0
Northeastern Illinois University   WIRELESS LOCAL AREA NETWORK
Authors <ul><li>  </li></ul><ul><li>Salwa Abdelrahim </li></ul><ul><li>Samia  Nur Eldayim </li></ul><ul><li>Supervisor  Pr...
Introduction <ul><li>Who are we ? </li></ul><ul><li>What is the project about? </li></ul><ul><li>Presentation highlights. ...
Wireless Networking <ul><li>What is Wireless Local Area Network (WLAN)? </li></ul>
Differences between WLANs and LANs <ul><li>Privacy issues. </li></ul><ul><li>Connectivity issues. </li></ul><ul><li>Mobili...
Similarities between LAN and WLAN <ul><li>Same Ethernet standard. </li></ul><ul><li>Share common network Protocols. </li><...
Why Wireless? <ul><li>Mobility  </li></ul><ul><li>Flexibility </li></ul><ul><li>Ease and Speed of Deployment </li></ul><ul...
Wireless Local Area Network (WLAN) Standards <ul><li>IEEE 802.11 Standard. </li></ul><ul><li>What Exactly Does 802.11 Defi...
802.11 a/b/g  Less devices to choose from, more expensive, interference Expensive, not compatible with 802.11b and 802.11 ...
Security options <ul><li>MAC filtering </li></ul><ul><li>Disabled clients </li></ul><ul><li>Local authentication </li></ul...
Security strategy  <ul><li>open Authentication </li></ul><ul><li>pre- shared key authentication (WEP) </li></ul><ul><li>we...
WEP vs WPA  Strong user authentication, utilizing 802.1x and EAP. Flawed, used WEP key itself for authentication Authentic...
WPA vs WPA2 Authentication: PSK Encryption: AES-CCMP Authentication: PSK Encryption: TKIP /MIC Personal Mode (SOHO/persona...
Open Area Vs Closed area. <ul><li>802.11 signal range in a free space incur minimum or no loss e.g. a warehouse. </li></ul...
Obstruction loss of 3.0 DB or more 20.00 Basement walls 10.00 Exterior walls 5.00 Metal partitions 3.00 Fixed walls Loss (...
WLAN Setup steps <ul><li>Define Requirements. </li></ul><ul><li>Design. </li></ul><ul><li>Perform site survey. </li></ul><...
Deployment
Site Survey <ul><li>Preliminary plan. </li></ul><ul><li>System requirements. </li></ul><ul><li>Analysis features: </li></u...
Received signal strength intensity
Campus Project <ul><li>Available Technologies in the market e.g. Cisco, Alcatel, Aruba, etc. </li></ul><ul><li>Why did we ...
Access points (AP) mounting considerations <ul><li>Mount AP standing or hanging either straight up or down and above obstr...
Continue AP mounting <ul><li>Position AP in the center of covered area. </li></ul><ul><li>Do not position the AP more than...
AP Approach to contain Vulnerability and unauthorized access  <ul><li>Avoid placing AP against exterior walls or windows t...
Steps and tools for WPA and WPA2 Deployment <ul><li>Security mechanism and credentials. </li></ul><ul><li>User authenticat...
Switch administration <ul><li>Switch features. </li></ul><ul><li>Switch configuration management. </li></ul><ul><ul><li>Us...
Monitor Menu
Wlan Menu <ul><li>New SSID being created </li></ul>
Conclusion  <ul><li>Designing a wireless network is not an easy task. Many wireless attributes should be considered throug...
Cont, <ul><li>As wireless regulations continually change it is important to reference the activities of the regularity com...
Cont, <ul><li>WPA enhances data protection and access control on existing and future WI-FI wlan. </li></ul><ul><li>WPA2 pr...
Recommendations <ul><li>Alcatel with POE.  </li></ul><ul><li>Deploy Wlan in NEIU using WPA and WPA2. </li></ul><ul><li>Per...
References <ul><li>Alcatel  internetworking,Inc. Omni Access 4000/4100 introduction, installation, administration and main...
Questions?
Upcoming SlideShare
Loading in...5
×

Northeastern Illinois University (WLAN) WIRELESS LOCAL AREA ...

637

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
637
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • With the increased reliance on wireless LANs (WLAN), businesses are becoming more concerned about network security, network manager need to provide end users with freedom and mobility without offering intruders access to the WLAN or the information sent and received on the wireless network
  • Transcript of "Northeastern Illinois University (WLAN) WIRELESS LOCAL AREA ..."

    1. 1. Northeastern Illinois University WIRELESS LOCAL AREA NETWORK
    2. 2. Authors <ul><li> </li></ul><ul><li>Salwa Abdelrahim </li></ul><ul><li>Samia Nur Eldayim </li></ul><ul><li>Supervisor Prof. Cafatori </li></ul>
    3. 3. Introduction <ul><li>Who are we ? </li></ul><ul><li>What is the project about? </li></ul><ul><li>Presentation highlights. </li></ul>
    4. 4. Wireless Networking <ul><li>What is Wireless Local Area Network (WLAN)? </li></ul>
    5. 5. Differences between WLANs and LANs <ul><li>Privacy issues. </li></ul><ul><li>Connectivity issues. </li></ul><ul><li>Mobility. </li></ul><ul><li>National regulatory requirements. </li></ul>
    6. 6. Similarities between LAN and WLAN <ul><li>Same Ethernet standard. </li></ul><ul><li>Share common network Protocols. </li></ul>
    7. 7. Why Wireless? <ul><li>Mobility </li></ul><ul><li>Flexibility </li></ul><ul><li>Ease and Speed of Deployment </li></ul><ul><li>Cost Saving </li></ul><ul><li>Scalability </li></ul>
    8. 8. Wireless Local Area Network (WLAN) Standards <ul><li>IEEE 802.11 Standard. </li></ul><ul><li>What Exactly Does 802.11 Define? </li></ul><ul><li>IEEE WLAN Standards. </li></ul><ul><li>Decision on Which WLAN Hardware is Best. </li></ul><ul><li>Update on New Standards. </li></ul>
    9. 9. 802.11 a/b/g Less devices to choose from, more expensive, interference Expensive, not compatible with 802.11b and 802.11 g, shorter range Limited bandwidth, interference Weaknesses Faster than and compatible with 802.11b, price going down Faster than 802.11b, less interference Less expensive, most widely installed base Strengths 300-500 ft 100-164 ft 300-500 ft Coverage (inside) 32 Mbps 32 Mbps 6 Mbps Optimal throughput 20 Mbps 20 Mbps 4-5 Mbps Typical link speed 54 Mbps 54 Mbps 11 Mbps Maximum link speed 2.4 GHz 5 GHz 2.4 GHz Frequency 802.11g 802.11a 802.11b
    10. 10. Security options <ul><li>MAC filtering </li></ul><ul><li>Disabled clients </li></ul><ul><li>Local authentication </li></ul><ul><li>Radius authentication </li></ul><ul><li>Access control list </li></ul>
    11. 11. Security strategy <ul><li>open Authentication </li></ul><ul><li>pre- shared key authentication (WEP) </li></ul><ul><li>web authentication </li></ul><ul><li>public key infrastructure (PKI) </li></ul><ul><li>802.1X </li></ul><ul><li>WI-FI protected access authentication: </li></ul><ul><ul><li>WPA </li></ul></ul><ul><ul><li>WPA2 (802.11i) </li></ul></ul>
    12. 12. WEP vs WPA Strong user authentication, utilizing 802.1x and EAP. Flawed, used WEP key itself for authentication Authentication Automatic distribution of keys Manual distribution of keys- hand typed into each device. Dynamic session keys. Per user, per session, per packet keys. Static- same key used by every one on the network. 128-bit keys 40-bit keys Fixes all WEP flaws Flawed, cracked by scientist and hackers Encryption WPA WEP
    13. 13. WPA vs WPA2 Authentication: PSK Encryption: AES-CCMP Authentication: PSK Encryption: TKIP /MIC Personal Mode (SOHO/personal) Authentication: IEEE 802.1x /EAP Encryption: AES-CCMP Authentication: IEEE 802.1x /EAP Encryption: TKIP /MIC Enterprise mode (Business and Government) WPA2 WPA
    14. 14. Open Area Vs Closed area. <ul><li>802.11 signal range in a free space incur minimum or no loss e.g. a warehouse. </li></ul><ul><li>Caution is needed when there are some obstructions in the area e.g. campus buildings. </li></ul><ul><li>Loss of 3 db means half of the transmission has been lost. </li></ul>
    15. 15. Obstruction loss of 3.0 DB or more 20.00 Basement walls 10.00 Exterior walls 5.00 Metal partitions 3.00 Fixed walls Loss (DB) Partition
    16. 16. WLAN Setup steps <ul><li>Define Requirements. </li></ul><ul><li>Design. </li></ul><ul><li>Perform site survey. </li></ul><ul><li>Deployment. </li></ul><ul><li>Improve the network based site survey results. </li></ul><ul><li>Periodic site survey. </li></ul>
    17. 17. Deployment
    18. 18. Site Survey <ul><li>Preliminary plan. </li></ul><ul><li>System requirements. </li></ul><ul><li>Analysis features: </li></ul><ul><li>- Access point location. </li></ul><ul><li>- Signal strength. </li></ul><ul><li>- Strongest Access point. </li></ul><ul><li>- SNR. </li></ul><ul><li>- Interference. </li></ul><ul><li>- Transmission Speed. </li></ul><ul><li>- Signals at channels. </li></ul><ul><li>- Access point placement tips. </li></ul><ul><li>- Access point count. </li></ul>
    19. 19. Received signal strength intensity
    20. 20. Campus Project <ul><li>Available Technologies in the market e.g. Cisco, Alcatel, Aruba, etc. </li></ul><ul><li>Why did we choose Alcatel Technologies. </li></ul><ul><li>Components Required: </li></ul><ul><li>-Existing network infrastructure. </li></ul><ul><li>DHCP, AAA,DNS,VPN. </li></ul><ul><li>-Clients (PC, PDA, Handset, etc). </li></ul><ul><li>-Access points. </li></ul><ul><li>- WLAN switches. </li></ul>
    21. 21. Access points (AP) mounting considerations <ul><li>Mount AP standing or hanging either straight up or down and above obstructions. </li></ul><ul><li>Consider the antenna gain when mounting for proper radio orientation. </li></ul><ul><li>Mount AP in the same location as clients. </li></ul>
    22. 22. Continue AP mounting <ul><li>Position AP in the center of covered area. </li></ul><ul><li>Do not position the AP more than 140 feet apart or higher than 16 feet. </li></ul><ul><li>Do not mount the AP within 3 feet of any metal obstruction e.g. metal ducts, electric conduit, water pipes, elevator shafts and metal walls. </li></ul>
    23. 23. AP Approach to contain Vulnerability and unauthorized access <ul><li>Avoid placing AP against exterior walls or windows to avoid leak. </li></ul><ul><li>Reduce the broadcast strength of AP to keep within the area of coverage and avoid parking lot coverage. </li></ul><ul><li>Change the default SSID and allow AP’s to broadcast their SSID. </li></ul><ul><li>Change default management password on AP’s. </li></ul>
    24. 24. Steps and tools for WPA and WPA2 Deployment <ul><li>Security mechanism and credentials. </li></ul><ul><li>User authentication database. </li></ul><ul><li>Client operating system. </li></ul><ul><li>Supplicants. </li></ul><ul><li>EAP types. </li></ul><ul><li>Authentication server. </li></ul><ul><li>Access points and clients NIC card. </li></ul>
    25. 25. Switch administration <ul><li>Switch features. </li></ul><ul><li>Switch configuration management. </li></ul><ul><ul><li>Using CLI. </li></ul></ul><ul><ul><li>Using switch web interface. </li></ul></ul>
    26. 26. Monitor Menu
    27. 27. Wlan Menu <ul><li>New SSID being created </li></ul>
    28. 28. Conclusion <ul><li>Designing a wireless network is not an easy task. Many wireless attributes should be considered throughout the design process: </li></ul><ul><li>Following the steps needed to setup a wireless local area network. </li></ul><ul><li>Making the right decision in choosing the appropriate hardware and software which are suitable to the coverage area. </li></ul>
    29. 29. Cont, <ul><li>As wireless regulations continually change it is important to reference the activities of the regularity committees before designing WLAN, nationally this include the Federal Communications Commission (FCC) and National Telecommunications and Information Administration (NTIA). </li></ul>
    30. 30. Cont, <ul><li>WPA enhances data protection and access control on existing and future WI-FI wlan. </li></ul><ul><li>WPA2 provides improved encryption with AES and a high level of assurance. </li></ul><ul><li>WPA2 able to meet government and enterprise security requirements. </li></ul>
    31. 31. Recommendations <ul><li>Alcatel with POE. </li></ul><ul><li>Deploy Wlan in NEIU using WPA and WPA2. </li></ul><ul><li>Periodic site survey. </li></ul><ul><li>Documentations for deployment and trouble shouting. </li></ul><ul><li>Implement the complete site survey recommendations for AP count. </li></ul>
    32. 32. References <ul><li>Alcatel internetworking,Inc. Omni Access 4000/4100 introduction, installation, administration and maintenance Student guide 2.0.2 </li></ul><ul><li>Arunesh Mishra, William A.Arbaugh, An initial security Analysis of the IEEE802.1x standard, 6 Feb 2002 </li></ul><ul><li>Jeffrey Wheat, Designing a wireless network Mattbews.Gast,802.11 wireless network </li></ul><ul><li>www.cisco.com, wi fi protected access,WPA2 and IEEE 802.11i </li></ul><ul><li>www.wi-fi.org , Deploying wi fi protected access (WPA) and (WPA2) IN THE Enterprise, March 2005 </li></ul><ul><li>www.wi-fi.org , Enterprise solutions for wireless LAN security , wi-fi Alliance Feb 6 2003 </li></ul><ul><li>www.wi-fi.org , wi-fi protected access, strong standards-based, interoperable security for today wi-fi networks , wi-fi Alliance April 29,2003 </li></ul><ul><li>15 www.wi-fi.org/open section/ secure.asp TID = 2 wi-fi security </li></ul>
    33. 33. Questions?
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×