SlideShare a Scribd company logo
1 of 6
Download to read offline
Wireless Technology
Wireless Technology
Wireless networks come in many different forms, cover various distances, and provide a range of low to
high bandwidth depending on the type installed. Wireless LAN – Wireless LAN enable Laptop users to
access the Network of a company.
Basic Wireless Devices
1. Wireless Access Points,
2. Wireless Network Interface Card (WNIC),
3. Wireless Antennas.
 Wireless Access Points
In the wireless networks, you’ll find a central component such as a switch that’s there to connect
hosts together and allow them to communicate with each other.
Only that device is known as a wireless access point (AP) instead.
 Wireless Network Interface Card (WNIC)
Every host you want to connect to a wireless network needs a wireless network interface card
(WNIC) to do so. Basically, a wireless NIC does the same job as a traditional Ethernet NIC, only
instead of having a socket/port to plug a cable into; the wireless NIC has a radio antenna. It
would be difficult to buy a laptop today without a wireless card already built in.
 Wireless Antennas
Wireless antennas work with both transmitters and receivers. There are two broad classes of
antennas on the market today: omnidirectional (or). Wireless access points have at least one
antenna. Usually there’s two for better reception (referred to as diversity) and an Ethernet port
to connect them to a wired network.
Wireless Standards (The 802.11 Standards)
Standard Speed Frequency (GHZ) Segment Length
802.11b 11 Mbps 2.4 150 to 350 m
802.11a 54 Mbps 5 75 to 175 m
802.11g 54 Mbps 2.4 100 to 300 m
802.11n 74 Mbps 2.4/5 250 to 300 m
Wireless Technology
Wireless Topologies
Now that I’ve discussed the very basics of wireless devices used in today’s simple networks, I want to
describe the different types of networks you’ll run across or design and implement as your wireless
networks grow.
These include the following:
1. IBSS
2. BSS
3. ESS
 Independent Basic Service Set (Ad Hoc) (IBSS)
Using an ad hoc network is the easiest way to install wireless 802.11 devices. In this mode, the
wireless NICs (or other devices) can communicate directly without the need for an AP.
Wireless Technology
 Basic Service Set (BSS)
A basic service set (BSS) is the area, or cell, defined by the wireless signal served by the AP. It can
also be called a basic service area (BSA) and the two terms, BSS and BSA, can be interchangeable.
Even so, BSS is the term most commonly used to define the cell area.
 Extended Service Set (ESS)
A good thing to know is that if you set all your access points to the same SSID, mobile wireless
clients can roam around freely within the same network. This is the most common wireless
network design you’ll find in today’s corporate settings.
Doing this creates something called an extended service set (ESS), which provides more coverage
than a single access point and allows users to roam from one AP to another without having their
host disconnected from the network. This design creates the ability to move more or less
seamlessly from one AP to another. APs configured with the same SSIDs in an office, thereby
creating the ESS network.
NOTE:- ( SSID is a basic name that defines the BSA transmitted from the AP. You’ve probably seen
that name pop up on your host when looking for a wireless network. The SSID can be up to 32
characters long. It normally consists of human readable ASCII characters, but the standard doesn’t
require this. The SSID is defined as a sequence of 1 to 32 octets, each of which may take any value.)
Wireless Technology
Wireless Security
 Open Access
All Wi-Fi Certified wireless LAN products are shipped in “open-access” mode, with their security
features turned off. While open access or no security may be appropriate and acceptable for
public hot spots such as coffee shops, college campuses, and maybe airports, it’s definitely not
an option for an enterprise organization, and likely not even adequate for your private home
network.
 SSIDs, WEP, and MAC Address Authentication
SSID Authentication- Two types of authentication were specified by the IEEE 802.11
committee: open authentication and shared-key authentication. Open authentication involves
little more than supplying the correct SSID—but it’s the most common method in use today.
WEP Authentication- WEP is a type of shared-key authentication With shared-key
authentication, the access point sends the client device a challenge-text packet that the client
Wireless Technology
must then encrypt with the correct Wired Equivalency Privacy (WEP) key and return to the
access point. Without the correct key, authentication will fail and the client won’t be allowed to
associate with the access point. Without the correct key, authentication will fail and the client
won’t be allowed to associate with the access point
MAC Address Authentication- Last, client MAC addresses can be statically typed into each
access point, and any of them that show up without that MAC addresses in the filter table would
be denied access. Sounds good, but of course all MAC layer information must be sent in the
clear—anyone equipped with a free wireless sniffer can just read the client packets sent to the
access point and spoof their MAC address.
NOTE:-
Encryption Methods
There are two basic types of encryption methods used in most wireless networks today:
TKIP and AES. We’ll cover TKIP first
Temporal Key Integrity Protocol (TKIP):- Temporal Key Integrity Protocol (TKIP)
which is based on the RC4 encryption algorithm. TKIP first gained respect in the
WLAN world due to the protections it affords the authentication process, but it is
also used after that completes to encrypt the data traffic thereafter.
Advanced Encryption Standard (AES):- Both WPA/2 and the 802.11i standard call
for the use of 128-bit Advanced Encryption Standard (AES) for data encryption.
It’s widely considered the best encryption available today and has been approved
by the National Institute of Standards and Technology (NIST). It’s also referred to
as AES-CCMP, or AES Counter Mode with CBC-MAC authentication.
 Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access (WPA) is a standard testing specification developed in 2003 by the Wi-Fi
Alliance, formerly known as the Wireless Ethernet Compatibility Alliance (WECA). WPA provides
a standard for authentication and encryption of WLANs that’s intended to solve known security
problems existing up to and including the year 2003. WPA is a step toward the IEEE 802.11i
standard and uses many of the same components, with the exception of encryption—802.11i
uses AES encryption.
Wireless Technology
WPA or WPA2 Pre-Shared Key
WPA or WPA2Pre-Shared Key (PSK) is a better form of wireless security than any other basic
wireless security method mentioned so far.
WPA or WPA2 Enterprise
WPA and WPA2 support an enterprise authentication method. This is called Extensible
Authentication Protocol (EAP). Understand that EAP isn’t a single method, but a framework that
enhances the existing 802.1x framework.

More Related Content

What's hot

183492595 md.jiarul islam(CSE 318)
183492595 md.jiarul islam(CSE 318)183492595 md.jiarul islam(CSE 318)
183492595 md.jiarul islam(CSE 318)MdJiarulIslam
 
CSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKCSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKMarvin Bronoso
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routersAdrian Suarez
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipAtika Zaimi
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
 
Networking Basics and Cisco
Networking Basics and CiscoNetworking Basics and Cisco
Networking Basics and CiscoShoaib Iqbal
 
Wireless routers Presentation
Wireless routers PresentationWireless routers Presentation
Wireless routers PresentationFahd Allebdi
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORTRajat Kumar
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)junnubabu
 

What's hot (20)

183492595 md.jiarul islam(CSE 318)
183492595 md.jiarul islam(CSE 318)183492595 md.jiarul islam(CSE 318)
183492595 md.jiarul islam(CSE 318)
 
Lan
LanLan
Lan
 
Midterm exam-css
Midterm exam-cssMidterm exam-css
Midterm exam-css
 
Ip Address
Ip AddressIp Address
Ip Address
 
CSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKCSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORK
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routers
 
LAN,MAN,WAN & MAC Address
LAN,MAN,WAN & MAC AddressLAN,MAN,WAN & MAC Address
LAN,MAN,WAN & MAC Address
 
Wlan
WlanWlan
Wlan
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)
 
Networking Basics and Cisco
Networking Basics and CiscoNetworking Basics and Cisco
Networking Basics and Cisco
 
Networking
NetworkingNetworking
Networking
 
Networking
NetworkingNetworking
Networking
 
IP classes
IP classesIP classes
IP classes
 
Wireless routers Presentation
Wireless routers PresentationWireless routers Presentation
Wireless routers Presentation
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
IP and MAC Address
IP and MAC AddressIP and MAC Address
IP and MAC Address
 

Viewers also liked

Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiNetwax Lab
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunkingNetwax Lab
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failoverNetwax Lab
 
Eincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing ProtocolsEincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing ProtocolsNetwax Lab
 
Securing Switch Access
Securing Switch Access Securing Switch Access
Securing Switch Access Netwax Lab
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNetwax Lab
 
Eincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP iiEincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP iiNetwax Lab
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access listNetwax Lab
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Netwax Lab
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNetwax Lab
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionNetwax Lab
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Netwax Lab
 
Eincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiEincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiNetwax Lab
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNetwax Lab
 
Eincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiEincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiNetwax Lab
 

Viewers also liked (20)

SSL Web VPN
SSL Web VPNSSL Web VPN
SSL Web VPN
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iii
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
 
Eincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing ProtocolsEincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing Protocols
 
Switching
SwitchingSwitching
Switching
 
Securing Switch Access
Securing Switch Access Securing Switch Access
Securing Switch Access
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
 
Eincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP iiEincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP ii
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access list
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asa
 
Remote VPN
Remote VPNRemote VPN
Remote VPN
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2
 
Eincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiEincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List ii
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asa
 
Eincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiEincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking ii
 

Similar to Wireless Technology

Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Northridge Consulting Group Case Project
Northridge Consulting Group Case ProjectNorthridge Consulting Group Case Project
Northridge Consulting Group Case Projectedwardlong
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networkingM Sabir Saeed
 
Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...
Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...
Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...redfoxtrapper
 
Attacking Automatic Wireless Network Selection
Attacking Automatic Wireless Network SelectionAttacking Automatic Wireless Network Selection
Attacking Automatic Wireless Network SelectionRenee Lewis
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.pptSagarBedarkar3
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyahSeptafiansyah P
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEric Vanderburg
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxalanfhall8953
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communicationJigsAshley
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comphanleson
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiAgreeta Sharma
 
Wk 7 Assignment Mac Layer Presentation
Wk 7 Assignment   Mac Layer PresentationWk 7 Assignment   Mac Layer Presentation
Wk 7 Assignment Mac Layer PresentationOcy Onyemachi
 
wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 

Similar to Wireless Technology (20)

Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Northridge Consulting Group Case Project
Northridge Consulting Group Case ProjectNorthridge Consulting Group Case Project
Northridge Consulting Group Case Project
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...
Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...
Wasson Week 7 Assignment For Northridge Consulting Group Power Point Presenta...
 
Attacking Automatic Wireless Network Selection
Attacking Automatic Wireless Network SelectionAttacking Automatic Wireless Network Selection
Attacking Automatic Wireless Network Selection
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.ppt
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyah
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi Fi
 
Wk 7 Assignment Mac Layer Presentation
Wk 7 Assignment   Mac Layer PresentationWk 7 Assignment   Mac Layer Presentation
Wk 7 Assignment Mac Layer Presentation
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Wireless Router: This is how it Benefits
Wireless Router: This is how it BenefitsWireless Router: This is how it Benefits
Wireless Router: This is how it Benefits
 

More from Netwax Lab

Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeNetwax Lab
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Netwax Lab
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionNetwax Lab
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewallNetwax Lab
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting Netwax Lab
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Netwax Lab
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cliNetwax Lab
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iiiNetwax Lab
 
Kerberos Protocol
Kerberos ProtocolKerberos Protocol
Kerberos ProtocolNetwax Lab
 
Radius vs. Tacacs+
Radius vs. Tacacs+Radius vs. Tacacs+
Radius vs. Tacacs+Netwax Lab
 
TACACS Protocol
TACACS ProtocolTACACS Protocol
TACACS ProtocolNetwax Lab
 
Radius Protocol
Radius ProtocolRadius Protocol
Radius ProtocolNetwax Lab
 

More from Netwax Lab (14)

Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cli
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
 
Nxll23 i pv6
Nxll23 i pv6Nxll23 i pv6
Nxll23 i pv6
 
Nxll24 i pv6
Nxll24 i pv6Nxll24 i pv6
Nxll24 i pv6
 
Kerberos Protocol
Kerberos ProtocolKerberos Protocol
Kerberos Protocol
 
Radius vs. Tacacs+
Radius vs. Tacacs+Radius vs. Tacacs+
Radius vs. Tacacs+
 
TACACS Protocol
TACACS ProtocolTACACS Protocol
TACACS Protocol
 
Radius Protocol
Radius ProtocolRadius Protocol
Radius Protocol
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Wireless Technology

  • 1. Wireless Technology Wireless Technology Wireless networks come in many different forms, cover various distances, and provide a range of low to high bandwidth depending on the type installed. Wireless LAN – Wireless LAN enable Laptop users to access the Network of a company. Basic Wireless Devices 1. Wireless Access Points, 2. Wireless Network Interface Card (WNIC), 3. Wireless Antennas.  Wireless Access Points In the wireless networks, you’ll find a central component such as a switch that’s there to connect hosts together and allow them to communicate with each other. Only that device is known as a wireless access point (AP) instead.  Wireless Network Interface Card (WNIC) Every host you want to connect to a wireless network needs a wireless network interface card (WNIC) to do so. Basically, a wireless NIC does the same job as a traditional Ethernet NIC, only instead of having a socket/port to plug a cable into; the wireless NIC has a radio antenna. It would be difficult to buy a laptop today without a wireless card already built in.  Wireless Antennas Wireless antennas work with both transmitters and receivers. There are two broad classes of antennas on the market today: omnidirectional (or). Wireless access points have at least one antenna. Usually there’s two for better reception (referred to as diversity) and an Ethernet port to connect them to a wired network. Wireless Standards (The 802.11 Standards) Standard Speed Frequency (GHZ) Segment Length 802.11b 11 Mbps 2.4 150 to 350 m 802.11a 54 Mbps 5 75 to 175 m 802.11g 54 Mbps 2.4 100 to 300 m 802.11n 74 Mbps 2.4/5 250 to 300 m
  • 2. Wireless Technology Wireless Topologies Now that I’ve discussed the very basics of wireless devices used in today’s simple networks, I want to describe the different types of networks you’ll run across or design and implement as your wireless networks grow. These include the following: 1. IBSS 2. BSS 3. ESS  Independent Basic Service Set (Ad Hoc) (IBSS) Using an ad hoc network is the easiest way to install wireless 802.11 devices. In this mode, the wireless NICs (or other devices) can communicate directly without the need for an AP.
  • 3. Wireless Technology  Basic Service Set (BSS) A basic service set (BSS) is the area, or cell, defined by the wireless signal served by the AP. It can also be called a basic service area (BSA) and the two terms, BSS and BSA, can be interchangeable. Even so, BSS is the term most commonly used to define the cell area.  Extended Service Set (ESS) A good thing to know is that if you set all your access points to the same SSID, mobile wireless clients can roam around freely within the same network. This is the most common wireless network design you’ll find in today’s corporate settings. Doing this creates something called an extended service set (ESS), which provides more coverage than a single access point and allows users to roam from one AP to another without having their host disconnected from the network. This design creates the ability to move more or less seamlessly from one AP to another. APs configured with the same SSIDs in an office, thereby creating the ESS network. NOTE:- ( SSID is a basic name that defines the BSA transmitted from the AP. You’ve probably seen that name pop up on your host when looking for a wireless network. The SSID can be up to 32 characters long. It normally consists of human readable ASCII characters, but the standard doesn’t require this. The SSID is defined as a sequence of 1 to 32 octets, each of which may take any value.)
  • 4. Wireless Technology Wireless Security  Open Access All Wi-Fi Certified wireless LAN products are shipped in “open-access” mode, with their security features turned off. While open access or no security may be appropriate and acceptable for public hot spots such as coffee shops, college campuses, and maybe airports, it’s definitely not an option for an enterprise organization, and likely not even adequate for your private home network.  SSIDs, WEP, and MAC Address Authentication SSID Authentication- Two types of authentication were specified by the IEEE 802.11 committee: open authentication and shared-key authentication. Open authentication involves little more than supplying the correct SSID—but it’s the most common method in use today. WEP Authentication- WEP is a type of shared-key authentication With shared-key authentication, the access point sends the client device a challenge-text packet that the client
  • 5. Wireless Technology must then encrypt with the correct Wired Equivalency Privacy (WEP) key and return to the access point. Without the correct key, authentication will fail and the client won’t be allowed to associate with the access point. Without the correct key, authentication will fail and the client won’t be allowed to associate with the access point MAC Address Authentication- Last, client MAC addresses can be statically typed into each access point, and any of them that show up without that MAC addresses in the filter table would be denied access. Sounds good, but of course all MAC layer information must be sent in the clear—anyone equipped with a free wireless sniffer can just read the client packets sent to the access point and spoof their MAC address. NOTE:- Encryption Methods There are two basic types of encryption methods used in most wireless networks today: TKIP and AES. We’ll cover TKIP first Temporal Key Integrity Protocol (TKIP):- Temporal Key Integrity Protocol (TKIP) which is based on the RC4 encryption algorithm. TKIP first gained respect in the WLAN world due to the protections it affords the authentication process, but it is also used after that completes to encrypt the data traffic thereafter. Advanced Encryption Standard (AES):- Both WPA/2 and the 802.11i standard call for the use of 128-bit Advanced Encryption Standard (AES) for data encryption. It’s widely considered the best encryption available today and has been approved by the National Institute of Standards and Technology (NIST). It’s also referred to as AES-CCMP, or AES Counter Mode with CBC-MAC authentication.  Wi-Fi Protected Access (WPA) Wi-Fi Protected Access (WPA) is a standard testing specification developed in 2003 by the Wi-Fi Alliance, formerly known as the Wireless Ethernet Compatibility Alliance (WECA). WPA provides a standard for authentication and encryption of WLANs that’s intended to solve known security problems existing up to and including the year 2003. WPA is a step toward the IEEE 802.11i standard and uses many of the same components, with the exception of encryption—802.11i uses AES encryption.
  • 6. Wireless Technology WPA or WPA2 Pre-Shared Key WPA or WPA2Pre-Shared Key (PSK) is a better form of wireless security than any other basic wireless security method mentioned so far. WPA or WPA2 Enterprise WPA and WPA2 support an enterprise authentication method. This is called Extensible Authentication Protocol (EAP). Understand that EAP isn’t a single method, but a framework that enhances the existing 802.1x framework.