CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
WLAN b a Johan Montelius
Networks Olga Agnew Bryant Likes Daewon Seo.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
ECE 4450:427/527 - Computer Networks Spring 2015
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Lecture #2 Chapter 14 Wireless LANs.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless technologies LAN Switching and Wireless – Chapter 7 and Fundamentals.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
1/28/2010 Network Plus Unit 4 Section 2: Wireless Networking.
Communication Research Labs Sweden AB Introduction to Wireless communication and WLAN.
Chapter 8 Connecting Wirelessly
CWNA Guide to Wireless LANs, Second Edition
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Jaringan Komputer Dasar Data Link Layer (2) Aurelio Rahmadian.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Wireless Technologies Chapter 9. Learning Objectives Explain current wireless networking technologies Discuss history of wireless networks and their advantages.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
WLAN.
Chapter 14 Wireless LANs.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
CSCI 465 D ata Communications and Networks Lecture 23 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
1 March 24, 2016 By Jay, Mihai, and Ryan Wi-Fi. 2 A GENDA ❖ Overview ➢ History ➢ The Big Picture ❖ IEEE Standard ➢ Headers ➢ Payload ❖ Properties.
Wireless Technologies
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless LANs Wireless proliferating rapidly.
Chapter 4: Wireless LANs
Wireless LAN Security 4.3 Wireless LAN Security.
컴퓨터 네트워크 Chapter 4 컴퓨터 네트워크.
Wireless LAN (WLAN) Wireless Ethernet Bluetooth.
IEEE Wireless Local Area Networks (RF-LANs)
Presentation transcript:

CO5023 Wireless Networks

Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an existing wired LAN, e.g. wifi Wireless WANs: Operates over long distances, can be used for connectivity between sites or broadband internet access, e.g WiMAX Wireless PANs: short range networks (personal area). Most common example is Bluetooth Cellular broadband: subscriber network covering large areas, normally for mobile phones. Gives single hop connectivity to the network providers infrastructure Satellite: Connects users by relaying signals from satellites in orbit around the earth.

Wireless LAN (802.11) Standards Wireless LANs operate at microwave frequencies (2.4GHz, 5GHz, 60GHz) n requires multiple antennas (MIMO) to achieve the 600Mbps rate, up to 4 antennas at 150Mbps each. The newer ac uses MIMO with up to 8 antennas ad uses the 60GHz band, which requires line of sight to achieve a theoretical 7Gbps.

WLAN components and topologies Components NICS Home Routers (combined, access point, router and Ethernet switch) Access points Autonomous Controller based Cloud managed Topologies Ad-hoc Devices connect directly without need of an access point, very useful in military and search and rescue applications Infrastructure Basically just a one hop set up communicating with a wired network BSS: system with one AP ESS: more than one AP covered by the same distribution system. Roaming is possible between APs

frame Frame Control - Identifies the type of wireless frame and contains subfields for protocol version, frame type, address type, power management, and security settings. Duration - Typically used to indicate the remaining duration needed to receive the next frame transmission. Address1 - Usually contains the MAC address of the receiving wireless device or AP. Address2 - Usually contains the MAC address of the transmitting wireless device or AP. Address3 - Sometimes contains the MAC address of the destination, such as the router interface (default gateway) to which the AP is attached. Sequence Control - Contains the Sequence Number and the Fragment Number subfields. The Sequence Number indicates the sequence number of each frame. The Fragment Number indicates the number of each frame sent of a fragmented frame. Address4 - Usually missing because it is used only in ad hoc mode. Payload - Contains the data for transmission. FCS - Frame Check Sequence; used for Layer 2 error control.

frame Protocol Version - Provides the current version of the protocol used. Receiving devices use this value to determine if the version of the protocol of the received frame is supported. Frame Type and Frame Subtype - Determines the function of the frame. A wireless frame can either be a control frame, data frame, or a management frame. There are multiple subtype fields for each frame type, which determine the function to perform for its associated frame type. ToDS and FromDS - Indicates whether the frame is going to or exiting from the DS, and is only used in data frames of wireless clients associated with an AP. More Fragments - Indicates whether more fragments of the frame, either data or management type, are to follow. Retry - Indicates whether or not the frame, for either data or management frame types, is being retransmitted. Power Management - Indicates whether the sending device is in active mode or power-save mode. More Data - Indicates to a device in power-save mode that the AP has more frames to send. It is also used for APs to indicate that additional broadcast/multicast frames are to follow. Security/Protected - Indicates whether encryption and authentication are used in the frame. It can be set for all data frames and management frames, which have the subtype set to authentication. Reserved/Order - Can indicate that all received data frames must be processed in order.

CSMA/CA WiFi sytems are half duplex – devices cannot send to each other at the same time: this means that collision detection, as used in some wired Ethernet networks, is impossible. Because of this, a collision avoidance technique is used with Request to Send (RTS) and Clear to Send (CTS) frames. The CTS frame includes a time duration in which the node is allowed to transmit. Other devices will back off for this time period.

Wireless AP association Wireless devices connect to the network by a 3 stage process Discovery Authentication Association Client and AP must agree on certain parameters, configurable at the AP or server. SSID - Unique ID, 2-32 characters long: the AP may advertise the SSID (passive mode) or the client may be required to know it in advance (active mode) Password - or key, prevents unwanted access Network mode - Refers to the a/b/g/n/ac/ad WLAN standards (or a mixed mode with more than one). Security mode - e.g WEP, WPA, or WPA2. Channel settings - The frequency bands being used to transmit wireless data.

Channels Wireless signals are propagated using one of 3 encoding schemes, all of which fall under the concept of “spread spectrum” Spread spectrum is a technique which sends different bits (or even different parts of the signal) over different frequencies within a band. Direct Sequence Spread Spectrum (DSSS): multiply signal by spreading code Frequency Hopping Spread Spectrum (FHSS): switch carrier signal across frequency channels Orthogonal Frequency-Division Multiplexing (OFDM): rather clever use of non-interfering subchannels. Used in most implementations When using more than one AP within an ESS, you can modify the channels on each access point so they do not interfere. A good approach is to have them 5 channels apart.

Wireless Security THREATS: Denial of Service (DoS) Spoofed Disconnect CTS flood Rogue APs Can gain access to a network by installing a rogue access point The ‘Evil Twin’ method Creates duplicate AP which steals all your data when you log in to it Solutions: MAC address filtering Authentication (ideally WPA2 with AES, WEP is awful) Configure on AP or use a RADIUS server