LESSON 1.4 98-366 Networking Fundamentals Understand Wireless Networking.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Advertisements

A Wireless Local Area Network (WLAN) is a network that interconnects devices using radio waves. Wireless networking technologies allow devices to communicate.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Chapter - 11 CWNA Certified Wireless Network Administrator Introduction to Wireless LANs.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
1 9 9 TELECOMMUNICATIONS AND NETWORKS. 2 Telecommunications Communicating information via electronic means over some distance Information SuperHighway.
Chapter 1: Computer Networks IB 300: Advanced Computer Sciences. Professor: Nabil Elmjati.
Basic Computer Network
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e Chapter 14 Wireless Networking Technologies.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Networks “Each time you use the telephone you use the world’s largest computer network – the telephone system”
Intro to MIS – MGS351 Network Basics Extended Learning Module E.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 01. Introduction to Wireless LANs.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
Information Technology in Business: Telecommunications, Networks and Internet Basics.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Communications & Networks
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Information Technology
1 Information Technology in Business: Telecommunications and Networks Chapter 6.
Extended Learning Module D
Module 2: Information Technology Infrastructure
Sybex CCNA Chapter 12: Wireless Networks.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Management Information Systems, 4 th Edition 1 Chapter 6 Information Technology in Business: Telecommunications and Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Chapter 1 Overview of Wireless Standards, Organizations, and Fundamentals.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Management Information Systems, 3 rd Edition Effy Oz 1 Chapter 6 Information Technology in Business: Telecommunications and Networks.
PRESENTATION ON WI-FI TECHNOLOGY
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 5 Cabling LANs and WANs.
IEEE &
A PRESENTATION ON “Wireless Networks”
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
WIFI. What is wifi ? Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Convergence Technology. Ch 01 Telecom Overview  Define communications and telecommunications  Components of a communications system  Difference between.
Wireless Technologies Chapter 9. Learning Objectives Explain current wireless networking technologies Discuss history of wireless networks and their advantages.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
William Stallings Data and Computer Communications
Chapter 4 Telecommunications and Networking The McGraw-Hill Companies, Inc All rights reserved. Irwin/McGraw-Hill.
Chapter 01 Wireless Standards, Organizations, and Applications Center for Information Technology.
Wireless Networks. Wireless Network A wireless network transports data from one device to another without cables or wires – RF signals – Microwaves –
1 LAN – local area network overview: 1.Types of networks 2.Network topology 3.LAN local area networks 4.Introduction to TCP/IP 5.IEEE / Wireless.
3/20: Telecommunications & Networking What is telecommunications? The hardware: physical components of telecommunications, inc. channels Standards: agreements.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 2 Omar Meqdadi Department of Computer Science and Software Engineering.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
Exploring the World of Wireless James Taylor - COSC 352 Fall 2007.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
ICT Unit 4: Network and the effects of using them
Objective of this Presentation To understand what is Wi-Fi and what is Bluetooth. Difference between Bluetooth and Wi-Fi.
Instructor Materials Chapter 6 Building a Home Network
Intro to MIS – MGS351 Network Basics
Wireless Fidelity 1 1.
Network Basics Extended Learning Module E
Wireless LAN Security 4.3 Wireless LAN Security.
Presentation transcript:

LESSON Networking Fundamentals Understand Wireless Networking

Networking Fundamentals LESSON 1.4 Lesson Overview In this lesson, you will learn about: Wireless networking  Wireless networking standards and their characteristics  a, b, g, n including different GHz ranges  Types of network security o WPA o WEP o 802.1X  Point-to-point (P2P) wireless  Wireless bridging  Gigahertz

Networking Fundamentals LESSON 1.4 Anticipatory Set 1. Make a list of all the wireless devices they have seen, used, or are familiar with. Answer the following questions relating to the devices in the list. a. How do they transmit and communicate with other devices? b. It is likely that there are many wireless devices in the same room or area. How are they able to not interfere with each other ? Or do they interfere with each other? 2. Discuss the uses and security issues of these items

Networking Fundamentals LESSON 1.4 Wireless Telecommunications  Computer networks created without wires such as a local area network (LAN)  The telecommunications network employ interconnections between nodes implemented without the use of wires  Wireless telecommunications networks are accomplished with some type of remote information transmission system

Networking Fundamentals LESSON 1.4 Wireless Telecommunications (continued)  This implementation takes place at the physical level or "layer" of the network where the waves are like radio waves.  Waveform refers to the shape and form of a carrier signal such as a radio wave. A wave is a disturbance that travels through space and time moving in a solid, liquid, or gaseous medium.  This carrier signal uses the same basic protocol as a modulating signal.

Networking Fundamentals LESSON 1.4 Electromagnetic Waves  The wave, or "disturbance," is invisible and is called the force field.  Without these charged particles, there can be no electric force fields and thus no electromagnetic waves.  Examples include light, microwaves, X-rays, and TV and radio transmissions are all kinds of electromagnetic waves.  Negative electrons and positive protons charges cause each other to move.  Positive charge exerts an attractive force on electrons—an electric force.  The velocity makes no difference, the pull or force depends only upon where you put it.  Electronic devices make use of the range of the electromagnetic spectrum.

Networking Fundamentals LESSON 1.4 Wireless  Describes communications in which electromagnetic waves or RF carry a signal over the entire communication path.  The frequencies that are available for use for communication are a public resource and are regulated by the Federal Communications Commission in the U.S.

Networking Fundamentals LESSON 1.4 Electronic Modulation  The process of varying one or more properties of a high-frequency periodic waveform.  In wireless we first take a signal, like a telephone conversation, and then impress it on a constant radio wave called a carrier.  It modulates a constant frequency in the radio range, which we can't hear.  Modulation makes voice band and radio band frequencies work together.  Different modulation techniques, such as AM and FM, are different ways to shape or form electromagnetic radio waves.

Networking Fundamentals LESSON 1.4 Electronic Modulation (continued)  Wireless network technologies are used in phones, laptop computers, automobiles, and public transportation.  High-speed wireless Internet connection services designed to be used from arbitrary locations refers to "mobile broadband.”  Wi-Fi hotspots provides connectivity over a limited radius around fixed wireless access points.  The data rate of a computer network connection is measured in units of bits per second (bps).  One Mbps equals one megabyte per second.  Network equipment makers rate their products using related, larger units of Kbps, Mbps, and Gbps.  Network outages happen due to limits of the service provider coverage area or obstructions from geography, or even inside larger buildings.

Networking Fundamentals LESSON 1.4 Institute of Electrical and Electronics Engineers (IEEE)  Creates standards to ensure compatibility.  The IEEE created the 802 project to develop the standards which are used today. There have been many changes and additions.  IEEE 802 standards define only certain technologies.  Most important IEEE 802 standards is the , wireless networks—it defines standards for wireless LAN communication.  IEEE is a set of standards carrying out wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands.  The base current version of the standard is IEEE They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802).

Networking Fundamentals LESSON 1.4 Popular Protocols Defined by the b and g  was the first wireless networking standard.  b was the first widely accepted one, followed by  g and then by n.  n is a new multistreaming modulation technique.  The family includes over-the-air modulation, which means to change or vary.

Networking Fundamentals LESSON 1.4  b and g use the 2.4 GHz ISM band (industrial, scientific and medical), operating in the United States under Part 15 of the US Federal Communications Commission Rules and Regulations.  Gigahertz is a measure of frequency.  Frequency (temporal frequency ) is the number of occurrences of a repeating event per unit time.  The duration of one cycle in a repeating event, so the period is the reciprocal of the frequency.  Because of this choice of frequency band, b and g equipment may occasionally suffer interference from microwaves, cordless telephones and Bluetooth devices.

Networking Fundamentals LESSON 1.4  Both and Bluetooth control their interference by using spread spectrum modulation.  Bluetooth uses a frequency hopping signaling method, while b and g use the direct sequence spread spectrum signaling and orthogonal frequency division multiplexing methods, respectively.  a uses the 5 GHz U-NII (Unlicensed National Information Infrastructure) band, which offers at least 19 non-overlapping channels rather than the 3 offered in the 2.4 GHz ISM frequency band.  Depending on the environment, channels may have better or worse performance with higher or lower frequencies.

Networking Fundamentals LESSON 1.4 WEP and WPA  Wireless security protocols widely used by wireless networking devices  WEP—Wired Equivalent Privacy or Weak Encryption Protocol o Designed to provide equivalent level of security as a wired network  WPA—Wi-Fi Protected Access (WPA and WPA2) o A certification program to designate compliance with the security protocol to secure wireless computer networks o Implements the majority of the IEEE i standard  The Wi-Fi Alliance intended WPA as an intermediate measure to take the place of WEP pending the preparation of i  IEEE wireless networks are NOT secured by WEP as it is easily broken

Networking Fundamentals LESSON 1.4 Wireless Security  Wireless network messages are more susceptible to eavesdropping than wired networks.  A WEP key uses a passphrase – a security code that is produced using this protocol that allows computers to hide the contents of the messages from intruders and exchange coded messages.  WPA-PSK (Pre-Shared Key) mode provides strong encryption protection without the enterprise authentication server and is the easiest way to deploy WPA to home wireless network using a passphrase.  WPA uses Temporal Key Integrity Protocol (TKIP) to produce unique encryption keys and automatic rekey each wireless clients from passphrase and network SSID.

Networking Fundamentals LESSON 1.4 Wireless Bridging A bridge is used to connect two network segments.

Networking Fundamentals LESSON 1.4 Bridging  A forwarding technique used in packet-switched computer networks.  Can be done wired or wireless and used only in LANs.  Bridging depends on flooding and examination of source addresses in received packet headers to locate unknown devices.  A network bridge connects multiple network segments at the data link layer (Layer 2) of the (OSI) Open System Interconnection model.  A switch is a bridge with numerous ports. Switch or Layer 2 switch is often used interchangeably with bridge.

Networking Fundamentals LESSON 1.4 Bridging (continued)  Another form of bridging, source route bridging, was developed for token ring networks.  The main purpose of wireless bridging is to connect a wired Ethernet network segment to a wireless Ethernet network segment.  This is most commonly found in a home wireless router that has a built-in multiport switch for wired devices, and a wireless networking WAN connection for DSL or cable for Internet access.

Networking Fundamentals LESSON 1.4 Point-to-Point Protocol (PPP)  A data link protocol commonly used to establish a direct connection between two networking nodes  Provides compression, transmission encryption privacy, and connection authentication  Used over many types of physical networks including serial cable, phone line, trunk line, cellular telephone, specialized radio links, and fiber optic links such as links  Internet service providers (ISPs) use PPP for customers’ dial-up access.  Internet service providers (ISPs) use two encapsulated forms of PPP to connect Digital Subscriber Line (DSL) Internet service.  Point-to-Point Protocol over Ethernet (PPPoE)  Point-to-Point Protocol over ATM (PPPoA)

Networking Fundamentals LESSON 1.4 Lesson Review  Compare WEP and WPA by creating a list of the advantages and disadvantages of each  Discuss the various wireless transmission methods