SlideShare une entreprise Scribd logo
1  sur  39
Wireless
              CCNA Exploration Semester 3
                                Chapter 7




30 Sep 2012             S Ward Abingdon and Witney College   1
Topics
 Components   and basic operation of wireless
  LANs
 Basic WLAN security

 Configure and verify basic wireless LAN
  access
 Troubleshoot wireless client access




                                            2
 30 Sep 2012   S Ward Abingdon and
               Witney College
Semester 3
                 LAN Design

  Basic Switch                      Wireless
  Concepts

VLANs                  STP


VTP                 Inter-VLAN
                    routing
                                               3
30 Sep 2012   S Ward Abingdon and
              Witney College
Wireless advantages
 Stay in contact while travelling.
 Move workstation within building without
  moving cables.
 In new building, save cost of cabling the
  whole building – just some cables needed.
 Use a variety of wireless devices.

 Can link to cabled network.



                                              4
 30 Sep 2012   S Ward Abingdon and
               Witney College
Wireless problems
 Interference

 Signal strength, blind spots
 Security – anyone with receiver within range
  can pick up signals
 Regulations differ in different countries




                                            5
 30 Sep 2012     S Ward Abingdon and
                 Witney College
Standards
               PAN         LAN           MAN       WAN

Standards Bluetooth        802.11        802.11    GSM
          802.15.3                       802.16    CDMA
                                         802.20    Satellite
Speed          < 1 Mbps    11-54         10 – 100+ 10 Kbps –
                           Mbps          Mbps      2 Mbps
Range          Short       medium        Medium-   Long
                                         long



                                                          6
 30 Sep 2012           S Ward Abingdon and
                       Witney College
Wireless and Ethernet
 Wireless  workstations connect to cabled
  Ethernet network via an access point (AP).
 Collisions can occur both with Ethernet and
  with wireless.
 Ethernet detects and recovers (CSMA/CD)

 Wireless uses collision avoidance.

 Frame format is different.



                                            7
 30 Sep 2012   S Ward Abingdon and
               Witney College
802.11a
 Introduced 1999, not compatible with 802.11b
 OFDM modulation (faster, up to 54Mbps)

 More costly than 802.11b

 5 GHz band.

 Smaller antennas, less interference

 Poorer range, absorbed more by walls etc.

 Not allowed in some countries.


                                           8
 30 Sep 2012   S Ward Abingdon and
               Witney College
802.11b
 Introduced 1999, not compatible with 802.11a
 DSSS modulation, slower, 1, 2, 5.5, 11 Mbps

 Cheaper than 802.11a

 2.4 GHz band.

 More interference as many appliances use
  this band
 Longer range, less easily obstructed.



                                           9
 30 Sep 2012   S Ward Abingdon and
               Witney College
802.11g
 Introduced 2003
 Compatible with 802.11b

 DSSS modulation, to 11 Mbps or OFDM to
  54 Mbps
 2.4 GHz band.

 More interference as many appliances use
  this band
 Longer range, less easily obstructed.

                                         10
 30 Sep 2012   S Ward Abingdon and
               Witney College
802.11n
 Expected  Sept 2008, in draft now.
 May use both 2.4 and 5 GHz band

 MIMO-OFDM Splits high data rate stream
  into several low data rate streams, transmits
  simultaneously using multiple antennae.
 Possibly up to 248 Mbps with 2 streams

 Longer range, 70 metres



                                             11
 30 Sep 2012    S Ward Abingdon and
                Witney College
Organisations
 ITU-R   allocates RF spectrum bands and
  satellite orbits
 IEEE develops and maintains 802 standards
  for LANs and MANs including wireless
  modulation
 Wi-Fi Alliance certifies that vendors keep to
  standards and industry norms so that devices
  can operate together

                                           12
 30 Sep 2012   S Ward Abingdon and
               Witney College
Wireless NIC
 Needed       to connect a device to an access
  point.
 Laptops used to have PCMCIA cards. Some
  still do, but now the NIC is usually built in.
 Desktops can have expansion cards
  installed, or they can use a USB device.



                                                  13
 30 Sep 2012        S Ward Abingdon and
                    Witney College
Access point, shared medium
 Access  point acts like a hub (not switch)
 Wireless is a shared medium

 802.11 uses CSMA/CA

 Devices detect activity on the medium, send
  signals if all is clear.
 Signal is acknowledged if it is received

 Attenuation limits distance of client from
  access point.
                                           14
 30 Sep 2012   S Ward Abingdon and
               Witney College
Hidden nodes
 Iftwo stations cannot sense
  each others’ signals then they
  may transmit at the same time
  and have a collision.
 Request to send/clear to send (RTS/CTS)
  avoids this.
 Station requests the medium, access point
  allocates it for long enough to complete the
  transmission.
                                             15
 30 Sep 2012    S Ward Abingdon and
                Witney College
Wireless router
 Commonly     used for Internet access
 Acts as router, Ethernet switch and wireless
  access point.
 Configure for mode 802.11a, b, g, or n
 Configure shared service set identifier (SSID)
  to identify network
 Select channel within 2.4GHz band. Adjacent
  access points need non-overlapping
  channels.
                                            16
 30 Sep 2012    S Ward Abingdon and
                Witney College
Ad hoc topology
 No access point
 Peer to peer

 Negotiate parameters

 Independent basic
  service set
 Area covered is basic
  service area (BSA).


                                     17
 30 Sep 2012   S Ward Abingdon and
               Witney College
Basic service set topology
 One  access point
 Access point manages
  parameters for clients
 Infrastructure mode

 Area covered is basic service
  area (BSA).



                                     18
 30 Sep 2012   S Ward Abingdon and
               Witney College
Extended service set topology
 More    than one access
  point
 Access point manages
  parameters for clients
 Infrastructure mode

 Area covered is
  extended service area
  (ESA).

                                       19
 30 Sep 2012     S Ward Abingdon and
                 Witney College
Beacon and probe
 Access   point may send out a beacon at
  regular intervals for clients to detect.
 Client sends a probe specifying the SSID and
  bit rates supported. Access point responds.
 Client can send probe with no SSID to look
  for any network. Access point may be
  configured to respond, or not.


                                          20
 30 Sep 2012   S Ward Abingdon and
               Witney College
Authentication
 Clientrequests authentication.
 Access point responds.

 802.11 had two authentication mechanisms.
  NULL (Open Authentication) does not give
  privacy. Wired Equivalency Protection (WEP)
  uses a shared key.



                                          21
 30 Sep 2012   S Ward Abingdon and
               Witney College
Association
 Request   from client and response.
 Finalizes security options
 Finalizes bit rate options
 Sets up data link
 Client learns the access point MAC address
  (BSSID)
 Access point maps a logical port known as
  the association identifier (AID) to the WLAN
  client.
                                            22
 30 Sep 2012   S Ward Abingdon and
               Witney College
Placing access points
 Above   obstructions.
 At least 3 feet from metal obstructions.

 Vertically and high up.

 In locations where users will work.

 But not too close to people.

 Work out the coverage for each AP.

 Allow enough overlap.


                                             23
 30 Sep 2012    S Ward Abingdon and
                Witney College
Security threats
 War  drivers look for an unsecured network
  that will provide Internet access.
 Hackers (Crackers) enter systems to steal
  data or cause harm. They can often get past
  weak security.
 Employees may install rogue access points
  without permission and without implementing
  the necessary security.

                                          24
 30 Sep 2012   S Ward Abingdon and
               Witney College
Man in the middle
 Attacker   modifies the NIC of a laptop with
  special software so that it accepts all traffic,
  not just traffic addressed to it.
 Uses packet sniffing software, such as
  Wireshark, to observe a client station
  connecting to an access point. Detects
  names, IP addresses, ID and the challenge
  and associate response.
 Can then monitor network.
                                                25
 30 Sep 2012     S Ward Abingdon and
                 Witney College
Denial of service
 Use  common devices to create interference.
  (cordless phone, microwave, baby monitor)
 Flood the network with clear-to-send (CTS)
  messages. Clients then send simultaneously
  and cause a constant stream of collisions.
 Send a series of disassociate commands so
  that clients repeatedly disconnect then try to
  reassociate.

                                             26
 30 Sep 2012    S Ward Abingdon and
                Witney College
802.11 original authentication
 Open  authentication – no privacy or security
  “Authenticate me.” “All right.”
 WEP shared key authentication – weak
  encryption algorithm could be cracked. 32 bit
  key had to be entered by hand. Prone to error
  and not easily scalable.



                                           27
 30 Sep 2012   S Ward Abingdon and
               Witney College
Authentication developments
 Vendors   created their own security systems
 Wi-Fi Alliance developed WiFi Protected
  Access (WPA) security method.
 802.11i standard introduced - similar to the
  Wi-Fi Alliance WPA2 standard.




                                            28
 30 Sep 2012   S Ward Abingdon and
               Witney College
TKIP and AES encryption
   Temporal Key Integrity Protocol (TKIP) encryption
    mechanism is certified as WPA by Wi-Fi Alliance.
   TKIP uses the original encryption algorithm used by
    WEP but addresses its weaknesses.
   TKIP encrypts the Layer 2 payload and carries out a
    message integrity check to detect tampering.
   Advanced Encryption Standard (AES) encryption
    mechanism is certified as WPA2. Has additional
    features.
   AES is the preferred method.
                                                   29
30 Sep 2012        S Ward Abingdon and
                   Witney College
Configuring Access Point
1.    Check wired operation: DHCP, Internet access
2.    Install access point
3.    Configure access point without security
4.    Install one wireless client without security
5.    Check wireless network operation
6.    Configure security
7.    Check wireless network operation

                                             30
     30 Sep 2012   S Ward Abingdon and
                   Witney College
Basic Wireless Settings
 Network  Mode – Lets you choose the right
  mode for your devices. B, G, N, mixed or BG
  mixed. You can disable wireless operation.
 Network Name (SSID) – should be changed
  from the default. Must be the same for all
  devices on the network.
 SSID broadcast can be enabled or disabled.




                                          31
 30 Sep 2012   S Ward Abingdon and
               Witney College
More Basic Wireless Settings
 Radio    Band –
    For Wireless-N devices only, select Wide - 40MHz
     Channel.
    For Wireless-G and Wireless-B only, select
     Standard - 20MHz Channel.
    For mixed devices, keep the default Auto.
 Wide Channel - If you selected Wide for the
  Radio Band, Select a channel from the drop-
  down menu.
 Standard Channel - Select the channel.
                                                 32
 30 Sep 2012        S Ward Abingdon and
                    Witney College
Security
 Choose   PSK2 (WPA2 or IEEE 802.11i) if all
  client devices are able to use it.
 If some older devices do not support WPA2
  then choose the best security mode that is
  supported by all devices.
 Encryption – AES is stronger than TKIP. Use
  AES with WPA2.


                                          33
 30 Sep 2012   S Ward Abingdon and
               Witney College
Configure the client
 Choose  the network to connect to.
 Enter the SSID

 Choose the authentication method

 Choose the encryption method

 Enter the network key.




                                       34
 30 Sep 2012   S Ward Abingdon and
               Witney College
Troubleshooting
 Generally  start with the physical layer and
  then move up.
 Eliminate the client PC as the source of
  trouble before checking the rest of the
  network.




                                                 35
 30 Sep 2012    S Ward Abingdon and
                Witney College
Troubleshooting – no connectivity
 Check  that the PC has an IP address.
 Try connecting the PC to the wired network
  and ping a known address
 Try a different wireless NIC. Reload drivers
  as necessary.
 Check the security mode and encryption
  settings on the client. Do they match the
  access point?

                                             36
 30 Sep 2012    S Ward Abingdon and
                Witney College
Troubleshooting – poor connection
 Check   distance to access point
 Check the channel settings on the client.

 Check for devices that might be causing
  interference (cordless phone, microwave
  oven etc).




                                              37
 30 Sep 2012   S Ward Abingdon and
               Witney College
Troubleshooting – looking wider
 Are  all devices in place?
 Are they all powered on?

 Are wired links working correctly?

 Is there a neighbouring access point using an
  overlapping wave band?
 Are access points badly placed?




                                           38
 30 Sep 2012   S Ward Abingdon and
               Witney College
The End




30 Sep 2012   S Ward Abingdon and Witney College       39

Contenu connexe

Tendances

Track e the road from 2 d to 3d integration -synopsys
Track e   the road from 2 d to 3d integration -synopsysTrack e   the road from 2 d to 3d integration -synopsys
Track e the road from 2 d to 3d integration -synopsys
chiportal
 
Cband vsat proposal updated
Cband vsat proposal updatedCband vsat proposal updated
Cband vsat proposal updated
ayo_deji
 

Tendances (15)

Whitepaper Advancements And Economics Make Vdsl Ideal Final
Whitepaper   Advancements And Economics Make Vdsl Ideal   FinalWhitepaper   Advancements And Economics Make Vdsl Ideal   Final
Whitepaper Advancements And Economics Make Vdsl Ideal Final
 
Lifi based communication system
Lifi based communication systemLifi based communication system
Lifi based communication system
 
Track e the road from 2 d to 3d integration -synopsys
Track e   the road from 2 d to 3d integration -synopsysTrack e   the road from 2 d to 3d integration -synopsys
Track e the road from 2 d to 3d integration -synopsys
 
Module 5 2010
Module 5 2010Module 5 2010
Module 5 2010
 
Presentation
PresentationPresentation
Presentation
 
On-chip ESD protection for LNA
On-chip ESD protection for LNAOn-chip ESD protection for LNA
On-chip ESD protection for LNA
 
V2 i10 ijertv2is100048
V2 i10 ijertv2is100048V2 i10 ijertv2is100048
V2 i10 ijertv2is100048
 
Visible light communication
Visible light communicationVisible light communication
Visible light communication
 
Cband vsat proposal updated
Cband vsat proposal updatedCband vsat proposal updated
Cband vsat proposal updated
 
Computer communication networks chapter 1 ppt (vtu odd sem EC)
Computer communication networks chapter 1 ppt (vtu odd sem EC)Computer communication networks chapter 1 ppt (vtu odd sem EC)
Computer communication networks chapter 1 ppt (vtu odd sem EC)
 
IRJET- Highway Navigation System using Light Fidelity Technology
IRJET- Highway Navigation System using Light Fidelity TechnologyIRJET- Highway Navigation System using Light Fidelity Technology
IRJET- Highway Navigation System using Light Fidelity Technology
 
Marctel Systems Private Limited, Thane, Connectors And Accessories Of Mobile ...
Marctel Systems Private Limited, Thane, Connectors And Accessories Of Mobile ...Marctel Systems Private Limited, Thane, Connectors And Accessories Of Mobile ...
Marctel Systems Private Limited, Thane, Connectors And Accessories Of Mobile ...
 
Cable catalogue 2016
Cable catalogue 2016Cable catalogue 2016
Cable catalogue 2016
 
Gleam Electric & Power Company Ghaziabad, Electrical Power Cables & Wires
Gleam Electric & Power Company Ghaziabad, Electrical Power Cables & WiresGleam Electric & Power Company Ghaziabad, Electrical Power Cables & Wires
Gleam Electric & Power Company Ghaziabad, Electrical Power Cables & Wires
 
V Tech Communications :Communication Devices , Faridabad
V Tech Communications :Communication Devices , FaridabadV Tech Communications :Communication Devices , Faridabad
V Tech Communications :Communication Devices , Faridabad
 

En vedette

En vedette (7)

Chapter 6 intervlanrouting
Chapter 6   intervlanroutingChapter 6   intervlanrouting
Chapter 6 intervlanrouting
 
Chapter 1 landesign
Chapter 1   landesignChapter 1   landesign
Chapter 1 landesign
 
Chapter 4 vtp
Chapter 4   vtpChapter 4   vtp
Chapter 4 vtp
 
Chapter 2 switches
Chapter 2   switchesChapter 2   switches
Chapter 2 switches
 
Chapter 5 stp
Chapter 5   stpChapter 5   stp
Chapter 5 stp
 
Chapter 3 vlans
Chapter 3   vlansChapter 3   vlans
Chapter 3 vlans
 
Cap6 intervlan routing
Cap6   intervlan routingCap6   intervlan routing
Cap6 intervlan routing
 

Similaire à Chapter 7 wireless

CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
Dsunte Wilson
 
Switches module 2
Switches module 2Switches module 2
Switches module 2
kratos2424
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
alanfhall8953
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
IJERA Editor
 
11-17-1686-00-00lc-use-cases-for-lc.ppt
11-17-1686-00-00lc-use-cases-for-lc.ppt11-17-1686-00-00lc-use-cases-for-lc.ppt
11-17-1686-00-00lc-use-cases-for-lc.ppt
said Touati
 
AD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptxAD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptx
RahafKhalid14
 

Similaire à Chapter 7 wireless (20)

WiMax - Technology &amp; Architecture
WiMax - Technology &amp; ArchitectureWiMax - Technology &amp; Architecture
WiMax - Technology &amp; Architecture
 
CCNA Icnd110 s03l01
CCNA Icnd110 s03l01CCNA Icnd110 s03l01
CCNA Icnd110 s03l01
 
transmission media.ppt
transmission media.ppttransmission media.ppt
transmission media.ppt
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Ieee standards
Ieee standardsIeee standards
Ieee standards
 
Switches module 2
Switches module 2Switches module 2
Switches module 2
 
Wimax vsWi-fi
Wimax vsWi-fiWimax vsWi-fi
Wimax vsWi-fi
 
Bluetooth Reinvented. Smart connectivity in consumer devices: Bluetooth Low ...
Bluetooth Reinvented.  Smart connectivity in consumer devices: Bluetooth Low ...Bluetooth Reinvented.  Smart connectivity in consumer devices: Bluetooth Low ...
Bluetooth Reinvented. Smart connectivity in consumer devices: Bluetooth Low ...
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
 
J010216776
J010216776J010216776
J010216776
 
Ruckus brief customer_Medley
Ruckus brief customer_MedleyRuckus brief customer_Medley
Ruckus brief customer_Medley
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
 
11-17-1686-00-00lc-use-cases-for-lc.ppt
11-17-1686-00-00lc-use-cases-for-lc.ppt11-17-1686-00-00lc-use-cases-for-lc.ppt
11-17-1686-00-00lc-use-cases-for-lc.ppt
 
A
AA
A
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlan
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
AD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptxAD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptx
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 

Plus de kratos2424

Final exam ccna exploration 3 lan switching and wireless
Final exam ccna exploration 3 lan switching and wirelessFinal exam ccna exploration 3 lan switching and wireless
Final exam ccna exploration 3 lan switching and wireless
kratos2424
 
Ch6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wirelessCh6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wireless
kratos2424
 
Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wireless
kratos2424
 
Ch5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wirelessCh5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wireless
kratos2424
 
Ch4 ccna exploration 3 lan switching and wireless
Ch4 ccna exploration 3 lan switching and wirelessCh4 ccna exploration 3 lan switching and wireless
Ch4 ccna exploration 3 lan switching and wireless
kratos2424
 
Ch3 ccna exploration 3 lan switching and wireless
Ch3 ccna exploration 3 lan switching and wirelessCh3 ccna exploration 3 lan switching and wireless
Ch3 ccna exploration 3 lan switching and wireless
kratos2424
 
Ch2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wirelessCh2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wireless
kratos2424
 
Ccna exploration 3 lan switching and wireless
Ccna exploration 3 lan switching and wirelessCcna exploration 3 lan switching and wireless
Ccna exploration 3 lan switching and wireless
kratos2424
 

Plus de kratos2424 (8)

Final exam ccna exploration 3 lan switching and wireless
Final exam ccna exploration 3 lan switching and wirelessFinal exam ccna exploration 3 lan switching and wireless
Final exam ccna exploration 3 lan switching and wireless
 
Ch6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wirelessCh6 ccna exploration 3 lan switching and wireless
Ch6 ccna exploration 3 lan switching and wireless
 
Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wireless
 
Ch5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wirelessCh5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wireless
 
Ch4 ccna exploration 3 lan switching and wireless
Ch4 ccna exploration 3 lan switching and wirelessCh4 ccna exploration 3 lan switching and wireless
Ch4 ccna exploration 3 lan switching and wireless
 
Ch3 ccna exploration 3 lan switching and wireless
Ch3 ccna exploration 3 lan switching and wirelessCh3 ccna exploration 3 lan switching and wireless
Ch3 ccna exploration 3 lan switching and wireless
 
Ch2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wirelessCh2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wireless
 
Ccna exploration 3 lan switching and wireless
Ccna exploration 3 lan switching and wirelessCcna exploration 3 lan switching and wireless
Ccna exploration 3 lan switching and wireless
 

Chapter 7 wireless

  • 1. Wireless CCNA Exploration Semester 3 Chapter 7 30 Sep 2012 S Ward Abingdon and Witney College 1
  • 2. Topics  Components and basic operation of wireless LANs  Basic WLAN security  Configure and verify basic wireless LAN access  Troubleshoot wireless client access 2 30 Sep 2012 S Ward Abingdon and Witney College
  • 3. Semester 3 LAN Design Basic Switch Wireless Concepts VLANs STP VTP Inter-VLAN routing 3 30 Sep 2012 S Ward Abingdon and Witney College
  • 4. Wireless advantages  Stay in contact while travelling.  Move workstation within building without moving cables.  In new building, save cost of cabling the whole building – just some cables needed.  Use a variety of wireless devices.  Can link to cabled network. 4 30 Sep 2012 S Ward Abingdon and Witney College
  • 5. Wireless problems  Interference  Signal strength, blind spots  Security – anyone with receiver within range can pick up signals  Regulations differ in different countries 5 30 Sep 2012 S Ward Abingdon and Witney College
  • 6. Standards PAN LAN MAN WAN Standards Bluetooth 802.11 802.11 GSM 802.15.3 802.16 CDMA 802.20 Satellite Speed < 1 Mbps 11-54 10 – 100+ 10 Kbps – Mbps Mbps 2 Mbps Range Short medium Medium- Long long 6 30 Sep 2012 S Ward Abingdon and Witney College
  • 7. Wireless and Ethernet  Wireless workstations connect to cabled Ethernet network via an access point (AP).  Collisions can occur both with Ethernet and with wireless.  Ethernet detects and recovers (CSMA/CD)  Wireless uses collision avoidance.  Frame format is different. 7 30 Sep 2012 S Ward Abingdon and Witney College
  • 8. 802.11a  Introduced 1999, not compatible with 802.11b  OFDM modulation (faster, up to 54Mbps)  More costly than 802.11b  5 GHz band.  Smaller antennas, less interference  Poorer range, absorbed more by walls etc.  Not allowed in some countries. 8 30 Sep 2012 S Ward Abingdon and Witney College
  • 9. 802.11b  Introduced 1999, not compatible with 802.11a  DSSS modulation, slower, 1, 2, 5.5, 11 Mbps  Cheaper than 802.11a  2.4 GHz band.  More interference as many appliances use this band  Longer range, less easily obstructed. 9 30 Sep 2012 S Ward Abingdon and Witney College
  • 10. 802.11g  Introduced 2003  Compatible with 802.11b  DSSS modulation, to 11 Mbps or OFDM to 54 Mbps  2.4 GHz band.  More interference as many appliances use this band  Longer range, less easily obstructed. 10 30 Sep 2012 S Ward Abingdon and Witney College
  • 11. 802.11n  Expected Sept 2008, in draft now.  May use both 2.4 and 5 GHz band  MIMO-OFDM Splits high data rate stream into several low data rate streams, transmits simultaneously using multiple antennae.  Possibly up to 248 Mbps with 2 streams  Longer range, 70 metres 11 30 Sep 2012 S Ward Abingdon and Witney College
  • 12. Organisations  ITU-R allocates RF spectrum bands and satellite orbits  IEEE develops and maintains 802 standards for LANs and MANs including wireless modulation  Wi-Fi Alliance certifies that vendors keep to standards and industry norms so that devices can operate together 12 30 Sep 2012 S Ward Abingdon and Witney College
  • 13. Wireless NIC  Needed to connect a device to an access point.  Laptops used to have PCMCIA cards. Some still do, but now the NIC is usually built in.  Desktops can have expansion cards installed, or they can use a USB device. 13 30 Sep 2012 S Ward Abingdon and Witney College
  • 14. Access point, shared medium  Access point acts like a hub (not switch)  Wireless is a shared medium  802.11 uses CSMA/CA  Devices detect activity on the medium, send signals if all is clear.  Signal is acknowledged if it is received  Attenuation limits distance of client from access point. 14 30 Sep 2012 S Ward Abingdon and Witney College
  • 15. Hidden nodes  Iftwo stations cannot sense each others’ signals then they may transmit at the same time and have a collision.  Request to send/clear to send (RTS/CTS) avoids this.  Station requests the medium, access point allocates it for long enough to complete the transmission. 15 30 Sep 2012 S Ward Abingdon and Witney College
  • 16. Wireless router  Commonly used for Internet access  Acts as router, Ethernet switch and wireless access point.  Configure for mode 802.11a, b, g, or n  Configure shared service set identifier (SSID) to identify network  Select channel within 2.4GHz band. Adjacent access points need non-overlapping channels. 16 30 Sep 2012 S Ward Abingdon and Witney College
  • 17. Ad hoc topology  No access point  Peer to peer  Negotiate parameters  Independent basic service set  Area covered is basic service area (BSA). 17 30 Sep 2012 S Ward Abingdon and Witney College
  • 18. Basic service set topology  One access point  Access point manages parameters for clients  Infrastructure mode  Area covered is basic service area (BSA). 18 30 Sep 2012 S Ward Abingdon and Witney College
  • 19. Extended service set topology  More than one access point  Access point manages parameters for clients  Infrastructure mode  Area covered is extended service area (ESA). 19 30 Sep 2012 S Ward Abingdon and Witney College
  • 20. Beacon and probe  Access point may send out a beacon at regular intervals for clients to detect.  Client sends a probe specifying the SSID and bit rates supported. Access point responds.  Client can send probe with no SSID to look for any network. Access point may be configured to respond, or not. 20 30 Sep 2012 S Ward Abingdon and Witney College
  • 21. Authentication  Clientrequests authentication.  Access point responds.  802.11 had two authentication mechanisms. NULL (Open Authentication) does not give privacy. Wired Equivalency Protection (WEP) uses a shared key. 21 30 Sep 2012 S Ward Abingdon and Witney College
  • 22. Association  Request from client and response.  Finalizes security options  Finalizes bit rate options  Sets up data link  Client learns the access point MAC address (BSSID)  Access point maps a logical port known as the association identifier (AID) to the WLAN client. 22 30 Sep 2012 S Ward Abingdon and Witney College
  • 23. Placing access points  Above obstructions.  At least 3 feet from metal obstructions.  Vertically and high up.  In locations where users will work.  But not too close to people.  Work out the coverage for each AP.  Allow enough overlap. 23 30 Sep 2012 S Ward Abingdon and Witney College
  • 24. Security threats  War drivers look for an unsecured network that will provide Internet access.  Hackers (Crackers) enter systems to steal data or cause harm. They can often get past weak security.  Employees may install rogue access points without permission and without implementing the necessary security. 24 30 Sep 2012 S Ward Abingdon and Witney College
  • 25. Man in the middle  Attacker modifies the NIC of a laptop with special software so that it accepts all traffic, not just traffic addressed to it.  Uses packet sniffing software, such as Wireshark, to observe a client station connecting to an access point. Detects names, IP addresses, ID and the challenge and associate response.  Can then monitor network. 25 30 Sep 2012 S Ward Abingdon and Witney College
  • 26. Denial of service  Use common devices to create interference. (cordless phone, microwave, baby monitor)  Flood the network with clear-to-send (CTS) messages. Clients then send simultaneously and cause a constant stream of collisions.  Send a series of disassociate commands so that clients repeatedly disconnect then try to reassociate. 26 30 Sep 2012 S Ward Abingdon and Witney College
  • 27. 802.11 original authentication  Open authentication – no privacy or security “Authenticate me.” “All right.”  WEP shared key authentication – weak encryption algorithm could be cracked. 32 bit key had to be entered by hand. Prone to error and not easily scalable. 27 30 Sep 2012 S Ward Abingdon and Witney College
  • 28. Authentication developments  Vendors created their own security systems  Wi-Fi Alliance developed WiFi Protected Access (WPA) security method.  802.11i standard introduced - similar to the Wi-Fi Alliance WPA2 standard. 28 30 Sep 2012 S Ward Abingdon and Witney College
  • 29. TKIP and AES encryption  Temporal Key Integrity Protocol (TKIP) encryption mechanism is certified as WPA by Wi-Fi Alliance.  TKIP uses the original encryption algorithm used by WEP but addresses its weaknesses.  TKIP encrypts the Layer 2 payload and carries out a message integrity check to detect tampering.  Advanced Encryption Standard (AES) encryption mechanism is certified as WPA2. Has additional features.  AES is the preferred method. 29 30 Sep 2012 S Ward Abingdon and Witney College
  • 30. Configuring Access Point 1. Check wired operation: DHCP, Internet access 2. Install access point 3. Configure access point without security 4. Install one wireless client without security 5. Check wireless network operation 6. Configure security 7. Check wireless network operation 30 30 Sep 2012 S Ward Abingdon and Witney College
  • 31. Basic Wireless Settings  Network Mode – Lets you choose the right mode for your devices. B, G, N, mixed or BG mixed. You can disable wireless operation.  Network Name (SSID) – should be changed from the default. Must be the same for all devices on the network.  SSID broadcast can be enabled or disabled. 31 30 Sep 2012 S Ward Abingdon and Witney College
  • 32. More Basic Wireless Settings  Radio Band –  For Wireless-N devices only, select Wide - 40MHz Channel.  For Wireless-G and Wireless-B only, select Standard - 20MHz Channel.  For mixed devices, keep the default Auto.  Wide Channel - If you selected Wide for the Radio Band, Select a channel from the drop- down menu.  Standard Channel - Select the channel. 32 30 Sep 2012 S Ward Abingdon and Witney College
  • 33. Security  Choose PSK2 (WPA2 or IEEE 802.11i) if all client devices are able to use it.  If some older devices do not support WPA2 then choose the best security mode that is supported by all devices.  Encryption – AES is stronger than TKIP. Use AES with WPA2. 33 30 Sep 2012 S Ward Abingdon and Witney College
  • 34. Configure the client  Choose the network to connect to.  Enter the SSID  Choose the authentication method  Choose the encryption method  Enter the network key. 34 30 Sep 2012 S Ward Abingdon and Witney College
  • 35. Troubleshooting  Generally start with the physical layer and then move up.  Eliminate the client PC as the source of trouble before checking the rest of the network. 35 30 Sep 2012 S Ward Abingdon and Witney College
  • 36. Troubleshooting – no connectivity  Check that the PC has an IP address.  Try connecting the PC to the wired network and ping a known address  Try a different wireless NIC. Reload drivers as necessary.  Check the security mode and encryption settings on the client. Do they match the access point? 36 30 Sep 2012 S Ward Abingdon and Witney College
  • 37. Troubleshooting – poor connection  Check distance to access point  Check the channel settings on the client.  Check for devices that might be causing interference (cordless phone, microwave oven etc). 37 30 Sep 2012 S Ward Abingdon and Witney College
  • 38. Troubleshooting – looking wider  Are all devices in place?  Are they all powered on?  Are wired links working correctly?  Is there a neighbouring access point using an overlapping wave band?  Are access points badly placed? 38 30 Sep 2012 S Ward Abingdon and Witney College
  • 39. The End 30 Sep 2012 S Ward Abingdon and Witney College 39