SlideShare ist ein Scribd-Unternehmen logo
1 von 24
1
WLAN Security
Wireless LAN Security
Network Security
WLAN Security
Presented by
S.Janani ECE
2
WLAN Security
WLAN Security - Contents
>Wireless LAN 802.11
>Technology
>Security History
>Vulnerabilities
>Demonstration
WLAN Security
3
WLAN Security
Wireless LANs
>IEEE ratified 802.11 in 1997.
>Also known as Wi-Fi.
>Wireless LAN at 1 Mbps & 2 Mbps.
>WECA (Wireless Ethernet Compatibility
Alliance) promoted Interoperability.
>Now Wi-Fi Alliance
>802.11 focuses on Layer 1 & Layer 2 of
OSI model.
>Physical layer
>Data link layer
WLAN Security
4
WLAN Security
802.11 Components
>Two pieces of equipment defined:
>Wireless station
>A desktop or laptop PC or PDA with a wireless
NIC.
>Access point
>A bridge between wireless and wired networks
>Composed of
> Radio
> Wired network interface (usually 802.3)
> Bridging software
>Aggregates access for multiple wireless stations
to wired network.
WLAN Security
5
WLAN Security
802.11 modes
> Infrastructure mode
> Basic Service Set
> One access point
> Extended Service Set
> Two or more BSSs forming a single subnet.
> Most corporate LANs in this mode.
> Ad-hoc mode
> Also called peer-to-peer.
> Independent Basic Service Set
> Set of 802.11 wireless stations that communicate
directly without an access point.
> Useful for quick & easy wireless networks.
WLAN Security
6
WLAN Security
Infrastructure mode
Basic Service Set (BSS) –
Single cell
Extended Service Set (ESS) –
Multiple cells
Access Point
Station
WLAN Security
7
WLAN Security
Ad-hoc mode
Independent Basic Service Set (IBSS)
WLAN Security
8
WLAN Security
802.11 Physical Layer
>Originally three alternative physical
layers
>Two incompatible spread-spectrum radio in
2.4Ghz ISM band
>Frequency Hopping Spread Spectrum (FHSS)
> 75 channels
>Direct Sequence Spread Spectrum (DSSS)
> 14 channels (11 channels in US)
>One diffuse infrared layer
>802.11 speed
>1 Mbps or 2 Mbps.
WLAN Security
9
WLAN Security
802.11 Data Link Layer
> Layer 2 split into:
> Logical Link Control (LLC).
> Media Access Control (MAC).
> LLC - same 48-bit addresses as 802.3.
> MAC - CSMA/CD not possible.
> Can’t listen for collision while transmitting.
> CSMA/CA – Collision Avoidance.
> Sender waits for clear air, waits random time, then
sends data.
> Receiver sends explicit ACK when data arrives intact.
> Also handles interference.
> But adds overhead.
> 802.11 always slower than equivalent 802.3.
WLAN Security
10
WLAN Security
802.11a
>802.11a ratified in 2001
>Supports up to 54Mbps in 5 Ghz range.
>Higher frequency limits the range
>Regulated frequency reduces interference
from other devices
>12 non-overlapping channels
>Usable range of 30 metres
>Average throughput of 30 Mbps
>Not backwards compatible
WLAN Security
11
WLAN Security
802.11b
> 802.11b ratified in 1999 adding 5.5 Mbps and
11 Mbps.
> DSSS as physical layer.
> 11 channels (3 non-overlapping)
> Dynamic rate shifting.
> Transparent to higher layers
> Ideally 11 Mbps.
> Shifts down through 5.5 Mbps, 2 Mbps to 1 Mbps.
> Higher ranges.
> Interference.
> Shifts back up when possible.
> Maximum specified range 100 metres
> Average throughput of 4Mbps
WLAN Security
12
WLAN Security
Roaming and Channels
>Reassociation with APs
>Moving out of range.
>High error rates.
>High network traffic.
>Allows load balancing.
>Each AP has a channel.
>14 partially overlapping channels.
>Only three channels that have no overlap.
>Best for multicell coverage.
WLAN Security
13
WLAN Security
Open System Authentication
>Service Set Identifier (SSID)
>Station must specify SSID to Access
Point when requesting association.
>Multiple APs with same SSID form
Extended Service Set.
>APs can broadcast their SSID.
>Some clients allow * as SSID.
>Associates with strongest AP regardless of
SSID.
WLAN Security
14
WLAN Security
MAC ACLs and SSID hiding
> Access points have Access Control Lists (ACL).
> ACL is list of allowed MAC addresses.
> E.g. Allow access to:
> 00:01:42:0E:12:1F
> 00:01:42:F1:72:AE
> 00:01:42:4F:E2:01
> But MAC addresses are sniffable and
spoofable.
> AP Beacons without SSID
> Essid_jack
> sends deauthenticate frames to client
> SSID then displayed when client sends reauthenticate
frames
WLAN Security
15
WLAN Security
Interception Range
Station outside
building perimeter.
Basic Service Set (BSS) –
Single cell
WLAN Security
16
WLAN Security
Interception
>Wireless LAN uses radio signal.
>Not limited to physical building.
>Signal is weakened by:
>Walls
>Floors
>Interference
>Directional antenna allows interception
over longer distances.
WLAN Security
17
WLAN Security
802.11b Security Services
>Two security services provided:
>Authentication
>Shared Key Authentication
>Encryption
>Wired Equivalence Privacy
WLAN Security
18
WLAN Security
Wired Equivalence Privacy
>Shared key between
>Stations.
>An Access Point.
>Extended Service Set
>All Access Points will have same shared key.
>No key management
>Shared key entered manually into
>Stations
>Access points
>Key management nightmare in large wireless
LANs
WLAN Security
19
WLAN Security
802.11 safeguards
>Security Policy & Architecture Design
>Treat as untrusted LAN
>Discover unauthorised use
>Access point audits
>Station protection
>Access point location
>Antenna design
WLAN Security
20
WLAN Security
Security Policy & Architecture
>Define use of wireless network
>What is allowed
>What is not allowed
>Holistic architecture and
implementation
>Consider all threats.
>Design entire architecture
>To minimise risk.
WLAN Security
21
WLAN Security
Wireless as untrusted LAN
>Treat wireless as untrusted.
>Similar to Internet.
>Firewall between WLAN and Backbone.
>Extra authentication required.
>Intrusion Detection
>at WLAN / Backbone junction.
>Vulnerability assessments
WLAN Security
22
WLAN Security
Location of Access Points
>Ideally locate access points
>In centre of buildings.
>Try to avoid access points
>By windows
>On external walls
>Line of sight to outside
>Use directional antenna to “point” radio
signal.
WLAN Security
23
WLAN Security
Relevant RFCs
>Radius Extensions: RFC 2869
>EAP: RFC 2284
>EAP-TLS: RFC 2716
WLAN Security
24
WLAN Security
Demonstration
>War driving
>Packet sniffing
>Faking Aps
>Cracking WEP
>brute force
>Dictionary attack
>FMS / H1kari attack
>Airsnarf?
>Packet injection?
WLAN Security

Weitere ähnliche Inhalte

Ähnlich wie Electronics and communication engineering

Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi Fi
Agreeta Sharma
 

Ähnlich wie Electronics and communication engineering (20)

Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Wireless lecture1
Wireless lecture1Wireless lecture1
Wireless lecture1
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlan
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wireless
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi Fi
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Wi – fi ( 802.11)
Wi – fi ( 802.11)Wi – fi ( 802.11)
Wi – fi ( 802.11)
 
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe
 

Kürzlich hochgeladen

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 

Kürzlich hochgeladen (20)

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 

Electronics and communication engineering

  • 1. 1 WLAN Security Wireless LAN Security Network Security WLAN Security Presented by S.Janani ECE
  • 2. 2 WLAN Security WLAN Security - Contents >Wireless LAN 802.11 >Technology >Security History >Vulnerabilities >Demonstration WLAN Security
  • 3. 3 WLAN Security Wireless LANs >IEEE ratified 802.11 in 1997. >Also known as Wi-Fi. >Wireless LAN at 1 Mbps & 2 Mbps. >WECA (Wireless Ethernet Compatibility Alliance) promoted Interoperability. >Now Wi-Fi Alliance >802.11 focuses on Layer 1 & Layer 2 of OSI model. >Physical layer >Data link layer WLAN Security
  • 4. 4 WLAN Security 802.11 Components >Two pieces of equipment defined: >Wireless station >A desktop or laptop PC or PDA with a wireless NIC. >Access point >A bridge between wireless and wired networks >Composed of > Radio > Wired network interface (usually 802.3) > Bridging software >Aggregates access for multiple wireless stations to wired network. WLAN Security
  • 5. 5 WLAN Security 802.11 modes > Infrastructure mode > Basic Service Set > One access point > Extended Service Set > Two or more BSSs forming a single subnet. > Most corporate LANs in this mode. > Ad-hoc mode > Also called peer-to-peer. > Independent Basic Service Set > Set of 802.11 wireless stations that communicate directly without an access point. > Useful for quick & easy wireless networks. WLAN Security
  • 6. 6 WLAN Security Infrastructure mode Basic Service Set (BSS) – Single cell Extended Service Set (ESS) – Multiple cells Access Point Station WLAN Security
  • 7. 7 WLAN Security Ad-hoc mode Independent Basic Service Set (IBSS) WLAN Security
  • 8. 8 WLAN Security 802.11 Physical Layer >Originally three alternative physical layers >Two incompatible spread-spectrum radio in 2.4Ghz ISM band >Frequency Hopping Spread Spectrum (FHSS) > 75 channels >Direct Sequence Spread Spectrum (DSSS) > 14 channels (11 channels in US) >One diffuse infrared layer >802.11 speed >1 Mbps or 2 Mbps. WLAN Security
  • 9. 9 WLAN Security 802.11 Data Link Layer > Layer 2 split into: > Logical Link Control (LLC). > Media Access Control (MAC). > LLC - same 48-bit addresses as 802.3. > MAC - CSMA/CD not possible. > Can’t listen for collision while transmitting. > CSMA/CA – Collision Avoidance. > Sender waits for clear air, waits random time, then sends data. > Receiver sends explicit ACK when data arrives intact. > Also handles interference. > But adds overhead. > 802.11 always slower than equivalent 802.3. WLAN Security
  • 10. 10 WLAN Security 802.11a >802.11a ratified in 2001 >Supports up to 54Mbps in 5 Ghz range. >Higher frequency limits the range >Regulated frequency reduces interference from other devices >12 non-overlapping channels >Usable range of 30 metres >Average throughput of 30 Mbps >Not backwards compatible WLAN Security
  • 11. 11 WLAN Security 802.11b > 802.11b ratified in 1999 adding 5.5 Mbps and 11 Mbps. > DSSS as physical layer. > 11 channels (3 non-overlapping) > Dynamic rate shifting. > Transparent to higher layers > Ideally 11 Mbps. > Shifts down through 5.5 Mbps, 2 Mbps to 1 Mbps. > Higher ranges. > Interference. > Shifts back up when possible. > Maximum specified range 100 metres > Average throughput of 4Mbps WLAN Security
  • 12. 12 WLAN Security Roaming and Channels >Reassociation with APs >Moving out of range. >High error rates. >High network traffic. >Allows load balancing. >Each AP has a channel. >14 partially overlapping channels. >Only three channels that have no overlap. >Best for multicell coverage. WLAN Security
  • 13. 13 WLAN Security Open System Authentication >Service Set Identifier (SSID) >Station must specify SSID to Access Point when requesting association. >Multiple APs with same SSID form Extended Service Set. >APs can broadcast their SSID. >Some clients allow * as SSID. >Associates with strongest AP regardless of SSID. WLAN Security
  • 14. 14 WLAN Security MAC ACLs and SSID hiding > Access points have Access Control Lists (ACL). > ACL is list of allowed MAC addresses. > E.g. Allow access to: > 00:01:42:0E:12:1F > 00:01:42:F1:72:AE > 00:01:42:4F:E2:01 > But MAC addresses are sniffable and spoofable. > AP Beacons without SSID > Essid_jack > sends deauthenticate frames to client > SSID then displayed when client sends reauthenticate frames WLAN Security
  • 15. 15 WLAN Security Interception Range Station outside building perimeter. Basic Service Set (BSS) – Single cell WLAN Security
  • 16. 16 WLAN Security Interception >Wireless LAN uses radio signal. >Not limited to physical building. >Signal is weakened by: >Walls >Floors >Interference >Directional antenna allows interception over longer distances. WLAN Security
  • 17. 17 WLAN Security 802.11b Security Services >Two security services provided: >Authentication >Shared Key Authentication >Encryption >Wired Equivalence Privacy WLAN Security
  • 18. 18 WLAN Security Wired Equivalence Privacy >Shared key between >Stations. >An Access Point. >Extended Service Set >All Access Points will have same shared key. >No key management >Shared key entered manually into >Stations >Access points >Key management nightmare in large wireless LANs WLAN Security
  • 19. 19 WLAN Security 802.11 safeguards >Security Policy & Architecture Design >Treat as untrusted LAN >Discover unauthorised use >Access point audits >Station protection >Access point location >Antenna design WLAN Security
  • 20. 20 WLAN Security Security Policy & Architecture >Define use of wireless network >What is allowed >What is not allowed >Holistic architecture and implementation >Consider all threats. >Design entire architecture >To minimise risk. WLAN Security
  • 21. 21 WLAN Security Wireless as untrusted LAN >Treat wireless as untrusted. >Similar to Internet. >Firewall between WLAN and Backbone. >Extra authentication required. >Intrusion Detection >at WLAN / Backbone junction. >Vulnerability assessments WLAN Security
  • 22. 22 WLAN Security Location of Access Points >Ideally locate access points >In centre of buildings. >Try to avoid access points >By windows >On external walls >Line of sight to outside >Use directional antenna to “point” radio signal. WLAN Security
  • 23. 23 WLAN Security Relevant RFCs >Radius Extensions: RFC 2869 >EAP: RFC 2284 >EAP-TLS: RFC 2716 WLAN Security
  • 24. 24 WLAN Security Demonstration >War driving >Packet sniffing >Faking Aps >Cracking WEP >brute force >Dictionary attack >FMS / H1kari attack >Airsnarf? >Packet injection? WLAN Security

Hinweis der Redaktion

  1. Usual configuration for offices.
  2. For meetings, conferences or other places where wireless infrastructure (access points) doesn’t exist.
  3. Industrial, Scientific and Medical band.
  4. Layer 2 split. LLC has same 48-bit addressing as Ethernet. Because this is a radio medium, can’t always listen for coliisions while transmitting. Therefore need a way to avoid collisions, instead of detecting collisions.