© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.

Slides:



Advertisements
Similar presentations
Jaringan Komputer Lanjut Jaringan Nirkabel (Wireless LAN) -Aurelio Rahmadian-
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Exploring Wireless Networking.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Inter- VLAN Routing LAN Switching and Wireless – Chapter 6.
1 15-May-15 S Ward Abingdon and Witney College Wireless CCNA Exploration Semester 3 Chapter 7.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Chapter 6 High-Speed LANs1 Chapter 6 High-Speed LANs.
Wireless Local Area Networks By Edmund Gean August 2, 2000.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Networks Olga Agnew Bryant Likes Daewon Seo.
Design Considerations & Emerging Standards.  Carrier Sense Multiple Access / Collision Detect.  Practical limit on Nodes per collision domain.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter 5 Updated January 2009 Raymond Panko’s Business Data Networks and Telecommunications,
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Instructor: Dr.Hanal ABUZANT
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless technologies LAN Switching and Wireless – Chapter 7 and Fundamentals.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Sybex CCNA Chapter 12: Wireless Networks.
CWNA Guide to Wireless LANs, Second Edition
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Basic Wireless Concepts & Configuration Chapter.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Connecting to the Network Networking for Home and Small Businesses – Chapter.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless Local Area Networks (WLANs)
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Presented by: Dr. Munam Ali Shah
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
PRESENTATION ON WI-FI TECHNOLOGY
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Wireless LANs and PANs : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Sybex CCNA Chapter 12: Wireless Networks Instructor & Todd Lammle.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
11 Chapter 4. Wireless Local Area Networks Departamento de Tecnología Electrónica Some of these slides are copyrighted by: Computer Networking: A Top Down.
Topic : 4.0 WIRELESS TECHNOLOGIES.  Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers. Wireless.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Wireless LAN Security Oleh: R. Muhamad Ramadan. Ancaman Thd Keamanan Wireless 1 Unauthorized Access War Drivers Find “open” network, use them to gain.
Chapter-7 Basic Wireless Concepts and Configuration.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
LOGO Wireless 25-Sep-16Jaringan Komputer_D3 TT_IT Telkom1.
CCNA Exploration Semester 3 Chapter 7
Basic Wireless Concepts and Configuration Part II
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Fidelity 1 1.
Wireless LAN Security 4.3 Wireless LAN Security.
Configure a Wireless Router
Configure a Wireless Router
Presentation transcript:

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 2 Objectives  Describe the components and operations of basic wireless LAN topologies.  Describe the components and operations of basic wireless LAN security.  Configure and verify basic wireless LAN access.  Configure and troubleshoot wireless client access.

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 3 Why Wireless?  Mobility  Less expensive implementation  FLEXIBILITY

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 4 Why Wireless?  Mobility  Less expensive implementation  FLEXIBILITY Better productivity More relaxed employees Better resutls Increased profits

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 5

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 6 WLAN / LAN Comparison Characteristic Wireless LAN802.3 Ethernet LAN Physical LayerRadio Frequency (RF)Cable Media AccessCollision AvoidanceCollision Detection AvailabilityAnyone with radio NIC in range of AP Cable connection required Signal interferenceYESInconsequential RegulationAdditional regulation by authorities IEEE standard dictates

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 7 RF Characteristics  RF does not have boundaries  RF unprotected from outside signals  RF signal weakens with distance  RF subject to additional and different regulations than wired LANs

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 8 Adding Wireless LAN Components  Extends a Ethernet LAN infrastructure  Wireless clients connect through a wireless router or access point (AP)  Wireless adapter in client communicates with wireless router or AP using RF signals  Once connected, wireless clients can access network resources just as if they were wired to the network

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 9 Wireless LAN Standards a802.11b802.11g802.11n Band5.7 GHz2.4 GHz ChannelsUp to 2333 ModulationOFDMDSSSDSSS/OFDM Data Rates<= 54 Mbps<=11 Mbps<=11 / <=54 Range150 ft (35 m) Release DateOct 1999 Jun 2003 Pros Fast, less prone to interference Low cost, good range Fast, good range, not easily obstructed Cons Higher cost, shorter range Slow, prone to interference Prone to Interference from appliances

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 10 Wireless LAN Standards a802.11b802.11g802.11n Band5.7 GHz2.4 GHz 2.4 / 5 GHz ChannelsUp to 2333 ModulationOFDMDSSSDSSS/OFDMMIMO-OFDM Data Rates<= 54 Mbps<=11 Mbps<=11 / <=54 ? 248 Mbps for 2 MIMO streams Range150 ft (35 m) 230 ft (70 m) Release DateOct 1999 Jun 2003? 2008 Pros Fast, less prone to interference Low cost, good range Fast, good range, not easily obstructed Very good data rates, improved range Cons Higher cost, shorter range Slow, prone to interference Prone to Interference from appliances ?

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 11 IMPORTANT!  RF bands allocated by ITU-R  ITU-R designates 900 MHz, 2.4 GHz, 5 GHz as unlicensed for ISM communities  RF globally unlicensed but subject to local regulations  In US, FCC administers use of RF bands  In Europe, ETSI administers us of RF bands  This impacts selection of wireless components

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 12 Wi-Fi Alliance, ITU-R, IEEE Roles  Wi-Fi Alliance, ITU-R, & IEEE influence WLAN standards  ITU-R regulates allocation of RF bands  IEEE specifies how RF is modulated to carry information  Wi-Fi ensures vendors make interoperable devices  Wi-Fi Alliance ( provides Wi-Fi certificationwww.wi-fi.org

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter based wireless infrastructure

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 14 Wireless Access Points  Wireless clients do not typically communicate directly— they communicate through an AP.  AP converts frame to frame  AP is a layer 2 device-functions like a hub since RF is a shared medium and all radio traffic is ‘heard’  AP oversees CSMA/CA

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 15 CSMA/CA (Carrie Sense Multiple Access /Collsion Avoidance)  AP oversees CSMA/CA  WLAN devices sense the medium for RF energy  If certain threshold of RF energy, then wait till free  If free, then send  When AP receives data from client, AP sends ‘ack’ so client will not retransmit

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 16 The Hidden Node Problem  If clients (nodes) are at the maximum range from the AP, they may be too distant from each other to be detected and transmit simultaneously.  The distant node transmission are subject to attenuation.  One resolution: CSMA/CA feature RTS/CTS  RTS/CTS-request to send/clear to send  When enabled, AP allocates the medium

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 17 Wireless Security Threats  WLAN access: in range of access point/credentials  Unauthorized Access: in range and ‘cracking’ techniques  3 Major Categories of Threat War Drivers Hackers (Crackers) Employees  Rogue APs Unauthorized-interferes with normal operation

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 18 Wireless Security Threats (2)  Man-in-the-Middle Attacks (MITM) Host selected as target Hacker uses packet-sniffing software (Wireshark) to observe client connecting to AP-may read/copy username, server name, IP addresses, ID to compute response, challenge/associate response (clear text) All users in BSS may be compromised! To defeat MITM: authenticate users on your WLAN, monitor devices and traffic, IPS (Intrusion Prevention System)

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 19 Wireless Security Threats (3)  Denial of Service (DoS) b/g use the unlicensed 2.4 GHz ISM band 1.Common consumer products may interfere causing DoS 2.Attacker use wireless NIC for AP-floods BSS with CTS, defeating the CSMA/CA (constant stream of collisions) 3.Attacker sends disassociate commands & clients disconnect Clients then immediately try to reassociate, which creates a burst of traffic. Attacker sends another disassociate command and the cycle repeats itself.

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 20

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 21

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 22

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 23

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 24 Configure a wireless NIC

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 25 How to solve access point firmware issues

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 26 How to solve access point firmware issues

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 27

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 28

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 29

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 30

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 31

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 32 Summary  Wireless LANs use standards such as IEEE a IEEE b IEEE g IEEE n  Basic Service set –Mobile clients use a single access point for connectivity  Extended service set –Multiple access point that share an SSID

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 33 Summary  WLAN security practices/methods include –MAC address filtering –SSID making –Implementing WPA2  Configuration of wireless NIC and access point –Configure both of them the same way SSID –Ensure that the latest firmware is installed  Troubleshooting WLANs include doing the following: –Check channel setting –Check for interference

© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE 1 Chapter 6 34 END Configuring a Wireless Router Chapter 7