802.11 Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.

Slides:



Advertisements
Similar presentations
Wireless Networks.
Advertisements

WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Chapter - 11 CWNA Certified Wireless Network Administrator Introduction to Wireless LANs.
CS 350 Chapter-12 Wireless Technologies. Wireless Agencies & Standards AgencyPurposeWeb Site Institute of Electrical and Electronics Engineers (IEEE)
WIRELESS NETWORKS - A.HARIKA Y5CSO28. INTRODUCTION It refer to a telecommunication networks whose interconnections between nodes is implemented without.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Wireless Fundamentals Chapter 6 Introducing Wireless Regulation Bodies, Standards, and Certifications.
Click to edit Master subtitle style Chapter 12: Wireless Networkimg Instructor:
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Wireless Local Area Networks By Edmund Gean August 2, 2000.
& WEP Tzachy Reinman System and Network Security Course
Wireless Security.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
Wireless Technologies Networking Essentials Chapter 12 – Part 2 Fall, 2012.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Wireless LAN (WLAN) Networks
Networks Olga Agnew Bryant Likes Daewon Seo.
Introduction to Wireless Networking. Basic Wireless and Wired Network.
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Wireless Local Area Technology.  Garikayi Brasington Madzudzo  Edmund Nartey  Ismeil Ahamed  Jakub Gieryn  Arnaud Fogno.
CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
1 Chapter Overview Wireless Technologies Wireless Security.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless technologies LAN Switching and Wireless – Chapter 7 and Fundamentals.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Wi-Fi Technology By Marc Bailey. What is Wi-Fi? Wi-Fi or Wireless Fidelity is a wireless technolgy owned by the Wi-Fi Alliance (formed in 1999) Goal:
Wireless Networks Tamus, Zoltán Ádám
Communication Research Labs Sweden AB Introduction to Wireless communication and WLAN.
Chapter 8 Connecting Wirelessly
Communication System Design 2002, KTH1 Security And Availability For Wireless Communication Organization Post & Telestyrelse : Anders Rafting Coach : Lars.
Sybex CCNA Chapter 12: Wireless Networks.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
OV Copyright © 2015 Logical Operations, Inc. All rights reserved. Unbounded Network Media  Wireless Networking  Wireless Network Devices and Components.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Presented by: Dr. Munam Ali Shah
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Setting Wireless Network At Home By: Parveen Sharma.
A presentation On a,b,g Wireless LAN, and Preented By Md.Masum Hossain Pranjal Sinha Md.Munis Varun Jain Anmol Jain Nsumbu Noe.
Wireless Security. Traditional method A computer with network card a cable connecting network card and the network.
CSE 5/7349 – April 5 th 2006 Wireless Networking.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Emerging Broadband Wireless Standards IEEE Bluetooth WAN MAN LAN PAN IEEE n- Wireless LAN IEEE d Hybrid MAC/ MIMO OFDMA/ MIMO HSDPA/
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
IEEE Wireless LAN Standard
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Wireless LAN Concepts. Wireless LAN Standards.
Standard: Security Methods Jason Gibson TCM471 Professor Crum.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Chapter 4: Wireless LANs
CSE 4905 Network Security Overview
Wireless Networking Chapter 23.
Presentation transcript:

Standard: Comparison and Security Jason Gibson TCM471 Professor Crum

Introduction: History  Television Remote Control  Cordless Phones  Cellular Phones  Business Applications

IEEE Institute of Electrical and Electronics Engineers  Ensure Compatibility  Define Standards  Research New Technology  Wireless Standards   b  a  g

IEEE  Developed in 1997  Supports High Data Rates - 1 to 2 Mbps  Operates at 2.4 GHz 2.4 GHz  Layer 1 -FHSS -DSSS  Layer 2 - CSMA/CA

IEEE b  Released in 1999  Support Higher Data Rates to 11 Mbps  Operates at 2.4 GHz  3 non- overlapping channels  Long Range Problem  Interference

IEEE a  Released September 1999  Support Higher Data Rates - 54 Mbps - 54 Mbps  Operates at 5 GHz  OFDM Problems  Limited Range  Interoperability

IEEE g  Scheduled Approval, May 2003  Support High Data Rates like a - 54 Mbps - 54 Mbps  Operates at 2.4 GHz like b  Backward Compatibility

Wireless Local Area Networks

Ad-hoc Mode - IBSS  Clients in same cell communicate directly  Other clients act as gateways within cell  Bluetooth

Infrastructure Mode - BSS  Centrally located access point  Management Frame Exchange  Association Process

Security Methods  Wired Equivalency Protocol (WEP)  Security Measures –Authentication –Confidentiality –Integrity  Vulnerabilities

Types of Attacks  Passive Attack –Eavesdropping –Traffic Analysis  Active Attack –Masquerading –Denial of Service

Security Solutions  Utilize Multiple Defensive Strategies  Virtual Private Networks (VPN’s)  Regular Password Updates  Changing Default SSID and Cryptographic Keys  Install Intrusion Detection system

QUESTIONS?