Similar documents
IEEE Romel Rudyard J. Lucentales, ECE 5

Appendix E Wireless Networking Basics

Wireless Networks

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless# Guide to Wireless Communications. Objectives

COMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Everybody s connecting.

Public Wireless LAN Service.

Wireless technology Principles of Security

WLAN TRENDS. Dong Wang. Prof. Dr. Eduard Heindl 05/27/2009. E-Business Technologies

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

QuickSpecs. HPE OfficeConnect M n Access Point Series. Overview. HPE OfficeConnect M n Access Point Series

Wi-Fi Scanner. Glossary. LizardSystems

Naveen Kumar. 1 Wi-Fi Technology

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson

COPYRIGHTED MATERIAL. Index

Overcoming Concerns about Wireless PACs and I/O in Industrial Automation

Wireless Technologies

Chapter 7. Basic Wireless Concepts and Configuration. Part I

Feature. What exactly is WLAN? More reading:

IEEE n Wireless PCI Adapter. User s Manual

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

802.11ac Wireless Access Point Model WAC104

802.11ac FREQUENTLY ASKED QUESTIONS. May 2012

Configuring a VAP on the WAP351, WAP131, and WAP371

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Wireless Router at Home

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

Chapter 10: Wireless LAN & VLANs

Wireless Attacks and Countermeasures

1. INTRODUCTION. Wi-Fi 1

Product Brief: SDC-EC25N n ExpressCard Card with Integrated Antenna

AC750 Dual Band Wireless-AC Access Point, Router and Repeater - Wall Plug

Product Brief: SDC-PE15N n PCIe Module with Antenna Connectors

Basic Wireless Settings on the CVR100W VPN Router

Introduction Enjoy business-class, high-speed wireless and Bluetooth connectivity on your desktop with the Realtek 8822BE ac PCIe x1 Card.

WHITE PAPER AX WAIT, DID WE JUST BUILD A WIRELESS SWITCH?

Wireless Communication

Wireless Networking Basics. Ed Crowley

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities

Configuring Wireless Security Settings on the RV130W

Wireless LAN Security. Gabriel Clothier

Overview. Back view. Package contents. Linksys WAP300N. Overview

Wireless 300N Access Point 300 Mbps, MIMO, Bridge, Repeater, Multiple SSIDs and VLANs Part No.:

IT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012

Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office

Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE

based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Configuring WEP and WEP Features

Nighthawk AX8/8-stream AX6000 WiFi Router

Leading the New Era of WiFi. Nighthawk AX12/12-stream AX6000 WiFi Router. Data Sheet RAX120

Chapter 24 Wireless Network Security

HP V-M n Access Point Series

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards

Configure n on the WLC

ECB N Multi-Function Gigabit Client Bridge

MR30H. MR30H and Meraki Cloud Management: A Powerful Combination. Robust Feature Set for Multi-dwelling Wireless. Product Highlights

802.11n in the Outdoor Environment

Wireless LAN, i.e

802.11b+g Wireless LAN USB Adapter. User Manual

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Multi-Function Gigabit Wireless-N Client Bridge 2.4GHz 300Mbps Client Bridge/AP/ WDS/Repeater

EAP9550 is a powerful and multi-functioned 11n Access Point

Grandstream Networks, Inc. GWN76XX Series Mesh Network Guide

EnGenius EAP-9550 Indoor Access Point

Introduction Enjoy business-class, high-speed wireless and Bluetooth connectivity on your desktop with the Intel ac PCIe x1 Card.

Wednesday, May 16, 2018

ECB N Multi-Function Client Bridge

Dual Band 11ac/11n 1200 Mbps OUTDOOR WIRELESS Model: GO1200ac

Configuring Cipher Suites and WEP

Wireless Embedded Modules

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Introduction to the EX2

Wi-Fi - Why for? A Word About Spectrum. I T I n f r a s t r u c t u r e S o l u t i o n s

IEEE Contents:-

Wireless Communication and Networking CMPT 371

ExtremeWireless WiNG ac Access Point

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs

802.11n and g Performance Comparison in Office Size for FTP Transmission

CWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ]

IEEE Overview (2)

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

Alternate PHYs

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

AC WiFi Business Access Point WAC510 User Manual

How Does it Work. Presented by StarSight Team

STA-MU-A0028S (MiniCard-USB version)

Overview of Wi-Fi. Dr. Srikanth Subramanian CKO, Nanocell Networks Wi-Fi A Wireless Success Story

Bluetooth SIG Liaison Report May 2009

LESSON 12: WI FI NETWORKS SECURITY

Wireless Standards a, b/g/n, and ac The family explained

Chapter 3 Wireless Configuration

Ubiquiti UniFi UAP-Pro Access Point

Product Brief: SDC-MSD30AG a/g Miniature SDIO Module with Antenna Connectors

Transcription:

Wireless Networking

WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB

802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses the same media access method defined in the original standard. 802.11b products appeared on the market in early 2000, since 802.11b is a direct extension of the modulation technique defined in the original standard. The dramatic increase in throughput of 802.11b (compared to the original standard) along with simultaneous substantial price reductions led to the rapid acceptance of 802.11b as the definitive wireless LAN technology. Devices using 802.11b experience interference from other products operating in the 2.4 GHz band. Devices operating in the 2.4 GHz range include microwave ovens, Bluetooth devices, baby monitors, cordless telephones, and some amateur radio equipment.

802.11a Since the 2.4 GHz band is heavily used to the point of being crowded, using the relatively unused 5 GHz band gives 802.11a a significant advantage. However, this high carrier frequency also brings a disadvantage: the effective overall range of 802.11a is less than that of 802.11b/g. In theory, 802.11a signals are absorbed more readily by walls and other solid objects in their path due to their smaller wavelength, and, as a result, cannot penetrate as far as those of 802.11b. In practice, 802.11b typically has a higher range at low speeds (802.11b will reduce speed to 5.5 Mbit/s or even 1 Mbit/s at low signal strengths). 802.11a also suffers from interference, but locally there may be fewer signals to interfere with, resulting in less interference and better throughput.

802.11g In June 2003, a third modulation standard was ratified: 802.11g. This works in the 2.4 GHz band (like 802.11b), but uses the same OFDM based transmission scheme as 802.11a. It operates at a maximum physical layer bit rate of 54 Mbit/s exclusive of forward error correction codes, or about 22 Mbit/s average throughput. 802.11g hardware is fully backward compatible with 802.11b hardware, and therefore is encumbered with legacy issues that reduce throughput by ~21% when compared to 802.11a. The then-proposed 802.11g standard was rapidly adopted in the market starting in January 2003, well before ratification, due to the desire for higher data rates as well as to reductions in manufacturing costs. By summer 2003, most dual-band 802.11a/b products became dual-band/tri-mode, supporting a and b/g in a single mobile adapter card or access point. Details of making b and g work well together occupied much of the lingering technical process; in an 802.11g network, however, activity of an 802.11b participant will reduce the data rate of the overall 802.11g network.

802.11n 802.11n is an amendment that improves upon the previous 802.11 standards by adding multiple-input multiple-output antennas (MIMO). 802.11n operates on both the 2.4 GHz and the lesser-used 5 GHz bands. Support for 5 GHz bands is optional. It operates at a maximum net data rate from 54 Mbit/s to 600 Mbit/s. The IEEE has approved the amendment, and it was published in October 2009. Prior to the final ratification, enterprises were already migrating to 802.11n networks based on the Wi-Fi Alliance's certification of products conforming to a 2007 draft of the 802.11n proposal.

802.11ac IEEE 802.11ac-2013 is an amendment to IEEE 802.11, published in December 2013, that builds on 802.11n. Changes compared to 802.11n include wider channels (80 or 160 MHz versus 40 MHz) in the 5 GHz band, more spatial streams (up to eight versus four), higher-order modulation (up to 256-QAM vs. 64-QAM), and the addition of Multi-user MIMO (MU-MIMO). As of October 2013, high-end implementations support 80 MHz channels, three spatial streams, and 256-QAM, yielding a data rate of up to 433.3 Mbit/s per spatial stream, 1300 Mbit/s total, in 80 MHz channels in the 5 GHz band. Vendors have announced plans to release so-called "Wave 2" devices with support for 160 MHz channels, four spatial streams, and MU-MIMO in 2014 and 2015.

Infrastructure Mode In the infrastructure mode, the wireless access point converts airwave data into wired Ethernet data, acting as a bridge between the wired LAN and wireless clients. Connecting multiple Access Points via a wired Ethernet backbone can further extend the wireless network coverage.

Ad Hoc Mode In an ad hoc network, computers are brought together as needed; thus, there is no structure or fixed points to the network - each node can generally communicate with any other node. There is no Access Point involved in this configuration. This mode enables you to quickly set up a small wireless workgroup and allows workgroup members to exchange data or share printers as supported by Microsoft networking in the various Windows operating systems. Some vendors also refer to ad hoc networking as peer-to-peer group networking.

Authentication and WEP The absence of a physical connection between nodes makes the wireless links vulnerable to eavesdropping and information theft. To provide a certain level of security, the IEEE 802.11 standard has defined two types of authentication methods : 1 ) Open System Authentication 2 ) Shared Key Authentication With Open System authentication, a wireless PC can join any network and receive any messages that are not encrypted. With Shared Key authentication, only those PCs that possess the correct authentication key can join the network. By default, IEEE 802.11 wireless devices operate in an Open System network.wired Equivalent Privacy (WEP) data encryption is used when the wireless devices are configured to operate in Shared Key authentication mode. There are two shared key methods implemented in most commercially available products, 64-bit and 128-bit WEP data encryption.

WPA The Wi-Fi Alliance intended WPA as an intermediate measure to take the place of WEP pending the availability of the full IEEE 802.11i standard. WPA could be implemented through firmware upgrades on wireless network interface cards designed for WEP that began shipping as far back as 1999. However, since the changes required in the wireless access points (APs) were more extensive than those needed on the network cards, most pre-2003 APs could not be upgraded to support WPA. The WPA protocol implements much of the IEEE 802.11i standard. Specifically, the Temporal Key Integrity Protocol (TKIP) was adopted for WPA. WEP used a 40-bit or 104-bit encryption key that must be manually entered on wireless access points and devices and does not change. TKIP employs a per-packet key, meaning that it dynamically generates a new 128-bit key for each packet and thus prevents the types of attacks that compromised WEP. WPA also includes a message integrity check, which is designed to prevent an attacker from altering and resending data packets. This replaces the cyclic redundancy check (CRC) that was used by the WEP standard. CRC's main flaw was that it did not provide a sufficiently strong data integrity guarantee for the packets it handled. Well tested message authentication codes existed to solve these problems, but they required too much computation to be used on old network cards. WPA uses a message integrity check algorithm called Michael to verify the integrity of the packets. Michael is much stronger than a CRC, but not as strong as the algorithm used in WPA2. Researchers have since discovered a flaw in WPA that relied on older weaknesses in WEP and the limitations of Michael to retrieve the keystream from short packets to use for re-injection and spoofing.

WPA2 WPA2 has replaced WPA. WPA2, which requires testing and certification by the Wi-Fi Alliance, implements the mandatory elements of IEEE 802.11i. In particular, it includes mandatory support for CCMP, an AES-based encryption mode with strong security. Certification began in September, 2004; from March 13, 2006, WPA2 certification is mandatory for all new devices to bear the Wi-Fi trademark

Antennas

Security Issues Hardware authentication (stolen equipment) Can be hacked from miles away Once network access is gained, security can be compromised on servers Protocol weaknesses Denial of service attacks (deauth) Rogue access point

Youtube https://www.youtube.com/watch?v=xmabfjukm dg The WiFi Repeater https://www.youtube.com/watch?v=joorcdu9cu E Cantenna https://www.youtube.com/watch?v=km v8dw0 Po

WiFi Hacking Hacking WEP https://www.youtube.com/watch?v=tipwuykw3uu Hacking WPA2 https://www.youtube.com/watch?v=4tkqkivsdpk Create a Rogue AP https://www.youtube.com/watch?v=blouxuv4vow Computer Hacks https://www.youtube.com/watch?v=ooomqgnvzay

Presentation on WiFi Attacks https://www.youtube.com/watch?v=szroux CD13I