Wireless Networks Standards and Protocols. 802.11 & 802.11x Standards 802.11 and 802.11x refers to a family of specifications developed by the IEEE for.

Slides:



Advertisements
Similar presentations
Wireless Networks.
Advertisements

IE 419/519 Wireless Networks Lecture Notes #6 Spread Spectrum.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Wireless Networks and Spread Spectrum Technologies.
Wireless Fundamentals Chapter 6 Introducing Wireless Regulation Bodies, Standards, and Certifications.
Wireless networking technology By Abbas Izadpanah January 2007.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless Local Area Networks By Edmund Gean August 2, 2000.
Wireless LAN’s Brent Leopold Geoff Guist. History of WLAN’s Have been around for almost 40 years First WLAN came together in 1971 Project called ALOHNET.
SPREAD SPECTRUM In spread spectrum (SS), we combine signals from different sources to fit into a larger bandwidth, but our goals are to prevent eavesdropping.
Wireless Networking IEEE Standards Module-03B Jerry Bernardini Community College of Rhode Island 6/27/2015Wireless Networking J. Bernardini1.
1 CMPT 371 Data Communications and Networking Spread Spectrum.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
WLAN b a Johan Montelius
Securing a Wireless Network. Wireless networks are rapidly becoming pervasive. How many of you have web-enabled cell phones? How many of you have web-enabled.
WIRELESS NETWORKING Presenter: Nhan Nguyên Phương.
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Wireless Local Area Technology.  Garikayi Brasington Madzudzo  Edmund Nartey  Ismeil Ahamed  Jakub Gieryn  Arnaud Fogno.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Wireless Security Chapter 12.
Wireless LANs By Armaghan Khan Fakhruddin Mahmood Sadiq Hasan.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Wireless and Instant Messaging
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Wireless Networking.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
Chapter 8 Connecting Wirelessly
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Lecture 11 Wireless security
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
IEEE Wireless LAN Standard
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
Presented by Hampton Smith  An IEEE (Institute for Electrical and Electronics Engineers) protocol ratified in 1997 which defines a standard.
A PRESENTATION ON “Wireless Networks”
Wireless Technologies Chapter 9. Learning Objectives Explain current wireless networking technologies Discuss history of wireless networks and their advantages.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards Modified.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
A presentation On a,b,g Wireless LAN, and Preented By Md.Masum Hossain Pranjal Sinha Md.Munis Varun Jain Anmol Jain Nsumbu Noe.
1 LAN – local area network overview: 1.Types of networks 2.Network topology 3.LAN local area networks 4.Introduction to TCP/IP 5.IEEE / Wireless.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 9 Spread Spectrum.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
WAP vs. WEP Prof. Carlos Rodríguez Sánchez. WAP WAP Wireless Application Protocol a secure specification that allows users to access information instantly.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
CSCI 465 D ata Communications and Networks Lecture 23 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Exploring the World of Wireless James Taylor - COSC 352 Fall 2007.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Wireless LAN Technology Chapter 13. Wireless LAN  Wireless LAN is one that make use of a wireless transmission medium.  Wireless LAN use infrared or.
DATA AND COMPUTER COMMUNICATIONS Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
INTRODUCTION WIRELESS GATEWAY.  A device that allows a computer and other Internet-enabled devices to access the Internet connection.  Functioned as.
Understand Wireless Security LESSON Security Fundamentals.
Wireless Fidelity 1 1.
Wireless Networking Chapter 23.
Spread Spectrum Multiplexing combines signals from several sources to achieve bandwidth efficiency: The available bandwidth of a link is divided between.
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Multiplexing Simultaneous transmission of multiple signals across a single data link As data & telecomm use increases, so does traffic Add individual links.
Terminologies in Wireless Communication Group Members Munib Ahmed Rehan Khan.
Presentation transcript:

Wireless Networks Standards and Protocols

& x Standards and x refers to a family of specifications developed by the IEEE for wireless LAN (WLAN) technology specifies an over-the-air interface between a wireless client and a base station or between two wireless clients. The IEEE accepted the specification in 1997.

standards in the OSI model

There are several specifications in the family: — applies to wireless LANs and provides 1 or 2 Mbps transmission in the 2.4 GHz band using either frequency hopping spread spectrum (FHSS) or direct sequence spread spectrum (DSSS) a a — an extension to that applies to wireless LANs and provides up to 54-Mbps in the 5GHz band a uses an orthogonal frequency division multiplexing encoding scheme rather than FHSS or DSSS b b (also referred to as High Rate or Wi-Fi) — an extension to that applies to wireless LANS and provides 11 Mbps transmission (with a fallback to 5.5, 2 and 1-Mbps) in the 2.4 GHz band b uses only DSSS b was a 1999 ratification to the original standard, allowing wireless functionality comparable to Ethernet.

DSSS & FHSS direct sequence spread spectrum (DSSS In direct sequence spread spectrum (DSSS), the stream of information to be transmitted is divided into small pieces, each of which is allocated across to a frequency channel across the spectrum. A data signal at the point of transmission is combined with a higher data-rate bit sequence (also known as a chipping code) that divides the data according to a spreading ratio. The redundant chipping code helps the signal resist interference and also enables the original data to be recovered if data bits are damaged during transmission. Frequency hopping Frequency hopping is one of two basic modulation techniques used in spread spectrum signal transmission. It is the repeated switching of frequencies during radio transmission, often to minimize the effectiveness of "electronic warfare" - that is, the unauthorized interception or jamming of telecommunications. It also is known as frequency- hopping code division multiple access (FH-CDMA). Frequency hopping requires a much wider bandwidth than is needed to transmit the same information using only one carrier frequency.

DSSS & FHSS

802.11e e — a wireless draft standard that defines the Quality of Service (QoS) support for LANs, and is an enhancement to the a and b wireless LAN (WLAN) specifications e adds QoS features and multimedia support to the existing IEEE b and IEEE a wireless standards, while maintaining full backward compatibility with these standards g g — applies to wireless LANs and is used for transmission over short distances at up to 54-Mbps in the 2.4 GHz bands n MIMO n — n builds upon previous standards by adding multiple-input multiple-output (MIMO). The additional transmitter and receiver antennas allow for increased data throughput through spatial multiplexing and increased range by exploiting the spatial diversity through coding schemes like Alamouti coding. The real speed would be 100 Mbit/s (even 250 Mbit/s in PHY level), and so up to 4-5 times faster than g.

Wireless Protocols

WEP WEP - Wired Equivalent Privacy ◦Short for Wired Equivalent Privacy, a security protocol for wireless local area networks (WLANs) defined in the b standard.

WAP WAP - Wireless Application Protocol ◦A secure specification that allows users to access information instantly via handheld wireless devices such as mobile phones.

WEP vs. WAP The Differences Between WEP and WPA ◦WPA has been a mainstream technology for years now, but WEP remains a standard feature on virtually every wireless router on store shelves today.  When using a wireless access point or router it is important to remember that if you can send information from one device and receive it at another, anyone else within range might also be able to receive it. When protecting data send via wireless, security and protection is offered through encryption schemes that come with your wireless hardware you can enable.

WEP vs. WAP WEP's Major Weakness ◦WEP's major weakness is its use of static encryption keys. When you set up a router with a WEP encryption key, that one key is used by every device on your network to encrypt every packet that's transmitted. But the fact that packets are encrypted doesn't prevent them from being intercepted, and due to some esoteric technical flaws it's entirely possible for an eavesdropper to intercept enough WEP- encrypted packets to eventually deduce what the key is.

WEP vs. WAP Wi-Fi Protected Access (WPA) Address WEP's Shortcomings ◦WPA aims to provide stronger wireless data encryption than WEP, but not everyone has or was able to jump onboard with the new wireless encryption technology. In order to use WPA all devices on the network must be configured for WPA. ◦If a device is not configured for WPA, it will usually fall back to the lesser WEP encryption scheme, enabling the wireless devices to communicate on the network. The technology was designed to work with existing Wi-Fi products that have been enabled with WEP (i.e., as a software upgrade to existing hardware), but the technology includes two improvements over WEP: temporal key integrity protocol  Improved data encryption through the temporal key integrity protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven't been tampered with. extensible authentication protocol  User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regulates access to a wireless network based on a computer's hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized network users can access the network.