CompTIA Network + Chapter 8 Connecting Wirelessly.

Slides:



Advertisements
Similar presentations
Anatomy of an Wi-Fi Enterprise Wireless LAN Chris De Herrera Pacific Crest Bank Chief Information Officer Webmaster, Tablet PC Talk, CEWindows.NET.
Advertisements

Wi-Fi Technology.
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Wi-Fi and Bluetooth Laboratorio di El&Tel Mauro Biagi.
Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs
Wireless Technology.
Wireless Networks.
1 15-May-15 S Ward Abingdon and Witney College Wireless CCNA Exploration Semester 3 Chapter 7.
Wireless networking technology By Abbas Izadpanah January 2007.
Click to edit Master subtitle style Chapter 12: Wireless Networkimg Instructor:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
WLAN b a Johan Montelius
Networks Olga Agnew Bryant Likes Daewon Seo.
WLAN What is WLAN? Physical vs. Wireless LAN
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Wireless Networking.
Wireless Networks Tamus, Zoltán Ádám
Communication Research Labs Sweden AB Introduction to Wireless communication and WLAN.
Chapter 8 Connecting Wirelessly
Sybex CCNA Chapter 12: Wireless Networks.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
OV Copyright © 2015 Logical Operations, Inc. All rights reserved. Unbounded Network Media  Wireless Networking  Wireless Network Devices and Components.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
PRESENTATION ON WI-FI TECHNOLOGY
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CSE 5/7349 – April 5 th 2006 Wireless Networking.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
Submitted By:- Raushan Kr. Chaurasiya(68) Santu Thapa(75) Satyanarayan Prajapat(76)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
Wi-Fi IEEE Standards a b g n ac
TERMINOLOGY Define: WPAN
Wireless Technologies
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Protocols WEP, WPA & WPA2.
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
Chapter 4: Wireless LANs
Wireless Networking Chapter 23.
CS 457 – Lecture 7 Wireless Networks
CIT 384: Network Administration
Wireless LAN Security 4.3 Wireless LAN Security.
Wireless LAN 第一組 電機四 林長寬 B /11/24.
Wireless Network Security
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
Antti Miettinen (modified by JJ)
Presentation transcript:

CompTIA Network + Chapter 8 Connecting Wirelessly

Objectives How do various wireless LAN (WLAN) technologies function, and what wireless standards are in common use? What are some of the most important WLAN design considerations? What WLAN security risks exist, and how can those risks be mitigated?

Introducing Wireless LANs The popularity of wireless LANs (WLAN) has exploded over the past decade, allowing users to roam within a WLAN coverage area, allowing users to take their laptops with them and maintain network connectivity as they move throughout a building or campus environment. Wireless device, such as laptops and smart phone, often have a built-in wireless card that allows those devices to communicate on a WLAN.

Wireless Routers The wireless router obtains an IP address via DHCP from the Internet service provider(ISP). The router uses PAT, to provide IP addressing services to devices attaching to it wireless or through a wired connection. The process through which a wireless client attaches with a wireless router (or wireless AP) is called association. All wireless devices associating with a single wireless router or AP share a collision domain. WLAN Concepts and Components

Wireless Access Point A wireless access Point (AP) interconnects a wired LAN with a WLAN, it does not interconnect two networks The AP connects to the wired LAN, and the wireless devices that connect to the wired LAN via the AP are on the same subnet as the AP. WLAN Concepts and Components

Antennas The coverage area of a WLAN is largely determined by the type of antenna used on the wireless AP or wireless router. Design goals to keep in mind when selecting an antenna include the following Required distance between an AP and a wireless client. Pattern of coverage area (for example, the coverage area might radiate out in all directions, forming a spherical coverage area around an antenna, or and antenna might provide increased coverage in only one or two directions. Indoor or outdoor environment Avoiding interference with other APs WLAN Concepts and Components

Omnidirectional: An omnidirectional antenna radiates power at relatively equal power levels in all directions. Unidirectional: Unidirectional antennas can focus their power in a specific direction, thus avoiding interference with other wireless devices and perhaps reaching greater distances.

WLAN Concepts and Components

Frequencies and Channels A characteristic to watch out for is the frequencies at which these standards operate. There are some country-specific variations, certain frequency ranges (or frequency bands) have been reserved internationally for industrial, scientific, and medical purposes. These frequency bands are called the ISM bands. Two of these bands are commonly used for WLANs. 2.4 GHz – 2.5 GHz range. Referred to as the 2.4 GHz band GHz – GHz range. Referred to as the 5 GHz Band Within each band are specific frequencies (or channels) at which device operate. WLAN Concepts and Components

3 nonoverlapping channels in US: 1, 6, 11

CSMA/CA We already learned that Ethernets carrier sense multiple access / collision detection (CSMA/CD) technology is used to control traffic on a wired network. WLAN use a similar technology called carrier sense multiple access/collision avoidance (CSMA/CA). A WLAN device listens for a transmission on a wireless channel to determine if it is safe to transmit. WLAN Concepts and Components

Transmission Methods Earlier you saw the frequencies used for various wireless channels. Those frequencies are considered to be the center frequencies of a channel. In actual operation, a channel uses more than one frequency, which is a transmission method called spread spectrum. These frequency are, however, very close to one another, which is called narrowband transmission. WLAN Concepts and Components

Transmission Methods WLAN use one of the following types of spread-spectrum technology: Direct-sequence spread spectrum (DSSS) Modulates data over an entire range of frequencies. Frequency-hopping spread spectrum (FHSS) Allows the participants in a communication to hop between predetermined frequencies or channels. Orthogonal frequency division multiplexing (OFDM) Uses a relatively slow modulation rate, combined with the simultaneous transmission of data over 52 data streams.

WLAN Standard StandardBandMax. BandwidthTransmission method Max. Range GHz1 Mbps or 2 MbpsDSSS or FHSS20m indoors/100 m outdoors a5 GHz54 MbpsOFDM35m indoors/120m outdoors b2.4GHz11 MbpsDSSS32m indoors/140m outdoors g2.4GHz54 MbpsOFDM or DSSS32m indoors / 140m outdoors n2.4GHz or 5GHz (or both) Mbps > 300 Mbps (with channel bonding) OFDM70m indoors/250m outdoors

WLAN Standard Independent Basic Service Set (IBSS) WLAN (ad-hoc)

WLAN Standard Basic Service Set (BSS) WLAN

WLAN Standard Extended Service Set (ESS) WLAN

Sources of Interference A major issue for WLANs is radio frequency interference (RFI) caused by other devices using similar frequencies to the WLAN device. Other WLAN devices Cordless Phone/ Baby Monitors Microwave ovens Wireless security systems devices Physical obstacles Signal strength

WLAN using more than one AP (an ESS WLAN) require careful planning to prevent the Aps from interfering with one another, which still servicing a desired coverage area. An overlapping of coverage between APs should exist to allow uninterrupted roaming from one WLAN cell (which is the coverage area provided by the AP) to another. However, those overlapping coverage areas should not use overlapping frequencies. Wireless AP Placement

10-15 % Coverage Overlap in Coverage Area for Non-overlapping Channels

Non-overlapping Coverage Cells for the 2.4-GHz Band Wireless AP Placement

Securing Wireless LANs Security Issues WLANs introduce some unique concerns to your network. Improperly installed wireless APs, and routers are roughly equivalent to putting an Ethernet Port in a buildings parking lot, where anyone can drive up and have access to your network. Today hackers and those who want to use free internet access perform reconnaissance, known as war driving, looking for unsecured WLANs

* Thu., Nov. 7, 2013, 6 PM * Meet in MUB 180 * Bring laptop or car if you have one * Install Vistumbler * Or just come with nothing

Other WLAN security threat include the following WEP cracking – WEP is worthless, easily cracked My students crack WEP as a CNIT 123 project WPA and WPA-2 are both very secure WPS ruins it (Wi-Fi Protected Setup) Rouge access points – A malicious user could set up his own AP to which legitimate users would connect. Securing Wireless LANs

Approaches to WLAN Security A WLAN that does not require any authentication or provide and encryption for wireless devices is said to be using open authentication. To protect WLAN traffic from eavesdroppers, a variety of security standards and practices have been developed, including the following. MAC address Filtering Disabling SSID broadcast Preshared Key IEEE 802.1X Securing Wireless LANs

IEEE 802.1x Security for a WLAN Securing Wireless LANs

Security Standards When configuring a wireless client for security, the most common security standards form which you can select are as follows: Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Wi-Fi Protected Access version 2 (WPA2) Securing Wireless LANs

WEP 40-bit WEP Key APs and client must use the same key. 24-bit initialization vector (IV) Sent in clear text. It could be compromised with a brute-force attack. Securing Wireless LANs

WAP Can require a user to authenticated before keys are exchanged. The keys used between a wireless client and an access point are temporary session keys. Temporal Key Integrity Protocol (TKIP) Message Integrity Check (MIC) WAP2 Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) Advanced Encryption Standard (AES) Securing Wireless LANs