Wireless Networking TGIF, April 18th, 2003 Alvin Chew Kent Reuber

Slides:



Advertisements
Similar presentations
SEMINAR ON Wi-Fi.
Advertisements

Anatomy of an Wi-Fi Enterprise Wireless LAN Chris De Herrera Pacific Crest Bank Chief Information Officer Webmaster, Tablet PC Talk, CEWindows.NET.
Application Guide For Mesh AP – MAP-3120
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Wireless networking Roger Treweek Oxford University Computing Services.
Wireless Network Selo TE UGM. Wireless Networking Wireless Networking (Wi-Fi) Wireless Networking (Wi-Fi) Introduction and Benefits Introduction and Benefits.
Wi-Fi Structures.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Chudi IgboemekaITSS, Stanford University 04/2002 Campus Wireless Update Chudi Igboemeka Academic Technology, Pilots & Projects ITSS.
Introduction to Computer Networking. Wireless Network.
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
Computer Networks IGCSE ICT Section 4.
Networking Components
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Securing a Wireless Network
SOHO Wireless Networking SCATA Nov 2005 Dr Duncan Hancox.
Wireless Networking 102.
Networking Components Mike Yardley LTEC 4550 Assignment 3
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking (Part 4 of 5)
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
NETWORKING COMPONENTS By Scott H. Bowers. HUB A hub can be easily mistaken for a switch, physically there are no defining characteristics, both have power.
Common Devices Used In Computer Networks
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
PRESENTATION ON WI-FI TECHNOLOGY
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
● Albert Einstein explained it best: ● "You see, wire telegraph is a kind of a very, very long cat. You pull his tail in New York and his head is meowing.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Networking Devices.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Going Wireless Presented By: Mohamed A. Farahat By: Evan H. Shu, FAIA Web Address: Topic Number:
Chapter 3.  Upon completion of this chapter, you should be able to:  Select and install network cards to meet network connection requirements  Connect.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
Network Components Kortney Horton LTEC October 20, 2013 Assignment 3.
Network Equipment Assignment 3 LTEC 4550 Aaron Whitaker.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
NETWORKING COMPONENTS Mujeeb Alikhan LTEC Hub A hub connects to multiple computers in a network. When traffic is transmitted thru the hub all devices.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wireless Gateway Name : Ahmad Rafiq Bin Razif Matrix Num :
MOHAMAD NURHAKIM BIN ZAILAN 2TSK1. Wireless Gateways The wireless gateway is a device that allows a computer and other Internet-enabled devices.
Networks and Security Great Demo
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Wireless Network By Mohammed AL Amoudi. Overview Definition of Wireless Reliability Speed Security Conclusion.
WHAT’S A WIRELESS AP? AND WHY DO I NEED ONE? Network Components & How They Work.
Instructor Materials Chapter 6 Building a Home Network
Wireless Fidelity 1 1.
How To Set Up A Wireless Network
Introduction to Computers
Chapter 12 Communications Security & Countermeasures
Presentation transcript:

Wireless Networking TGIF, April 18th, 2003 Alvin Chew Kent Reuber

Outline Wireless technology overview ITSS Wireless Net Department wireless nets Home wireless nets Questions

Wireless Technology Overview

Why Wireless? (+) No wires. Convenience, flexible. But… –(-) Relatively slow speeds, typically 5 Mbps with b. Nowhere near the 100 Mbps of typical wired connection. –(-) Wireless access points are hubs, not switches. Bandwidth is shared among wireless users. Think of it as phone party lines. –(-) Data is freely available “in the air”. Traffic is easily sniffed. Data is not encrypted unless the protocol is encrypted (e.g., SSL and Kerberos). Stanford does not use WEP, because it can be cracked.

Wireless Terms Access Point (or AP): device that sends and receives wireless signals. Usually directly connected to the wired net. –ITSS uses Cisco Aironet 350 AP’s. SSID: the network name that Access Points broadcast. –ITSS uses “Stanford”. –Departments and home users may want to use other names. –Users can roam between access points with the same SSID. Channel: radio frequency used by AP’s. –AP’s near one another should use different channels to minimize noise. –802.11b: Channels 1, 6, and 11 don’t overlap. Channels 1, 4, 8, and 11 have only a little bit of overlap

Wireless “Alphabet Soup” b: –Most common wireless protocol. Uses 2.4GHz frequency, with 11 Mbps bandwidth. (5 Mbps is more typical). ITSS wireless net and most other campus wireless is based on this a: –Uses 5.5GHz range, 54 Mbps bandwidth (~20 Mbps is typical performance). Produces to much radio power to be certified in medical areas. Unlikely to become a standard at Stanford g: –Uses 2.4GHz band and is compatible with b. Also 54 Mbps bandwidth (~20 Mbps typical). An emerging standard, but likely to grow in the future.

ITSS Wireless Net

ITSS Wireless Net Overview Coverage map at Wireless net uses separate physical and logical network. (Separate switches, fiber, and address space.) –Prevents layer 2 attacks (e.g., broadcasts, IP/MAC spoofing) on wired net –Prevents wired broadcasts/multicasts from saturating wireless bandwidth –Don’t have to dedicate department roaming IP’s for wireless users You still have to register wireless cards in NetDB. –provide the hardware address of the wireless card –enable “DHCP” and “roaming”. Wireless card recommendations –Recommend Cisco and Apple cards which are available at the Bookstore. –Any “WiFi” certified card should work.

ITSS Wireless Net Security Wireless networks are inherently insecure –Even with encryption, the data between client and AP’s are available for anyone to capture. –Most corporate wireless nets lie outside of firewalls. ITSS Wireless doesn’t use WEP –Consumes client resources –Well-known security vulnerabilities Other methods of wireless encryption are vendor-specific. Stanford uses wireless authentication to protect campus resources.

ITSS Wireless Net Authentication Protects the institution, not the user S/ident integration –If you have PC/Mac-Leland, you’re all set –First net activity should bring up PC/Mac-Leland automatically Web-based authentication backup –First web page you get is the authentication page –Automatically redirects you to your requested page after login Future Guest Login feature –Any SUNet ID user will be able to sponsor a guest wireless account

Department Wireless

My Department Wants Wireless! Net-to-jack clients are eligible for 1 AP for every 16 wired ports. “Wireless net-to-jack”: For non-net-to-jack clients, ITSS will do a survey, install, monitor, maintain, and upgrade your wireless network. Price is $31/month per AP. Or….

Do-It-Yourself Options Option 1: ITSS can place a “wireless entrance” switch in your building and that carries the ITSS Wireless net. Option 2: Departments can put their wireless devices on their existing building net. Both options require departments to purchase AP’s and switches. ITSS can recommend equipment, but departments will need to do their own survey and place access points.

Department Wireless Setup ITSS Wireless net always uses “Stanford” as the SSID. AP’s plugged into the building net shouldn’t use “Stanford” –This has caused problems when users roam between access points. –Putting the department/group/lab name as the SSID makes it clear to users who to call in case of trouble.

Recommended Cards and AP’s b cards: –Apple Airport card, Cisco Aironet 350 PC Card –In principle, any card that adhere to the “WiFi” certification should work. Access Points: –Cisco Aironet 350 AP’s for departments.

Home Wireless Nets

Keeping Your Neighbors Out The range of wireless means that it’s very possible that your neighbors can use your wireless net too. And see all your traffic… Precautions: –Most AP’s have MAC address filters so that only specific cards can associate. This is the most important thing to enable! –Most AP’s can also be set to not broadcast the SSID. (e.g., Apple Airports call this “Create a closed network”) That way, people have to know the name of your network in order to join. –Definitely want to use encrypted protocols whenever possible. –If available, consider turning down the power of your AP to restrict the range.

Setup 1: Stanford DSL and Stanford West In both cases, you can request multiple IP addresses for home machines. You don’t need a DSL router. We suggest that you purchase access points that do “bridging”, where traffic is simply forwarded between the wired and wireless sides of the access point without alteration. –Examples: Cisco Aironet 350, Linksys WAP11, Apple Airport. We’ve seen a number of people on the campus or Stanford West who have installed Airport base stations with DHCP enabled on the Ethernet side, disrupting DHCP service. –Breaks DHCP for other users. –We shut down their connections…

Setup 2: Non-Stanford DSL or Cable Modem In many cases, you only get one IP address. Network Address Translation (NAT -- often provided by “DSL/wireless routers”) can be used to hide a network behind a single IP address: –Some wireless units do this by default. E.g., Apple Airport. –Note that NAT disrupts some Stanford services, especially WebAuth. –Also interferes with some VPN setups.

Questions???