Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.

Slides:



Advertisements
Similar presentations
INTRODUCTION TO Wi-Fi TECHNOLOGY.
Advertisements

Wi-Fi Technology.
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
BZUPAGES.COM BSIT BZUPAGES.COM BSIT ON.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Wireless networking technology By Abbas Izadpanah January 2007.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless Local Area Networks By Edmund Gean August 2, 2000.
Wireless Network Selo TE UGM. Wireless Networking Wireless Networking (Wi-Fi) Wireless Networking (Wi-Fi) Introduction and Benefits Introduction and Benefits.
Wireless Fidelity (Wi-Fi)
Networks Olga Agnew Bryant Likes Daewon Seo.
Wireless LANs Presented by: Jerome Thompson Mei-Lun Huang Liu-Yin Hu Kai-Wing Sum.
WIRELESS NETWORKING Presenter: Nhan Nguyên Phương.
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
1 Chapter Overview Wireless Technologies Wireless Security.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
UNDER THE GUIDANCE OF MR. S.K. DANI (SDE) SUBMITTED BY:
Wrocław University of Technology, Faculty of Fundamental Problems of Technology. 1.
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
 Midterm 30%  Final 40%  LAB 15%  Assignment 15%  Text Book – Designing and Deploying n Wireless Networks  Jim Geier (ciscopress)
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Chapter 8 Connecting Wirelessly
Sybex CCNA Chapter 12: Wireless Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
 Introduction  Components of Wi-Fi and its working  IEEE Architecture  Advantages and Limitations.
Lecture 11 Wireless security
Presented by: Dr. Munam Ali Shah
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
PRESENTATION ON WI-FI TECHNOLOGY
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
A PRESENTATION ON “Wireless Networks”
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
IEEE standards (Wireless LANs) Presented by Danu Hunskunatai.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
Wi-Fi Technology.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
Lecture 24 Wireless Network Security
By. P. Victer Paul Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends like u.. To get to know about more.
BZUpages.com “In the name of ALLAH, most Beneficent and Merciful”
IWD2243 Wireless & Mobile Security Chapter 1 : Wireless Fundamentals Prepared by : Zuraidy Adnan, FITM UNISEL1.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
Submitted By:- Raushan Kr. Chaurasiya(68) Santu Thapa(75) Satyanarayan Prajapat(76)
PRESENTATION ON. What is a Wi-Fi Hotspot? A Wi-Fi hotspot is location or access point where you can access wireless broadband using a wireless enabled.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
IEEE Wireless LAN Standard
Naveen Kumar. Contents  Introduction  Need of Wi-Fi Technology  Purpose  History  Wi-Fi Technology  How a Wi-Fi Network Works  Topologies & Configurations.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
ICT Unit 4: Network and the effects of using them
1 March 24, 2016 By Jay, Mihai, and Ryan Wi-Fi. 2 A GENDA ❖ Overview ➢ History ➢ The Big Picture ❖ IEEE Standard ➢ Headers ➢ Payload ❖ Properties.
Created by: Prashant More Dipak Chavan Ajinkya Khude WI-FI.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Contents Introduction Need of Wi-Fi Technology Purpose History
Wi-Fi Technology.
Instructor Materials Chapter 6 Building a Home Network
Wireless Network Computer Science Engineering Technical English II
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
Presented by: Jeffrey D. Bombell, American Computer Technologies
Wi-Fi Technology.
Wi-Fi Technology.
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
Name- Nazrin Parveen Roll no. 33. outline  What is Wi-Fi? What is Wi-Fi?  purpose purpose  Wi-Fi network elements Wi-Fi network elements  How a Wi-Fi.
Presentation transcript:

Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra

Introduction Wi-Fi Technologies Wi-Fi Protocols Wi-Fi Channel Wi-Fi Network Elements How a Wi-Fi Network Works Wi-Fi Network Topologies Wi-Fi Security Threats Wi-Fi Security Techniques Advantages/ Disadvantages of Wi-Fi

Wi-Fi(Wireless Fidelity) is a generic term that refers to the IEEE communications standard for Wireless Local Area Networks (WLANs). Wi-Fi is the wireless way to handle networking. Wi-Fi Network can connect computers to each other, to the internet and to the wired network.

Wi-Fi Networks use Radio Technologies to transmit & receive data at high speed: Wi-Fi protocols: There are several new extensions have been added to the core protocols. IEEE b IEEE a IEEE g

Appear in late 1999 Operates at 2.4GHz radio spectrum 11 Mbps (theoretical speed) - within 30 m Range 4-6 Mbps (actual speed) feet range Most popular, Least Expensive Interference from mobile phones and Bluetooth devices which can reduce the transmission speed.

Introduced in 2001 Operates at 5 GHz (less popular) 54 Mbps (theoretical speed) Mbps (Actual speed) feet range More expensive Not compatible with b

Introduced in 2003 Combine the feature of both standards (a,b) feet range 54 Mbps Speed 2.4 GHz radio frequencies Compatible with ‘b’

a802.11b802.11g Frequency2.4 GHz5 GHZ2.4 GHZ2.4 GHz Data Rate 1,2 Mbps 5,9,12,18, 24,36,48,5 4 Mbps 1,2,5.5,1 1 Mbps 6,9,12,15, 24,36,48,5 4 Mbps ModulationFHSS, DSSS OFDMDSSSOFDM Comparison

Direct Sequence Spread Spectrum (DSSS) Frequency Hoping Spread Spectrum (FHSS) Orthogonal Frequency Division Multiplexing(OFDM)

Direct sequence signaling technique divides the 2.4 GHz band into MHz channels. Adjacent channels overlap one another partially, with three of the 11 being completely non- overlapping. Data is sent across one of these 22 MHz channels without hopping to other channels.

Each of three UNII bands(lower,upper & middle) provides 4 chennels for communication in a network. Chennels are separated with no overlapping. Each channel is 20MHz wide surrounding the center frequency.

FHSS system hop from frequency to frequency using a pseudorandom hopping sequence. This hopping sequence or pattern is defined as the channel.

 THREE IMPORTANT CONCEPTS Data Rate Actual Throughput Dynamic Rate Selection

Access Point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices simultaneously to the Internet. Wi-Fi cards - They accept the wireless signal and relay information.They can be internal and external.(e.g PCMCIA Card for Laptop and PCI Card for Desktop PC) Safeguards - Firewalls and anti-virus software protect networks from uninvited users and keep information secure.

Basic concept is same as Walkie talkies. A Wi-Fi hotspot is created by installing an access point to an internet connection. An access point acts as a base station. When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly. A single access point can support up to 30 users and can function within a range of 100 – 150 feet indoors and up to 300 feet outdoors. Many access points can be connected to each other via Ethernet cables to create a single large network.

Wireless network can function in one of two basic modes: 1) Ad-hoc 2) Infrastructure

Wireless technology doesn’t remove any old security issues, but introduces new ones Eavesdropping Man-in-the-middle attacks Denial of Service

Easy to perform, almost impossible to detect By default, everything is transmitted in clear text Usernames, passwords, content... No security offered by the transmission medium Different tools available on the internet Network sniffers, protocol analysers... Password collectors With the right equipment, it’s possible to eavesdrop traffic from few kilometers away.

1. Attacker spoofes a disassociate message from the victim 2. The victim starts to look for a new access point, and the attacker advertises his own AP on a different channel, using the real AP’s MAC address 3. The attacker connects to the real AP using victim’s MAC address

Attack on transmission frequecy used Frequency jamming Not very technical, but works Attack on MAC layer Spoofed deauthentication / disassociation messages can target one specific user

The requirements for Wi-Fi network security can be broken down into two primary components: Authentication  User Authentication  Server Authentication Privacy

Service Set Identifier Hiding(SSID) Wired Equivalent Privacy (WEP) 802.1X Access Control Wireless Protected Access (WPA) IEEE i

Mobility Easy Installation Flexibility Cost Reliability Use unlicensed part of the radio spectrum Speed

Interference High power consumption Limited range Security