Wireless Networks Tamus, Zoltán Ádám

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
A Wireless Local Area Network (WLAN) is a network that interconnects devices using radio waves. Wireless networking technologies allow devices to communicate.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless World Where the cord is cut, but we are still connected.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Design Wireless Network 2
Fundamentals of Networking Discovery 1, Chapter 7.
7: Wireless Technologies Networking for Home & Small Business.
Wireless(review) a (1999) a speed ◦ 54 Mb/s & frequency of 5 GHz Used by ◦ Government buildings ◦ Older style networks.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
WLAN What is WLAN? Physical vs. Wireless LAN
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
Securing a Wireless Network
© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Wireless Networking.
Wireless Networking 102.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Wireless Networking and Security
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
LANs and WLANs Chapter 5. 5 Chapter 5: LANs and WLANs 2 Chapter Contents  Section A: Network Building Blocks  Section B: Wired Networks  Section C:
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
Why go Wireless? By Cheryl Aupperle The Start…. Wireless communication is something we all are familiar with. Think about using a walkie- talkie, listening.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Chapter 8 Connecting Wirelessly
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
 LANs and WLANs LANs and WLANs1.  Network Building Blocks  Wired Networks  Wireless Networks  Using LANs  Security Through Encryption LANs and WLANs2.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Setting Wireless Network At Home By: Parveen Sharma.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Remote Access for Mobile Computing Andrew Jessett NT Support and Development Group (a.k.a. PC Support) Business and Information.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
7: Wireless Technologies Networking for Home & Small Business.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Chapter 5 LANs and WLANs.
TERMINOLOGY Define: WPAN
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
How To Set Up A Wireless Network
Wireless Networking Chapter 23.
Chapter 12 Communications Security & Countermeasures
Wireless LAN Security 4.3 Wireless LAN Security.
ICT Computing Lesson 4: Computing Network.
Presentation transcript:

Wireless Networks Tamus, Zoltán Ádám

Basics of Communication  Transmitter (coding)->Channel->(decoding) Receiver

The Radio-Channel  Wireless technologies use electromagnetic waves as channel  Radio waves (freq. 30 kHz-30 GHz)  Light (Infra Red) (wavelength ~900 nm)

Personal Area Networks  Interconnecting devices without wire  Headsets  Notebooks  PDA (Personal Digital Assistant)  Mobile phones  GPS  Peripherals (Keyboard, Mouse, Printer, Game controller etc.)

 Bluetooth  1998, Special Interest Group (Ericsson, IBM, Intel, Nokia, Toshiba)  Uses radiofrequency: in the 2.4 GHz band, frequency hopping spread spectrum system  Max. 1 Mb/sec bandwidth  Operating range ~10 m, but in high power applications can be extended to 100 m Personal Area Networks

Personal Area Network  Bluetooth devices

Personal Area Network  IrDA (Infrared Data Association) 1993  Use Infrared light  Operating range max. 1 m  Bandwidth: 4 Mb/sec.

Local Area Networks  Home  Offices  Public WLAN, Wi-Fi Hot Spots  Hotels  Airports  Net Cafes  Ad Hoc peer to peer

Local Area Network  Typical WLAN application in home or small office

Local Area Network  Network Access in Buildings  Desktop PCs  Notebooks  PDAs

Local Area Networks  IEEE standard  a  1999  5 GHz band  Max. 54 Mb/sec  b  2.5 GHz  Max. 11 Mb/sec  g  2.5 GHz  Max. 54 Mb/sec

Security  Eavesdropping & Espionage  Wireless technologies use radio waves. Eavesdroppers can easily pick up unencrypted messages by listening the ether  Rouge Access Points  An employee of an organization might hook up an access point without the permission or even knowledge of IT.

 Accidental Associations  A wireless network is setup using the same SSID as your network and within range of your wireless device. Connecting to another wireless LAN can divulge passwords or sensitive document to anyone on the neighbouring network  Denial of Service  Flowing packages to the network take the resources  RF interference with an external transmitter Security

Security  Securing Wireless Networks  WEP (Wired Equivalent Privacy)  Problems: Easily vulnerable because of the permanent keys and the short initialization vector  WPA (Wi-Fi Protocol Access)  The clients use periodically changed different keys  VPN (Virtual Private Network)

 Authentication  SSID (Service Set Identifier)  Weakness in IEEE : the SSID is sent without encrypting!  MAC address filtering  MAC (Media Access Control)  WEP not encodes the MAC field of the frame! Security

Setting up a wireless router  Connection to the broadband router  Connecting a PC

 Access to Web-based utility software by Router’s IP address  User Name:  User Name:  Password: admin Configuration

Setting up Internet Connection  DHCP  Static IP  PPPoE  PPTP

Setting up Wireless Network  Mode: B/G  SSID Broadcasting ?  Channel

Security Settings  WEP  Level of WEP encryption: 64-bit or 128-bit

 WPA  WPA2  WPA2 Mixed  Set the Passphrase and Renewal period Security Settings

Access control  MAC address filtering

Security Precautions   Change the default SSID.   Disable SSID Broadcast.   Change the default password for the Administrator account.   Enable MAC Address Filtering.   Change the SSID periodically.   Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce your network performance.   Change the WEP encryption keys periodically.