• Like
Slide 1 - classes.bus.oregonstate.edu - /
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Slide 1 - classes.bus.oregonstate.edu - /

  • 221 views
Published

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
221
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
3
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Wireless Technology & Security
  • 2. Wireless Local Area Networks
    • What is the IEEE?
        • Institute of Electrical and Electronics Engineers
        • Not for profit
        • Sets the standards for 802.11
    • What is 802.11?
        • Set of standards for WLAN
        • Progressing with technology
        • Change is denoted with a letter
    http://www.ieee.org/web/aboutus/home/index.html
  • 3. Wi-Fi and 802.11
    • Wi-Fi (wireless fidelity)
      • WLAN products that utilize 802.11 standards
      • Wi-Fi Alliance
        • Oversees tests of product certification
        • Products certified Wi-Fi will work with all 802.11 standards
    http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci838865,00.html
  • 4. Wireless & Business
    • By 2007-2008
      • 65% of enterprises will have wireless applications deployed
      • With mobile devices outnumbering traditional PCs
    -Editors of Computer World
  • 5. By the dollars
    • Total U.S. spending on wireless communications will grow by 9.3% this year, reaching $158.6 billion. It’s predicted to hit $212.5 billion by 2008, with a 10% compound annual growth rate.
    -Editors of Computer World
  • 6. Keys for Growth in Business
    • Improved Security
      • Steve will address specifics
    • Increased Options involving
      • Speed
      • Range
      • Frequency
    -Editors of Computer World
  • 7. 802.11b & a
  • 8. 802.11b & a
    • “a” implemented in 1999
      • After 802.11b, 2.4GHz and 11 Mbps
    • Differences from 802.11b
      • Enhanced data speed to 54 Mbps
      • Operates in the 5 GHz band
        • Less interference
    http://www.computerworld.com http://www.siliconvalley.internet.com
  • 9. 802.11g
  • 10.
    • Speed 54 Mbps
    • Operates in a 2.4 GHz ISM Band
    • Is it better than a or b?
      • Yes and No
    802.11g http://siliconvalley.internet.com
  • 11. Compatibility of 802.11g
    • 802.11b
    • a,b, and g
      • Combination
      • More expensive
    http://www.computerworld.com
  • 12. Disadvantages of 802.11g
    • Range can be reduced.
      • Radio Frequency
    • Only has 3 fully non-overlapping channels.
      • Others can handle up to 11
    • Before this standard was fully ratified, 802.11n was already being discussed.
    http://siliconvalley.internet.com http://www.computerowrld.com
  • 13. Advantages of 802.11g
    • Compatibility
      • “ Ultimately it takes the guesswork away from the user.” –Ben Worthen
      • It’s a “life extension” of 802.11b
    • Higher speeds with little price increase.
    • Use it when greater coverage is needed and cost is a big factor.
    http://www.cio.com
  • 14. 802.11n
  • 15. Definition
    • 802.11n is a newer standard
    • Proper name = IEEE (International Institute of Electrical and Electronics Engineers)
    • The number “11” indicates the IEEE working group within this body, known as TGn.
    http://www.wisegeek.com/what-is-80211n.htm
  • 16. Wireless LAN Throughput by IEEE Standard 100 Mbps 200+ Mbps 802.11n 25 Mbps 54 Mbps 802.11a 25 Mbps (when .11b is not present) 54 Mbps 802.11g 5 Mbps 11 Mbps 802.11b Media Access Control Layer, Service Access Point (MAC SAP) Estimates Over-the-Air (OTA) Estimates IEEE WLAN Standard
  • 17. The hope of implementing 802.11n is so that consumers may be able to use more of a range of products.
    • HDTV
    • Streaming videos
    • Other consumer electonics
    • Personal computing
    • Hand held platforms
  • 18. Where can it be used if implemented?
    • All major environments including:
      • Enterprises
      • Households
          • Wireless Networks
      • Public hotspots
          • Coffee Houses (Starbucks, Internet Cafes)
          • Pizza Parlors (American Dream)
          • Schools (OSU entire campus)
  • 19. What is a hotspot?
    • Hotspot =
      • Public Area
      • Wireless network connections to the internet
      • NIC = Network Interface Card
      • Have to ask permission to log onto the network
      • Sometimes is free other times costs a small fee (i.e. Starbucks)
    • http://www.wisegeek.com/what-is-a-hotspot.htm
  • 20. Current Status of 802.11n
    • Meeting in January 2006 in Kona, Hawaii
    • Wave of the future
    • Price range of $89.50 - $159.00
        • Only for a pre-N router
  • 21. Benefits of 802.11n
    • The connection speed is really fast
    • It has a great, wide reaching range
    • Comes with software that is compatible with both Windows and Macintoshes.
  • 22. Disadvantages of 802.11n
    • It is very expensive as compared with the other routers for b/a/g
    • Requires a MIMO adapter to be able to use it full potential.
    • http://google-cnet.com/4014-3319_9-30993672.html?part=google-cnet&subj=103011980&tag=103011980
  • 23.
    • Have the best of the best!!!
  • 24. Wireless Security References: www.wifi-planet.com www.wikipedia.org www.tomsnetworking.com http://engr.oregonstate.edu/computing/
  • 25. Protecting Access and Signal
    • Wireless Security needs to protect two separate parts of the wireless network.
      • Access – Control who can access the network
      • Signal – Control who can read the signal.
  • 26. Controlling Access
    • End to End Encryption
      • MAC Filtering
        • Controlling which devices can “Log on” to the network
        • This method can be hacked using a MAC Spoof
          • (kind of like identity theft for wireless computers)
      • SSID Broadcasting
        • Do not broadcast the SSID (Service Set Identifier)
        • If the hackers cannot see your network, it is harder to get into
      • One example of end to end encryption is online banking. Ever notice the https?
        • https://www.bankofamerica.com
  • 27. Controlling the signal
    • WEP – Wireless Equivalent Privacy
      • 64 or 128 bit encryption.
      • Very easy to break.
      • FBI demonstrated a 3 minute breach using common hacking software 1
    • WPA – Wifi Protected Access
      • This adds additional security features to WEP.
      • Much harder to crack and can use a pre-shared key (PSK)
        • Like a secret password
      • Based on the 801.11i standard
    • WPA2 – WPA with AES
      • (Advanced Encryption Standard)
      • Algorithm from WPA is replaced by a message authentication code, CCMP
  • 28. Other ways to get secured
    • VPN – Virtual Private Network
      • Two types – Secure and Unsecured
    • Secured VPN
      • uses cryptographic tunneling protocols to provide the necessary confidentiality (preventing snooping ), sender authentication (preventing identity spoofing ), and message integrity (preventing message alteration) to achieve the privacy intended. When properly chosen, implemented, and used, such techniques can provide secure communications over unsecured networks
  • 29. Connecting to OSU_PUB Domain
    • Enable Wireless LAN on your device
    • Go to the internet
    • Browser will redirect you to the wireless security page for OSU (See next page)
    • Enter login information (See next page)
    • Enter computer information (See next page)
    • Quit browser (15-20 min)
    • Surf
    • Your computer is now permanently registered with OSU (College of Engineering)
  • 30.  
  • 31.  
  • 32. Questions?