December 17, 2002 1 Wi-Fi Mark Faggiano GBA 576. December 17, 20022 Purpose of the Project  I hear Wi-Fi, WLAN, 802.11 everywhere  What does it all.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Wireless Technology & Security. Wireless Local Area Networks What is the IEEE? What is the IEEE? Institute of Electrical and Electronics Engineers Institute.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Computer Networks IGCSE ICT Section 4.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
The Opportunity of WISP’s Mark Levetzow. Topics  WISP’s and how they work  IEEE standards and radio frequency.  Equipment  Good/Bad points about WISP’s.
WIRELESS NETWORKING Presenter: Nhan Nguyên Phương.
WLAN. A wireless LAN, or WLANLAN WLAN, is a local area network that does not have wired Ethernet connections. A WLAN can be either an extension to a current.
Wireless Networking 102.
CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES.
Topic Coverage – Consumer Why Wireless? Advantages of Wireless How Does Wireless Work – Consumer? Various Types x – A vs. B vs. G Which is best for.
Computer Network Forensics Lecture 5 - Wireless © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
1 Chapter Overview Wireless Technologies Wireless Security.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Wi-Fi Technology By Marc Bailey. What is Wi-Fi? Wi-Fi or Wireless Fidelity is a wireless technolgy owned by the Wi-Fi Alliance (formed in 1999) Goal:
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Presented by: Dr. Munam Ali Shah
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
PRESENTATION ON WI-FI TECHNOLOGY
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Remote Access for Mobile Computing Andrew Jessett NT Support and Development Group (a.k.a. PC Support) Business and Information.
CSE 5/7349 – April 5 th 2006 Wireless Networking.
Wireless Networking Chapter 12. Chapter Objectives Identify wireless networking Compare wireless and wired network Explain the different wireless standards.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
Submitted By:- Raushan Kr. Chaurasiya(68) Santu Thapa(75) Satyanarayan Prajapat(76)
Digital Planet: Tomorrow’s Technology and You Chapter 8 Networking and Digital Communication Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
 Today’s networks are no longer limited to using cabled, or wired, devices.  Today’s networks have a mix of wired systems along with wireless systems.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
Wireless Networks2 Wired Network Application Transport Internet Link Physical
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Understand Wireless Security LESSON Security Fundamentals.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
How To Set Up A Wireless Network
802.11b Wireless Network Security
Wi-Fi Technology.
Presentation transcript:

December 17, Wi-Fi Mark Faggiano GBA 576

December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all mean?

December 17, What’s in a Name? Wi-Fi is:  Short for Wireless Fidelity  Popular Term for Wireless LAN (WLAN)  Also known as b

December 17, What is ? is:  A related group of specifications for WLANs developed by the Institute of Electrical and Electronic Engineers (IEEE)  Currently, there are four different specifications in this group: , a, b, g

December 17, What does Wi-Fi Do? Wi-Fi:  Works a lot like a cell phone.  Allows computers to send and receive data to each other anywhere within the range of a base station.  Works without the use of a traditional infrastructure like cable and wires

December 17, Two Modes to Choose From Wi-Fi can be implemented in an…  Ad-hoc or Independent Basic Service Set  Infrastructure or Basic Service Set

December 17, Ad-hoc Mode  Peer-to-peer network (i.e., one computer is “connected” with another)

December 17, Infrastructure Mode  Each wireless client computer deals with an access point via a radio link (i.e., a NIC card).  The access point connects to the Ethernet enterprise network using a standard Ethernet cable, and provides the wireless client computer with access to the wired Ethernet network.  Much more commonplace because access points are cheaper nowadays and a lot easier to set up.

December 17, Who Cares? The benefits to Wi-Fi include:  Cost  Ease of Use –Out-of-the-Box solutions  Increased Adoption –Starbucks –Cities with wireless access points

December 17, Here to Stay?  20 percent of “large” companies currently have wireless LANs in addition to their existing wired networks  Estimated that 50 percent of U.S. companies will use the technology by 2003  Sales of wireless network cards and access points to grow from $1.9 billion in 2001 to $5.2 billion in 2005

December 17, Wi-Fi and Security Security is an issue because:  Adoption was the goal  Access points are usually behind firewall  Existing security measures are “inadequate”

December 17, Existing Security  Built-in security is called Wireless Equivalent Privacy (WEP). –Two levels commonly available:  64-bit encryption and 128-bit encryption –Experts disagree if this security is enough. Regardless of what experts believe about either level of security in WEP, almost all believe that ignoring both of the built-in options is a huge mistake.  AirSnort can crack the encryption by “listening” to the Wi-Fi networks’ traffic for a considerably short period of time

December 17, Security Study Tools Needed  NetStumbler (shareware) –Identifies b signals as it “logs the MAC address of the access point, the network name, SSID, manufacturer, channel that the signal was heard on, WEP enabled (Yes or No), signal strength, signal to noise ratio, and other various flags.” In addition, latitude and longitude data points are recorded if the access point emits standard GPS data.  Antenna –Detects the signals. –Can be purchased from $60 to $130.

December 17, Security Study (con’t) Methodology  Writers checked several locations around the country (New York City, Jersey City, New England, and Silicon Valley).  Locations were “checked” by either driving down a street populated by multiple businesses or by simply sitting on top of a building (as was the case in New York City)

December 17, Security Study (con’t) Results  Over 800 access points detected –Some as far away as 6 blocks  Less than 40 percent WEP-enabled  Several attempts to gain access to networks were successful

December 17, Security Options  VPN (Virtual Private Networks) –Creates a secure virtual “tunnel” from the end-user’s computer through the end-user’s access point, though the Internet, all the way to a corporation’s servers and systems  MAC (media Access Control) Filtering –Accept only certain MAC addresses and filter out all others  RADIUS –A user name and password scheme that enables only approved users to access the network; it does not affect or encrypt data  Kerberos –Network authentication system based on key distribution

December 17, Questions