Wireless Fidelity.  Short for wireless fidelity.  It is a wireless technology that uses radio frequency to transmit data through the air.  Wi-Fi is.

Slides:



Advertisements
Similar presentations
SEMINAR ON Wi-Fi.
Advertisements

INTRODUCTION TO Wi-Fi TECHNOLOGY.
Anatomy of an Wi-Fi Enterprise Wireless LAN Chris De Herrera Pacific Crest Bank Chief Information Officer Webmaster, Tablet PC Talk, CEWindows.NET.
Wi-Fi Technology.
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Security+ All-In-One Edition Chapter 10 – Wireless Security
1 Wireless LAN --which standard to follow? Avirup Dasgupta IT Department, Jadavpur University. Guide: Utpal K. Ray 29 th June,2004
Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs
Wireless Technology.
BZUPAGES.COM BSIT BZUPAGES.COM BSIT ON.
Wireless Networks.
Pengantar Teknologi Mobile 4 Antonius Rachmat C, S.Kom Wireless Fidelity.
Security in Wireless Networks Juan Camilo Quintero D
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Wireless Technology & Security. Wireless Local Area Networks What is the IEEE? What is the IEEE? Institute of Electrical and Electronics Engineers Institute.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Securing a Wireless Network
Wireless Local Area Technology.  Garikayi Brasington Madzudzo  Edmund Nartey  Ismeil Ahamed  Jakub Gieryn  Arnaud Fogno.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Wireless Networking.
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wi-Fi Technology By Marc Bailey. What is Wi-Fi? Wi-Fi or Wireless Fidelity is a wireless technolgy owned by the Wi-Fi Alliance (formed in 1999) Goal:
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Lecture 11 Wireless security
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
A PRESENTATION ON “Wireless Networks”
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
WIFI. What is wifi ? Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
IEEE standards (Wireless LANs) Presented by Danu Hunskunatai.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Wireless Security. Traditional method A computer with network card a cable connecting network card and the network.
Wi-Fi and Security What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
IWD2243 Wireless & Mobile Security Chapter 1 : Wireless Fundamentals Prepared by : Zuraidy Adnan, FITM UNISEL1.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
INTRODUCTION WIRELESS GATEWAY.  A device that allows a computer and other Internet-enabled devices to access the Internet connection.  Functioned as.
Objective of this Presentation To understand what is Wi-Fi and what is Bluetooth. Difference between Bluetooth and Wi-Fi.
Understand Wireless Security LESSON Security Fundamentals.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Wireless Networks Dave Abbott.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
4 Mobile Computing 2 SKS Dedy Alamsyah, S.Kom..
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Wireless Networking Chapter 23.
Wireless LAN Security 4.3 Wireless LAN Security.
By Markus Kriechhammer
Presentation transcript:

Wireless Fidelity

 Short for wireless fidelity.  It is a wireless technology that uses radio frequency to transmit data through the air.  Wi-Fi is based on the standard: ◦ a ◦ b ◦ g

 Non-profit standards organization.  Global organization that created the Wi-Fi brand name.  Formerly the Wireless Ethernet Compatibility Alliance.  Logo:

 Beberapa perusahaan yang tergabung pada konsorsium WiFi

 IEEE (Institute of Electrical and Electronics Engineers) established the Group in Specifications for standard written in  Initial speeds were 1 and 2 Mbps.  IEEE modified the standard in 1999 to include: ◦ b ◦ a ◦ g was added in  IEEE created standard, but Wi-Fi Alliance certifies products

HotSpot adalah definisi untuk daerah yang dilayani oleh satu Access Point Wireless LAN standar a/b/g, dimana pengguna (user) dapat masuk ke dalam Access Point secara bebas dan mobile menggunakan perangkat sejenis notebook, PDA atau lainnya

 Pada wireless semakin tinggi gelombang radio maka semakin tinggi bandwidth tetapi jarak semakin pendek  x menggunakan frekuensi 900, 2.4 dan 5 Ghz (Free)

 Konfigurasi Wireless LAN HotSpot gratis

 is primarily concerned with the lower layers of the OSI model.  Data Link Layer ◦ Logical Link Control (LLC). ◦ Medium Access Control (MAC).  Physical Layer ◦ Physical Layer Convergence Procedure (PLCP). ◦ Physical Medium Dependent (PMD).

 Well-supported, stable, and cost effective, but runs in the 2.4 GHz range that makes it prone to interference from other devices (microwave ovens, cordless phones, etc) and also has security disadvantages.  Limits the number of access points in range of each other to three.  Has 11 channels, with 3 non-overlapping, and supports rates from 1 to 11 Mbps, but realistically about 4-5 Mbps max.  Uses direct-sequence spread-spectrum technology.

 Extension of b, with the same disadvantages (security and interference).  Has a shorter range than b.  Is backwards compatible with b so it allows or a smooth transition from 11b to 11g.  Flexible, because multiple channels can be combined for faster throughput, but limited to one access point.  Runs at 54 Mbps, but realistically about Mbps and about 14 Mbps when b associated  Uses frequency division multiplexing

 Completely different from 11b and 11g.  Flexible, because multiple channels can be combined for faster throughput and more access points can be co-located.  Shorter range than 11b and 11g.  Runs in the 5 GHz range, so less interference from other devices.  Has 12 channels, 8 non-overlapping, and supports rates from 6 to 54 Mbps, but realistically about 27 Mbps max  Uses frequency division multiplexing

 Block your Service Set Identifier (SSID) from being broadcast.  Change the default network name in the access point.  Change the default access point password.  Center the access point in the middle of the building/house.

 Every network device has a unique MAC address ◦ Allocated by the manufacturer.  MAC Filtering only allows certain addresses access.  Mostly for home use. ◦ Tedious to implement on a large scale

 Basic encryption technology. ◦ Uses an RC4 stream cipher.  Pseudo-random bytes. ◦ Two versions: 64-bit and 128-bit versions.  Built into Wi-Fi certified equipment. ◦ Implemented at the MAC level.  Protects radio signal between device and access point. ◦ Does not protect data beyond the access point.  Uses static encryption keys. ◦ Easy to crack.  Still better then nothing.

 Designed to replace WEP. ◦ Firmware update. ◦ 128-bit Temporal Key Integrity Protocol (TKIP) encryption.  Uses a master key that is regularly changed. ◦ User authentication. ◦ Data Integrity.  Protects radio signal between device and access point.  Built into Wi-Fi certified equipment. ◦ Implemented at the MAC level.  Available in two versions: ◦ WPA2 Personal. ◦ WPA2 Enterprise.

 Designed to replace WEP. ◦ 128-bit Advanced Encryption Standard (AES).  Based on the IEEE i standard.  Provides government level security.  Also available in two versions: ◦ WPA2 Personal. ◦ WPA2 Enterprise.

 Creates a secure virtual “tunnel” from remote device to VPN server. ◦ Creates an encryption scheme. ◦ Requires authentication.  Works across the internet.  Many types and levels of VPN technology. ◦ May include hardware and software components. ◦ Some very expensive. ◦ Windows provides a basic implementation in its server software.

 Can make the network or computer invisible to the internet.  Block unauthorized users.  Monitor and control flow of data to/from a network or computer.  Many types and levels of firewall technology. ◦ Hardware and software combinations ◦ Software only versions.  ZoneAlarm  Many devices provide basic firewall capability. ◦ Gateways and access points.  Network address translation. ◦ Windows XP operating system.