WLAN Infrastructure. Wireless Wireless Data Networks Broadband PCS Broadband PCS Metricom Local Wide Coverage Area Satellite Spread Spectrum Wireless.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs
A Wireless Local Area Network (WLAN) is a network that interconnects devices using radio waves. Wireless networking technologies allow devices to communicate.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
WIRELESS NETWORKS - A.HARIKA Y5CSO28. INTRODUCTION It refer to a telecommunication networks whose interconnections between nodes is implemented without.
Cisco Aironet 340 Series LAN Wireless Solutions March 20, 2000.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
Wireless Local Area Networks By Edmund Gean August 2, 2000.
CPET 260 – Network I Wireless Networks Bluetooth.
Wireless Network Selo TE UGM. Wireless Networking Wireless Networking (Wi-Fi) Wireless Networking (Wi-Fi) Introduction and Benefits Introduction and Benefits.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Chapter 7 - Wireless Networks1 Chapter 7 Wireless Local Area Networks Some new material added!
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Networks Olga Agnew Bryant Likes Daewon Seo.
1 © 2000, Cisco Systems, Inc. Cisco Company Confidential - Do not distributeSE Meeting – November 16th 2000 Security for Next Generation Wireless LANs.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
Wireless Networks: Personal, Local, Metropolitan Speedups, Security, Power John Schafer University of Michigan Ann Arbor CSG 10 May 2000
WIRELESS NETWORKING Presenter: Nhan Nguyên Phương.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Computer networks 6: Wireless and Mobile Networks.
1 © 2000, Cisco Systems, Inc. Wireless LAN Solution & Deployment Tjie Seng, Njauw.
1 Chapter Overview Wireless Technologies Wireless Security.
The Electromagnetic Spectrum The electromagnetic spectrum and its uses for communication.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
1999 Cabletron Systems. Wireless Networking RoamAbout Introduction to Wireless Networking Overview of the Wireless functionality Applications for Wireless.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Wireless Networking.
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
Wireless Networks Tamus, Zoltán Ádám
Wireless. New Ideas New Opportunities Wireless Growth By 2003, 20% of B2B traffic and 25% of B2C traffic will be wireless “ ” Meta Group Research.
Sybex CCNA Chapter 12: Wireless Networks.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Lecture 11 Wireless security
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
1 WB-Retail-Marketing-01/01-do© 2001, Cisco Systems, Inc. – CONFIDENTIAL! Cisco.com Wireless Applications Retail Vertical Dean Olson Team Lead SE.
A PRESENTATION ON “Wireless Networks”
1350 TAC Training © 2000, Cisco Systems, Inc. Cisco Aironet 350 Series Product and Software Update WNBU Technical Marketing.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
Wireless Networking Devices. wireless LAN adapter cards wireless access Points wireless bridges wireless routers.
Exploring the World of Wireless James Taylor - COSC 352 Fall 2007.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
S305 – Network Infrastructure Chapter 6 Local Area Network.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Port Based Network Access Control
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
Wireless LANs (Geier Book, Chapter 2)
Antti Miettinen (modified by JJ)
Presentation transcript:

WLAN Infrastructure

Wireless Wireless Data Networks Broadband PCS Broadband PCS Metricom Local Wide Coverage Area Satellite Spread Spectrum Wireless LANs Spread Spectrum Wireless LANs Circuit & Packet Data Cellular, CDPD, RAM, ARDIS Circuit & Packet Data Cellular, CDPD, RAM, ARDIS Narrowband PCS Data Rates 9.6 Kbps 19.6 Kbps 56 Kbps 1 Mbps Mbps Infrared Wireless LANs Infrared Wireless LANs Narrow Band Wireless LANs Narrow Band Wireless LANs Products 54 Mbps

License Free ISM Band Extremely Low Very Low MediumHighVery High Ultra High Super High InfraredVisible Light Ultra- violet X-Rays Audio AM Broadcast Short Wave RadioFM Broadcast Television Infrared wireless LAN Cellular (840MHz) NPCS (1.9GHz) MHz 26 MHz Older Product 5 GHz (IEEE A) HyperLAN HyperLAN2 Future Technology 2.4 – GHz 83.5 MHz (IEEE B) Current Product Notes: Very little spectrum is for unlicensed use.

Channels b Spectrum: 83MHz Channels: Three 22MHz stationary channels. Only 3 non-overlapping. Speeds: 1, 2, 5.5, and 11 Mbps data rate

1 Mbps DSSS 5.5 Mbps DSSS 11 Mbps DSSS 2 Mbps DSSS Coverage

Bandwidth Blue= 11Mb Green=11Mb Red=11Mb Total Bandwidth=33MB

Site Survey Channel Mapping Channel 1 Channel 6 Channel 11 Channel 1 Channel 6 Channel 11 Channel 1 Channel 6 Channel 11

2 Mbps 5.5 Mbps 11 Mbps Site Survey Bandwidth Layout

30mW Cell Size Comparison 30 milli-Watt client and Access Point range capabilities 11 Mbps DSSS feet radius 5.5 Mbps DSSS feet radius 2 Mbps DSSS feet radius

Cell Size Comparison, Cont. Full Antenna Power – 30mW 3 Access Points Reduce Antenna power - 5mW 18 Access Points Fewer users per access point

Antennas Antennas extend range by changing the shape of the signal Different applications call for different antennas Measurements given in “gain” – dBI Cable type/length greatly affects “gain”

Antennas, Cont. Maximum Coverage Autorate Negotiation Wireless for Students DiPole Indoor, Patch Outdoor Class 1Class 3 Hallway 1000’ 850’ Class 4Class 2 AP’s on Isolated LAN with PIX Class 8Class 10Class 11Class 9 Building Courtyard 1000’

Antennas, Cont. Maximum Coverage Autorate Negotiation Cabling Only Available at Store Front Yagi Antennas and DiPole 2000’ 850’

Products Evolving Better radios – better reception, improved bandwidth Better management Easier to deploy (in-line power) More security New standards

Inline Power

100mW Cell Size Comparison 100 milli-Watt client and Access Point range capabilities 11 Mbps DSSS feet radius 5.5 Mbps DSSS feet radius 2 Mbps DSSS feet radius

802.11a (fall?) Spectrum (US*): 50mW from – GHz 250mW from GHz 1W from – GHz Speeds: 6, 12, and 24Mbps for compliances 54Mbps+ expected Channels: 20 MHz channels Vendors?

Wired or Wireless… Wireless pilots encouraged, but would not invest heavily – technology changing Wireless is not a replacement for wired networks at this time

Some Problems

Interference potential b Other Frequency Hopping Bluetooth HomeRF Cordless Phone

Building ABuilding B Problems with just plugging it in –Colliding channel allocations? –How to implement authentication (WEP)? –Coordination between autonomous departments? –Interference with other devices? –On different subnets? –Different accesses policies? –Dueling Access Points? –Signal leakage between buildings? –Building codes? You are not in control.

Wireless Networks are Public  Public networks will be designed, installed, and managed by TIS on department’s behalf (and on departments funding)  Public networks must be authenticated  Installation will be professional, following UT building codes and practices  Spectrum will be allocated/adjudicated by TIS  Public interest will be considered over private interest in wireless conflicts  There are always exceptions

Which Vendor?

Authentication

Authentication Schemes SSIDs (Service Set Identifiers) –Broadcast in clear by unit and clients. Anyone can hear and insert. WEP (Wired Equivalent Privacy) –Uses RC4, problems with exchanging keys. Either sent in clear or have to be manually configured and then exposed on client. MAC (hardware address restrictions) –Restrict based on Ethernet hardware address. Hard to manage across all access points. Any card can pretend to be any MAC address.

Authentication Schemes, Cont. UTEID (home grown) – –UT’s home grown digitally signed fat cookie application. Doesn’t provide encryption, but doesn’t require any custom software and is compatible with all OSes X / EAP / LEAP –Extended Authentication Protocol, Lightweight Extended Authentication Protocol –Solves authentication and key distribution problem. Evolving standard and isn’t supported on some OSes. LEAP doesn’t use same secured mechanisms as EAP- TLS. VPN (Virtual Private Network) –Requires client software. All traffic has to go to VPN gateway and back – obviates local routing/switching.

SSID -Broadcast in clear by AP and client, anyone can add to their client -Must be manually configured on all clients -Provides no encryption of signals -Provides no user authentication/accounting

WEP +Provides some encryption (still vulnerable to same attack as wired networks ala dsniff) -Uses shared key which is exposed to other clients -Key must be manually configured on all clients (or sent in clear) -Has various crypto defects -Provides no user authentication/accounting

MAC -Requires obtaining hardware addresses of all clients -MAC address can be duplicated by any client -Must be maintained on all APs (not scalable) -Provides no encryption -Provides no user authentication/accounting

UT EID +Provides user authentication utilizing well known mechanism (already in use on wired ports) +Requires no additional software and is available on all platforms -Funnels all traffic through central gateway which obviates local switching/routing -No encryption provided -Home grown – unclear how to integrate with new offerings

802.1x/EAP Authentication

EAP over LAN Ethernet Laptop computer 802.1X Authenticator/Bridge Radius Server EAPOL-Start EAP-Request/Identity EAP-Response/Identity EAP-Request Radius-Access-Request Radius-Access-Challenge EAP-Response (cred) Radius-Access-Request EAP-Success Access blocked Port connect Radius-Access-Accept Access allowed RADIUS EAPOL

EAP over Wireless Ethernet Access Point Radius Server EAPOL-Start EAP-Request/Identity EAP-Response/Identity EAP-Request Radius-Access-Request Radius-Access-Challenge EAP-Response (cred) Radius-Access-Request EAP-Success Access blocked Association Radius-Access-Accept RADIUS EAPOW Laptop computer Wireless Associate Access allowed EAPOW-Key (WEP)

Future EAP Client Work ? Microsoft placing EAP Native supplicant in, –Win2K, WinCE What about other Microsoft OSes? –Win9x/WinNT (need LEAP) What about other OSes? –Linux, MacOS (need LEAP)

Steps to Re-association: Adapter listens for beacons from APs. Adapter evaluates AP beacons, selects best AP. Adapter sends association request to selected AP (B). AP B confirms association and registers adapter. Access Point A Access Point B Roaming from Access Point A to Access Point B AP B informs AP A of re-association with AP B. AP A forwards buffered packets to AP B and de-registers adapter. Change AP Association

802.1X/EAP/LEAP + Provides user authentication/accounting in scalable manner +Provides encryption (still vulnerable to same attack as wired networks ala dsniff) -Evolving standard -Requires client software not extant on all platforms -Network equipment more likely to be proprietary -Will require inve$tment in new authentication infrastructure -LEAP doesn’t support same encryption features

VPN + Provides user authentication + Provides encryption -Requires software on all clients -Funnels all traffic through VPN gateway, obviates local switching/routing -Dedicated expen$ive VPN gateway hardware needed at high traffic rates, and new authentication infrastructure

What about other devices? Handheld? EAP (Extensible Authentication Protocol) VPN (IP SEC) PPP (PPTP, PPPOE) LEAP (Lightweight & Efficient Application Protocol) – card drivers, only one time user/password authentication

We don’t decide… UTEID: Already deployed Could transition to VPN from UTEID easily or run in parallel 802.1x would mean flag day for any mechanism and isn’t ready for deployment …see what the industry decides

Multicast Applications Multicast Support is in WLAN infrastructure Multicast has problems when Clients Roam –Router/L2 Switch is unaware of Client move –Router/Switch still sends multicast stream to original AP –Multicast stream terminated when Router/L2 timesout due to non- response to multicast query No IGMP leave is sent by AP or Client