Wireless Networks. Wireless Network A wireless network transports data from one device to another without cables or wires – RF signals – Microwaves –

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Computer Concepts – Illustrated 8th edition
TYPES OF COMPUTER NETWORKS
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
SESSION : Mobile Computing and Wireless Communications -- Overview
1 Introduction to Networking Lesson 01 NETS2150/2850.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Communications and Networks
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Remote Access Techniques and Issues Bill Klein Networking and Telecommunications Services 10/25/2006
Wireless Networking (WLAN) Reina Trujillo Nathan Ekenberg.
Communications and Networks
Intro to MIS – MGS351 Network Basics Extended Learning Module E.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Chapter CHAPTER SEVEN OVERVIEW SECTION NETWORKS AND TELECOMMUNICATIONS  Network Basics  Voice over IP  Networking Businesses  Increasing.
Fundamental of wireless network.  Heinrich Hertz discovered and first produced radio waves in 1888 and by 1894 the modern way to send a message over.
1 Lecture Network Media Media refers to the means used to link a network's nodes together communications channel is the transmission media on which.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Communications & Networks
Succeeding with Technology: Second Edition
Networks. Network Classifications Acronyms, acronyms, and more acronyms What does PAN stand for? – Personal Area Network – interconnection of personal.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Chapter 5 LANs and WANs. Network Building Blocks Chapter 5: LANs and WLANs 2  Network Classifications  LAN Standards  Network Devices  Clients, Servers,
LESSON Networking Fundamentals Understand Wireless Networking.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Networks. Network Classifications Acronyms, acronyms, and more acronyms What does PAN stand for? – Personal Area Network – interconnection of personal.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
LANs and WLANs Chapter 5. 5 Chapter 5: LANs and WLANs 2 Chapter Contents  Section A: Network Building Blocks  Section B: Wired Networks  Section C:
6.1. Communication Methods Revision using Qwizdom.
LANs and WANs Coatbridge High School Computing Department.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Communications and Networks © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Communication Research Labs Sweden AB Introduction to Wireless communication and WLAN.
Communications and Networks Chapter 9. CE06_PP09-2 Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution, and communication systems.
Chapter 7 Connecting to the Internet. Connecting to the Internet FAQs: – What is the Internet? – What are the options for Internet service? – What is.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
WEEK 3 TOPIC : INTRODUCTION TO NETWORKING What is Networking? Networking can be defined as the linking of two or more Computers together in order to share.
PRESENTATION ON WI-FI TECHNOLOGY
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Chapter 7 Connecting to the Internet. 2Practical PC 5 th Edition Chapter 7 Getting Started In this Chapter, you will learn: − What is the Internet − Options.
Managing Telecommunications Chapter 6 Emily Gehm Jessica Paul Melanie Wall.
 LANs and WLANs LANs and WLANs1.  Network Building Blocks  Wired Networks  Wireless Networks  Using LANs  Security Through Encryption LANs and WLANs2.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Networking Basics 8th Grade
Lecture 1: Major Networking Concepts: a Review Dr. Najla Al-Nabhan.
Remote Access for Mobile Computing Andrew Jessett NT Support and Development Group (a.k.a. PC Support) Business and Information.
Wireless Network Security By Simon Langford. About… This oral presentation is on wireless networks and the methods of security in use on them, in order.
Introduction to Computing Slides By ADEELA MUSTAFA.
Networks The Big Picture. Three Great Leaps of Civilization.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Networks Unit 5 Digital Literacy Computer Technology (S3 Obj 2-1, 2-2 & 2-3)
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Chapter 5 LANs and WLANs.
Instructor Materials Chapter 6 Building a Home Network
Networking 101.
Presentation transcript:

Wireless Networks

Wireless Network A wireless network transports data from one device to another without cables or wires – RF signals – Microwaves – Infrared light Slower than wired networks Security concerns - Wireless networks are much more susceptible to unauthorized access and use than wired networks

Wireless Network Information transmitted over wireless networks – Wireless LANs – Bluetooth and other personal area networks – Cellular networks – Satellite systems – Fixed Wireless Main issue: information transmitted over common medium (air) Security approaches at several levels (Networks to applications)

Network Classifications Personal Area Network (PAN) – interconnection of personal digital devices (Bluetooth) Neighborhood Area Network (NAN) – connectivity spread over several buildings Local Area Network (LAN) – usually connects computers in a single building – this is the one most people have heard of Metropolitan Area Network (MAN) – public high- speed network with range of about 50 miles Wide Area Network (WAN) – consists of several smaller networks

Wireless Networks Paging Networks Satellite Systems Cellular Networks Wireless LANs Wireless Local Loops Example1: GSM, 9.6 Kbps, wide coverage Example2: 3G, 2 Mbps, wide coverage Wireless Ethernet 11 Mbps, 100 Meters Example1: FLEX, 1.2 Kbps Example2: ReFLEX, 6.4Kbps Wireless WANs Wireless MANs Cellular Networks Personal Area Networks Business LANs Bluetooth 1 Mbps, 10 meters Example: Motorola Iridium up to 64 Mbps globally Example: LMDS 10 Mbps, 100 Km Wireless Networks at a Glance

Levels of Wireless Security Applications Middleware Wireless Link security (WEP, WPA) Cellular network security Satellite link security WLL and cordless link security SSL WAP security Proxy server security PGP for secure Java security Database security TCP/IP VPN

WEP and WPA Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP) have a pre-shared key as the basis for encryption, WEP’s use of the pre-shared key is relatively static, whereby it uses rudimentary variations of the same key to encrypt all packets (transmitted data). This is not very safe, as a large sample of encrypted packets using the same key tends to create an easy key recovery target for hackers. WPA uses apre-shared key to derive a temporal key that is used to encrypt all packets. As WPA generates a unique key for each association, the pre-shared key is rarely used - making it difficult for hackers to lock onto a common key to crack the network.

A Cellular Network Public Switched Telephone Network (PSTN) Mobile Telephone Switching Center (MTSC) Base Transceiver Station (BTS) Mobile User Cell 1 Cell 2 Cordless connection Wired connection

Security concerns unique to the cellular networks  The call setup information that includes the user ID and other information should be protected  The speech and data transmitted during a cellular conversation should be kept private and confidential.  Privacy of user location. The location (cell ID) from where the user is calling should be private and also the VLR/HLR records that trace where the user has been visiting should be kept private.  The calling patterns (e.g., calling home everyday at 5 PM to inform your family about when you will be home) should be private.  The user-ID in the cellular networks should be kept private.

Satellite System Security Encryption/ Spread Spectrum Physical security of earth station Typically secured through scrambling of satellite by spread spectrum techniques. For additional security, the messages can be encrypted by using VPNs Employing better physical security on ground stations.

Satellite Security US General Accounting Office (GAO) report found critical vulnerabilities in the nation's commercial satellite network. Federal agencies using commercial satellites may be exposing sensitive data to unauthorized snooping. The government uses encryption to protect satellite communications and employs physical security to protect ground stations But many federal agencies rely on commercial satellite service providers Commercial providers may not provide adequate security

Some Guidelines for wireless Network security  Turn on security at wireless links to avoid eavesdropping even if it is deficient.  For example, use WEP because it does provide some security -- make up for WEP security by providing higher layers of security (e.g., SSL).  Make sure that all access points are themselves monitored and controlled so that no one sets up rogue access points.  Treat wireless networks as untrusted networks. Thus put the internal WLANs outside the firewall so that they are treated as outsiders.  Minimize placing critical applications and databases on wireless networks;move them to wired networks behind firewalls.  Make sure that the passwords on wireless networks are different than the wired networks. Hackers usually capture passwords from wireless networks and then use them to gain access over wired networks.