Wireless Network By Mohammed AL Amoudi. Overview Definition of Wireless Reliability Speed Security Conclusion.

Slides:



Advertisements
Similar presentations
SEMINAR ON Wi-Fi.
Advertisements

Wi-Fi Technology.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Wireless Networking TGIF, April 18th, 2003 Alvin Chew Kent Reuber
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless networking Roger Treweek Oxford University Computing Services.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
WLAN What is WLAN? Physical vs. Wireless LAN
WIRELESS NETWORKING Presenter: Nhan Nguyên Phương.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Access Point Extender/bridge Radio card SSID - Service Set Identifier “An identifier attached to packets sent over the wireless LAN that functions as a.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Chapter 1: Wireless Networking/Technology. Wireless Networking Definition: –the technologies that enable computers to communicate using standard network.
Wi-Fi Brandon & Jiayang. What is Wi-Fi? Wi-Fi (wireless fidelity) is a wireless networking technology that allows devices to communicate without wires.
Understand Wireless Security LESSON Security Fundamentals.
CS101 Home Network Basics.
Wi-Fi Technology.
Chapter 5 LANs and WLANs.
Wireless Networks Dave Abbott.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Network Infrastructure
Securing A Wireless Network
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Wireless Network Security
Wireless Local Area Network (WLAN)
Presented by: Jeffrey D. Bombell, American Computer Technologies
Introduction to Computers
Wireless Fidelity (15881A0515).
Wireless Networking Chapter 23.
Chapter 12 Communications Security & Countermeasures
Technology, Issues, and Solutions by David Clark
CS101 Home Network Basics.
Wireless LAN Security 4.3 Wireless LAN Security.
802.11b Wireless Network Security
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
WLAN Security Antti Miettinen.
CS101 Home Network Basics.
Antti Miettinen (modified by JJ)
By Markus Kriechhammer
Networking 101.
CS101 Home Network Basics.
Presentation transcript:

Wireless Network By Mohammed AL Amoudi

Overview Definition of Wireless Reliability Speed Security Conclusion

Wireless Definition The term wireless networking refers to technology that enables two or more computers to communicate using standard network protocols, but without network cabling.

Wireless Definition (cont): Ethernet (networking) capability over radio waves instead of physical wires. A tool for convenience, for when mobility is required in computing A solution for when short-term connections are needed.

Wireless Network Types There are two types of wireless network 1) Ad-Hoc pr Peer-to Peer networking. 2)Hardware Access Point.

Ad-Hoc pr Peer-to Peer networking consists of a number of computers each equipped with a wireless networking interface card. Each computer can communicate directly with all of the other wireless enabled computers

Hardware Access Point In this type of network the access point acts like a hub, providing connectivity for the wireless computers. It can connect (or "bridge") the wireless LAN to a wired LAN, allowing wireless computer access to LAN resources.

Reliability Easy to blocked

Blocked by Human hand This shows how the strength of the signal is decreased by placing a hand over the wireless card. Green is good signal, Red is interference, Purple is dropped signal

Reliability (Cont) Lots of Interference

Interference by other technology This shows how much inter-ference is added by using a 2.4GHz cordless phone near the wireless card. Green is good signal, Red is interference, Purple is dropped signal.

Speed

Speed (cont) Wireless is considerably slower than wires. It’s a shared resource, so the more people use it, the less there is for you. If there are other users, the available bandwidth is split between them. So, it create more interference and speed goes down even further.

Speed (Cont) SpecificationConnection SpeedRadio Frequency or 2Mbps2.4 GHz aUp to 54 Mbps5 GHz b5.5 and 11 Mbps2.4 GHz gUp to 54 Mbps2.4 GHz

Security Because of the unrestricted nature of their transmission, wireless networks have inherent security issues.

Security Threats Broadcasting: All data over the wireless connection is being broadcast on an open radio channel, like walkie-talkie or other short wave radio. Encryption: Wireless comes with substandard encryption such as WEP (wired equivalent protection) which is easy crackable. Therefor anyone with permission to be on the network can read anything on the network.

Security Threats (cont) Ways to Attack Pretending to be someone/something else - SSID Attack -Mac Spoofing -Man in the Middle Attack Direct and denial of Service attacks - Insertion Attack -Encryption Attack -Jamming

Insecure: Easily Sniffed “Sniffing” a connection means listening in (much like a tap on a phone) and pulling useful information out of the data stream. Most data is sent “clear text” which means that the sniffer can read it with little effort.

How To Secure Wireless Network  Secure your wireless router / Access Point - Your router or Access Point should require a password to access its Admin features  Use Encryption - VPN, SSH (Secure Shell), SSL (Secure Socket Layer)  Disable the Wireless card unless it is in use  Use WEP for data and Authentication

simple steps to help protect your wireless network Position wireless components away from windows and toward the center of your home to decrease the strength of the radio signal outside your intended coverage area. Do not give your wireless security settings to anyone not authorized to use your network, and avoid leaving WEP key, WPA passphrase, or password information in an obvious place (for example, taped to your monitor). Make sure you follow general security guidelines to protect all parts of your network, not just the wireless segment.

Conclusion Wireless security is a work in progress. The protocols are evolving to meet the needs of serious users. Until the protocols have proven themselves, the best course of action for network engineers is to assume that the link layer offers no security. Treat wireless stations as you would treat an unknown user asking for access to network

References tworkingwww.microsoft.com/hardware/broadbandne tworking