WLAN Security - Contents. Wireless LAN Security. WLAN Technologies. The ISM Frequency Bands
|
|
- Lisa Paul
- 6 years ago
- Views:
Transcription
1 WLAN Security - Contents Wireless LAN Security Matthew Joyce Vodafone UK > WLAN Technologies > Wireless LAN >Technology >Security History > Vulnerabilities > Demonstration IY WLAN Security 1 IY WLAN Security 2 WLAN Technologies The ISM Frequency Bands Infrared Wireless LAN LAN Technologies Narrow Band Direct Sequence Spread Spectrum Frequency Hopping IY WLAN Security GHz Selected regional licensing differences: 915 MHz only in the Americas (region 2) 2.4 GHz for global availability (region 1,2,3) Unlicensed spectrum is difficult to come by and usually contested IY WLAN Security 4
2 CODE Multiple Access Methods TIME FDMA User 3 User 2 User 1 Each user assigned a different frequency - like ordinary radio FREQUENCY TIME TIME User 3 User 2 User 1 TDMA FREQUENCY Multiple users share the same frequency channel sequentially Time slot sequence repeats over and over Channel is spread over wide frequency band Many users share the same frequency band at the same time Each user is assigned a unique code to identify and separate them Spread Spectrum Communication > Spread spectrum signals have bandwidths much wider than that of the data they carry > This provides the signal with substantial immunity to noise and interference, and to fading and multipath > The use of different basis signals allows many users to exist simultaneously in the same band, hence CDMA FREQUENCY CDMA (also referred to as Spread Spectrum ) IY WLAN Security 5 IY WLAN Security 6 Spread Spectrum Properties DS and FH Spread Spectrum > Spread spectrum signals may be overlaid on existing services (this is the rule, rather than the exception in the 2.4 GHz ISM band) > The distinctive signals allow each user to be automatically identified > The wide bandwidth of the signals allows multipath diversity to be used > The data rate may be varied to adapt gracefully to changing load conditions > Frequency Hopping > Sequential use of multiple frequencies > Hop sequence and rate will vary > Direct Sequence > Each symbol is transmitted over multiple frequencies at the same time > Higher speed than FH at comparable distances > System capacity (multiple channels) higher than FH COMPLETE WAVEBAND ALLOCATED Time Time IY WLAN Security 7 IY WLAN Security 8
3 DSSS Transmitter Schema DSSS Signal Convolution Source and Channel Coding Code Generator Digital Signal (Bits) Frequency Spectrum Code Bits (Chips) f Multiplier X RF Modulator Spread Frequency Spectrum f Symbol time t s Chip time t c 1 0 X = symbol Barker sequence Result of multiplication > Due to the multiplication of a symbol with Barker code, the rate-of-change increases with a factor 11 in this example > This means that cycle rate increases from 1 MHz to 11 MHz > Spreading: Information signal (I.e. a symbol ) is multiplied by a unique, high rate digital code which stretches (spreads) its bandwidth before transmission. > Code bits are called Chips. > Sequence is sometimes called a Barker Code IY WLAN Security 9 2 Mhz 22 Mhz > In terms of spectrum this means that after RF modulation the signal is spread from 2 MHz bandwidth to 22 MHz bandwidth IY WLAN Security 10 Data and Spread Signal Spectra DSSS Receiver Schema Information signal Spread signal Multiplied RF X Demodulator Spread Frequency f Spectrum Code Generator Code Bits (Chips) Digital Signal (Bits) De-Spread Signal f Channel and Source Decoding > At the receiver, the spread signal is multiplied again by a synchronized replica of the same code, and is de-spread and recovered > The outcome of the process is the original symbol Chip Rate = 32 IY WLAN Security 11 IY WLAN Security 12
4 De-Spreading Effects of Reflections/Echoes +1-1 Direct Sequence Spread Spectrum Signal 11 chip code +11 : Data > When the incoming signal is de-spread, it results in either a positive (+) or a negative (-) spike > These spikes arrive at intervals equal to the symbol time > A positive spike represents a 1 symbol, a negative spike represents a 0 symbol peak echo echo Symbol time > Echoes may arrive at the receiver, fluctuations can be noticed at positions other than at the symbol time boundaries > These fluctuations are (largely) ignored as the receiver will only interpret the spike at the synchronization points (separated from each other by the symbol time) -11 Symbol time IY WLAN Security 13 IY WLAN Security 14 IEEE 802 The WiFi Context > IEEE 802 is a collection of standards by IEEE that typically get promulgated to ANSI and ISO standards > E.g. IEEE specifies the physical and data link layer properties of Ethernet (in its various incarnations) > IEEE is a family of standards for wireless local area networks > Baseline IEEE Std was approved in June 1997 > Current standard is IEEE Std , which is supplemented by amendment documents (in the sequence a,b,d,g,h,i, j, and e) and one corrigendum document > IEEE Std was reaffirmed by the working group in 2003 without changes > A recommended practices document for inter-access-point communication (802.11f) was ratified in 2003 but withdrawn in March 2006 Wireless LANs > IEEE ratified in >Also known as Wi-Fi. > Wireless LAN at 1 Mbps & 2 Mbps. > WECA (Wireless Ethernet Compatibility Alliance) promoted Interoperability. >Now Wi-Fi Alliance > provides protocols at Layer 1 & Layer 2 of OSI model. >Physical layer >Data link layer IY WLAN Security 15 IY WLAN Security 16
5 Components modes > Two pieces of equipment defined: >Wireless station >A desktop or laptop PC or PDA with a wireless NIC. >Access point >A bridge between wireless and wired networks >Composed of >Radio > Wired network interface (usually 802.3) > Bridging software >Aggregates access for multiple wireless stations to wired network. > Infrastructure mode > Basic Service Set > One access point > Extended Service Set > Two or more BSSs forming a single subnet. > Corporate WLANs operate in this mode. > Ad-hoc mode > Also called peer-to-peer. > Independent Basic Service Set > Set of wireless stations that communicate directly without an access point. > Useful for quick & easy wireless networks. IY WLAN Security 17 IY WLAN Security 18 Infrastructure mode Ad-hoc mode Access Point Basic Service Set (BSS) Single cell Station Extended Service Set (ESS) Multiple cells Independent Basic Service Set (IBSS) IY WLAN Security 19 IY WLAN Security 20
6 Physical Layer > Originally three alternative physical layers >Two incompatible spread-spectrum radio in 2.4Ghz ISM band >Frequency Hopping Spread Spectrum (FHSS) > 75 channels >Direct Sequence Spread Spectrum (DSSS) > 14 channels (11 channels in US) >One diffuse infrared layer > speed >1 Mbps or 2 Mbps Data Link Layer > Layer 2 split into: > Logical Link Control (LLC). > Media Access Control (MAC). > LLC - same 48-bit addresses as > MAC - CSMA/CD not possible. > Can t listen for collision while transmitting. > CSMA/CA Collision Avoidance. > Sender waits for clear air, waits random time, then sends data. > Receiver sends explicit ACK when data arrives intact. > Also handles interference. > But adds overhead. > always slower than equivalent IY WLAN Security 21 IY WLAN Security 22 Hidden nodes RTS / CTS > To handle hidden nodes > Sending station sends > Request to Send > Access point responds with > Clear to Send >All other stations hear this and delay any transmissions. > Only used for larger pieces of data. >When retransmission may waste significant time. IY WLAN Security 23 IY WLAN Security 24
7 802.11b Joining a BSS > b ratified in 1999 adding 5.5 Mbps and 11 Mbps. > DSSS as physical layer. > 11 channels (3 non-overlapping) > Dynamic rate shifting. > Transparent to higher layers > Ideally 11 Mbps. > Shifts down through 5.5 Mbps, 2 Mbps to 1 Mbps. > Higher ranges. > Interference. > Shifts back up when possible. > Maximum specified range 100 metres > Average throughput of 4Mbps > When client enters range of one or more APs >APs send beacons. >AP beacon can include SSID. >AP chosen on signal strength and observed error rates. >After AP accepts client. >Client tunes to AP channel. > Periodically, all channels surveyed. >To check for stronger or more reliable APs. >If found, reassociates with new AP. IY WLAN Security 25 IY WLAN Security 26 Access Point Roaming Roaming and Channels > Reassociation with APs Channel 1 >Moving out of range. >High error rates. >High network traffic. >Allows load balancing. Channel 4 Channel 7 Channel 9 > Each AP has a channel. >14 partially overlapping channels. >Only three channels that have no overlap. >Best for multicell coverage. IY WLAN Security 27 IY WLAN Security 28
8 802.11a > a ratified in 2001 > Supports up to 54Mbps in 5 Ghz range. >Higher frequency limits the range >Regulated frequency reduces interference from other devices > 12 non-overlapping channels > Usable range of 30 metres > Average throughput of 30 Mbps > Not backwards compatible g > g ratified in 2002 > Supports up to 54Mbps in 2.4Ghz range. >Backwards compatible with b > 3 non-overlapping channels > Range similar to b > Average throughput of 30 Mbps > n due for November 2006 >Aiming for maximum 200Mbps with average 100Mbps IY WLAN Security 29 IY WLAN Security 30 Open System Authentication > Service Set Identifier (SSID) > Station must specify SSID to Access Point when requesting association. > Multiple APs with same SSID form Extended Service Set. > APs can broadcast their SSID. > Some clients allow * as SSID. >Associates with strongest AP regardless of SSID. MAC ACLs and SSID hiding > Access points have Access Control Lists (ACL). > ACL is list of allowed MAC addresses. > E.g. Allow access to: > 00:01:42:0E:12:1F > 00:01:42:F1:72:AE > 00:01:42:4F:E2:01 > But MAC addresses are sniffable and spoofable. > AP Beacons without SSID > Essid_jack > sends deauthenticate frames to client > SSID then displayed when client sends reauthenticate frames IY WLAN Security 31 IY WLAN Security 32
9 Interception Range Interception Basic Service Set (BSS) Single cell 100 metres Station outside building perimeter. > Wireless LAN uses radio signal. > Not limited to physical building. > Signal is weakened by: >Walls >Floors > Interference > Directional antenna allows interception over longer distances. >Record is 124 miles for an unamplified b signal (4 metre dish) IY WLAN Security 33 IY WLAN Security 34 Directional Antenna > Directional antenna provides focused reception. > DIY plans available. > Aluminium cake tin > Chinese cooking sieve > > WarDriving >Software >Netstumbler >And many more >Laptop > a,b,g PC card > Optional: >Global Positioning System > Logging of MAC address, network name, SSID, manufacturer, channel, signal strength, noise (GPS - location). IY WLAN Security 35 IY WLAN Security 36
10 WarDriving results WarDriving map Source: > San Francisco, 2001 >Maximum 55 miles per hour. > 1500 Access Points >60% in default configuration. >Most connected to internal backbones. >85% use Open System Authentication. > Commercial directional antenna >25 mile range from hilltops. > Peter Shipley - IY WLAN Security 37 IY WLAN Security 38 Worldwide War Drive 2004 > Fourth and last worldwide war drive > > 228,537 Access points > 82,755 (35%) with default SSID > 140,890 (60%) with Open System Authentication > 62,859 (27%) with both, probably default configuration Further issues > Access Point configuration >Mixtures of SNMP, web, serial, telnet. >Default community strings, default passwords. > Evil Twin Access Points >Stronger signal, capture user authentication. > Renegade Access Points >Unauthorised wireless LANs. IY WLAN Security 39 IY WLAN Security 40
11 War Driving prosecutions b Security Services > February 2004, Texas, Stefan Puffer acquitted of wrongful access after showing an unprotected county WLAN to officials > June 2004, North Carolina, Lowes DIY store > Salcedo convicted for stealing credit card numbers via unprotected WLAN > Botbyl convicted for checking & web browsing via unprotected WLAN > June 2004, Connecticut, Myron Tereshchuk guilty of drive-by extortion via unprotected WLANs > make the check payable to M.Tereshchuk > July 2005, London, Gregory Straszkiewicz guilty of dishonestly obtaining a communications service > Warwalking in Ealing > Two security services provided: > Authentication >Shared Key Authentication >Encryption >Wired Equivalence Privacy IY WLAN Security 41 IY WLAN Security 42 Wired Equivalence Privacy > Shared key between >Stations. >An Access Point. > Extended Service Set >All Access Points will have same shared key. > No key management >Shared key entered manually into >Stations >Access points >Key management nightmare in large wireless LANs RC4 > Ron s Code number 4 >Symmetric key encryption >RSA Security Inc. >Designed in >Trade secret until leak in > RC4 can use key sizes from 1 bit to 2048 bits. > RC4 generates a stream of pseudo random bits >XORed with plaintext to create ciphertext. IY WLAN Security 43 IY WLAN Security 44
12 WEP Sending WEP Encryption > Compute Integrity Check Vector (ICV). > Provides integrity > 32 bit Cyclic Redundancy Check. > Appended to message to create plaintext. > Plaintext encrypted via RC4 > Provides confidentiality. > Plaintext XORed with long key stream of pseudo random bits. > Key stream is function of > 40-bit secret key > 24 bit initialisation vector > Ciphertext is transmitted. Initialisation Vector (IV) Secret key Plaintext PRNG 32 bit CRC IV Cipher text IY WLAN Security 45 IY WLAN Security 46 WEP Receiving > Ciphertext is received. > Ciphertext decrypted via RC4 >Ciphertext XORed with long key stream of pseudo random bits. >Key stream is function of >40-bit secret key >24 bit initialisation vector (IV) >Check ICV >Separate ICV from message. >Compute ICV for message >Compare with received ICV Shared Key Authentication > When station requests association with Access Point > AP sends random number to station > Station encrypts random number > Uses RC4, 40 bit shared secret key & 24 bit IV > Encrypted random number sent to AP > AP decrypts received message > Uses RC4, 40 bit shared secret key & 24 bit IV > AP compares decrypted random number to transmitted random number > If numbers match, station has shared secret key. IY WLAN Security 47 IY WLAN Security 48
13 WEP Safeguards > Shared secret key required for: >Associating with an access point. >Sending data. >Receiving data. > Messages are encrypted. >Confidentiality. > Messages have checksum. >Integrity. > But management traffic still broadcast in clear containing SSID. Initialisation Vector > IV must be different for every message transmitted. > standard doesn t specify how IV is calculated. > Wireless cards use several methods >Some use a simple ascending counter for each message. >Some switch between alternate ascending and descending counters. >Some use a pseudo random IV generator. IY WLAN Security 49 IY WLAN Security 50 Passive WEP attack > If 24 bit IV is an ascending counter, > If Access Point transmits at 11 Mbps, > All IVs are exhausted in roughly 5 hours. > Passive attack: >Attacker collects all traffic >Attacker could collect two messages: >Encrypted with same key and same IV >Statistical attacks to reveal plaintext >Plaintext XOR Ciphertext = Keystream Active WEP attack > If attacker knows plaintext and ciphertext pair >Keystream is known. >Attacker can create correctly encrypted messages. >Access Point is deceived into accepting messages. > Bitflipping >Flip a bit in ciphertext >Bit difference in CRC-32 can be computed IY WLAN Security 51 IY WLAN Security 52
14 Limited WEP keys Creating limited WEP keys > Some vendors allow limited WEP keys >User types in a passphrase >WEP key is generated from passphrase >Passphrases creates only 21 bits of entropy in 40 bit key. >Reduces key strength to 21 bits = 2,097,152 >Remaining 19 bits are predictable. >21 bit key can be brute forced in minutes. > ord_cracker.ppt IY WLAN Security 53 IY WLAN Security 54 Brute force key attack > Capture ciphertext. >IV is included in message. > Search all 2 40 possible secret keys. > 1,099,511,627,776 keys >~170 days on a modern laptop > Find which key decrypts ciphertext to plaintext. 128 bit WEP > Vendors have extended WEP to 128 bit keys. >104 bit secret key. >24 bit IV. > Brute force takes 10^19 years for 104- bit key. > Effectively safeguards against brute force attacks. IY WLAN Security 55 IY WLAN Security 56
15 Key Scheduling Weakness > Paper from Fluhrer, Mantin, Shamir, > Two weaknesses: >Certain keys leak into key stream. >Invariance weakness. >If portion of PRNG input is exposed, >Analysis of initial key stream allows key to be determined. >IV weakness. IY WLAN Security 57 IV weakness > WEP exposes part of PRNG input. > IV is transmitted with message. > Every wireless frame has reliable first byte > Sub-network Access Protocol header (SNAP) used in logical link control layer, upper sub-layer of data link layer. > First byte is 0xAA >Attack is: > Capture packets with weak IV > First byte ciphertext XOR 0xAA = First byte key stream > Can determine key from initial key stream > Practical for 40 bit and 128 bit keys > Passive attack. >Non-intrusive. >No warning. IY WLAN Security 58 Wepcrack > First tool to demonstrate attack using IV weakness. >Open source, Anton Rager. > Three components > Weaker IV generator. >Search sniffer output for weaker IVs & record 1 st byte. >Cracker to combine weaker IVs and selected 1 st bytes. > Cumbersome. Airsnort > Automated tool >Cypher42, Minnesota, USA. >Does it all! >Sniffs > Searches for weaker IVs >Records encrypted data >Until key is derived. > 100 Mb to 1 Gb of transmitted data. > 3 to 4 hours on a very busy WLAN. IY WLAN Security 59 IY WLAN Security 60
16 Avoid the weak IVs Generating WEP traffic > FMS described a simple method to find weak IVs > Many manufacturers avoid those IVs after 2002 > Therefore Airsnort and others may not work on recent hardware > However David Hulton aka h1kari > Properly implemented FMS attack which shows many more weak IVs > Identified IVs that leak into second byte of key stream. > Second byte of SNAP header is also 0xAA > So attack still works on recent hardware > And is faster on older hardware > Dwepcrack, weplab, aircrack > Not capturing enough traffic? >Capture encrypted ARP request packets >Anecdotally lengths of 68, 118 and 368 bytes appear appropriate >Replay encrypted ARP packets to generate encrypted ARP replies >Aireplay implements this. IY WLAN Security 61 IY WLAN Security safeguards > Security Policy & Architecture Design > Treat as untrusted LAN > Discover unauthorised use > Access point audits > Station protection > Access point location > Antenna design Security Policy & Architecture > Define use of wireless network >What is allowed >What is not allowed > Holistic architecture and implementation >Consider all threats. >Design entire architecture >To minimise risk. IY WLAN Security 63 IY WLAN Security 64
17 Wireless as untrusted LAN > Treat wireless as untrusted. >Similar to Internet. > Firewall between WLAN and Backbone. > Extra authentication required. > Intrusion Detection >at WLAN / Backbone junction. > Vulnerability assessments Discover unauthorised use > Search for unauthorised access points, ad-hoc networks or clients. > Port scanning > For unknown SNMP agents. > For unknown web or telnet interfaces. >Warwalking! > Sniff packets > Identify IP addresses > Detect signal strength > But may sniff your neighbours > Wireless Intrusion Detection > AirMagnet, AirDefense, Trapeze, Aruba, IY WLAN Security 65 IY WLAN Security 66 Access point audits > Review security of access points. > Are passwords and community strings secure? > Use Firewalls & router ACLs >Limit use of access point administration interfaces. > Standard access point config: >SSID >WEP keys >Community string & password policy Station protection > Personal firewalls > Protect the station from attackers. > VPN from station into Intranet > End-to-end encryption into the trusted network. > But consider roaming issues. > Host intrusion detection > Provide early warning of intrusions onto a station. > Configuration scanning > Check that stations are securely configured. IY WLAN Security 67 IY WLAN Security 68
18 Location of Access Points > Ideally locate access points >In centre of buildings. > Try to avoid access points >By windows >On external walls >Line of sight to outside > Use directional antenna to point radio signal. Wireless IDS/IPS > Sensors deployed in WLAN > Monitoring to detect >Unauthorised clients by MAC address >Accidental >Malicious >Ad-hoc mode networks >Unauthorised access points >Policy violations > Possible to identify approximate locations IY WLAN Security 69 IY WLAN Security 70 WPA WPA and 802.1x > Wi-Fi Protected Access > Works with b, a and g > Fixes WEP s problems > Existing hardware can be used > 802.1x user-level authentication >TKIP > RC4 session-based dynamic encryption keys > Per-packet key derivation > Unicast and broadcast key management > New 48 bit IV with new sequencing method > Michael 8 byte message integrity code (MIC) > Optional AES support to replace RC4 > 802.1x is a general purpose network access control mechanism > WPA has two modes > Pre-shared mode, uses pre-shared keys > Enterprise mode, uses Extensible Authentication Protocol (EAP) with a RADIUS server making the authentication decision > EAP is a transport for authentication, not authentication itself > EAP allows arbitrary authentication methods > For example, Windows supports > EAP-TLS requiring client and server certificates >PEAP-MS-CHAPv2 IY WLAN Security 71 IY WLAN Security 72
19 Practical WPA attacks i (WPA2) > Dictionary attack on pre-shared key mode >CoWPAtty, Joshua Wright > Denial of service attack >If WPA equipment sees two packets with invalid MICs in 1 second >All clients are disassociated >All activity stopped for one minute >Two malicious packets a minute enough to stop a wireless network > Robust Security Network extends WPA > Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) > Based on a mode of AES, with 128 bits keys and 48 bit IV. > Also adds dynamic negotiation of authentication and encryption algorithms > Allows for future change > Does require new hardware > Lots more info > IY WLAN Security 73 IY WLAN Security 74 Relevant RFCs > Radius Extensions: RFC 2869 > EAP: RFC 2284 > EAP-TLS: RFC 2716 Demonstration > War driving > Packet sniffing >Cracking WEP IY WLAN Security 75 IY WLAN Security 76
Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationWireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationA Configuration Protocol for Embedded Devices on Secure Wireless Networks
A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)
More informationWireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design
Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended
More informationWireless Networking Basics. Ed Crowley
Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2
More informationAppendix E Wireless Networking Basics
Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE
More informationWireless Technologies
Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless
More informationWireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.
Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE
More informationCSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology
CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals
More informationSecurity in IEEE Networks
Security in IEEE 802.11 Networks Mário Nunes, Rui Silva, António Grilo March 2013 Sumário 1 Introduction to the Security Services 2 Basic security mechanisms in IEEE 802.11 2.1 Hidden SSID (Service Set
More informationWLAN Security. รศ. ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D.
Wireless LANs 2013 WLAN Security รศ. ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. anan.p@ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand
More informationChapter 3.1 Acknowledgment:
Chapter 3.1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts
More information1. INTRODUCTION. Wi-Fi 1
Wi-Fi 1 1. INTRODUCTION Wi-Fi, or Wireless Fidelity, is freedom: it allows you to connect to the Internet from your home, a bed in a hotel room or at a conference room at work without wires. How? Wi-Fi
More informationAdvanced Security and Mobile Networks
Advanced Security and Mobile Networks W.Buchanan (1) 9. GSM/3G Unit 7: Mobile Networks. Wireless. Security. Mobile IP. Mobile Agents. Spread spectrum. Military/Emergency Networks 8. Ad-hoc 7. Mobile Networks
More informationCITS3002 Networks and Security. The IEEE Wireless LAN protocol. 1 next CITS3002 help3002 CITS3002 schedule
1 next CITS3002 help3002 CITS3002 schedule The IEEE-802.11 Wireless LAN protocol We'll next examine devices implementing the IEEE-802.11 family of wireless networking protocols, and get an appreciation
More information02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel
TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationManaging and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer
Managing and Securing Computer Networks Guy Leduc Chapter 7: Securing LANs Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2016. (section 8.8) Also
More informationCYBER ATTACKS EXPLAINED: WIRELESS ATTACKS
CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these
More informationViewing Status and Statistics
CHAPTER 7 This chapter explains how to use ADU to view the client adapter s status and its transmit and receive statistics. The following topics are covered in this chapter: Overview of ADU and Statistics
More informationWireless LAN USB Super G 108 Mbit. Manual
Wireless LAN USB Super G 108 Mbit Manual Dear Customer, Thanks for choosing Hamlet. Please carefully follow the instructions for its use and maintenance and, once this item has run its life span, we kindly
More informationWireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Wireless Networking 802.11 based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers topics Standards Technical Concepts Implementation Troubleshooting 802.11 timeline source: Anandtech
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g
More informationChapter 24 Wireless Network Security
Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically
More informationWireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities
Wireless Security Comp Sci 3600 Security Outline 1 2 3 Wired versus wireless Endpoint Access point Figure 24.1 Wireless Networking Components Locations and types of attack Outline 1 2 3 Wired Equivalent
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms
More informationWhat is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne
Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor What is a Wireless LAN? The wireless telegraph is not difficult to understand.
More information2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp
2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp Questions Have you used a wireless local area network before? At home? At work? Have you configured a wireless AP before?
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationThe 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013
The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationWNC-0300USB. 11g Wireless USB Adapter USER MANUAL
WNC-0300USB 11g Wireless USB Adapter USER MANUAL Contents 1. Introduction...3 1.1 Product Feature...3 1.2 System Requirement...3 2. Getting Start...3 2.1 LED Indicators...3 2.2 Install the 54Mbps Wireless
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18
More informationWireless LAN -Architecture
Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution
More informationPrincess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationFamily Structural Overview
Some IEEE 802 Standards TELE301 Lecture 5 802.11 Wireless Networking David Eyers Telecommunications Programme University of Otago 802.1 Bridging and Management 802.1X,... 802.3 Ethernet 802.11 Wireless
More informationWireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS
How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms
More informationWireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs
Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)
More informationWireless LAN. Access Point. Provides network connectivity over wireless media
LAN Technologies 802.11 Wireless LAN Network connectivity to the legacy wired LAN Access Point Desktop with PCI 802.11 LAN card Laptop with PCMCIA 802.11 LAN card Provides network connectivity over wireless
More informationWLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC
WLAN Security Dr. Siwaruk Siwamogsatham ThaiCERT, NECTEC Agenda Wireless Technology Overview IEEE 802.11 WLAN Technology WLAN Security Issues How to secure WLAN? WLAN Security Technologies Wireless Technologies
More informationOutdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0
Outdoor High Power 802.11b/g/n Wireless USB Adapter USER MANUAL 4.0 2012 Contents 1 Introduction... 3 2 Hardware Installation... 4 3 Driver Installation... 6 3.1 Windows XP... 6 3.2 Windows Vista... 9
More informationD. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.
Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More information05 - WLAN Encryption and Data Integrity Protocols
05 - WLAN Encryption and Data Integrity Protocols Introduction 802.11i adds new encryption and data integrity methods. includes encryption algorithms to protect the data, cryptographic integrity checks
More informationWireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses
More informationExtending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.
Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just
More informationHow Insecure is Wireless LAN?
Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost
More informationWarDriving. related fixed line attacks war dialing port scanning
WarDriving slide 1 related fixed line attacks war dialing port scanning war driving drive through a metropolitan area looking for wireless access points software logs, latidute/longitude runs software
More informationChapter 7. Basic Wireless Concepts and Configuration. Part I
Chapter 7 Basic Wireless Concepts and Configuration Part I CCNA3-1 Chapter 7-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationOverview of Security
Overview of 802.11 Security Bingdong Li Present for CPE 601 2/9/2011 Sources: 1 Jesse Walker (Intel) & 2. WinLab 1 Agenda Introduction 802.11 Basic Security Mechanisms What s Wrong? Major Risks Recommendations
More informationExpected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy
CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationWireless Security i. Lars Strand lars (at) unik no June 2004
Wireless Security - 802.11i Lars Strand lars (at) unik no June 2004 802.11 Working Group 11 of IEEE 802 'Task Groups' within the WG enhance portions of the standard: 802.11 1997: The IEEE standard for
More informationInstitute of Electrical and Electronics Engineers (IEEE) IEEE standards
HW Institute of Electrical and Electronics Engineers (IEEE) IEEE 802.11 standards WLAN Standard (IEEE 802.11) The IEEE 802.11 is a family of standards that governs the operations and functions of WLANs.
More informationPhysical and Link Layer Attacks
Physical and Link Layer Attacks CMSC 414 November 1, 2017 Attenuation Physical links are subject to attenuation Copper cables have internal resistance, which degrades signal over large distances Fiber
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationWi-Fi Scanner. Glossary. LizardSystems
Wi-Fi Scanner Glossary LizardSystems 2 Table of Contents 802 6 802.11 6 802.11a 6 802.11b 6 802.11d 6 802.11e 6 802.11g 6 802.11h 6 802.11i 6 802.11j 6 802.11n 7 802.1X 7 802.3 7 A 8 Ad-Hoc mode 8 AES
More informationWireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved
Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks
More informationOverview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi
Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationMobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE
Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE COURSE TITLE WIRELESS TECHNOLOGY SPECIALIST COURSE DURATION 13 Hours of Interactive Training COURSE OVERVIEW This course will teach you
More informationVendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo
Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the
More informationPast, Present, and Future WiFi Standards and Technologies. Max Slater Davidson Academy of Nevada
Past, Present, and Future 802.11 WiFi Standards and Technologies Max Slater Davidson Academy of Nevada Under Supervision of: Dr. Shamik Sengupta Department of Computer Science and Engineering, University
More informationIEEE WLANs (WiFi) Part II/III System Overview and MAC Layer
IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationCSCD 433/533 Advanced Networking
CSCD 433/533 Advanced Networking Lecture 6 Wireless LAN Components and Characteristics Winter 2017 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Introduction
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 5: The 802.11 Standard October 7, 2004 2004 Matt Welsh Harvard University 1 All about 802.11 Today's Lecture CSMA/CD MAC and DCF WEP
More informationCS4/MSc Computer Networking. Lecture 12: Wireless Local Area Networks
CS4/MSc Computer Networking Lecture 12: Wireless Local Area Networks Wireless Networking Motivation Mobility Connect from anywhere, anytime, on the move Wi-fihotspots beginning to proliferate» coffee shops,
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationWireless MAXg Technology
Wireless MAXg Technology MAXimizing range, performance, security and simplicity for 802.11g networks Technology Note Wireless technology has undoubtedly become a ubiquitous presence in our computing environment,
More informationbased on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Wireless Networking 802.11 based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers topics History Standards Technical Concepts Implementation Troubleshooting 1 HISTORY AND STANDARDS History
More informationArchitecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change
802.11 Architecture Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change What is unique about wireless? Difficult media - interference and noise -
More informationWireless PCI PCMCIA Super G 108 Mbit. Manual
Wireless PCI PCMCIA Super G 108 Mbit Dear Customer, Manual thanks for choosing Hamlet. Please carefully follow the instructions for its use and maintenance and, once this item has run its life span, we
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationInterworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...
Interworking 2006 Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks Interworking Conference, 15th - 17th of January 2007 Dr-Ing Kai-Oliver Detken Business URL: http://wwwdecoitde
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More information3.1. Introduction to WLAN IEEE
3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to
More informationWireless Network Security
Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless
More informationU S E R M A N U A L b/g PC CARD
U S E R M A N U A L 802.11b/g PC CARD Table of Content CHAPTER 1 INTRODUCTION... 1 1.1 WIRELESS LAN FEATURE FUNCTIONS... 1 1.2 REGULATORY NOTICE... 1 1.2.1 FCC Class B Statement...1 1.2.2 Canadian Regulatory
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationQuickSpecs. HP enterprise access point WL520. Overview
Overview 1. Power Out 8. Ethernet LAN Activity LED 2. Power Supply 9. Power LED 3. Power Input 10. Wireless Interface Cardbus Slot B 4. Processor Module 11. Wireless Interface Cardbus Slot A 5. Cover 12.
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationNetwork+ Guide to Networks 6 th Edition. Chapter 8 Wireless Networking
Network+ Guide to Networks 6 th Edition Chapter 8 Wireless Networking Objectives Explain how nodes exchange wireless signals Identify potential obstacles to successful wireless transmission and their repercussions,
More informationWireless Local Area Network (IEEE )
Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode
More information300M Wireless-N Mini USB Adapter
Model No. ib-wua300nm Ver.: 1.0.0 FCC STATEMENT This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationChapter 10: Wireless LAN & VLANs
Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1
More informationIEEE Technical Tutorial. Introduction. IEEE Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
More information