© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Advertisements

Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs
Application Guide For Mesh AP – MAP-3120
Security in Wireless Networks Juan Camilo Quintero D
Altai Certification Training Configuration
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
C ISCO ’ S W IRELESS T ECHNOLOGIES :. Introduction to Wireless Technology Wireless LANs (WLANs) use radio frequencies (RFs) that are radiated into air.
1 15-May-15 S Ward Abingdon and Witney College Wireless CCNA Exploration Semester 3 Chapter 7.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Wi-Fi Technology.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Networking IEEE Standards Module-03B Jerry Bernardini Community College of Rhode Island 6/27/2015Wireless Networking J. Bernardini1.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
D-Link Unified Access Point
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Fundamentals of Networking Discovery 1, Chapter 7.
Networks Olga Agnew Bryant Likes Daewon Seo.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
By: Matthew Follett. Introduction  A Wireless local area network (WLAN) links two or more devices using some wireless distribution method and usually.
7: Wireless Technologies Networking for Home & Small Business.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Wireless Networking.
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
Wireless Networks Tamus, Zoltán Ádám
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Chapter 8 Connecting Wirelessly
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Chapter 7- Mobile and Wi-Fi Networks Taking signals on and off the air Connections to other networks Need to manage spectrum Managing and billing for services.
Lecture 11 Wireless security
Presented by: Dr. Munam Ali Shah
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
WME ABC ’ s LayerDescription aPHY 54 Mb/s in 5 GHz bands bPHY 11 Mb/s direct sequence in 2.4 GHz band cMAC Bridging operation dPHY International.
April 11, 2007 Healthcare Engineering Course Online 1 Wireless Internet Shigeki Goto Waseda University.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
IWD2243 Wireless & Mobile Security Chapter 1 : Wireless Fundamentals Prepared by : Zuraidy Adnan, FITM UNISEL1.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
7: Wireless Technologies Networking for Home & Small Business.
Presented by Ian Mearns FUSD. Fresno Unified School District 5,000 teachers & 4,000 support / administrative staff 75,000 students 110 schools and admin.
IEEE Wireless LAN Standard
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Wireless Ethernet Programming
CCNA Exploration Semester 3 Chapter 7
Optimizing the In-Home Experience
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
IS3120 Network Communications Infrastructure
Wireless LAN Security 4.3 Wireless LAN Security.
LM 5. Wireless Network Security
Presentation transcript:

© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012

© Aastra Aastra confidential information / for training purpose only Wireless LAN

© Aastra Aastra confidential information / for training purpose only WLAN Standards (Summary) a (1999) – Physical Layer in 5 GHz band – data rate up to 54 Mbit/s using OFDM b (1999) – data rate up to 11 Mbit/s using CCK / DSSS g (2003) – Physical Layer in 2,4 GHz band – data rate up to 54 Mbit/s using OFDM – backward compatible to b n (2009) – Physical Layer in 2,4 GHz and 5 GHz band – data rate up to 600 Mbit/s using OFDM / MIMO – backward compatible to b/g / a » i (2004) – additional WLAN security – AES, TKIP, EAP (base for WPA2) » e (2005) – Medium Access Control(MAC) Quality of Service Enhancements – automatic power save delivery

© Aastra Aastra confidential information / for training purpose only WLAN Applications environments hotels hospitals office buildings production halls.... applications »healthcare »logistics »Internet / network ».... devices »laptops »PDAs »phones »....

© Aastra Aastra confidential information / for training purpose only WLAN Deployment customer requirement application, devices, coverage, bandwidth Planning site survey, building details, disturbing devices channels, security, if possible pre deployment Installation deployment, device configuration, network, security settings, client configuration, backup Verfication site survey, fine tuning, check data rates, check stability, user verfication by customer Documentation building maps, verification results, photos!

© Aastra Aastra confidential information / for training purpose only WLAN Frequency (General) There are 3 overlap-free channels in 2.4 GHz ISM band (using b/g + n-HT20) e.g. 1 – 6 – 11. Each channel has a bandwidth of 22MHz. APs should always be 5 channels seperated from each other. Ch: Freq: Channel Frequency 2.4 GHz ISM (channels EMEA: 1-13, NA: 1-11) Channel Frequency ,…, GHz ISM In 5 GHz all channels are overlapping free. The usage of certain channels is bound to regulatory requirements, Access Point capabilities (DFS, TPC) and indoor / outdoor usage.

© Aastra Aastra confidential information / for training purpose only WLAN Frequency Planning For planning the channels for a base of a site-covering radio network, the distance between two base stations with the same frequency should be at least double that of the coverage. The coverage can be adjusted with the help of the Output Power Level parameters by 6% / 12% / 25% / 50% or 100%. Using the n HT40 mode two WLAN channels will be combined for more troughput. This reduce the number of non overlapping channels in 2.4 GHz frequency secondaryprimary (1) HT40 (double channel) vs HT20 (single channel)

© Aastra Aastra confidential information / for training purpose only WLAN n MIMO Using n, AccessPoints and clients (stations) can use multiple antennas to transmit or receive data on individual streams. Multiple Input Multiple Output (MIMO) allow higher data rates and provide better radio conditions as signals can be received by multiple antennas. ModeHT20HT40 1x x x x maximal phy. data rates (Mbit/s) The RFP43 support the 2x2 antenna mode with the maximal data rate of 300 Mbit/s data rates vary on the radio environment and devices capabilites.

© Aastra Aastra confidential information / for training purpose only WLAN Security = Authentification + Encryption Authentification: SSID – Service Set Identifier Access filter e.g. MAC address filter, external radius server Encryptiondetails WEP (Wired Equivalent Privacy) Not recommended, because this is not safe !! usage to support old clients with no WPA support WPA Wi-Fi Protected Access WPA 2 using AES is presently the most secure WLAN encryption in the market WPA 1 / 2 PSK (pre shared key) for households and small enterprise using a secret / password on all WLAN stations WPA 1 / 2 Enterprise for SME / MLE using a Radius Server (802.1x) for the station authentication e.g. using EAP-TLS

© Aastra Aastra confidential information / for training purpose only WPA Authentification with a Radius Server Authentification Radius Server WLAN | LAN Master Secret EAP / 802.1x Authentification Key Normal data traffic Station Access Point Key Normal data traffic LAN Client Certificate Private + Public Key CA Certificate Private + Public Key Server Certificate Private + Public Key CA Certificate Private + Public Key

© Aastra Aastra confidential information / for training purpose only VLAN 802.1q The RFP 42 / 43 supports VLAN tagging (separation) for up to 4 WLANs and Voice data. e.g. for enabling the separation of different WLAN network‘s and the telephone network. Data VoIP (e.g untagged) WLAN Data RFP 42/43 Switch DECT Voice WLAN Data Internet corporate LAN Voice LAN

© Aastra Aastra confidential information / for training purpose only WLAN Profile Configuration Service Set Identifier (SSID): Name / Description of this WLAN VLAN tag: tag WLAN data to this VLAN and receive with this tag mode: WLAN mode n prefered Hidden SSID mode: send no SSID in beacon packets Create WLAN profiles which later can be assigned to the RFPs. Profiles have to be defined for RFP types e.g. RFP(L)42 or RFP(L)43

© Aastra Aastra confidential information / for training purpose only WLAN Profile Configuration (2) Select the security type: open, WEP, WPA(2)-PSK, WPA(2)-802.1x

© Aastra Aastra confidential information / for training purpose only WLAN Profile Configuration (3) Distribution interval: key exchange interval for WPA Radius Settings: IP address and Port of the Radius server and the secret to authenticate the basestation as radius client WME: Wireless Media Extentions (for QoS, required for n) Multiple SSID: one profile can have up to 4 different SSIDs Be aware that on RFP(L) 42 only SSID1 can be broadcast. All other SSIDs have to be known to the station as they are hidden SSIDs.

© Aastra Aastra confidential information / for training purpose only RFP WLAN Configuration Assign the WLAN profile to your RFP’s (42 / 43). WLAN profile: ID of the WLAN profile (need to match RFP type) channel: (selection depend on profile) 1-14 = 2,4 GHz b/g or n = 5 GHz a or n Output power level: WLAN transmit power HT40: activate WLAN channel bundle for more troughput. In 2.4 GHz this reduce the number of overlapping free channels! Use only for single spots. The RFP(L) 43 can operate as WLAN Access Point and OMM at the same time. If the OMM reside on a RFP (L) 42 the WLAN function is disabled. The RFP type need to be known in the OMM to apply a WLAN Profile. e.g. RFP is connected or type is set by OMP