Version 1.1 2006Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
How to Set Up, Secure and Manage A Network
WIRELESS NETWORKS - A.HARIKA Y5CSO28. INTRODUCTION It refer to a telecommunication networks whose interconnections between nodes is implemented without.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Wireless Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering PSTN.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Fidelity (Wi-Fi)
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Intro to MIS – MGS351 Network Basics Extended Learning Module E.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
Wireless(review) a (1999) a speed ◦ 54 Mb/s & frequency of 5 GHz Used by ◦ Government buildings ◦ Older style networks.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Wireless LANs Presented by: Jerome Thompson Mei-Lun Huang Liu-Yin Hu Kai-Wing Sum.
WLAN What is WLAN? Physical vs. Wireless LAN
Wireless Networking 102.
Wireless Networking and Security
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Wrocław University of Technology, Faculty of Fundamental Problems of Technology. 1.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Wireless Networking.
Thornbury U3A Computer Group Wireless Networking (Part 1) September 2006 Mike Farquhar.
Wireless Networks Tamus, Zoltán Ádám
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
 Introduction  Components of Wi-Fi and its working  IEEE Architecture  Advantages and Limitations.
Presented by: Dr. Munam Ali Shah
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
PRESENTATION ON WI-FI TECHNOLOGY
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
April 11, 2007 Healthcare Engineering Course Online 1 Wireless Internet Shigeki Goto Waseda University.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Submitted By:- Raushan Kr. Chaurasiya(68) Santu Thapa(75) Satyanarayan Prajapat(76)
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
SIVA INSTITUTE OF FRONTIER TECHNOLOGY ASHWINI.B. NISHA.B.A.
Wireless Networks Dave Abbott.
Instructor Materials Chapter 6 Building a Home Network
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
Wi-Fi Technology.
Presentation transcript:

Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues

Version Slide 2 Wireless Technology Wireless and mobile computing are the keywords Very topical/exciting This technology not yet mature Promises that we can improvise our existing networks without having to lay new wires - roving staff will just have to insert a wireless card into their device and join the network Interesting to compare the what the Telco’s are doing with 3G and how this rivals WiFi hotspots

Version Slide 3 Wireless Technology Wireless technology has to compete with digital satellite Cable phone lines (HomePNA) 10Mbps Power line (HomePlug) 14Mbps Wireless broadband technology (WiMax) gives wire-free transmission of two way multimedia Bandwidth is an issue here

Version Slide 4 Wireless Technology What is on the market/coming? Communication cards to allow data from personal digital assistants to be synchronised with desktop PC’s Cards to link laptops and PC’s with Global System for Mobiles(GSM) based phones and local area network devices All the above enables firms to set up wireless networks without having to use Ethernet cable

Version Slide 5 Wireless Protocols Wireless LAN Bluetooth WAP/GPRS/UMTS SWAP - Shared Wireless Access Protocol SWAP 3G - third generation cellular standard

Version Slide 6 Wireless versus Wired networks Using Radio frequency (2.4GHz and 5GHz) Easy to setup a small office or home office (SOHO) Mobility Travel through wall Easy for network reconstruction

Version Slide 7 What is WiFi? Wireless LAN IEEE x network Promulgated by an association called WiFi Alliance WiFi Alliance certifies all wireless LAN IEEE802.11x based products for interoperability All IEEE802.11x based products that passed the WiFi Alliances are called WiFi Wireless Fidelity

Version Slide 8 WiFi Standards IEEE a An IEEE standard for a wireless network that operates at 5 GHz with rates up to 54Mbps IEEE b An IEEE standard for a wireless network that operates at 2.4 GHz with rates up to 11Mbps IEEE g – referred to as 54g (but don’t confuse that with the 54Mbps!) An IEEE standard for a wireless network that operates at 2.4 GHz with rates up to 54Mbps

Version Slide 9 WiFi Standards WPA (WiFi protected Access) TKIP encryption and protects against unauthorized network access through the use of a pre-shared key (PSK) WMM (WiFi MultiMedia) packet prioritisation that meet IEEE e quality of service standard. Packets containing time-dependent data such as audio or video to be sent ahead of data that can safely wait a few microseconds

Version Slide 10 WiFi Hardware Access points (APs) PCMCIA cards/ PC cards USB adapters PCI network cards Wireless routers

Version Slide 11 WiFi Applications Retails Warehouses Healthcare Education News about wifi and also see if you can find out the hotspot(s) around the Stoke-on-Trent area

Version Slide 12 WiFi topology Ad Hoc Without use of Access Point Peer-to-peer style communication Recommended 3 or less users per channel Infrastructure Communication each other devices by the use of Access Point About users per access point

Version Slide 13

Version Slide 14

Version Slide 15

Version Slide 16

Version Slide 17 Ad Hoc vs Infrastructure Ad Hoc can be setup instantly for temporary solution Scalability is limited to Ad Hoc Coverage Reliability Efficiency

Version Slide 18 Wireless LAN

Version Slide 19 Security choices Network security ensures the communications and files are protected How important of the security depend on how you want to use the network. Browsing internet and mp3 streaming may not need a security Internet shopping or purchasing will use SSL security There are several way to protect your data confidentiality while transmitting In WLAN, you can change your SSID, WEP or WPA or latest technology WPA2

Version Slide 20 Wireless surfing Common knowledge that some users use someone else’s network connection to use the Internet “piggybacking” Hi-gain antenna example that I use How do you know someone is using you? If infrastructure – you don’t – would have to look at router logs Ad-hoc – shows in connections window How do they know you are not using them in return?

Version Slide 21 WEP Wired Equivalent Privacy Encrypt data over the radio waves Implemented in MAC layer – NIC encrypt the frame before transmit Using 64bits or 128bits encryption keys Shared secret key You need to provide 40 bits (10 digit Hex) or 104bits (26 digit Hex) 24 bits Initialisation Vector (IV) for generating key sequence

Version Slide 22 Limitation of WEP Share, static keys WEP only encrypt frame within wireless station but not within wired network Limited IV numbers and may increase collision - IV repeats after sending 26GB. Recovery attack - the data can be manipulated after a few hours by tracking repeating IV

Version Slide 23 WPA and WPA v2 WiFi Protected Access Different key for each user 48 bit IV – defeats recovery attack on WEP Use Temporal Key Integrity Protocol (TKIP) which dynamic change keys on transmission More information on

Version Slide 24 Summary Security is the main issues in wireless communications Still in the development to increase the privacy Next tutorial you will see wireless security in action