What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne
|
|
- Zoe Fowler
- 6 years ago
- Views:
Transcription
1 Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor
2 What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in New York, and it meows in Los Angeles. The wireless is the same way, only without the cat. - Attributed to Albert Einstein Chino Information Technology Center 2
3 What is a Wireless LAN? (really) It is a LAN Extension of Wired LAN Uses High Frequency Radio Waves (RF) Speed : 2Mbps to 54Mbps Distance 100 feet to 15 miles (with fancy antennas) Chino Information Technology Center 3
4 How WLANs Operate Although a variety of radio frequency WLANs exist, different products share similarities and operate similarly Only two components are required ed for a wireless network Wireless network interface (NIC) cards Access points (AP) Chino Information Technology Center 4
5 Wireless Network Interface Card NICs connect a computer to the network so it can send and receive data On wired network, NIC has a port for a cable connector On wireless network, the NIC has an antenna to send and receive RF signals Chino Information Technology Center 5
6 Desktop PC Wireless NIC Chino Information Technology Center 6
7 Notebook Wireless NIC PCMCIA wireless NICs are available for notebook PCs Some vendors integrate components of wireless NIC onto single chip on motherboard Chino Information Technology Center 7
8 Software for Wireless NICs Software may be part of operating system itself Windows XP has software integrated while previous versions of Windows do not Software may be separate program loaded into the computer All operating systems before Windows XP, require loading software Chino Information Technology Center 8
9 Access Point An access point (AP) has three main parts An antenna and a radio transmitter/receiver An RJ-45 wired network interface to connect to a wired network Special bridging software Chino Information Technology Center 9
10 Access Point Chino Information Technology Center 10
11 Functions of an Access Point Access point has two basic functions Acts as base station for wireless network Acts as bridge between wireless and wired network Chino Information Technology Center 11
12 Access Point Characteristics Max range approximately 375 feet (115 meters) Expect a LOT less when there are obstructions Supports as many as 100 users s One access point for each 50 users with light and basic Internet access One access point per 20 users for heavy network access and large file transfer APs typically mounted on ceiling, but AC power may be a problem Chino Information Technology Center 12
13 Features of Access Points Coverage area should overlap when using multiple l access points Clients find the AP that provides the best service A seamless handoff occurs when client associates with new AP Chino Information Technology Center 13
14 WLAN Alphabet Soup IEEE family of specifications for WLANs 2.4GHz 2Mbps a 5GHz, 54Mbps b Often called Wi-Fi, 2.4GHz, 11Mbps g 2.4GHz, 54Mbps i Newly adopted encryption standard parts of i are already available (WPA, TKIP, AES) on some new hardware/software Chino Information Technology Center 14
15 Chino Information Technology Center 15
16 Wireless Topologies There are multiple modes of operation for wireless devices Chino Information Technology Center 16
17 WLAN Terms & Basic Concept Ad Hoc Mode Wireless client-to-client communication Chino Information Technology Center 17
18 WLAN Terms & Basic Concept Infrastructure Mode All clients connect via an Access Point AP Chino Information Technology Center 18
19 WLAN Terms & Basic Concept SSID or BSSID Basic Service Set Identifier beacon BSS BSSID or SSID (Basic Service Set Identifier) An AP forms an association with one or more wireless clients that is referred to as a Basic Service Set beacon beacon Chino Information Technology Center 19
20 WLAN Terms & Basic Concept ESSID Extended Service Set Identifier ESS To increase the range and coverage of a wireless network, overlapping APs are installed. This is referred to as an Extended Service Set ESSID (Extended Service Set Identifier) Chino Information Technology Center 20
21 WLAN Terms & Basic Concept WEP Optional method to encrypt (scramble) transmissions Offers some level of protection for wireless networks NOT enabled by default Chino Information Technology Center 21
22 WLAN Terms & Basic Concept There are 11 channels used by b & g Most APs default to channel a 1 uses 2 3 different 4 5 (higher 6 7 frequency) channels Channel 4 Channel 5 Channel 9 Channel 10 Channel 3 Channel 8 Channel 2 Channel 7 Channel 1 Channel 6 Channel Chino Information Technology Center 22 Frequency (GHz)
23 WLAN Risk Unauthorized Clients In range Malicious client Detector Chino Information Technology Center 23
24 WLAN Risk Unauthorized or Renegade Access Points Interception and unauthorized monitoring of wireless traffic Client-to-Client Attacks Jamming (DoS) Client-to-client attack Jamming malicious Chino Information Technology Center 24
25 WLAN Risk - Fake Access Point Access Point Clone (Evil Twin) Traffic Interception AP1 AP1* Chino Information Technology Center 25
26 WLAN Risk Brute force attacks against access point passwords WEP weakness Misconfiguration Chino Information Technology Center 26
27 WLAN Risk (continued) WEP weakness WEP security flaws documented in a 2001 UC Berkley study Weak encryption (never intended for repeated use) Short keys (64bits 24bit Init Vector = 40 bits) Static Keys No distribution method (shared key) Chino Information Technology Center 27
28 WLAN Risk (continued) Mis-configurations Default SSID SSID broadcasting is on by default Default Password SNMP Community (RO & RW) Newer hardware/firmware turns this off by default Default security settings (none) Chino Information Technology Center 28
29 WLAN Risk Unauthorized installation Rogue APs can open a back door to the network. Who is allowed to install? Where are they be installed? Chino Information Technology Center 29
30 WLAN Risk Network Stumbler Chino Information Technology Center 30
31 WLAN Risk Wardriving Network Stumbler Chino Information Technology Center 31
32 WLAN Risk Low cost product prevalent limited features, insecure Well-intentioned user may compromise network security Accidental detection Windows xp automatically discovers access points Chino Information Technology Center 32
33 Wireless LAN Protection Strategies Chino Information Technology Center Steve Siedschlag, Associate Professor
34 Recommendations Wireless LAN related Configuration Enable WEP, use 128bit key Disable SSID Broadcasts No SNMP access Use MAC (hardware) address to restrict access Non-default Access Point password Change default Access Point Name Use 802.1x / WPA / i (when available) Chino Information Technology Center 34
35 Wireless LAN related Configuration Enable WEP, use 128bit key Chino Information Technology Center 35
36 Wireless LAN related Configuration Enable WEP, use 128bit key Chino Information Technology Center 36
37 Wireless LAN related Configuration Enable WEP, use 128bit key Chino Information Technology Center 37
38 Wireless LAN related Configuration Disable SSID Broadcast Chino Information Technology Center 38
39 Wireless LAN related Configuration No SNMP access Chino Information Technology Center 39
40 Wireless LAN related Configuration Use 802.1x / WPA / i (when available) Chino Information Technology Center 40
41 General Recommendations Always (wired or wireless) Install virus protection software plus automatic frequent pattern file update Shared folders must impose password Management Issue Prohibit installation of AP s without authorization Discover any new APs constantly (NetStumbler is free, Antenna is cheap) Power off Access Point when not in use Carefully select the physical location of your AP, not near windows or front doors. Chino Information Technology Center 41
42 Thank You! Computer Network Security Resources at the Robert Pile Chino Information Technology Center CIS-420 PC Security & Privacy CISNTWK-440 Fund. Of Network Security (Security+) CISNTWK-441 Firewalls & Intrusion Detection CISNTWK-442 Disaster Recovery Planning CISNTWK-445 Windows Security Administration CISNTWK-447 Linux Security Administration Steve Siedschlag Associate Professor Chino Information Technology Center 42
Wireless Networks. Lecture 4: Wireless Networking Devices. Assistant Teacher Samraa Adnan Al-Asadi 1
Wireless Networks Lecture 4: Wireless Networking Devices Assistant Teacher Samraa Adnan Al-Asadi 1 Contents wireless LAN adapter cards wireless access Points wireless bridges wireless routers Assistant
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationWireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationWireless Router at Home
Wireless Router at Home 192.168.1.2 192.168.1.1 Modem 192.168.1.3 120.6.46.15 telephone line to ISP 192.168.1.4 Internet connection with public IP internal LAN with private IPs 192.168.1.5 Wireless All-in-one
More informationWireless Network Security
Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless
More informationWireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS
How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms
More informationTable of Contents. Chapter 1Introduction Package Contents Features Specifications Physical Description...
Table of Contents Chapter 1Introduction... 3 1.1 Package Contents... 3 1.2 Features... 3 1.3 Specifications... 3 1.4 Physical Description... 4 Chapter 2Wireless LAN Access Point Connection... 5 Chapter
More information802.11g PC Card/USB Wireless Adapter
802.11g PC Card/USB Wireless Adapter User Guide Regulatory Approvals FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of
More informationPRODUCT GUIDE Wireless Intrusion Prevention Systems
PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing
More informationHow Insecure is Wireless LAN?
Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost
More informationChapter 10: Wireless LAN & VLANs
Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1
More informationWireless LAN Access Point
Wireless LAN Access Point IEEE 802.11b/g 54Mbps 501903 User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4 Physical Description...
More informationCSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology
CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals
More informationWireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More informationKarthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03
Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03 Introduction Although a variety of wireless network technologies have or will soon reach the general business market, wireless
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g
More informationITRAINONLINE MMTK WIN98 WIRELESS CLIENT INSTALLATION
ITRAINONLINE MMTK WIN98 WIRELESS CLIENT INSTALLATION Developed by: Onno W. Purbo & Bruno Roger Client installation for other Windows versions This document will show and example of the driver installation
More informationFamily Structural Overview
Some IEEE 802 Standards TELE301 Lecture 5 802.11 Wireless Networking David Eyers Telecommunications Programme University of Otago 802.1 Bridging and Management 802.1X,... 802.3 Ethernet 802.11 Wireless
More informationWireless LAN Access Point
Wireless LAN Access Point IEEE 802.11b/g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4 Physical Description...
More information802.11ac 3x3 Dual Band High-Powered Wireless Access Point/Client Bridge
Datasheet ECB1750 802.11ac 3x3 Dual Band High-Powered Wireless Access Point/Client Bridge The ECB1750 marks a new speed and performance breakthrough for users with 802.11ac laptops and other devices, who
More informationLevelOne User Manual WNC-0600USB N_One Wireless USB Adapter
LevelOne User Manual WNC-0600USB N_One Wireless USB Adapter V2.0.0-0712 i Safety FCC WARNING This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
More informationNWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012
NWD2705 Dual-Band Wireless N450 USB Adapter Version 1.00 Edition 1, 09/2012 Quick Start Guide User s Guide www.zyxel.com Copyright 2012 ZyXEL Communications Corporation IMPORTANT! READ CAREFULLY BEFORE
More informationAppendix E Wireless Networking Basics
Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical
More informationWireless g AP. User s Manual
Wireless 802.11g AP User s Manual Version 1.8 User s Guide 0 Copyright Statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,
More informationLESSON 12: WI FI NETWORKS SECURITY
LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information
More information802.11N Wireless Broadband Router
802.11N Wireless Broadband Router Pre-N Wireless Access Point Broadband Internet Access WPS 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless Router Features... 1
More informationChapter 1 Introduction
Copyright Statement is the registered trademark of Zonet Technology Inc. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective holders. Copyright
More information2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp
2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp Questions Have you used a wireless local area network before? At home? At work? Have you configured a wireless AP before?
More informationWireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.
Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE
More informationWireless Bridge User Manual. Version 1.0
Wireless Bridge 520645 User Manual Version 1.0 FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should
More informationDigital Entertainment. Networking Made Easy
Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered
More informationWireless Technologies
Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless
More informationWireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved
Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks
More informationLevelOne. User Manual. WAP Mbps PoE Wireless AP V3.0.0
LevelOne WAP-0005 108Mbps PoE Wireless AP User Manual V3.0.0 i TABLE OF CONTENTS CHAPTER 1 INTRODUCTION... 1 FIGURE 1: WIRELESS ACCESS POINT... 1 FEATURES OF YOUR WIRELESS ACCESS POINT... 1 Security Features...
More informationEAP Wireless Access Point. 2.4 GHz b/g 54 Mbps
EAP-3660 is a small form factor wireless product. It is stylish and looks like a smoke detector on the ceiling. EAP-3660 is a / Repeater / WDS that operates seamlessly in the 2.4 GHz frequency spectrum
More informationWireless networking with three times the speed and five times the flexibility.
Wireless 150N Outdoor Range Extender / Access Point Multiple SSIDs, Wireless client isolation, Bridge, Repeater, WDS, Passive PoE, Built-in 12dBi Antenna Part No.: 525497 Wireless networking with three
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationConfiguring Cipher Suites and WEP
10 CHAPTER This chapter describes how to configure the cipher suites required to use WPA authenticated key management, Wired Equivalent Privacy (WEP), Temporal Key Integrity Protocol (TKIP), and broadcast
More informationLevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver
LevelOne WBR-3407 11g Wireless ADSL VPN Router User s Manual Ver 1.00-0510 Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless ADSL Router Features... 1 Package Contents... 5 Physical Details... 6 CHAPTER
More informationChapter 5 Local Area Networks. Computer Concepts 2013
Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section
More informationSecuring Wireless Networks by By Joe Klemencic Mon. Apr
http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies
More informationWireless Access Point
802.11g / 802.11b / WPA Wireless Access Point User Guide TABLE OF CONTENTS CHAPTER 1 INTRODUCTION... 1 Features of your Wireless Access Point... 1 Package Contents... 4 Physical Details... 4 CHAPTER 2
More informationWireless LAN Access Point
Wireless LAN Access Point IEEE 802.11b 11Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4 Physical Description...
More informationCE MARK WARNING LIMITED WARRANTY
CE MARK WARNING This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. LIMITED WARRANTY Hawking
More informationConfiguring WEP and WEP Features
CHAPTER 9 This chapter describes how to configure Wired Equivalent Privacy (WEP), Message Integrity Check (MIC), and Temporal Key Integrity Protocol (TKIP). This chapter contains these sections: Understanding
More informationAdd a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)
Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP) Objective A Wireless Access Point (WAP) is a networking device that allows wireless-capable devices to connect to
More informationSecure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements
Unified Wireless Switching Enabling a Truly Converged Network White Paper Abstract As businesses scale, traditional wireless network deployments become more complex, more costly and less secure. Users
More informationWireless Networking Basics. Ed Crowley
Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2
More informationWireless LAN Connection Guide
Wireless LAN Connection Guide Precautions When Using Wireless LAN... 2 Preparing to Use a Wireless LAN Environment... 2 Checking the Network Environment to Be Used on the Wireless LAN... 2 Selecting a
More informationWednesday, May 16, 2018
Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available
More informationA Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. Access Point WIRELESS WAP54G (EU/LA/UK) Model No.
A Division of Cisco Systems, Inc. GHz 2,4 802.11g WIRELESS Wireless-G Access Point User Guide Model No. WAP54G (EU/LA/UK) Copyright and Trademarks Specifications are subject to change without notice. Linksys
More informationConfiguring Wireless Security Settings on the RV130W
Article ID: 5021 Configuring Wireless Security Settings on the RV130W Objective Wireless networking operates by sending information over radio waves, which can be more vulnerable to intruders than a traditional
More informationWL-5420AP. User s Guide
WL-5420AP User s Guide Table of contents INTRODUCTION... 1 About the Operation Modes...2 LED Indicators...5 Solid...5 Ports on the Rear Panel...7 GETTING CONNECTED... 8 WPA AP -CONFIGURATION VIA WEB...
More informationCYBER ATTACKS EXPLAINED: WIRELESS ATTACKS
CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these
More informationWireless High power Multi-function AP
Wireless High power Multi-function AP EAP-3660 2.4GHz Super G 108Mbps Access Point/ WDS/Universal Repeater The EAP-3660 is a smoke detector looking Wireless Access Point / Universal Repeater / WDS that
More informationWireless-G USB Dongle. User Manual. Ver 1.00
Wireless-G USB Dongle User Manual Ver 1.00 Table of Contents 1. Introduction 1.1The Wireless-G USB Dongle 1.2 Key Feature 2. Planning Your Wireless Network 2.1 Network Topology 2.2 Ad-Hoc versus Infrastructure
More informationVendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo
Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the
More informationD. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.
Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.
More informationWLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC
WLAN Security Dr. Siwaruk Siwamogsatham ThaiCERT, NECTEC Agenda Wireless Technology Overview IEEE 802.11 WLAN Technology WLAN Security Issues How to secure WLAN? WLAN Security Technologies Wireless Technologies
More informationCSCD 433/533 Advanced Networking
CSCD 433/533 Advanced Networking Lecture 6 Wireless LAN Components and Characteristics Winter 2017 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Introduction
More informationWireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Wireless Networking 802.11 based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers topics Standards Technical Concepts Implementation Troubleshooting 802.11 timeline source: Anandtech
More informationWireless N USB Adapter. User Guide
Wireless N USB Adapter User Guide Part#: PL-18N Model: Hermes V. 0613 Contents Chapter 1 Getting Start...3 Chapter 2 Installation Guide...5 Installing the Drivers for Mac OS X...10 Uninstall the Drivers
More informationU S E R M A N U A L b/g PC CARD
U S E R M A N U A L 802.11b/g PC CARD Table of Content CHAPTER 1 INTRODUCTION... 1 1.1 WIRELESS LAN FEATURE FUNCTIONS... 1 1.2 REGULATORY NOTICE... 1 1.2.1 FCC Class B Statement...1 1.2.2 Canadian Regulatory
More informationD-Link AirPlus G DWL-G700AP
TM D-Link AirPlus G DWL-G700AP 2.4GHz Wireless Access Point Manual Building Networks for People Contents Package Contents...3 Introduction...4 Wireless Basics...6 Getting Started...8 Using the Configuration
More informationChapter 24 Wireless Network Security
Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically
More informationChapter 7. Basic Wireless Concepts and Configuration. Part I
Chapter 7 Basic Wireless Concepts and Configuration Part I CCNA3-1 Chapter 7-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,
More informationNaveen Kumar. 1 Wi-Fi Technology
Naveen Kumar 1 Contents 2 Introduction Need of Purpose History How a Wi-Fi Network Works Topologies & Configurations Applications Wi-Fi Security Advantages & Limitations Innovations Introduction 3 Wireless
More informationSAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide
SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide About this guide This Quick Start Guide describes how to install and operate your SAGEM Wi-Fi 11g USB ADAPTER. Please read this manual before you install the
More informationWhat is Eavedropping?
WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks
More informationProcedure: You can find the problem sheet on the Desktop of the lab PCs.
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Advance Networks Laboratory 907529 Lab.3 WLAN Security Objectives 1. Configure administrator accounts.
More informationWPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)
WPA SECURITY (Wi-Fi Protected Access) Presentation By Douglas Cheathem (csc 650.01 Spring 2007) OUTLINE Introduction Security Risk Vulnerabilities Prevention Conclusion Live Demo Q & A INTRODUCTION! WPA
More informationWireless 300N Access Point 300 Mbps, MIMO, Bridge, Repeater, Multiple SSIDs and VLANs Part No.:
Wireless 300N Access Point 300 Mbps, MIMO, Bridge, Repeater, Multiple SSIDs and VLANs Part No.: 524728 Wireless networking with three times the speed and five times the flexibility. The INTELLINET NETWORK
More informationThursday, May 29,
1 Computer Networks in The Home Connecting your computers, peripherals and other electronic devices with Ethernet using TCP/IP 1 Introduction Home Networking - connecting computers and other devices together
More informationOutdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0
Outdoor High Power 802.11b/g/n Wireless USB Adapter USER MANUAL 4.0 2012 Contents 1 Introduction... 3 2 Hardware Installation... 4 3 Driver Installation... 6 3.1 Windows XP... 6 3.2 Windows Vista... 9
More informationChapter 3 Wireless Configuration
Chapter 3 Wireless Configuration This chapter describes how to configure the wireless features of your WNR854T router. In planning your wireless network, you should consider the level of security required.
More informationEnGenius Quick Start Guide
T he operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard. High output power and high sensitivity
More informationPracticeTorrent. Latest study torrent with verified answers will facilitate your actual test
PracticeTorrent http://www.practicetorrent.com Latest study torrent with verified answers will facilitate your actual test Exam : H12-311 Title : Huawei Certified ICT Associate-Wireless Local Area Network
More informationWireless SOHO Router/Bridge 2.4 GHz b/g 54 Mbps
Wireless SOHO Router/Bridge ECB-1220R 2.4 GHz 802.11 b/g 54 Mbps ECB-1220R is a 2.4GHz 802.11b/g broadband Wi-Fi Router with advanced AP/Client Bridge/Repeater functions. So you could implement this crossover
More informationPRODUCT DESCRIPTION. Learn more about EnGenius Solutions at
Wireless Long Range Multi-function Client Bridge 2.4 GHz EIRP up to 400mW Access point Client Bridge Repeater Client Router PRODUCT DESCRIPTION is a powerful client bridge. It supports several networking
More informationToday s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd.
Today s challenge on Wireless Networking David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd. Agenda How Popular is Wireless Network? Threats Associated with Wireless Networking
More informationWireless Network Security
Wireless Network Security By: Jose Rodriguez Table of Contents Wireless Network Security...1 Table of Contents...2 Introduction...3 Wireless Network Requirements...4 Wireless Network Protocols...5 Wireless
More informationWIRELESS EVIL TWIN ATTACK
WIRELESS EVIL TWIN ATTACK Prof. Pragati Goel Associate Professor, NCRD s Sterling Institute of Management Studies, Navi Mumbai Mr. Chetan Singh NCRD s Sterling Institute Of Management Studie, Navi Mumbai
More informationPackage Content IEEE g Wireless LAN USB Adapter... x 1 Product CD-ROM.x 1
IEEE 802.11g Wireless LAN USB Adapter Quick Installation Guide Network Configuration IEEE 802.11g Wireless LAN USB Adapter is a standard USB adapter that fits into any standard USB 2.0 and 1.1 slots in
More informationECB3500 Wireless Long Range Multi-function 7+1 AP 2.4GHz Super G 108Mbps EIRP up to 2000mW
WDS Bridge/Client /AP ECB3500 is a powerful, enhanced, enterprise level product supports 7 multi-functions to operate for every kind of working environment. It supports high transmit output power and high
More informationLearn How to Configure EnGenius Wi-Fi Products for Popular Applications
Learn How to Configure EnGenius Wi-Fi Products for Popular Applications Operation Modes Access Point (AP) / WDS AP Client Bridge (CB) Repeater WDS Bridge Client Router AP Router Access Point An access
More informationInformation Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards
COUNTY OF SACRAMENTO Inter-Departmental Correspondence December 6, 2007 TO: FROM: Information Technology Policy Board Members Jeff Leveroni, Chair Technology Review Group SUBJECT: Update to County WAN/LAN
More informationWireless PCI PCMCIA Super G 108 Mbit. Manual
Wireless PCI PCMCIA Super G 108 Mbit Dear Customer, Manual thanks for choosing Hamlet. Please carefully follow the instructions for its use and maintenance and, once this item has run its life span, we
More information300Mbps Wireless Gigabit PoE Access Point
WAP-6150 Version: 1 300Mbps Wireless Gigabit PoE Access Point The tough, high performance WAP-6150 is designed for fast wireless connectivity in enterprise or industrial environments of all dimensions.
More informationInterworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...
Interworking 2006 Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks Interworking Conference, 15th - 17th of January 2007 Dr-Ing Kai-Oliver Detken Business URL: http://wwwdecoitde
More information2.4GHz / 5GHz 54Mbps a/b/g Flexible Application
Dual Radio Concurrent AP/CB EOA7535 2.4GHz / 5GHz 54Mbps 802.11a/b/g Flexible Application EOA7535 equips with two powerful independent RF interfaces which support 802.11a and 802.11b/g. With certified
More informationWireless LAN USB Super G 108 Mbit. Manual
Wireless LAN USB Super G 108 Mbit Manual Dear Customer, Thanks for choosing Hamlet. Please carefully follow the instructions for its use and maintenance and, once this item has run its life span, we kindly
More informationThe 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013
The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional
More information11N Wall Mount Access Point / WDS AP / Universal Repeater. Features. Fully compatible with IEEE b/g/n devices
EAP9550-KZ is a powerful and multi-functioned 11n Indoor Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly
More informationEOC1650. Wireless Access Point / Client Bridge / Client Router PRODUCT DESCRIPTION. 2.4GHz 54Mbps b/g Superior Performance
Wireless Access Point / Client Bridge / Client Router 2.4GHz 54Mbps 802.11b/g Superior Performance PRODUCT DESCRIPTION is a revolutionary product consists of conciseness, quality, and flexibility. It comes
More informationCHAPTER 7 ADVANCED ADMINISTRATION PC
Table of Contents CHAPTER 1 INTRODUCTION... 1 54Mbps 802.11g ADSL Firewall Modem Router Features... 2 Package Contents... 4 Physical Details... 5 CHAPTER 2 INSTALLATION... 7 Requirements... 7 Procedure...
More informationWireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design
Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended
More informationRuckus ZoneDirector 3450 WLAN Controller (up to 500 ZoneFlex Access Points)
Product Name: Manufacturer: - Model Number: 901-3450-UK00 Ruckus ZoneDirector 3450 supporting up to 500 ZoneFlex APs (901-3450-UK00) The Ruckus ZoneDirector 3450, The First Simple and Powerful Enterprise
More informationWi-Net Window and Rogue Access Points
Wi-Net Window and Rogue Access Points The Wi-Net Window (WP150) has several features that make it ideal for detecting and locating rogue access points: A rogue access point is a wireless access point that
More informationExpected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy
CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design
More information