNMP (applications)

Current Standards – a,b,g, n a Up to 54 Mbps 5 GHz Not compatible with either b or g b Up to 11 Mbps 2.4 GHz g Up to 54 Mbps 2.4 GHz n, the newest protocol, utilizes both 2.4-GHz and 5-GHz bands. Datarate varying from Mbps) [ [ 860 Kbps 900 MHz 1 and 2 Mbps 2.4 GHz Proprietary Ratified a,b Ratified and 2 Mbps2.4 GHz11 Mbps 54 Mbps Standards-based 5 GHz Radio Network Speed  IEEE Begins Drafting g is backwards compatible with b n is backward compatible with existing a/b/g g Ratified

Radio Frequency Issues As signal strength decreases, so will the transmission rate. An b client’s speed may drop from 11 Mbps to 5.5 Mbps, to 2 Mbps, or even 1 Mbps. This can all be associated with a combination of factors including: 1. Distance 2. Line of Sight 3. Obstructions 4. Reflection 5. Multpath Reflection 6. Refraction (partially blocked by obstruction) 7. Diffraction (bending of signal) 8. Noise and Interference

Wireless Access Points An access point (AP) is a WLAN device that can act as the center point of a stand-alone wireless network. An AP can also be used as the connection point between wireless and wired networks. In large installations, the roaming functionality provided by multiple APs allows wireless users to move freely throughout the facility, while maintaining seamless, uninterrupted access to the network.

Wireless Bridges The bridges connect hard-to-wire sites, noncontiguous floors, satellite offices, school or corporate campus settings, temporary networks, and warehouses. Example: The Cisco Aironet 1300 Series Wireless Bridge is designed to connect two or more networks that are typically located in different buildings. They can be configured for point- to-point or point-to-multipoint applications.

Service Set Identifier (SSID) SSID is used to logically separate WLANs. The SSID must match on client and access point. Access point can broadcast SSID in beacon. Client can be configured without SSID.

Basic Topologies Peer-to-Peer (Ad Hoc) Topology (IBSS) Basic Infrastructure Topology (BSS) Extended Infrastructure Topology (ESS)

WiFi (802.11) Media Access Control As all the devices in the network share the same frequency, to a common Access Point (AP) They cannot all transmit at the same time as their signals will interfere. Therefore, WiFi networks operate in half-duplex, using an access method similar called CSMA/CA. Access Point

Using Wireless Routers

Local area networks (LAN) Adding an AP is also a way to add wireless devices and extend the range of an existing wired system. If a single cell does not provide enough coverage, any number of cells can be added to extend the range. It is recommended that adjacent BSS cells have a 10 to 15 percent overlap b/g Channels a Channels

A wireless repeater is simply an access point that is not connected to the wired backbone. This setup requires a 50% overlap of the AP on the backbone and the wireless repeater. (So they can reach each other). The user can set up a chain of several repeater access points, however, the throughput for client devices at the end of the repeater chain will be quite low, as each repeater must receive and re-transmit each frame. Not covered by standards 50% overlap Wireless repeater

Wireless VLAN Deployment

Combined deployment of infrastructure and non-infrastructure devices

Cisco WLAN Implementation Distributed WLAN solution Autonomous AP Wireless LAN Solution Engine (WLSE) Centralized WLAN solution Lightweight AP Wireless LAN Controller (WLC) Cisco offers 2 “flavors” of wireless solutions:

Comparison of the WLAN Solutions Autonomous WLAN: Autonomous access point Configuration of each access point Independent operation Management via CiscoWorks WLSE and WDS Access point redundancy Lightweight WLAN: Lightweight access point Configuration via Cisco Wireless LAN Controller Dependent on Cisco Wireless LAN Controller Management via Cisco Wireless LAN Controller Cisco Wireless LAN Controller redundancy

Why Lightweight APs? A WLAN controller system is used to create and enforce policies across many different lightweight access points. With centralized intelligence, functions essential to WLAN operations such as security, mobility, and quality of service (QoS), can be efficiently managed across an entire wireless enterprise. Splitting functions between the access point and the controller, simplifies management, improves performance, and increases security of large WLANs.

Cisco Centralized WLAN Model The control traffic between the access point and the controller is encapsulated by Lightweight Access Point Protocol (LWAPP). And encrypted via the Advanced Encryption Standard (AES). The data traffic between the access point and controller is also encapsulated with LWAPP, but not encrypted.

Layer-2 LWAPP Architecture Access Points don’t require IP addressing Controllers need to be on EVERY subnet on which APs reside L2 LWAPP was the first step in the evolution of the architecture; many current products do not support this functionality

Access Points require IP addressing APs can communicate w/ WLC across routed boundaries L3 LWAPP is more flexible than L2 LWAPP and all products support this LWAPP operational ‘flavor’ Layer-3 LWAPP Architecture

Wireless Mesh Networking Each access point runs the Cisco Adaptive Wireless Path protocol (AWP). AWP allows access points to communicate with each other to determine the best path back to the wired network. After the optimal path is established, AWP continues to run in the background to establish alternative routes back to the roof- top access point (RAP) if the topology changes or conditions cause the link strength to diminish.

Wireless LAN Security Threats

Wireless Security Protocols Today, the standard that should be followed in most enterprise networks is the i standard. This is similar to the Wi-Fi Alliance WPA2 standard. For enterprises, WPA2 includes a connection to a Remote Authentication Dial In User Service (RADIUS) database.

Identification and protection against attacks, DoS AES strong encryption Authentication Dynamic key management Evolution of Wireless LAN Security No strong authentication Static, breakable keys Not scalable Initial (1997) Encryption (WEP) Interim (2001) 802.1x EAP Dynamic keys Improved encryption User authentication 802.1x EAP (LEAP, PEAP) RADIUS Interim (2003) Wi-Fi Protected Access (WPA) Standardized Improved encryption Strong, user authentication (e.g., LEAP, PEAP, EAP-FAST) Present Wireless IDS IEEE i WPA2 (2004)

WPA and WPA2 Authentication

WPA and WPA2 Encryption

Wi-Fi Protected Access What are WPA and WPA2? Authentication and encryption standards for Wi-Fi clients and APs 802.1x authentication WPA uses TKIP encryption WPA2 uses AES block cipher encryption Which should I use? Gold, for supporting NIC/OSs Silver, if you have legacy clients Lead, if you absolutely have no other choice. Gold WPA2/802.11i EAP-Fast AES Silver WPA EAP-Fast TKIP Lead Dynamic WEP EAP-Fast/LEAP VLANs + ACLs

WLAN Security Summary Open Access No Encryption, Basic Authentication Public “Hotspots” Basic Security 40-bit or 128-bit Static WEP Encryption, WPA Home Use Enhanced Security 802.1x, TKIP Encryption, Mutual Authentication, Scalable Key Mgmt., Etc. Enterprise Remote Access Virtual Private Network (VPN) Business Traveler, Telecommuter