Wireless LAN presented by: Damian Borth, Florian Seidel, Thomas Winterscheid.

Slides:



Advertisements
Similar presentations
Anatomy of an Wi-Fi Enterprise Wireless LAN Chris De Herrera Pacific Crest Bank Chief Information Officer Webmaster, Tablet PC Talk, CEWindows.NET.
Advertisements

Wi-Fi Technology.
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Security+ All-In-One Edition Chapter 10 – Wireless Security
Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs
A Wireless Local Area Network (WLAN) is a network that interconnects devices using radio waves. Wireless networking technologies allow devices to communicate.
Wireless Networks.
1 Pertemuan 17 Jaringan LAN (Local Area Network) Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Wireless networking technology By Abbas Izadpanah January 2007.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
Wireless Local Area Networks By Edmund Gean August 2, 2000.
CPET 260 – Network I Wireless Networks Bluetooth.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Networking Overview Carey Williamson Dept. of Computer Science U. of Calgary (Original slides courtesy of David Schwab, U of S)
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
WLAN b a Johan Montelius
Wireless LANs Presented by: Jerome Thompson Mei-Lun Huang Liu-Yin Hu Kai-Wing Sum.
Wireless Networking 102.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
1 Chapter Overview Wireless Technologies Wireless Security.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Wireless LAN Pertemuan 16 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless technologies LAN Switching and Wireless – Chapter 7 and Fundamentals.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
Chapter 8 Connecting Wirelessly
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
PRESENTATION ON WI-FI TECHNOLOGY
2001/11/23 Prof. Huei-Wen Ferng 1 Chapter 4 Wireless LAN Technologies and Products.
A PRESENTATION ON “Wireless Networks”
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Wireless Technologies Chapter 9. Learning Objectives Explain current wireless networking technologies Discuss history of wireless networks and their advantages.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CSE 5/7349 – April 5 th 2006 Wireless Networking.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Submitted By:- Raushan Kr. Chaurasiya(68) Santu Thapa(75) Satyanarayan Prajapat(76)
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Wi-Fi Technology.
Wireless Technologies
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Wireless Networking Chapter 23.
Anatomy of a Wireless LAN – Part I
Wireless LAN Technologies and Products
802.11b Wireless Network Security
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
IEEE Wireless Local Area Networks (RF-LANs)
Presentation transcript:

Wireless LAN presented by: Damian Borth, Florian Seidel, Thomas Winterscheid

Contents Definition The IEEE standards Infrastructure and Impairments Hardware System Providers Advantages and Disadvantages Security Alternatives

Table of content IEEE Standard Basics Frequency OSI / ISO Layer Modulation Net topology Properties

Standard There is the IEEE Standard for WLAN`s Sub specifications a b g e

Basics OSI / ISO overview Physical Layer Wireless LAN is almost exclusively Spread Spectrum Radio direct sequence spread spectrum (DSSS) frequency-hopping spread spectrum (FHSS) infrared pulse position modulation (IrDA) Data Link Layer Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol

Basics Frequence ISM band 2.4 GHz and 5 GHz GHz frequency band GHz frequency band Modus Ad hoc mode Peer to peer Infrastructure mode Using an access point network

Properties Range: 100m – 400m (outdoors) b- 2.4GHz a- 5GHz g- 2.4GHz e- w/QoS

Contents (Part 2) Definition The IEEE standards Infrastructure and Impairments Hardware System Providers Advantages and Disadvantages Security Alternatives

How to install? Two different use modes: AdHoc (P2P) Infrastructured (LAN) ? ? ? ?

Adhoc Standard P2P connection Only for two PC`s Same way of configuration (IP range etc...) Transferrate 11 Mbit/s Range ca. 30m-50m (outdoor 400m) WEP against eavesdropping

Infrastructured Access points are needed Range 30m - 50m Access points act like bridges/gateways Installation of access points enables Roaming functionality Configuration of IP and administration like in wired network Transferrate 11 Mbit/s

Impairments Weakened by solid walls and concrete No influence through glass Range impairment can be increased with additional antenna up to 2 km Bluetooth / IrDA

Which hardware you need? WirelessLan-Card Adapter USB Access Point e.g. Fujitsu-Siemens I-Gate WLAN I-Gate WLAN Pre-installed

Wired? Connectivity to wired LAN Access points must be installed (bridge functionality) Connectable to each kind of LAN

Roaming Extended connectivity possibility Allows free mobility Access points transfers given IP within the network Roaming between different networks is also possible (bridge/gateway)

Access to WAN?...is possible by using access points connected to ISDN / DSL Access points can act like a gateway No impairment to the transferrates

System provider Producer Fujitsu-Siemens Aironet NDC Proxim Bay Networks Lucent RDC Productname I-Gate Telxon Serie 3500 Instantwave Rangelan Airsurfer Wavelan Portlan

Contents (Part 3) Definition The IEEE standards Infrastructure and Impairments Hardware System Providers Advantages and Disadvantages Security Alternatives

Advantages mobility / flexibility inexpensiveness ease of installation / usage extends LAN and doesnt need to replace it

Disadvantages lack of security lower transmission rates than in wired networks

Security basic problem: broadcast of radio data transmission piracy tools: AirSnort WEPcrack Network Stumbler, etc. real problem: default settings of WLAN are insecure, e.g. Accept ANY SSID

Security - WEP Wireless Equivalent Privacy based on RC4 encryption algorithm most important, but optional 128 bit encryption algorithm for data encryption and authentification

Security - WEP WEP does stream-encryption + generates key for each data package to set up the stream, WEP uses the shared key and an initialization vector the plain text information is parsed bit- by-bit and combined with pseudo random numbers (ensures that packages with same content are not equally encrypted)

Security - WEP a carrier frequency is determined by the constallation of the data stream and broadcasted throughout the WLAN the recipient deletes the pseudo random numbers and restores the plain text information

Weak Point Initialization Vector (IV) 24 bit easily predictable (usually increment by1) Same IV + (constant) Shared Key IV-Collision (same WEP-Key) many IV-Collisions allow extraction

Security check change default settings (e.g. password) use WEP encryption change WEP key regularly filter MAC addresses position APs before firewall

Security check check log files for intrusion attempts use intrusion detection system turn off DHCP use authentification for extra high security use a VPN.

Standards Overview

References & Bibliography Data and Computer Communications,Sixth Edition, William Stallings, Prentice Hall

Any Questions? Thank you.