Chapter 10.  Upon completion of this chapter, you should be able to:  Understand.

Slides:



Advertisements
Similar presentations
Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs
Advertisements

WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
1 15-May-15 S Ward Abingdon and Witney College Wireless CCNA Exploration Semester 3 Chapter 7.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
CPET 260 – Network I Wireless Networks Bluetooth.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Fundamentals of Networking Discovery 1, Chapter 7.
7: Wireless Technologies Networking for Home & Small Business.
Wireless Communication Systems
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
WLAN What is WLAN? Physical vs. Wireless LAN
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Wireless Networking.
Module 6.6 Networking. Internet Connectivity By default, new computers typically come with the network cards installed, the proper drivers installed,
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES.
Wireless Technologies
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Chapter 4 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Describe the purpose of the physical layer  Identify.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
LANs and WLANs Chapter 5. 5 Chapter 5: LANs and WLANs 2 Chapter Contents  Section A: Network Building Blocks  Section B: Wired Networks  Section C:
Wireless Networking.
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
Wireless Networking Chapter 16. Objectives Explain wireless networking standards Describe the process for implementing Wi-Fi networks Describe troubleshooting.
Communication Research Labs Sweden AB Introduction to Wireless communication and WLAN.
Chapter 8 Connecting Wirelessly
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Sybex CCNA Chapter 12: Wireless Networks.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Computer Concepts 2014 Chapter 5 Local Area Networks.
OV Copyright © 2015 Logical Operations, Inc. All rights reserved. Unbounded Network Media  Wireless Networking  Wireless Network Devices and Components.
EDT 661 Kelly Maurer. (((DS))) (((WIRELESS PRINTER))) ((( NETBOOK ))) DESKTOP ROUTER MODEM INTERNET /DLS (FROM WALL)
Presented by: Dr. Munam Ali Shah
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
PRESENTATION ON WI-FI TECHNOLOGY
 LANs and WLANs LANs and WLANs1.  Network Building Blocks  Wired Networks  Wireless Networks  Using LANs  Security Through Encryption LANs and WLANs2.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Ethernet Chapter 4.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
7: Wireless Technologies Networking for Home & Small Business.
 Today’s networks are no longer limited to using cabled, or wired, devices.  Today’s networks have a mix of wired systems along with wireless systems.
Securing a Wireless Home Network BY: ARGA PRIBADI.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
LOGO Wireless 25-Sep-16Jaringan Komputer_D3 TT_IT Telkom1.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
CCNA Exploration Semester 3 Chapter 7
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Chapter 4: Wireless LANs
Wireless Networking Chapter 23.
Wireless LAN Security 4.3 Wireless LAN Security.
Wireless networking Chapter days including test.
Presentation transcript:

Chapter 10

 Upon completion of this chapter, you should be able to:  Understand

10.1

 IEEE wireless standards  2.4GHz & 5GHz  Moving away from 2.4GHz  Congested with other devices  Most channels overlap, causing interruption 1, 6, 11 DO NOT OVERLAP

 STA  Device w/ wireless card installed  Infrastructure wireless network  Devices use a Wireless Access Point (WAP or AP) to handle communication  Star topology  Ad hoc wireless network  Intermediate Basic Service Set (IBSS)  Devices communicate directly with each other; peer to peer  No Access Point is used  Mesh topology

 BSS (Basic Service Set)  Devices that talk to an AP on the same channel  ESS (Extended Service Set)  BSS’ that connect together  Each AP on a separate channel  AP’s connect together

 Backhaul  Link between AP & wired network  Allows AP to talk to wired network  Allows AP to talk to other wireless clients in another BSS  SSID (Service Set Identifier)  Name of the wireless network

 Ethernet uses CSMA/CD to talk on the wired network  Takes turns talking, detects collisions, backoff  Wireless uses CSMA/CA  Carrier sense multiple access with collision avoidance  STA listens for wireless signals; busy=wait  STA sends a RTS (Request to Send) message to AP  CTS (Clear to Send) comes back from AP All other communications backoff for milliseconds  Message sent to destination

 TestOut Fact Sheet  TestOut Practice Questions (5)

10.2

 Many devices use wireless  Cordless Phones 2.4GHz Interference  Microwave Ovens Interference  Range  Solid Walls a problem  Not as fast as, or reliable as, wired  Security  Wireless is east to access & can be intercepted Authentication & Encryption now used

 Specifies data speed, range, RF spectrum  IEEE standards, Wi-Fi  a, b, g, n, ac  Wi-Fi Alliance tests devices from manufacturer  Will work with other devices w/ same logo

 1999  2.4GHz  11Mbps  150ft range indoors  300 ft range outdoors

 1999  5GHz  Unused at that time  Less congestion  54Mbps (faster than B)  NOT compatible with b/g/n  150ft range  Originally too expensive

 2003  2.4GHz  54Mbps  150ft range indoors  300 ft range outdoors  Compatible with b

 2.4Ghz  600Mbps  Up to 12000ft range  Backwards compatible b/g

 5GHz (for faster speeds) & 2.4GHz  Up to 1.3Gbps  150ft range  Backwards compatible with b/g/n

Standard Maximum Speed Frequency Backwards compatible a b g n ac

Standard Maximum Speed Frequency Backwards compatible a 54 Mbps5 GHzNo b 11 Mbps2.4 GHzNo g 54 Mbps2.4 GHz802.11b n 600 Mbps2.4 GHz or 5 GHz802.11b/g ac 1.3 Gbps (1300 Mbps) 2.4 GHz and 5.5 GHz802.11b/g/n

 You’d like to add wireless with speeds up to 1.3Gbps. Which spec should you buy?  ac  What is the max speed of G?  54Mbps  What connects wireless devices to a wired network?  AP  What wireless spec is not compatible with others?  a

 What could interfere with a wireless signal?  Cordless phones, microwaves, solid walls  b, g, and n all operate on what frequency?  2.4GHz  n & ac operate on what frequency?  5GHz  Which 3 channels are non-overlapping on 2.4GHz?  1, 6, 11

 Channel is a frequency  b/g has 11 channels to use  Channels overlap  1, 6, 11 are separate  Multiple APs are used  Use separate channels since they overlap so they don’t interfere with each other

 23 non-overlapping channels  It’s much easier to keep same-channel cells from touching

 Adds transmit & receive antennas/radios to the AP

 Allows antennae to divide streams to multiple devices

 Personal Area Network (PAN)   2.4GHz  Short range (up to 100m)  Bluetooth 3.0 & 4.0  Use link to connect  Use WiFi for data transfer, up to 24mbps

 TestOut Configuring Bluetooth Connections Video  TestOut Fact Sheet Review  TestOut Practice Questions (13)

10.3

 Connect  Plug into switch, go to browser, enter IP  Press WPS buttons on both devices (stay close)  Change password  SSID & disable broadcast  Network Mode (a/b/g/n/ac/mixed)  Security/encryption  Channel width  20 or 40 MHz or Auto  Channels  Set for both 2.4 & 5 GHz

 Use Chrome

 Service Set Identifier  Name of wireless network  Case-sensitive & up to 32 characters  All of your devices MUST have same SSID  Should disable the Broadcast of SSID  Change Router/AP password from default

 You can change the hostname & IP from default  People know or can lookup the default IP for the config and could change the settings!

 Choose your type of wireless  If all use N, select N  Mixed clients? Choose Mixed  Mixed- more overhead; slower performance  Channel width  At home, leave on Auto  Channel  With only 1 AP, leave at Auto  Change if getting interference/drops

 Clients authenticate to AP 1 st before communication  Pre-Shared Key (PSK)  Choose a passphrase  Enterprise  Set up a RADIUS server

 How data is encrypted when sent between client and AP  None- BAD CHOICE!  WEP  WEAKEST with only bits  WPA Personal (WPA-PSK)  WPA Enterprise  Requires RADIUS server  WPA2 Personal (WPA2-PSK)  Max 256 bits  WPA2 Enterprise  Requires RADIUS server

 Use your device’s MAC address to limit connectivity to your KNOWN devices  You pre-configure the MACs in the AP  The AP will check its list  Only those in list will connect

 Typo on the MAC address  New devices can’t enter network without adding Mac to the AP configuration  MAC address cloning  Sniff network traffic (MAC address in packet)  Find MAC addresses on that network  Change your MAC address to match one on the target network.

Use all of the following to secure your wireless network: 1. Change the router IP address 2. Change the router password from the default 3. Change the SSID & disable the broadcast 4. Use MAC Address Filtering 5. Authentication (PSK) 6. Encryption (WPA2)

 TestOut Create a Home Wireless Network LAB  TestOut Secure a Home Wireless Network LAB  TestOut Configure Wireless Profiles LAB  TestOut Practice Questions (4)

10.4

 Gather requirements  Identify expectations  Identify design considerations  Conduct mapping  Perform bandwidth planning  Conduct site survey  TestOut Wireless Network Design Video  PLEASE pay attention to it

 Regular or high gain  Measured in decibels (12dB or more for high gain)  Omnidirectional antenna  360 degree signal  Used in Access Points  Directional antenna  Concentrate signal in one direction for better distance  Connects networks 25 miles or more apart

 Used to bridge wireless networks  Example: GCIT to BBE wirelessly  Yagi antenna

 TestOut Conducting a Wireless Survey Video  TestOut Design an Indoor Wireless Network LAB  TestOut Design an Outdoor Wireless Network LAB  TestOut Practice Questions (9)

10.5

 Use a wireless controller and LWAP  Controller connects to AP by wire  Controller connects to wired network too  Controller acts as a router to wired network  Sends config to LWAP

 Distributed wireless mesh  Still uses controller  APs are smart enough to talk to each other too

 TestOut Implement an Enterprise Wireless Network LAB  TestOut Practice Questions (4)  TestOut Wireless Security Video  Only review from Encryption down

10.6

 Unauthorized AP on a network  Employee or person adds their own AP on a free port  Can be used just for  Getting wireless access  Pharming- people connect & enter credentials on a fake website; attacker steals credentials

 Rogue AP set up with same SSID as legit AP but with stronger signal  People connect to it  Attacker can sniff, phish, capture data

 Driving & looking for unsecure or weak (WEP) network to gain access to it or mark on a map

 Drive & find open networks  Mark with chalk on sidewalk or building to tell others it’s an open network

 Snorting or snarfing  Attacker sets WiFi card to Monitor Mode to listen to packets over the radio waves

 Jamming a wireless signal so others can’t use it

 TestOut Secure an Enterprise Wireless Network LAB  TestOut Practice Questions (15)

10.7

 What are some things you should check?

 Wireless adapter turned on? ***COMMON***  Correct SSID?  Matching security settings?  Correct passphrase?  Correct wireless standard?  Too far from AP?  Solid walls between you and the AP?  Interference from EMI, RFI, cordless phones, microwave ovens?  Correct antenna & placement?

 TestOut Exploring Wireless Network Problems LAB  TestOut Troubleshoot Wireless Network Problems 1  TestOut Troubleshoot Wireless Network Problems 2  TestOut Practice Questions (15)

 Complete the study guide handout  Complete TestOut  Practice in Packet Tracer  Jeopardy review

Chapter 10