Topic 4.0 wireless technology

Topic 4.0 wireless technology
Learning Outcomes
1. Understand wireless technologies.
2. Build wireless LANs.
3. Implement wireless LAN security.
UNDERSTAND WIRELESS
TECHNOLOGIES
4.1
Wireless Computer Networking
• Wireless technologies use electromagnetic
waves to carry information between devices.
• An electromagnetic wave is the same
medium that carries radio signals through
the air.
Popular wireless
local area
networking (WLAN)
products conform to
the 802.11 "Wi-Fi"
standards
Advantages of WiFi
• Mobility – allows for easy connection of both
stationary and mobile clients
• Scalability – allow more users (coverage area)
• Flexibility – provide anytime connectivity
• Cost Saving – equipment costs
• Reduce Installation Time – easy to install
Disadvantages of WiFi
• Interference - due to weather, other wireless
devices, or obstructions like walls.
• Speed - Wireless connections are slower.
• Price - Wireless hardware is more expensive.
• Technology – WLAN technology continues to
involve. The speed and technology (not fix as
wired technology)
Wireless Technologies
• Infrared (IR)
– Infrared (IR) is relatively low energy and cannot
penetrate through walls or other obstacles.
– Used to connect and move data between devices
such as Personal Digital Assistants (PDAs) and
PCs.
Wireless Technologies (cont…)
• Radio Frequency (RF)
– RF waves can penetrate through walls and other
obstacles, allowing a much greater range than IR.
Bluetooth is a technology that makes use of the 2.4
GHz band. It is limited to low-speed, short-range
communications, but has the advantage of
communicating with many devices at the same time.
IEEE 802.11 standards - transmit at a much higher
power level, which gives them a greater range.
Types of Wireless Networks
WWAN
WLAN
WPAN
WPAN, WLAN & WWAN
** EDR – Enhanced Data Rate
Answer Me…. WPAN / WLAN /
WWAN???
1. Naim call his friend using his cell phone?
2. Upload files to Emma’s laptop from her PDA’s?
3. Checking email using laptop at a wireless
hotspot?
4. Bella uses a wireless Bluetooth to listen to music
from his mp3 player?
WLAN Standards
• IEEE 802.11 standard governs the WLAN
environment.
• There are four amendments to the IEEE
802.11 standard:
– 802.11a
– 802.11b
– 802.11g
– 802.11n
IEEE WLAN Standards
BUILD WIRELESS LANs
4.2
WLAN Components
• Wireless Client/STA (STAtion) – Any host
device that connect to a wireless network.
• Access Point – Control access between
wired and wireless network, acts as media
converter accepting.
WLAN Components (cont…)
• Wireless Bridge – Connect two wired
network through a wireless link.
WLAN Components (cont…)
• Antenna – Used on APs and Wireless
bridges, increases the output signal strength
from a wireless device
Service Set Identifier (SSID)
• SSID is a code to set the wireless components
connect to the appropriate WLAN.
• SSID is a case-sensitive, alpha-numeric string that
is up to 32-characters.
All wireless devices in
a WLAN must be
configured with the
same SSID in order to
communicate.
SSID is the public
name of a wireless
network
hyp1
Basic form of WLAN installations
• There are two basic forms of WLAN
installations:
 Ad-hoc
 Infrastructure mode.
Ad-Hoc / IBSS
• Covered area known as Independent Basic
Service Set (IBSS)
• Simplest form of a wireless network is
created by connecting two or more wireless
clients together in a peer-to-peer network.
• Does not include an Access Point.
• All clients within an ad-hoc network are
equal.
Infrastructure Mode / BSS
• Covered area known as Basic Service Set
(BSS)
• Require a single device that controls
communications in the wireless cell.
• Individual STAs can not communicate
directly with each other.
• To communicate, each device must obtain
permission from the AP.
Extended Service Set (ESS)
• (BSS) area of coverage of a single AP is limited.
• To expand the coverage area, connect multiple BSSs
through a Distribution System (DS). ESS uses multiple
APs. Each AP is in a separate BSS. BSSs must overlap by
approximately 10%.
Wireless Channel
• Wireless clients are communicating within an
IBSS, BSS or ESS.
• Channels are created by dividing up the
available RF spectrum.
• Each channel is capable of carrying a
different conversation.
Wireless Channel (cont…)
• Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA).
– CSMA/CA creates a reservation on the channel
for use by a specific conversation.
Example:
Sending
message
from H1 to
H2 thru
wireless
channel
CSMA/CA
Steps to sending message/data thru channel
by CSMA/CA:
• H1 must ask permission from the AP. Known as a
Request to Send (RTS)
• AP replied known as Clear to Send (CTS). If no one
use the channel.
• H1 sending Data to H2.
• When conversation is complete, H1 requested the
channel sends another message to the AP. Known
as Acknowledgement (ACK). ACK is to release the
channel, so someone else can use the channel.
IMPLEMENT WIRELESS
LAN SECURITY
4.3
WLAN Attacks
WLAN attacks avoid by:
1. Limited access to a WLAN – filter MAC
address
2. Authentication on a WLAN – username
and password
3. Encryption on a WLAN – data transfer
4. Traffic filtering on a WLAN – filter MAC
address, IP address, application etc.
Limited Access to WLAN
• One way to limit access to your wireless network is
to filtering the MAC Address.
Authentication to WLAN
• Authentication is the process of permitting entry to a
network based on a set of credentials.
• There are three types of wireless authentication
methods:
– Open authentication
– Pre-Shared Key (PSK)
– Extensible Authentication Protocol (EAP)
Authentication to WLAN (cont…)
 Open authentication
 Open authentication should only be used on
public wireless networks
Authentication to WLAN (cont…)
 Pre-Shared Key (PSK)
 PSK both the AP and client must be configured
with the same key or secret word.
Authentication to WLAN (cont…)
 Extensible Authentication Protocol (EAP)
 EAP provides two-way, authentication as well as
user authentication.
EAP software is installed on the client, the client communicates with a backend authentication server:
Remote Authentication Dial-in User Service (RADIUS)
Encryption on a WLAN
• Authentication and MAC filtering ONLY stop an
attacker from connecting to a wireless network.
• Encryption is the process of transforming data so
that even if it is intercepted it is unusable.
1
2
Encryption
Encryption on a WLAN (cont…)
• Types of Encryption:
1. Wired Equivalency Protocol (WEP)
2. Wi-Fi Protected Access (WPA)
** WPA also have another version called WPA2
Wired Equivalency Protocol (WEP)
• Wired Equivalency Protocol (WEP) is an advanced
security feature that encrypts network traffic through
the air.
• WEP uses pre-configured keys to encrypt and
decrypt data. A WEP key is entered as a string of
numbers and letters and is generally 64 bits or 128
bits long.
• Every wireless device must have the same WEP key
entered. Without this key, devices will not be able to
understand the wireless transmissions.
Wired Equivalency Protocol (WEP)
Weakness of WEP is the use of a
static key on all WEP enabled
devices
Wi-Fi Protected Access (WPA)
• WPA uses encryption keys from 64 bits up to
256 bits.
• Generates new, dynamic keys each time a
client establishes a connection with the AP.
• More secure than WEP because it is
significantly more difficult to crack
Traffic Filtering on a WLAN
• Traffic filtering is control the types of traffic
transmitted across a WLAN.
• Traffic filtering blocks undesirable traffic from
entering or leaving the wireless network.
• Filtering is done by the AP as traffic passes. We can
remove the traffic by filter a specific MAC or IP
address.
• It can also block certain applications by port
numbers.
Traffic Filtering on a WLAN
I don’t stop when I’m tired.
I only stop when I’m done…
1 von 40

Recomendados

Transmission Medium von
Transmission MediumTransmission Medium
Transmission Mediumsabari Giri
3.6K views42 Folien
Transmission media ppt von
Transmission media pptTransmission media ppt
Transmission media pptShubham Singh
2K views35 Folien
Network Types and Topologies von
Network Types and TopologiesNetwork Types and Topologies
Network Types and TopologiesChristopher Brown
1.1K views17 Folien
Data mining von
Data miningData mining
Data miningMaulik Togadiya
9.4K views18 Folien
Network cable von
Network cableNetwork cable
Network cableOnline
30.4K views19 Folien
Topic : X.25, Frame relay and ATM von
Topic :  X.25, Frame relay and ATMTopic :  X.25, Frame relay and ATM
Topic : X.25, Frame relay and ATMDr Rajiv Srivastava
8.7K views23 Folien

Más contenido relacionado

Was ist angesagt?

Forward Backward Chaining von
Forward Backward ChainingForward Backward Chaining
Forward Backward ChainingQAU ISLAMABAD,PAKISTAN
64.6K views49 Folien
Pseudo Random Number von
Pseudo Random NumberPseudo Random Number
Pseudo Random NumberHemant Chetwani
2.5K views21 Folien
Computer network Report von
Computer network ReportComputer network Report
Computer network ReportAmitoj Kaur
22.7K views40 Folien
Network cabling von
Network cablingNetwork cabling
Network cablingEm Magallon
2.2K views19 Folien
network cabling von
network cablingnetwork cabling
network cablingemad94
3.2K views20 Folien

Was ist angesagt?(20)

Computer network Report von Amitoj Kaur
Computer network ReportComputer network Report
Computer network Report
Amitoj Kaur22.7K views
Network cabling von Em Magallon
Network cablingNetwork cabling
Network cabling
Em Magallon2.2K views
network cabling von emad94
network cablingnetwork cabling
network cabling
emad943.2K views
Topic 1.1 basic concepts of computer network von Atika Zaimi
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Atika Zaimi473 views
Basics Of Networking (Overview) von ashiesh0007
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
ashiesh000739.4K views
Linear Programming Feasible Region von VARUN MODI
Linear Programming Feasible RegionLinear Programming Feasible Region
Linear Programming Feasible Region
VARUN MODI7.7K views
Matrix chain multiplication von Respa Peter
Matrix chain multiplicationMatrix chain multiplication
Matrix chain multiplication
Respa Peter33.8K views
Network devices von Dhani Ahmad
Network devicesNetwork devices
Network devices
Dhani Ahmad6.3K views
Matrix multiplication von Bobby Bloch
Matrix multiplicationMatrix multiplication
Matrix multiplication
Bobby Bloch4.6K views
Chap 06 delivery and routing of ip packets von Noctorous Jamal
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
Noctorous Jamal2.2K views
Networking Devices and Networking Topologies von mc aa
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
mc aa4.1K views
Guided And Unguided Media von Rajesh Yadav
Guided And Unguided MediaGuided And Unguided Media
Guided And Unguided Media
Rajesh Yadav16.8K views

Similar a Topic 4.0 wireless technology

Recent Trends in Wireless communication von
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communicationJigsAshley
12 views88 Folien
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration von
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
2.8K views56 Folien
POLITEKNIK MALAYSIA von
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
237 views33 Folien
Wireless Network security von
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
548 views29 Folien
wi-fi technology von
wi-fi technologywi-fi technology
wi-fi technologytardeep
1.4K views40 Folien
Wifi von
WifiWifi
WifiTheSmit Chheda
323 views40 Folien

Similar a Topic 4.0 wireless technology(20)

Recent Trends in Wireless communication von JigsAshley
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
JigsAshley12 views
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration von Abdelkhalik Mosa
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
Abdelkhalik Mosa2.8K views
POLITEKNIK MALAYSIA von Aiman Hud
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
Aiman Hud237 views
wi-fi technology von tardeep
wi-fi technologywi-fi technology
wi-fi technology
tardeep1.4K views
Wireless communication and networking von M Sabir Saeed
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
M Sabir Saeed800 views
wifi-technology von tardeep
 wifi-technology wifi-technology
wifi-technology
tardeep5.2K views
Wifi vignan final von PREMKUMAR
Wifi vignan finalWifi vignan final
Wifi vignan final
PREMKUMAR561 views
Wireless Networks.ppt von xdarlord
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.ppt
xdarlord3 views
WLAN of networking.ppt von Umme habiba
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
Umme habiba7.7K views
Wireless networksppt von pmuthumca51
Wireless networkspptWireless networksppt
Wireless networksppt
pmuthumca51493 views

Más de Atika Zaimi

Topic 5.0 basic security part 1 von
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Atika Zaimi
255 views27 Folien
Topic 3.2 internet service provider von
Topic 3.2 internet service providerTopic 3.2 internet service provider
Topic 3.2 internet service providerAtika Zaimi
1.5K views22 Folien
Topic 3.1 data transmission and networking media von
Topic 3.1 data transmission and networking mediaTopic 3.1 data transmission and networking media
Topic 3.1 data transmission and networking mediaAtika Zaimi
976 views48 Folien
Topic 2.4 network services von
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network servicesAtika Zaimi
85 views13 Folien
Topic 2.3 network addressing for tcpip von
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipAtika Zaimi
280 views33 Folien
Topic 2.2 network protocol von
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocolAtika Zaimi
161 views9 Folien

Más de Atika Zaimi(9)

Topic 5.0 basic security part 1 von Atika Zaimi
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1
Atika Zaimi255 views
Topic 3.2 internet service provider von Atika Zaimi
Topic 3.2 internet service providerTopic 3.2 internet service provider
Topic 3.2 internet service provider
Atika Zaimi1.5K views
Topic 3.1 data transmission and networking media von Atika Zaimi
Topic 3.1 data transmission and networking mediaTopic 3.1 data transmission and networking media
Topic 3.1 data transmission and networking media
Atika Zaimi976 views
Topic 2.4 network services von Atika Zaimi
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network services
Atika Zaimi85 views
Topic 2.3 network addressing for tcpip von Atika Zaimi
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
Atika Zaimi280 views
Topic 2.2 network protocol von Atika Zaimi
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocol
Atika Zaimi161 views
Topic 2.1 network communication using osi model part1 von Atika Zaimi
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1
Atika Zaimi188 views
Topic 1.3 create lan using networking devices von Atika Zaimi
Topic 1.3 create lan using networking devicesTopic 1.3 create lan using networking devices
Topic 1.3 create lan using networking devices
Atika Zaimi70 views
Topic 1.2 principle of communication in networking von Atika Zaimi
Topic 1.2 principle of communication in networkingTopic 1.2 principle of communication in networking
Topic 1.2 principle of communication in networking
Atika Zaimi168 views

Último

TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensorssugiuralab
21 views15 Folien
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... von
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
40 views69 Folien
MVP and prioritization.pdf von
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdfrahuldharwal141
31 views8 Folien
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive von
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
34 views35 Folien
Design Driven Network Assurance von
Design Driven Network AssuranceDesign Driven Network Assurance
Design Driven Network AssuranceNetwork Automation Forum
15 views42 Folien
Serverless computing with Google Cloud (2023-24) von
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)wesley chun
11 views33 Folien

Último(20)

TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab21 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... von Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker40 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive von Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Serverless computing with Google Cloud (2023-24) von wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 views
Voice Logger - Telephony Integration Solution at Aegis von Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma39 views
6g - REPORT.pdf von Liveplex
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdf
Liveplex10 views
Future of AR - Facebook Presentation von ssuserb54b561
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
ssuserb54b56115 views
Business Analyst Series 2023 - Week 3 Session 5 von DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10300 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... von James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson92 views
HTTP headers that make your website go faster - devs.gent November 2023 von Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 views

Topic 4.0 wireless technology

  • 2. Learning Outcomes 1. Understand wireless technologies. 2. Build wireless LANs. 3. Implement wireless LAN security.
  • 4. Wireless Computer Networking • Wireless technologies use electromagnetic waves to carry information between devices. • An electromagnetic wave is the same medium that carries radio signals through the air. Popular wireless local area networking (WLAN) products conform to the 802.11 "Wi-Fi" standards
  • 5. Advantages of WiFi • Mobility – allows for easy connection of both stationary and mobile clients • Scalability – allow more users (coverage area) • Flexibility – provide anytime connectivity • Cost Saving – equipment costs • Reduce Installation Time – easy to install
  • 6. Disadvantages of WiFi • Interference - due to weather, other wireless devices, or obstructions like walls. • Speed - Wireless connections are slower. • Price - Wireless hardware is more expensive. • Technology – WLAN technology continues to involve. The speed and technology (not fix as wired technology)
  • 7. Wireless Technologies • Infrared (IR) – Infrared (IR) is relatively low energy and cannot penetrate through walls or other obstacles. – Used to connect and move data between devices such as Personal Digital Assistants (PDAs) and PCs.
  • 8. Wireless Technologies (cont…) • Radio Frequency (RF) – RF waves can penetrate through walls and other obstacles, allowing a much greater range than IR. Bluetooth is a technology that makes use of the 2.4 GHz band. It is limited to low-speed, short-range communications, but has the advantage of communicating with many devices at the same time. IEEE 802.11 standards - transmit at a much higher power level, which gives them a greater range.
  • 9. Types of Wireless Networks WWAN WLAN WPAN
  • 10. WPAN, WLAN & WWAN ** EDR – Enhanced Data Rate
  • 11. Answer Me…. WPAN / WLAN / WWAN??? 1. Naim call his friend using his cell phone? 2. Upload files to Emma’s laptop from her PDA’s? 3. Checking email using laptop at a wireless hotspot? 4. Bella uses a wireless Bluetooth to listen to music from his mp3 player?
  • 12. WLAN Standards • IEEE 802.11 standard governs the WLAN environment. • There are four amendments to the IEEE 802.11 standard: – 802.11a – 802.11b – 802.11g – 802.11n
  • 15. WLAN Components • Wireless Client/STA (STAtion) – Any host device that connect to a wireless network. • Access Point – Control access between wired and wireless network, acts as media converter accepting.
  • 16. WLAN Components (cont…) • Wireless Bridge – Connect two wired network through a wireless link.
  • 17. WLAN Components (cont…) • Antenna – Used on APs and Wireless bridges, increases the output signal strength from a wireless device
  • 18. Service Set Identifier (SSID) • SSID is a code to set the wireless components connect to the appropriate WLAN. • SSID is a case-sensitive, alpha-numeric string that is up to 32-characters. All wireless devices in a WLAN must be configured with the same SSID in order to communicate. SSID is the public name of a wireless network hyp1
  • 19. Basic form of WLAN installations • There are two basic forms of WLAN installations:  Ad-hoc  Infrastructure mode.
  • 20. Ad-Hoc / IBSS • Covered area known as Independent Basic Service Set (IBSS) • Simplest form of a wireless network is created by connecting two or more wireless clients together in a peer-to-peer network. • Does not include an Access Point. • All clients within an ad-hoc network are equal.
  • 21. Infrastructure Mode / BSS • Covered area known as Basic Service Set (BSS) • Require a single device that controls communications in the wireless cell. • Individual STAs can not communicate directly with each other. • To communicate, each device must obtain permission from the AP.
  • 22. Extended Service Set (ESS) • (BSS) area of coverage of a single AP is limited. • To expand the coverage area, connect multiple BSSs through a Distribution System (DS). ESS uses multiple APs. Each AP is in a separate BSS. BSSs must overlap by approximately 10%.
  • 23. Wireless Channel • Wireless clients are communicating within an IBSS, BSS or ESS. • Channels are created by dividing up the available RF spectrum. • Each channel is capable of carrying a different conversation.
  • 24. Wireless Channel (cont…) • Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). – CSMA/CA creates a reservation on the channel for use by a specific conversation. Example: Sending message from H1 to H2 thru wireless channel
  • 25. CSMA/CA Steps to sending message/data thru channel by CSMA/CA: • H1 must ask permission from the AP. Known as a Request to Send (RTS) • AP replied known as Clear to Send (CTS). If no one use the channel. • H1 sending Data to H2. • When conversation is complete, H1 requested the channel sends another message to the AP. Known as Acknowledgement (ACK). ACK is to release the channel, so someone else can use the channel.
  • 27. WLAN Attacks WLAN attacks avoid by: 1. Limited access to a WLAN – filter MAC address 2. Authentication on a WLAN – username and password 3. Encryption on a WLAN – data transfer 4. Traffic filtering on a WLAN – filter MAC address, IP address, application etc.
  • 28. Limited Access to WLAN • One way to limit access to your wireless network is to filtering the MAC Address.
  • 29. Authentication to WLAN • Authentication is the process of permitting entry to a network based on a set of credentials. • There are three types of wireless authentication methods: – Open authentication – Pre-Shared Key (PSK) – Extensible Authentication Protocol (EAP)
  • 30. Authentication to WLAN (cont…)  Open authentication  Open authentication should only be used on public wireless networks
  • 31. Authentication to WLAN (cont…)  Pre-Shared Key (PSK)  PSK both the AP and client must be configured with the same key or secret word.
  • 32. Authentication to WLAN (cont…)  Extensible Authentication Protocol (EAP)  EAP provides two-way, authentication as well as user authentication. EAP software is installed on the client, the client communicates with a backend authentication server: Remote Authentication Dial-in User Service (RADIUS)
  • 33. Encryption on a WLAN • Authentication and MAC filtering ONLY stop an attacker from connecting to a wireless network. • Encryption is the process of transforming data so that even if it is intercepted it is unusable. 1 2 Encryption
  • 34. Encryption on a WLAN (cont…) • Types of Encryption: 1. Wired Equivalency Protocol (WEP) 2. Wi-Fi Protected Access (WPA) ** WPA also have another version called WPA2
  • 35. Wired Equivalency Protocol (WEP) • Wired Equivalency Protocol (WEP) is an advanced security feature that encrypts network traffic through the air. • WEP uses pre-configured keys to encrypt and decrypt data. A WEP key is entered as a string of numbers and letters and is generally 64 bits or 128 bits long. • Every wireless device must have the same WEP key entered. Without this key, devices will not be able to understand the wireless transmissions.
  • 36. Wired Equivalency Protocol (WEP) Weakness of WEP is the use of a static key on all WEP enabled devices
  • 37. Wi-Fi Protected Access (WPA) • WPA uses encryption keys from 64 bits up to 256 bits. • Generates new, dynamic keys each time a client establishes a connection with the AP. • More secure than WEP because it is significantly more difficult to crack
  • 38. Traffic Filtering on a WLAN • Traffic filtering is control the types of traffic transmitted across a WLAN. • Traffic filtering blocks undesirable traffic from entering or leaving the wireless network. • Filtering is done by the AP as traffic passes. We can remove the traffic by filter a specific MAC or IP address. • It can also block certain applications by port numbers.
  • 40. I don’t stop when I’m tired. I only stop when I’m done…