Wireless technology Principles of Security
|
|
- Augustus Rodgers
- 5 years ago
- Views:
Transcription
1 Wireless technology Principles of Security 1
2 Wireless technologies 2
3 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the industry views LANs Wireless networking provides all the features and benefits of traditional LAN technologies without the limitations of wires or cables The freedom to roam while still maintaining connectivity has helped launch wireless networking to new heights 3
4 Wireless Technologies
5 Comparing a WLAN to a LAN
6 Benefits of wireless technology 6
7 Limitations of wireless technology 7
8 Introduction to wireless LANs A WLAN, just like a LAN, requires a physical medium through which transmission signals pass. Instead of using twisted-pair or fiber-optic cable, WLANs use infrared light (IR) or radio frequencies (RFs) The use of RF is far more popular for its longer range, higher bandwidth, and wider coverage. WLANs use the 2.4-gigahertz (GHz) and 5-GHz frequency bands Wireless networking provides the freedom and flexibility to operate within buildings and between buildings. 8
9 Wireless LAN Standards A number of standards have been developed to ensure that wireless devices can communicate They specify the RF spectrum used, data rates, how the information is transmitted The IEEE standard governs the WLAN environment a, b, g and n (802.11n is not ratified at the time of this writing). Collectively these technologies are referred to as Wi-Fi, Wireless Fidelity. 9
10 10
11 11
12 Evolution of Wireless LANs Just as the Ethernet standard allows for data transmission over twisted-pair and coaxial cable, the WLAN standard allows for transmission over different media: Infrared light Three types of radio transmission within the unlicensed 2.4- GHz frequency bands: Frequency Hopping Spread Spectrum (FHSS) 1 Mbps Direct Sequence Spread Spectrum (DSSS) 11 Mbps Orthogonal Frequency-Division Multiplexing (OFDM) One type of radio transmission within the unlicensed 5-GHz frequency bands: 54 Mbps Orthogonal Frequency-Division Multiplexing (OFDM) 12
13 Wireless LAN standards 13
14 Wireless Standards
15 802.11a: Uses 5 GHz RF spectrum Not compatible with 2.4 GHz spectrum, i.e b/g/n devices Range is approximately 33% that of the b/g Relatively expensive to implement compared to other technologies Increasingly difficult to find a compliant equipment 15
16 802.11b: First of the 2.4 GHz technologies Maximum data-rate of 11 Mbps Range of approximately 46 m (150 ft) indoors/96 m (300 ft) outdoors 16
17 802.11g: 2.4 GHz technologies Maximum data-rate increase to 54 Mbps Same range as the b Backwards compatible with b 17
18 802.11n: Newest standard in development 2.4 GHz technologies (draft standard specifies support for 5 GHz-) Extends the range and data throughput. Backwards compatible with existing g and b equipment (draft standard specifies a support) 18
19 Wireless Technologies and devices 19
20 Wireless LAN components 20
21 Wireless LAN components An access point (AP) contains a radio transceiver. It can act as the center point of a stand-alone wireless network or as the connection point between wireless and wired networks. The roaming functionality provided by multiple APs allows wireless users to move freely throughout the facility, while maintaining seamless, uninterrupted access to the network. Any AP can be used as a repeater, or extension point, for the wireless network 21
22 Hidden Nodes A CSMA/CA feature called request to Request/Clear to send (RTS/CTS), access points allocate the medium to the requesting station for as long as is required to complete the transmission. When the transmission is complete, other stations can request the channel in a similar fashion.
23 Wireless LAN components Wireless router Wireless routers perform the role of access point, Ethernet switch, and router 23
24 WLANs and SSID When building a wireless network, it is important that the wireless components connect to the appropriate WLAN. This is done using a Service Set Identifier (SSID). The SSID is a case-sensitive, alpha-numeric string that is up to 32-characters. It is sent in the header of all frames transmitted over the WLAN Regardless of the type of WLAN installation, all wireless devices in a WLAN must be configured with the same SSID in order to communicate. 24
25 WLANs and SSID There are two basic forms of WLAN installations: Ad-hoc Infrastructure Mode 25
26 Ad-hoc The simplest form of a wireless network is created by connecting two or more wireless clients together in a peer-to-peer network. Does not include an AP All clients within an ad-hoc network are equal. The area covered by this network is known as an Independent Basic Service Set (IBSS). Used to exchange files and information between devices without the expense and complexity of purchasing and configuring an AP. 26
27 Infrastructure Mode Larger networks require a single device that controls communications in the wireless cell. AP will take over this role and control who can talk and when. Wireless communication most often used in the home and business environment. To communicate, each device must obtain permission from the AP. The AP controls all communications and ensures that all STAs have equal access to the medium. The area covered by a single AP is known as a Basic Service Set (BSS) or cell. 27
28 WLANs and SSID The area of coverage of a single AP is limited. To expand the coverage area, it is possible to connect multiple Basic Service Set (BSS) through a Distribution System (DS). This forms an Extended Service Set (ESS). An ESS uses multiple APs. Each AP is in a separate BSS. In order to allow movement between the cells without the loss of signal, BSSs must overlap by approximately 10% 28
29 Wireless channel Wireless technology uses an access method called Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). CSMA/CA creates a reservation on the channel for use by a specific conversation. While a reservation is in place, no other device may transmit on the channel thus possible collisions are avoided. 29
30 Wireless channel The conversation between sender and receiver must be controlled. One way this is accomplished is through the use of Channels. Channels are created by dividing up the available RF spectrum Normally each wireless conversation makes use of a separate channel. 30
31 If there are three adjacent access points, use channels 1, 6, and 11. If there are just two, select any two that are five channels apart, such as channels 5 and b DSSS 31
32 Client and Access Point Association Beacons - Frames used by the WLAN network to advertise its presence. Probes - Frames used by WLAN clients to find their networks. Authentication - A process which is an artifact from the original standard, but still required by the standard. Association - The process for establishing the data link between an access point and a WLAN client.
33 Client and Access Point Association
34 Client and Access Point Association
35 Client and Access Point Association
36 Client and Access Point Association
37 Planning the Wireless LAN Network requirements specify that there must be a minimum of 6 Mb/s b
38 Planning the Wireless LAN Network requirements specify that there must be a minimum of 6 Mb/s b
39 Planning the Wireless LAN Network requirements specify that there must be a minimum of 6 Mb/s b
40 Security considerations on WLANs The ease of connectivity and the fact that the information is transmitted through the air also makes your network vulnerable to interception and attacks. Once an attacker have access to your network, they can use your Internet services for free, as well as access computers on the network to damage files, or steal personal and private information. These vulnerabilities in wireless networking require special security features and implementation methods to help protect your WLAN from attacks. 40
41 Treats to wireless security Unauthorized Access War drivers Hackers (Crackers) Employees Rogue Access Points A rogue access point is an access point placed on a WLAN that is used to interfere with normal network operation Man-in-the-Middle Attacks Denial of Service 41
42 Security considerations on WLANs The SSID broadcast feature can be turned off. Change the default setting such as SSIDs, passwords, and IP addresses in place. Even with SSID broadcast turned off and default values changed, attackers can learn the name of a wireless network through the use of these devices that intercept wireless signals 42
43 Limiting access to a WLAN MAC Address Filtering Requires the MAC addresses of all devices 43
44 Wired Equivalent Privacy (WEP) The IEEE standard includes WEP to protect authorized users of a WLAN WEP standard specified a 40-bit key Most vendors have extended WEP to 128 bits or more. Both the wireless client and the access point must have a matching WEP key. WEP is based upon an existing and familiar encryption type, Rivest Cipher 4 (RC4). 44
45 WPA- Wi-Fi Protected Access WPA also uses encryption keys from 64 bits up to 256 bits. WPA, unlike WEP, generates new, dynamic keys each time a client establishes a connection with the AP. WPA is considered more secure than WEP because it is significantly more difficult to crack. WPA allows user authentication through the IEEE 802.1x protocol x provides mutual authentication. Network and the user prove their identity to each other. An access point that supports 802.1x and its protocol, Extensible Authentication Protocol (EAP), acts as the interface between a wireless client and an authentication server such as a Remote Access Dial-In User Service (RADIUS) server. 45
46 Authentication on WLAN Authentication is the process of permitting entry to a network based on a set of credentials. The use of a username and password is a most common form of authentication. Two types of authentication were introduced with the original standard: Open authentication Pre Shared WEP Key authentication 46
47 Open Authentication By default, wireless devices do not require authentication. Clients are able to associate regardless of who they are. Open authentication should only be used on public wireless networks such as those found in many schools and restaurants. 47
48 48
49 Pre-shared keys (PSK) With PSK both the AP and client must be configured with the same key or secret word. AP sends a random string of bytes to the client. The client accepts the string, encrypts it (or scrambles it) based on the key, and sends it back to the AP. PSK performs one-way authentication, that is, the host authenticates to the AP. PSK does not authenticate the AP to the host, nor does it authenticate the actual user of the host. 49
50 Pre-shared WEP keys (PSK) 50
51 Today, the standard that should be followed in most enterprise networks is the i standard. This is similar to the Wi-Fi Alliance WPA2 standard. For enterprises, WPA2 includes a connection to a Remote Authentication Dial In User Service (RADIUS) database. 51
52 Extensible Authentication Protocol (EAP) EAP provides mutual, or two-way, authentication as well as user authentication. When EAP software is installed on the client, the client communicates with a backend authentication server such as Remote Authentication Dial-in User Service (RADIUS). 52
53 53
54 The access point blocks all data frames, except for 802.1x-based traffic. The 802.1x frames carry the EAP authentication packets via the access point to a server that maintains authentication credentials. This server is an Authentication, Authorization, and Accounting (AAA) server running a RADIUS protocol. If the EAP authentication is successful, the AAA server sends an EAP success message to the access point. 54
55 Encrytpion Two enterprise-level encryption mechanisms specified by i are certified as WPA and WPA2 by the Wi-Fi Alliance: Temporal Key Integrity Protocol (TKIP) TKIP is the encryption method certified as WPA. Advanced Encryption Standard (AES) 55
56 AES AES offers stronger encryption Cryptographic algorithm for use by United States government organizations to protect sensitive, unclassified information AES requires a coprocessor or additional hardware to operate. This means that companies need to replace existing access points and client NICs to implement AES AES specifies three key sizes, which are 128, 192, and 256 bits 56
57 Configuring Basic Wireless Settings
58 Configuring Security When you see "Personal" in a security mode, no AAA (Authentication, Authorization, Accounting)ser ver is used. "Enterprise" in the security mode name means a AAA server and EAP authentication is used.
Wireless Technologies
Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless
More informationChapter 7. Basic Wireless Concepts and Configuration. Part I
Chapter 7 Basic Wireless Concepts and Configuration Part I CCNA3-1 Chapter 7-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g
More informationWireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Wireless Networking 802.11 based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers topics Standards Technical Concepts Implementation Troubleshooting 802.11 timeline source: Anandtech
More informationAppendix E Wireless Networking Basics
Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical
More information02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel
TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment
More informationWireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.
Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE
More informationCSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology
CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals
More informationWireless Networking Basics. Ed Crowley
Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2
More informationOutdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0
Outdoor High Power 802.11b/g/n Wireless USB Adapter USER MANUAL 4.0 2012 Contents 1 Introduction... 3 2 Hardware Installation... 4 3 Driver Installation... 6 3.1 Windows XP... 6 3.2 Windows Vista... 9
More informationOverview of IEEE Networks. Timo Smura
Overview of IEEE 802.11 Networks Timo Smura 24.03.2004 Outline Introduction IEEE 802.11 standards Protocol model Network topologies 802.11 MAC layer 802.11 PHY layers Interoperability: Wi-Fi Alliance 3GPP
More information1. INTRODUCTION. Wi-Fi 1
Wi-Fi 1 1. INTRODUCTION Wi-Fi, or Wireless Fidelity, is freedom: it allows you to connect to the Internet from your home, a bed in a hotel room or at a conference room at work without wires. How? Wi-Fi
More informationA Configuration Protocol for Embedded Devices on Secure Wireless Networks
A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)
More informationWireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS
How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms
More informationChapter 10: Wireless LAN & VLANs
Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationWIRELESS USB 2.0 ADAPTER. Manual (DN & DN )
WIRELESS USB 2.0 ADAPTER Manual (DN-7043-4 & DN-7053-2) 1. Introduction... 1 2. Wireless LAN Basics... 3 3. IP ADDRESS... 4 4. Install Driver/Utility... 5 4.1 Windows XP/Vista... 5 5. Wireless Network
More information11n Wireless USB Adapter
User Manual 11n Wireless USB Adapter Model No.: SP907NS Table of Content 1. INTRODUCTION... 2 1.1 Features... 2 1.2 Specifications... 2 1.3 Package Contents... 3 2. INSTALLATION PROCEDURE... 4 2.1 Install
More informationWLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC
WLAN Security Dr. Siwaruk Siwamogsatham ThaiCERT, NECTEC Agenda Wireless Technology Overview IEEE 802.11 WLAN Technology WLAN Security Issues How to secure WLAN? WLAN Security Technologies Wireless Technologies
More informationChapter 3.1 Acknowledgment:
Chapter 3.1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts
More informationInstitute of Electrical and Electronics Engineers (IEEE) IEEE standards
HW Institute of Electrical and Electronics Engineers (IEEE) IEEE 802.11 standards WLAN Standard (IEEE 802.11) The IEEE 802.11 is a family of standards that governs the operations and functions of WLANs.
More information11N Wireless USB Adapter User Guide
-- 1 -- Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective
More informationWireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved
Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks
More informationWireless LAN -Architecture
Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution
More information11N Wireless PCI Adapter User Guide
-- 1 -- Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective
More informationbased on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Wireless Networking 802.11 based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers topics History Standards Technical Concepts Implementation Troubleshooting 1 HISTORY AND STANDARDS History
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationWireless LAN USB Super G 108 Mbit. Manual
Wireless LAN USB Super G 108 Mbit Manual Dear Customer, Thanks for choosing Hamlet. Please carefully follow the instructions for its use and maintenance and, once this item has run its life span, we kindly
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE
More information11N Wireless PCI Adapter User Guide -6-
-6- Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective
More informationNWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012
NWD2705 Dual-Band Wireless N450 USB Adapter Version 1.00 Edition 1, 09/2012 Quick Start Guide User s Guide www.zyxel.com Copyright 2012 ZyXEL Communications Corporation IMPORTANT! READ CAREFULLY BEFORE
More informationNT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs
NT1210 Introduction to Networking Unit 6: Chapter 6, Wireless LANs Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of networks
More informationDRAFT. Wireless Networking. Introduction
Introduction Wireless Networking The IEEE 802.11 Wireless LAN Standard Wireless Networking Bluetooth, WiMAX, RFID, and Mobile Communications Wireless LAN Security DRAFT Introduction So far, we have been
More informationU S E R M A N U A L b/g PC CARD
U S E R M A N U A L 802.11b/g PC CARD Table of Content CHAPTER 1 INTRODUCTION... 1 1.1 WIRELESS LAN FEATURE FUNCTIONS... 1 1.2 REGULATORY NOTICE... 1 1.2.1 FCC Class B Statement...1 1.2.2 Canadian Regulatory
More informationBasic Wireless Settings on the CVR100W VPN Router
Basic Wireless Settings on the CVR100W VPN Router Objective A Wireless Local Area Network (WLAN) utilizes radio communication to connect wireless devices to a LAN. An example is a Wi-Fi hotspot at a cafe.
More informationDeploying WLANs: This section lists a set of generic steps for installing small WLANs, with no product-specific details.
This chapter covers the following subjects: Wireless LAN Concepts: This section explains the basic theory behind transmitting data with radio waves using wireless LAN standards. Deploying WLANs: This section
More informationChapter 24 Wireless Network Security
Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically
More informationWireless Networking CHAPTER SEVEN. Objectives. What You Need To Know
7 CHAPTER SEVEN Wireless Networking Objectives 1.7 Compare the characteristics of wireless communication standards. 802.11 a/b/g/n.speeds.distance.channels.frequency. Authentication and encryption.wpa.wep.radius.tkip
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationWhat is Eavedropping?
WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationWi-Fi Scanner. Glossary. LizardSystems
Wi-Fi Scanner Glossary LizardSystems 2 Table of Contents 802 6 802.11 6 802.11a 6 802.11b 6 802.11d 6 802.11e 6 802.11g 6 802.11h 6 802.11i 6 802.11j 6 802.11n 7 802.1X 7 802.3 7 A 8 Ad-Hoc mode 8 AES
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More informationWireless MAXg Technology
Wireless MAXg Technology MAXimizing range, performance, security and simplicity for 802.11g networks Technology Note Wireless technology has undoubtedly become a ubiquitous presence in our computing environment,
More information300M MIMO Wireless-N PCI-E Adapter
Model No. ib-wpa300n 1910020629 Ver.: 1.0.0 FCC RF Radiation Exposure Statement: This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This device and
More informationIP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask
Network Requirements, page 1 Wireless LAN, page 2 Wi-Fi Network Components, page 3 802.11 Standards for WLAN Communications, page 6 Security for Communications in WLANs, page 9 WLANs and Roaming, page
More informationFAQ on Cisco Aironet Wireless Security
FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most
More informationOverview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi
Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some
More information802.11g PC Card/USB Wireless Adapter
802.11g PC Card/USB Wireless Adapter User Guide Regulatory Approvals FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of
More informationIT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs
IT220 Network Standards & Protocols Unit 6: Chapter 6 Wireless LANs 2 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationWNC-0300USB. 11g Wireless USB Adapter USER MANUAL
WNC-0300USB 11g Wireless USB Adapter USER MANUAL Contents 1. Introduction...3 1.1 Product Feature...3 1.2 System Requirement...3 2. Getting Start...3 2.1 LED Indicators...3 2.2 Install the 54Mbps Wireless
More informationECB N Multi-Function Gigabit Client Bridge
ECB9500 is a powerful and multi-functioned 11n product with 7 major multi-functions, is designed to operate in every working environment for enterprises. ECB9500 is a Wireless Network device that delivers
More informationMODE COM WIRELESS NETWORK USB ADAPTER
a p t e r U s e r U S B 2. 0 A d M a I E E E 8 n u 0 2. 1 1 b / a l MODE COM WIRELESS NETWORK USB ADAPTER g W i r e l e s s MC-105USB Table of Contents 1 Introduction...3 1.1 Product Overview...4 1.2 Main
More information802.11b+g Wireless LAN USB Adapter. User Manual
802.11b+g Wireless LAN USB Adapter User Manual REGULATORY STATEMENTS FCC Certification The United States Federal Communication Commission (FCC) and the Canadian Department of Communications have established
More information3.1. Introduction to WLAN IEEE
3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationRNX-N150NUB N150 Wireless Nano USB Adapter
1910020746 REV 1.0.0 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of Rosewill Inc. Other brands and product names are trademarks or registered trademarks
More informationConfiguring a VAP on the WAP351, WAP131, and WAP371
Article ID: 5072 Configuring a VAP on the WAP351, WAP131, and WAP371 Objective Virtual Access Points (VAPs) segment the wireless LAN into multiple broadcast domains that are the wireless equivalent of
More informationA Division of Cisco Systems, Inc. GHz g a. Dual-Band. Wireless A+G. User Guide. Notebook Adapter WIRELESS WPC55AG. Model No.
A Division of Cisco Systems, Inc. 5 GHz 802.11a + GHz 2.4 802.11g WIRELESS Dual-Band Wireless A+G Notebook Adapter User Guide Model No. WPC55AG Copyright and Trademarks Specifications are subject to change
More informationCWNP PW Certified Wireless Analysis Professional. Download Full Version :
CWNP PW0-270 Certified Wireless Analysis Professional Download Full Version : http://killexams.com/pass4sure/exam-detail/pw0-270 QUESTION: 50 ABC Company is having VoWiFi latency problems on their 802.11g
More informationChapter 17. Wireless Network Security
Chapter 17 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s, to develop a protocol & transmission specifications for wireless LANs (WLANs) Demand
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationExpected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy
CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design
More informationWPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)
WPA SECURITY (Wi-Fi Protected Access) Presentation By Douglas Cheathem (csc 650.01 Spring 2007) OUTLINE Introduction Security Risk Vulnerabilities Prevention Conclusion Live Demo Q & A INTRODUCTION! WPA
More information11N Wall Mount Access Point / WDS AP / Universal Repeater. Features. Fully compatible with IEEE b/g/n devices
EAP9550-KZ is a powerful and multi-functioned 11n Indoor Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly
More informationEnGenius EAP-9550 Indoor Access Point
Product Name: Manufacturer: - Model Number: NET-EL-EAP9550 Please Note the has been discontinued, for alternative wireless equipment please check out Ubiquiti UniFi UAP LR EnGenius EAP9550 Indoor Access
More informationWireless LAN Access Point
Wireless LAN Access Point IEEE 802.11b/g 54Mbps 501903 User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4 Physical Description...
More information300M Wireless-N Mini USB Adapter
Model No. ib-wua300nm Ver.: 1.0.0 FCC STATEMENT This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed
More informationThe Wi-Fi Boom. Dr. Malik Audeh Tropos Networks March 13, 2004
1 The Wi-Fi Boom Dr. Malik Audeh Tropos Networks March 13, 2004 Outline 2 Wi-Fi has gone mainstream Background of Wi-Fi/802.11 Technical Details of Wi-Fi Physical Layer(s) MAC Layer Security Wi-Fi in different
More informationCompact. Wireless-G g. User Guide. USB Network Adapter with SpeedBooster WIRELESS WUSB54GSC (EU/LA) Model No.
Compact 2.4 GHz 802.11g Wireless-G WIRELESS USB Network Adapter with SpeedBooster User Guide Model No. WUSB54GSC (EU/LA) Copyright and Trademarks Specifications are subject to change without notice. Linksys
More informationEnGenius Quick Start Guide
T he operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard. High output power and high sensitivity
More informationProduct Brief: SDC-PE15N n PCIe Module with Antenna Connectors
Product Brief: SDC-PE15N 802.11n PCIe Module with Antenna Connectors The SDC-PE15N PCI Express Mini Card (PCIe) radio module from Summit Data Communications combines a high-performance, dual-band 802.11n
More informationTechnical Introduction
802.11 Technical Introduction Tomas Krag t@wire.less.dk Unlicensed Spectrum There was a need for spectrum with fewer regulations The ISM band at 2.4 Ghz & 5.2 GHz The UNII band at 5.8 GHz No need for a
More informationECB N Multi-Function Client Bridge
ECB9300 is a multi-functioned 11n product with 7 major multi-functions, is designed to operate in every working environment for enterprises. ECB9300 is a Wireless Network device that delivers up to 3x
More informationChapter 5 Local Area Networks. Computer Concepts 2013
Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section
More informationFeature. What exactly is WLAN? More reading:
The WLAN Roadmap Wireless Local Area Networking (WLAN) is a simple concept, but one that entails a wide, sometimes confusing, variety of standards, implementations, and future plans for development. This
More informationIEEE WLANs (WiFi) Part II/III System Overview and MAC Layer
IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed
More informationChapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du
Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each
More informationWIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal
WIRELESS LANS By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal Introduction Why wireless? World will become fully mobile Increase in wireless devices usage Wireless will succeed; integrates into many
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More informationWireless networking with three times the speed and five times the flexibility.
Wireless 150N Outdoor Range Extender / Access Point Multiple SSIDs, Wireless client isolation, Bridge, Repeater, WDS, Passive PoE, Built-in 12dBi Antenna Part No.: 525497 Wireless networking with three
More informationConfiguring the Wireless Parameters (CPE and WBS)
Configuring the Wireless Parameters (CPE and WBS) CHAPTERS 1. Configure Basic Wireless Parameters 2. Configure Wireless Client Parameters 3. Configure Wireless AP Parameters 4. Configure Multi-SSID 5.
More informationWireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design
Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended
More informationMobile Computing. Fery Updi, M.Kom.
Mobile Computing Fery Updi, M.Kom. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit data through the air. Wi-Fi is based on the 802.11 standard:
More informationCOPYRIGHT & TRADEMARKS
COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK Technologies Co., Ltd. Other brands and product names are trademarks or registered trademarks
More informationArchitecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change
802.11 Architecture Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change What is unique about wireless? Difficult media - interference and noise -
More informationWireless LAN. Access Point. Provides network connectivity over wireless media
LAN Technologies 802.11 Wireless LAN Network connectivity to the legacy wired LAN Access Point Desktop with PCI 802.11 LAN card Laptop with PCMCIA 802.11 LAN card Provides network connectivity over wireless
More informationAdd a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)
Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP) Objective A Wireless Access Point (WAP) is a networking device that allows wireless-capable devices to connect to
More informationMulti-Function Gigabit Wireless-N Client Bridge 2.4GHz 300Mbps Client Bridge/AP/ WDS/Repeater
Multi-Function Gigabit Wireless-N Client Bridge 2.4GHz 300Mbps Client Bridge/AP/ WDS/Repeater ECB-9750 ECB-9750 is a powerful and multi-functioned 11n product with 7 major multi-functions, is designed
More informationEAP Wireless Access Point. 2.4 GHz b/g 54 Mbps
EAP-3660 is a small form factor wireless product. It is stylish and looks like a smoke detector on the ceiling. EAP-3660 is a / Repeater / WDS that operates seamlessly in the 2.4 GHz frequency spectrum
More informationIntroduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007
Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 5: Wireless LANs and IEEE 802.11 Part III This lecture completes the study of wireless LANs, looking at the developing and security
More informationWireless High power Multi-function AP
Wireless High power Multi-function AP EAP-3660 2.4GHz Super G 108Mbps Access Point/ WDS/Universal Repeater The EAP-3660 is a smoke detector looking Wireless Access Point / Universal Repeater / WDS that
More informationWireless-G. User Guide. Portable USB Adapter. GHz g WUSB54GP. A Division of Cisco Systems, Inc. WIRELESS. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Portable USB Adapter User Guide Model No. WUSB54GP Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its
More informationKey Features. EnGenius Outdoor CPE design High Power, High Sensitivity and Strong Reliability Solutions under Harsh Environment.
N300 2.4GHz Long Range Point to Point CPE 2.4 GHz 11b/g/n 300Mbps Key Features IEEE 802.11 b/g/n compliant Up to 300Mbps (2.4GHz) 13dBi Directional high gain antenna 24V Proprietary PoE support Waterproof
More informationWireless Local Area Networks (WLAN)
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Wireless Local Area Networks (WLAN) Mobile Communication and Mobile Computing Prof. Dr. Alexander Schill http://www.rn.inf.tu-dresden.de
More informationTable of Contents. Chapter 1Introduction Package Contents Features Specifications Physical Description...
Table of Contents Chapter 1Introduction... 3 1.1 Package Contents... 3 1.2 Features... 3 1.3 Specifications... 3 1.4 Physical Description... 4 Chapter 2Wireless LAN Access Point Connection... 5 Chapter
More information