Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.

Slides:



Advertisements
Similar presentations
SEMINAR ON Wi-Fi.
Advertisements

SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Security+ Guide to Network Security Fundamentals, Third Edition
Security Awareness Chapter 5 Wireless Network Security.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
1 Wireless LAN Security Presented by Vikrant Karan.
Computer Networks. Types of Wireless Network Attacks - 1 Insertion attacks: When a wireless device connects to an access point without authorization Interception.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
WLAN What is WLAN? Physical vs. Wireless LAN
Module 6.6 Networking. Internet Connectivity By default, new computers typically come with the network cards installed, the proper drivers installed,
Wireless Networking 102.
WIRELESS NETWORKING. What are the advantages to wireless networking? How has society changed?
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
1 Chapter Overview Wireless Technologies Wireless Security.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Wireless Networking.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Sybex CCNA Chapter 12: Wireless Networks.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Presented by: Dr. Munam Ali Shah
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
PRESENTATION ON WI-FI TECHNOLOGY
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Sybex CCNA Chapter 12: Wireless Networks Instructor & Todd Lammle.
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wireless Networks Dave Abbott.
Instructor Materials Chapter 6 Building a Home Network
Wireless LAN Security 4.3 Wireless LAN Security.
Presentation transcript:

Computer Networks

Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header – intended recipient All computers receive all communications, however only intended computer saves material

Ethernet Networks Rules or Protocols One computer does not interfere with communications by another Each computer ‘listens’ to the network as it transmits it message If the message received is different, another computer sent message at same time Wait random amount of time and resend Maximum length for any message

Expansion of networks Variations in degree to which networks are used To keep demand low on networks, many organizations maintain separate small networks and connect those networks Ethernet networks Cabling limited to 100 meters (328 feet) Hubs - A common connection point Repeaters – amplify electrical signals

Wireless Technology Wireless communications Infrared signals or radio waves Devices on a wireless network form a logical Ethernet network Messages are divided into packets Packet contains a header IDs which machine is to receive the data All wireless computers in an area share the airwaves, receive the same messages and determine if they are the recipient

Wireless Technology Access Point Computer directly to the Internet (acts as intermediary) Example: on a 2.4 GHz radio frequency band Beacon Repeating of identifying information by access point Association – Portable wishes to make connection Portable computers use radio waves or infrared signals to communicate with access point As portable computers move, interact with new access point If no computers have direct access to the Internet, portable computers still can interact with each other, but not with the Internet

Types of Wireless Network Attacks - 1 Insertion attacks: When a wireless device connects to an access point without authorization Interception /monitoring of wireless traffic: The network traffic across a WLAN is intercepted and monitored without authorization. Mis-configuration: Many access points ship in an unsecured configuration

Types of Wireless Network Attacks - 2 Client-to-client attacks: Two wireless clients can communicate with each other directly. One may attack another. Jamming: DoS (Denial of Service) legitimate traffic overwhelms the frequencies, making the network not usable.

WLAN Security SSID Service Set Identifier or Network Name Name of a wireless local area network All wireless devices on a WLAN must employ the same SSID NOT broadcast SSID in access points MAC Filtering MAC: hardware/physical address of wireless network card Only allow specified MAC addresses for connections

WLAN Security WEP: Wired Equivalent Privacy WPA: Wi-Fi Protected Access WPA2: Best protection for home WLAN.

WEP: Wired Equivalent Privacy Purpose: Protect wireless network from eavesdropping. Prevent unauthorized access to the network How Does It Work A secret key between laptop and access point The secret key to encrypt packets Length of Key 64-bit encryption 128-bit encryption

WPA: Wi-Fi Protected Access Two types of WPA WPA-PSK (WPA Personal) - Home &Small Offices WPA-RADIUS (WPA Enterprise) – Large Organizations WPA-PSK: Pre-Shared Key Extra-strong encryption Encryption keys are automatically changed after a specified period of time after a specified number of packets Implements a subset of IEEE i.

WPA2: Wi-Fi Protected Access WPA2: Best protection for home WLAN. Fully compatible with IEEE i security standard. Stronger encryption protocol Not all wireless cards and access points support WPA2 certification is mandatory for all new devices wishing to be Wi-Fi certified.