1 15-May-15 S Ward Abingdon and Witney College Wireless CCNA Exploration Semester 3 Chapter 7.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs
Application Guide For Mesh AP – MAP-3120
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Networks Olga Agnew Bryant Likes Daewon Seo.
Design Considerations & Emerging Standards.  Carrier Sense Multiple Access / Collision Detect.  Practical limit on Nodes per collision domain.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Instructor: Dr.Hanal ABUZANT
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
LANs and WLANs Chapter 5. 5 Chapter 5: LANs and WLANs 2 Chapter Contents  Section A: Network Building Blocks  Section B: Wired Networks  Section C:
Wireless Networking.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Chapter 8 Connecting Wirelessly
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Sybex CCNA Chapter 12: Wireless Networks.
CWNA Guide to Wireless LANs, Second Edition
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Presented by: Dr. Munam Ali Shah
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
PRESENTATION ON WI-FI TECHNOLOGY
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
 LANs and WLANs LANs and WLANs1.  Network Building Blocks  Wired Networks  Wireless Networks  Using LANs  Security Through Encryption LANs and WLANs2.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
CCNA3-1 Chapter 7-2 Chapter 7 Basic Wireless Concepts and Configuration Part II.
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
Submitted By:- Raushan Kr. Chaurasiya(68) Santu Thapa(75) Satyanarayan Prajapat(76)
COMPUTER FUNDAMENTALS David Samuel Bhatti
Chapter 10.  Upon completion of this chapter, you should be able to:  Understand.
Chapter-7 Basic Wireless Concepts and Configuration.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
LOGO Wireless 25-Sep-16Jaringan Komputer_D3 TT_IT Telkom1.
Chapter 5 LANs and WLANs.
CCNA Exploration Semester 3 Chapter 7
Basic Wireless Concepts and Configuration Part II
Chap 7 – Configure Wireless Routers Learning Objectives
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Wireless Networking Chapter 23.
CIT 384: Network Administration
Wireless LAN Security 4.3 Wireless LAN Security.
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
Configure a Wireless Router
Presentation transcript:

1 15-May-15 S Ward Abingdon and Witney College Wireless CCNA Exploration Semester 3 Chapter 7

2 15-May-15 S Ward Abingdon and Witney College Topics Components and basic operation of wireless LANs Basic WLAN security Configure and verify basic wireless LAN access Troubleshoot wireless client access

3 15-May-15 S Ward Abingdon and Witney College Semester 3 LAN DesignBasic Switch Concepts VLANs VTP STP Inter-VLAN routing Wireless

4 15-May-15 S Ward Abingdon and Witney College Wireless advantages Stay in contact while travelling. Move workstation within building without moving cables. In new building, save cost of cabling the whole building – just some cables needed. Use a variety of wireless devices. Can link to cabled network.

5 15-May-15 S Ward Abingdon and Witney College Wireless problems Interference Signal strength, blind spots Security – anyone with receiver within range can pick up signals Regulations differ in different countries

6 15-May-15 S Ward Abingdon and Witney College Standards PANLANMANWAN StandardsBluetooth GSM CDMA Satellite Speed< 1 Mbps11-54 Mbps 10 – 100+ Mbps 10 Kbps – 2 Mbps RangeShortmediumMedium- long Long

7 15-May-15 S Ward Abingdon and Witney College Wireless and Ethernet Wireless workstations connect to cabled Ethernet network via an access point (AP). Collisions can occur both with Ethernet and with wireless. Ethernet detects and recovers (CSMA/CD) Wireless uses collision avoidance. Frame format is different.

8 15-May-15 S Ward Abingdon and Witney College a Introduced 1999, not compatible with b OFDM modulation (faster, up to 54Mbps) More costly than b 5 GHz band. Smaller antennas, less interference Poorer range, absorbed more by walls etc. Not allowed in some countries.

9 15-May-15 S Ward Abingdon and Witney College b Introduced 1999, not compatible with a DSSS modulation, slower, 1, 2, 5.5, 11 Mbps Cheaper than a 2.4 GHz band. More interference as many appliances use this band Longer range, less easily obstructed.

10 15-May-15 S Ward Abingdon and Witney College g Introduced 2003 Compatible with b DSSS modulation, to 11 Mbps or OFDM to 54 Mbps 2.4 GHz band. More interference as many appliances use this band Longer range, less easily obstructed.

11 15-May-15 S Ward Abingdon and Witney College n Expected Sept 2008, in draft now. May use both 2.4 and 5 GHz band MIMO-OFDM Splits high data rate stream into several low data rate streams, transmits simultaneously using multiple antennae. Possibly up to 248 Mbps with 2 streams Longer range, 70 metres

12 15-May-15 S Ward Abingdon and Witney College Organisations ITU-R allocates RF spectrum bands and satellite orbits IEEE develops and maintains 802 standards for LANs and MANs including wireless modulation Wi-Fi Alliance certifies that vendors keep to standards and industry norms so that devices can operate together

13 15-May-15 S Ward Abingdon and Witney College Wireless NIC Needed to connect a device to an access point. Laptops used to have PCMCIA cards. Some still do, but now the NIC is usually built in. Desktops can have expansion cards installed, or they can use a USB device.

14 15-May-15 S Ward Abingdon and Witney College Access point, shared medium Access point acts like a hub (not switch) Wireless is a shared medium uses CSMA/CA Devices detect activity on the medium, send signals if all is clear. Signal is acknowledged if it is received Attenuation limits distance of client from access point.

15 15-May-15 S Ward Abingdon and Witney College Hidden nodes If two stations cannot sense each others’ signals then they may transmit at the same time and have a collision. Request to send/clear to send (RTS/CTS) avoids this. Station requests the medium, access point allocates it for long enough to complete the transmission.

16 15-May-15 S Ward Abingdon and Witney College Wireless router Commonly used for Internet access Acts as router, Ethernet switch and wireless access point. Configure for mode a, b, g, or n Configure shared service set identifier (SSID) to identify network Select channel within 2.4GHz band. Adjacent access points need non-overlapping channels.

17 15-May-15 S Ward Abingdon and Witney College Ad hoc topology No access point Peer to peer Negotiate parameters Independent basic service set Area covered is basic service area (BSA).

18 15-May-15 S Ward Abingdon and Witney College Basic service set topology One access point Access point manages parameters for clients Infrastructure mode Area covered is basic service area (BSA).

19 15-May-15 S Ward Abingdon and Witney College Extended service set topology More than one access point Access point manages parameters for clients Infrastructure mode Area covered is extended service area (ESA).

20 15-May-15 S Ward Abingdon and Witney College Beacon and probe Access point may send out a beacon at regular intervals for clients to detect. Client sends a probe specifying the SSID and bit rates supported. Access point responds. Client can send probe with no SSID to look for any network. Access point may be configured to respond, or not.

21 15-May-15 S Ward Abingdon and Witney College Authentication Client requests authentication. Access point responds had two authentication mechanisms. NULL (Open Authentication) does not give privacy. Wired Equivalency Protection (WEP) uses a shared key.

22 15-May-15 S Ward Abingdon and Witney College Association Request from client and response. Finalizes security options Finalizes bit rate options Sets up data link Client learns the access point MAC address (BSSID) Access point maps a logical port known as the association identifier (AID) to the WLAN client.

23 15-May-15 S Ward Abingdon and Witney College Placing access points Above obstructions. At least 3 feet from metal obstructions. Vertically and high up. In locations where users will work. But not too close to people. Work out the coverage for each AP. Allow enough overlap.

24 15-May-15 S Ward Abingdon and Witney College Security threats War drivers look for an unsecured network that will provide Internet access. Hackers (Crackers) enter systems to steal data or cause harm. They can often get past weak security. Employees may install rogue access points without permission and without implementing the necessary security.

25 15-May-15 S Ward Abingdon and Witney College Man in the middle Attacker modifies the NIC of a laptop with special software so that it accepts all traffic, not just traffic addressed to it. Uses packet sniffing software, such as Wireshark, to observe a client station connecting to an access point. Detects names, IP addresses, ID and the challenge and associate response. Can then monitor network.

26 15-May-15 S Ward Abingdon and Witney College Denial of service Use common devices to create interference. (cordless phone, microwave, baby monitor) Flood the network with clear-to-send (CTS) messages. Clients then send simultaneously and cause a constant stream of collisions. Send a series of disassociate commands so that clients repeatedly disconnect then try to reassociate.

27 15-May-15 S Ward Abingdon and Witney College original authentication Open authentication – no privacy or security “Authenticate me.” “All right.” WEP shared key authentication – weak encryption algorithm could be cracked. 32 bit key had to be entered by hand. Prone to error and not easily scalable.

28 15-May-15 S Ward Abingdon and Witney College Authentication developments Vendors created their own security systems Wi-Fi Alliance developed WiFi Protected Access (WPA) security method i standard introduced - similar to the Wi-Fi Alliance WPA2 standard.

29 15-May-15 S Ward Abingdon and Witney College TKIP and AES encryption Temporal Key Integrity Protocol (TKIP) encryption mechanism is certified as WPA by Wi-Fi Alliance. TKIP uses the original encryption algorithm used by WEP but addresses its weaknesses. TKIP encrypts the Layer 2 payload and carries out a message integrity check to detect tampering. Advanced Encryption Standard (AES) encryption mechanism is certified as WPA2. Has additional features. AES is the preferred method.

30 15-May-15 S Ward Abingdon and Witney College Configuring Access Point 1. Check wired operation: DHCP, Internet access 2. Install access point 3. Configure access point without security 4. Install one wireless client without security 5. Check wireless network operation 6. Configure security 7. Check wireless network operation

31 15-May-15 S Ward Abingdon and Witney College Basic Wireless Settings Network Mode – Lets you choose the right mode for your devices. B, G, N, mixed or BG mixed. You can disable wireless operation. Network Name (SSID) – should be changed from the default. Must be the same for all devices on the network. SSID broadcast can be enabled or disabled.

32 15-May-15 S Ward Abingdon and Witney College More Basic Wireless Settings Radio Band – For Wireless-N devices only, select Wide - 40MHz Channel. For Wireless-G and Wireless-B only, select Standard - 20MHz Channel. For mixed devices, keep the default Auto. Wide Channel - If you selected Wide for the Radio Band, Select a channel from the drop- down menu. Standard Channel - Select the channel.

33 15-May-15 S Ward Abingdon and Witney College Security Choose PSK2 (WPA2 or IEEE i) if all client devices are able to use it. If some older devices do not support WPA2 then choose the best security mode that is supported by all devices. Encryption – AES is stronger than TKIP. Use AES with WPA2.

34 15-May-15 S Ward Abingdon and Witney College Configure the client Choose the network to connect to. Enter the SSID Choose the authentication method Choose the encryption method Enter the network key.

35 15-May-15 S Ward Abingdon and Witney College Troubleshooting Generally start with the physical layer and then move up. Eliminate the client PC as the source of trouble before checking the rest of the network.

36 15-May-15 S Ward Abingdon and Witney College Troubleshooting – no connectivity Check that the PC has an IP address. Try connecting the PC to the wired network and ping a known address Try a different wireless NIC. Reload drivers as necessary. Check the security mode and encryption settings on the client. Do they match the access point?

37 15-May-15 S Ward Abingdon and Witney College Troubleshooting – poor connection Check distance to access point Check the channel settings on the client. Check for devices that might be causing interference (cordless phone, microwave oven etc).

38 15-May-15 S Ward Abingdon and Witney College Troubleshooting – looking wider Are all devices in place? Are they all powered on? Are wired links working correctly? Is there a neighbouring access point using an overlapping wave band? Are access points badly placed?

39 15-May-15 S Ward Abingdon and Witney College The End