Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Wireless Networks

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 20

Wireless Networks

Authors:
Archana Vivekananda Polytechnic
Puttur

August 08, 2010


Presentation Outline

• Wireless Technology overview


• The IEEE 802.11 WLAN Standards
• Secure Wireless LANs
• Migrating to Wireless LANs
Wireless?
• Wireless network is a network set up by using
radio signal frequency to communicate among
computers and other network devices.
• The last link with the users is wireless, to give a
network connection to all users in a building or
campus.
• It’s also referred to as WiFi network or WLAN.
How do wireless LANs work?

Wireless equipment transmits the data using


radio waves. The frequencies vary depending
on the specific equipment being used.

The data to be transported is superimposed on


the radio carrier by various modulation
techniques.
How are WLANs Different?
• They use specialized physical and data link
protocols
• They integrate into existing networks through access
points which provide a bridging function
• They let you stay connected as you roam from one
coverage area to another
• They have unique security considerations
• They have specific interoperability requirements
• They require different hardware
• They offer performance that differs from wired
LANs.
Physical and Data Link Layers
Physical Layer:
• The wireless NIC takes frames of data from
the link layer, scrambles the data in a
predetermined way, then uses the modified
data stream to modulate a radio carrier
signal.
Data Link Layer:
• Uses Carriers-Sense-Multiple-Access with
Collision Avoidance (CSMA/CA).
Is WLAN is Secure?
• In theory, spread spectrum radio signals are
inherently difficult to decipher without knowing
the exact hopping sequences or direct
sequence codes used
• The IEEE 802.11 standard specifies optional
security called "Wired Equivalent Privacy"
whose goal is that a wireless LAN offer privacy
equivalent to that offered by a wired LAN. The
standard also specifies optional authentication
measures.
Hardware used in Wireless Network
• PC Card, either with integral antenna or with
external antenna/RF module.
• ISA Card with external antenna connected by
cable.
• Handheld terminals
• Access points
Hardware

CISCO Aironet 350 series Wireless Handheld Terminal

Semi Parabolic Antenna BreezeCOM AP


Performance
• 802.11a offers speeds with a theoretically
maximum rate of 54Mbps in the 5 GHz band
• 802.11b offers speeds with a theoretically
maximum rate of 11Mbps at in the 2.4 GHz
spectrum band
• 802.11g is an amendment to the IEEE 802.11
specification that extended throughput to up to
54 Mbps using the same 2.4 GHz band as
802.11b.
What is 802.11?
• A family of wireless LAN (WLAN) specifications
developed by a working group at the Institute of
Electrical and Electronic Engineers (IEEE)
• Defines standard for WLANs using the following four
technologies
• Frequency Hopping Spread Spectrum (FHSS)
• Direct Sequence Spread Spectrum (DSSS)
• Infrared (IR)
• Orthogonal Frequency Division Multiplexing (OFDM)
• Versions: 802.11a, 802.11b, 802.11g, 802.11e,
802.11f, 802.11i
802.11 - Transmission
• Most wireless LAN products operate in
unlicensed radio bands
• 2.4 GHz is most popular
• Available in most parts of the world
• No need for user licensing
• Most wireless LANs use spread-spectrum radio
• Resistant to interference, secure
• Two popular methods
• Frequency Hopping (FH)
• Direct Sequence (DS)
Frequency Hopping Vs. Direct Sequence
• FH systems use a radio carrier that “hops” from frequency to
frequency in a pattern known to both transmitter and receiver
• Easy to implement
• Resistance to noise
• Limited throughput (2-3 Mbps @ 2.4 GHz)
• DS systems use a carrier that remains fixed to a specific
frequency band. The data signal is spread onto a much larger
range of frequencies (at a much lower power level) using a
specific encoding scheme.
• Much higher throughput than FH (11 Mbps)
• Better range
• Less resistant to noise (made up for by redundancy – it transmits at
least 10 fully redundant copies of the original signal at the same time)
Authentication
Means:
• Based on cryptography
• Non-cryptographic
• Both are identity-based verification mechanisms
(devices request access based on the SSID –
Service Set Identifier of the wireless network).
Authentication
• Authentication techniques
Privacy in Wireless Network

• Cryptographic techniques
• WEP Uses RC4 symmetric key, stream cipher
algorithm to generate a pseudo random data
sequence. The stream is XORed with the data
to be transmitted
• Unfortunately, recent attacks have shown that
the WEP approach for privacy is vulnerable to
certain attack regardless of key size
Data Integrity

• Data integrity is data that has a complete or


whole structure.
• Data integrity is ensured by a simple encrypted
version of CRC (Cyclic Redundant Check)
• Also vulnerable to some attacks
Security Problems
• Security features in Wireless products are frequently
not enabled.
• Use of static WEP keys (keys are in use for a very long
time). WEP does not provide key management.
• Cryptographic keys are short.
• No user authentication occurs – only devices are
authenticated. A stolen device can access the network.
• Identity based systems are vulnerable.
• Packet integrity is poor.
Antenna Selection and Placement
• Permanently attached.
• Remote antennas connected using an antenna cable.
• Coax cable used for RF has a high signal loss, should
not be mounted more than a 1 or 2 meters away from
the device.
• Placement: consider building construction, ceiling
height, obstacles, and aesthetics. Different materials
(cement, steel) have different radio propagation
characteristics.
Which is better - wired or wireless?
• If you are very cost-conscious, need maximum
performance of your home system, and don't care
much about mobility, then a wired Ethernet LAN is
probably right for you.
• If on the other hand, cost is less of an issue, you like
being an early adopter of leading-edge technologies,
and you are really concerned about the task of wiring
your home or small business with Ethernet cable, then
you should certainly consider a wireless LAN.

You might also like