SlideShare a Scribd company logo
1 of 24
WIRELESS
TECHNOLOGY
EXCERPTS FROM CWNA/CWSP
A QUICK INTRODUCTION
OUTLINE OF THIS PRESENTATION
â–¸Components
â–¸Measurements
â–¸Communication / Signal
â–¸Security
â–¸Questions and/or Applause
RADIO FREQUENCY CREATION
HOW A SIGNAL IS
CREATED1. Data is sent to the Transmitter, which creates the wireless medium.
2. Transmitter is responsible for the modulation of the signal (carrier signal)
and the signal strength (Amplitude/Power).
3. The Antenna radiates the carrier signal in a pattern specific to the type of
antenna and receive signals from air to propagate it back to the transmitter
SIGNAL DEMYSTIFIED
MEASUREMENTS
â–¸Equivalent Isotropic Radiated Power (EIRP) - Highest signal
strength that is transmitted from a particular antenna.
â–¸Antennas tend to focus the RF signal, altering the effective
output.
â–¸Decibel (dB) - a unit of comparison, NOT a unit of power.
â–¸identifies the difference between 2 values.
â–¸A relative expression and a measurement in change of
power
SIGNAL DEMYSTIFIED
MEASUREMENTS CONTINUED
â–¸Decibel notations:
â–¸dBi (decibel isotropic) - comparison of an antenna to an
isotropic radiator (think antenna gain).
â–¸dBd (decibel dipole) - comparison of an antenna to a
dipole antenna (omnidirectional).
â–¸dBi = dBd + 3
â–¸dBm - a signal comparison to 1 milliwatt of power.
SIGNAL DEMYSTIFIED
MEASUREMENTS MATH EXAMPLES
â–¸Problem: 2.4GHz AP transmitting at 100mW, Laptop is 100m
(0.1Km) from AP.
â–¸Solution: Laptop receives 0.000001mW or if we use FSPL
formula -> dB = 32.4 + (20log10(2400)) + (20log10(0.1)) or
80.004dB ~ 80dB of signal loss.
â–¸dBm: 0dBm = 1mW then what would 100mW be?
â–¸dBm = 10 X log10(PmW) or +20dBm
â–¸the reverse formula is: PmW = 10(dBm/10)
RF SIGNAL
UNDERSTANDING SOME KEY METHODS
AND WAVE FUNCTIONS
â–¸Manipulation of signal is called Keying Method.
â–¸Aptitude Shift-Keying (ASK)
â–¸Frequency Shift-Keying (FSK)
â–¸Phase Shift-Keying (PSK)
RF SIGNAL
UNDERSTANDING SOME KEY METHODS
AND WAVE FUNCTIONS
â–¸All RF signals will experience some type of degradation.
â–¸Absorption - loss of attenuation due to various materials
â–¸Reflection - diversion or bouncing of a signal
â–¸Scattering - multiple reflections of signal in various directions
â–¸Refraction - bending of a signal as it passes through a medium of different
density.
â–¸Diffraction - bending of a signal around an object
â–¸Free Space Path Loss - loss of signal strength caused by natural
broadening of the waves (Beam Divergence)
SIGNAL PROPAGATION
RF TRANSMISSION METHODS
â–¸Narrowband
â–¸uses very little bandwidth
â–¸more susceptible to interference and intentional jamming
â–¸Spread Spectrum
â–¸wide range of bandwidth
â–¸less susceptible to jamming and interference
SIGNAL PROPAGATION
TYPES OF SPREAD SPECTRUM
â–¸Frequency Hopping Spread Spectrum (FHSS)
â–¸Components:
â–¸Hopping sequence - predefined pattern of frequencies
â–¸Dwell time - measure of time of signal transmission
â–¸Hop time - measure of time between transmission signal
change
â–¸Modulation (Gaussian Frequency Shift-Keying) GFSK
FREQUENCY HOPPING SPREAD
SPECTRUM COMPONENTS
SIGNAL PROPAGATION
TYPES OF SPREAD SPECTRUM
â–¸Direct Sequence Spread Spectrum (DSSS)
â–¸Signal transmission is spread across the range of frequencies
that make up that channel.
â–¸The process of spreading the data is known as: Data Encoding.
â–¸Modulation
â–¸Differential Binary Phase Shift-Keying (DBPSK)
â–¸Differential Quadrature Phase Shift-Keying (DQPSK)
SIGNAL PROPAGATION
ORTHOGONAL FREQUENCY DIVISION
MULTIPLEXING (OFDM)
â–¸Most popular and used in either 5GHz or 2.4GHz range
â–¸Looks like Spread Spectrum, but it uses subcarriers (52
separate closely and precisely spaced frequencies)
â–¸More resistant to ISI and negative effects from multi-path
interference.
â–¸Utilizes harmonics overlap to cancel unwanted signals.
â–¸Modulation is BPSK or QPSK (at higher rates uses 16-QAM
or 64-QAM).
OFDM
2.4GHZ CHANNEL
OVERLAY DIAGRAM
2.4GHZ CHANNEL
OVERLAY DIAGRAM
SECURITY
THE CHALLENGE
â–¸Unauthorized access
â–¸open systems for customers and consumers
â–¸data and information is in the open and easy to view both
in promiscuous mode and in attack mode
▸Rogue AP’s
â–¸redirect traffic
â–¸out-signal the original transmission
CONNECTIVITY
PROCESS OF GETTING CONNECTED
▸It’s a 4 step process
1. Authentication
‣ Open - no verification of identity (null authentication)
‣ Varied - open to join but data encrypted to outside
‣ Private - some type of encryption / shared key
2. Association
‣ becoming a part of the BSS
SECURITY
TYPES OF PROTECTION
â–¸Access Control
â–¸MAC address filtering
â–¸Restrictions
â–¸Encryption
â–¸Wireless Equivalent Protection (WEP)
â–¸Wi-Fi Protected Access (WPA)
â–¸Wi-Fi Protected Access v2 (WPA2)
â–¸SSID Cloaking
SECURITY
VULNERABILITIES AND ATTACKS
â–¸Leaving the Default access (Passwords, set-up)
â–¸open Authentication and/or Authorization
â–¸Use of SNMP-managed devices (Simple Network Management
Protocol) in unsecured mode
â–¸Improper configuration of gateways, extenders, bridged devices,
etc.
â–¸MAC Spoofing and MAC Layer Attacks
â–¸session hijacking, MITM, DoS and Disassociation(s)
SECURITY
ENCRYPTION TYPES AND DEFINITION
â–¸Static WEP
â–¸Layer 2 encryption using RC4 streaming cipher
â–¸64-bit and 128-bit encryption (24-bit IV)
â–¸Weakness
â–¸IV Collision attacks - 24-bit IV is in clear text and repeats itself after 16 million.
â–¸RC4 Key-scheduling Algorithm uses 24-bit IV
â–¸Reinjection Attack
â–¸Bit-Flip Attack - ICV considered weak and packet can be compromised
SECURITY
ENCRYPTION TYPES AND DEFINITION
CONT.
â–¸Wi-Fi Protected Access (WPA)
â–¸Temporal Key Integrity Protocol (TKIP) - 40-bit encryption
and 128-bit key. Generates keys dynamically for each
packet, avoiding some collisions.
â–¸Message Integrity Check (MIC) - avoids the capturing,
changing and resending the packets. Also uses the MIC
as a seed for the mathematic encryption keys.
SECURITY
ENCRYPTION TYPES AND DEFINITION
CONT.
â–¸Wi-Fi Protected Access 2 (WPA2)
â–¸Advanced Encryption Standard (AES)
â–¸AES-CCMP
â–¸Counter Mode with Cipher Block Chaining Authentication
Code Protocol (CCMP)
â–¸Message Integrity Check (MIC) - avoids the capturing,
changing and resending the packets. Also uses the MIC as
a seed for the mathematic encryption keys.

More Related Content

What's hot

Spread spectrum
Spread spectrumSpread spectrum
Spread spectrumSushant Burde
 
Presentation on fhss
Presentation on fhssPresentation on fhss
Presentation on fhsstanu_jaswal
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrumHarshit Gupta
 
Spread-Spectrum Techniques
Spread-Spectrum TechniquesSpread-Spectrum Techniques
Spread-Spectrum Techniquesmohammedalimahdi
 
spread spectrum technique
 spread spectrum technique spread spectrum technique
spread spectrum techniqueTauseef khan
 
Digital communication (DSSS)
Digital communication  (DSSS)Digital communication  (DSSS)
Digital communication (DSSS)SSGMCE SHEGAON
 
Wireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignWireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignJim Jenkins
 
Spread spectrum technologies
Spread spectrum technologiesSpread spectrum technologies
Spread spectrum technologiesDr. Ghanshyam Singh
 
Chapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9eChapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9eadpeer
 
An introduction to spread spectrum communications
An introduction to spread spectrum communicationsAn introduction to spread spectrum communications
An introduction to spread spectrum communicationsFarzad Nuseeb
 
A chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication systemA chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication systemMohit Chimankar
 
Spread spectrum techniques
Spread spectrum techniquesSpread spectrum techniques
Spread spectrum techniquesFaisal Ch
 
time hopping spread spectrum term paper
time hopping spread spectrum term papertime hopping spread spectrum term paper
time hopping spread spectrum term paperHimanshu Shekhar
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumRohit Choudhury
 

What's hot (20)

Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Presentation on fhss
Presentation on fhssPresentation on fhss
Presentation on fhss
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
 
Topic: Spread Spectrum
Topic: Spread SpectrumTopic: Spread Spectrum
Topic: Spread Spectrum
 
Spread-Spectrum Techniques
Spread-Spectrum TechniquesSpread-Spectrum Techniques
Spread-Spectrum Techniques
 
spread spectrum technique
 spread spectrum technique spread spectrum technique
spread spectrum technique
 
Digital communication (DSSS)
Digital communication  (DSSS)Digital communication  (DSSS)
Digital communication (DSSS)
 
Wireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignWireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum Design
 
Spread spectrum technologies
Spread spectrum technologiesSpread spectrum technologies
Spread spectrum technologies
 
4rth lec dsss
4rth lec   dsss4rth lec   dsss
4rth lec dsss
 
Chapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9eChapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9e
 
An introduction to spread spectrum communications
An introduction to spread spectrum communicationsAn introduction to spread spectrum communications
An introduction to spread spectrum communications
 
A chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication systemA chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication system
 
FHSS
FHSSFHSS
FHSS
 
Spread spectrum techniques
Spread spectrum techniquesSpread spectrum techniques
Spread spectrum techniques
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrum
 
SPREAD SPECTRUM
SPREAD SPECTRUMSPREAD SPECTRUM
SPREAD SPECTRUM
 
time hopping spread spectrum term paper
time hopping spread spectrum term papertime hopping spread spectrum term paper
time hopping spread spectrum term paper
 
Spread Spectrum System
Spread Spectrum SystemSpread Spectrum System
Spread Spectrum System
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread Spectrum
 

Viewers also liked

Chefs catalog coupon
Chefs catalog couponChefs catalog coupon
Chefs catalog couponMaterazzi3
 
Lost in elysium
Lost in elysiumLost in elysium
Lost in elysiumJay Lee
 
Flat Technology Short Presentation
Flat Technology Short PresentationFlat Technology Short Presentation
Flat Technology Short Presentationab153
 
How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...
How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...
How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...cloudcontroller
 
Altc 2010 paper_0188_cb_dh
Altc 2010 paper_0188_cb_dhAltc 2010 paper_0188_cb_dh
Altc 2010 paper_0188_cb_dhClaire B
 
Lesdag 3 ouderfactoren
Lesdag 3 ouderfactorenLesdag 3 ouderfactoren
Lesdag 3 ouderfactorenCVO-SSH
 
Social Media By Kay Green, My Precious Kid
Social Media By Kay Green, My Precious KidSocial Media By Kay Green, My Precious Kid
Social Media By Kay Green, My Precious KidMy Precious Kid LLC
 
Lesdag 3 charles taylor michel foucault
Lesdag 3 charles taylor   michel foucaultLesdag 3 charles taylor   michel foucault
Lesdag 3 charles taylor michel foucaultCVO-SSH
 
Sfe time robbers
Sfe time robbersSfe time robbers
Sfe time robbersArif Mahmood
 
Pictures of students in sw 475
Pictures of students in sw 475Pictures of students in sw 475
Pictures of students in sw 475pegart
 
Zorg En Welzijn Projecten In Beeld
Zorg En Welzijn   Projecten In BeeldZorg En Welzijn   Projecten In Beeld
Zorg En Welzijn Projecten In BeeldClairtje01
 
Roberto espe 1 finanzas
Roberto espe 1 finanzasRoberto espe 1 finanzas
Roberto espe 1 finanzascarlos0509
 
Roberto Llumiquinga
Roberto LlumiquingaRoberto Llumiquinga
Roberto Llumiquingacarlos0509
 
LCIA Training Section 1
LCIA Training Section 1LCIA Training Section 1
LCIA Training Section 1asriasky
 
Posscon 2011 Drupal Workshop
Posscon 2011 Drupal WorkshopPosscon 2011 Drupal Workshop
Posscon 2011 Drupal WorkshopOS Solutions
 
Magie sau fenta mishto?
Magie sau fenta mishto?Magie sau fenta mishto?
Magie sau fenta mishto?Valentin Vesa
 
Introductiedag 11 12 [compatibiliteitsmodus]
Introductiedag 11 12 [compatibiliteitsmodus]Introductiedag 11 12 [compatibiliteitsmodus]
Introductiedag 11 12 [compatibiliteitsmodus]CVO-SSH
 

Viewers also liked (20)

Louise Cohen | CREATE YOUR OWN modular collection
Louise Cohen | CREATE YOUR OWN modular collectionLouise Cohen | CREATE YOUR OWN modular collection
Louise Cohen | CREATE YOUR OWN modular collection
 
Chefs catalog coupon
Chefs catalog couponChefs catalog coupon
Chefs catalog coupon
 
Lost in elysium
Lost in elysiumLost in elysium
Lost in elysium
 
Flat Technology Short Presentation
Flat Technology Short PresentationFlat Technology Short Presentation
Flat Technology Short Presentation
 
How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...
How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...
How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...
 
Altc 2010 paper_0188_cb_dh
Altc 2010 paper_0188_cb_dhAltc 2010 paper_0188_cb_dh
Altc 2010 paper_0188_cb_dh
 
Lesdag 3 ouderfactoren
Lesdag 3 ouderfactorenLesdag 3 ouderfactoren
Lesdag 3 ouderfactoren
 
Social Media By Kay Green, My Precious Kid
Social Media By Kay Green, My Precious KidSocial Media By Kay Green, My Precious Kid
Social Media By Kay Green, My Precious Kid
 
Lesdag 3 charles taylor michel foucault
Lesdag 3 charles taylor   michel foucaultLesdag 3 charles taylor   michel foucault
Lesdag 3 charles taylor michel foucault
 
Stockholm shopping guide
Stockholm shopping guideStockholm shopping guide
Stockholm shopping guide
 
Sfe time robbers
Sfe time robbersSfe time robbers
Sfe time robbers
 
Ir
IrIr
Ir
 
Pictures of students in sw 475
Pictures of students in sw 475Pictures of students in sw 475
Pictures of students in sw 475
 
Zorg En Welzijn Projecten In Beeld
Zorg En Welzijn   Projecten In BeeldZorg En Welzijn   Projecten In Beeld
Zorg En Welzijn Projecten In Beeld
 
Roberto espe 1 finanzas
Roberto espe 1 finanzasRoberto espe 1 finanzas
Roberto espe 1 finanzas
 
Roberto Llumiquinga
Roberto LlumiquingaRoberto Llumiquinga
Roberto Llumiquinga
 
LCIA Training Section 1
LCIA Training Section 1LCIA Training Section 1
LCIA Training Section 1
 
Posscon 2011 Drupal Workshop
Posscon 2011 Drupal WorkshopPosscon 2011 Drupal Workshop
Posscon 2011 Drupal Workshop
 
Magie sau fenta mishto?
Magie sau fenta mishto?Magie sau fenta mishto?
Magie sau fenta mishto?
 
Introductiedag 11 12 [compatibiliteitsmodus]
Introductiedag 11 12 [compatibiliteitsmodus]Introductiedag 11 12 [compatibiliteitsmodus]
Introductiedag 11 12 [compatibiliteitsmodus]
 

Similar to Bar camp presentation

Spread Spectrum Modulation
Spread Spectrum ModulationSpread Spectrum Modulation
Spread Spectrum ModulationLipsa Dash
 
Spread spectrum seminar
Spread spectrum seminarSpread spectrum seminar
Spread spectrum seminarDeepika Patil
 
NoDig 2016 TM2-T2-02 Final
NoDig 2016 TM2-T2-02 FinalNoDig 2016 TM2-T2-02 Final
NoDig 2016 TM2-T2-02 FinalSiggi Finnsson
 
SPREAD SPECTRUM MODULATION.pptx
SPREAD SPECTRUM MODULATION.pptxSPREAD SPECTRUM MODULATION.pptx
SPREAD SPECTRUM MODULATION.pptxDeepakBaghel50
 
Cdma, speard spectrum
Cdma, speard spectrumCdma, speard spectrum
Cdma, speard spectrumPritish kumawat
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor networkRABIA ASHRAFI
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networksPriya Kaushal
 
Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...
Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...
Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...Yuval Ron
 
Spread spectrum communication schemes
Spread spectrum communication schemesSpread spectrum communication schemes
Spread spectrum communication schemesHira Shaukat
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networksProf. Dr. Noman Islam
 
AJAL ASC Chap2 revIew
AJAL ASC Chap2 revIewAJAL ASC Chap2 revIew
AJAL ASC Chap2 revIewAJAL A J
 
Signal and system (1)
Signal and system (1)Signal and system (1)
Signal and system (1)Abhishek Sainkar
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
Ij a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationIj a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationshobanavsm
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...JPINFOTECH JAYAPRAKASH
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 

Similar to Bar camp presentation (20)

Spread Spectrum Modulation
Spread Spectrum ModulationSpread Spectrum Modulation
Spread Spectrum Modulation
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Spread spectrum seminar
Spread spectrum seminarSpread spectrum seminar
Spread spectrum seminar
 
NoDig 2016 TM2-T2-02 Final
NoDig 2016 TM2-T2-02 FinalNoDig 2016 TM2-T2-02 Final
NoDig 2016 TM2-T2-02 Final
 
SPREAD SPECTRUM MODULATION.pptx
SPREAD SPECTRUM MODULATION.pptxSPREAD SPECTRUM MODULATION.pptx
SPREAD SPECTRUM MODULATION.pptx
 
Cdma, speard spectrum
Cdma, speard spectrumCdma, speard spectrum
Cdma, speard spectrum
 
UNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdfUNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdf
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...
Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...
Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...
 
Spread spectrum communication schemes
Spread spectrum communication schemesSpread spectrum communication schemes
Spread spectrum communication schemes
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networks
 
AJAL ASC Chap2 revIew
AJAL ASC Chap2 revIewAJAL ASC Chap2 revIew
AJAL ASC Chap2 revIew
 
Signal and system (1)
Signal and system (1)Signal and system (1)
Signal and system (1)
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
Ij a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationIj a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communication
 
Bi36358362
Bi36358362Bi36358362
Bi36358362
 
Wireless
WirelessWireless
Wireless
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 

More from Shai Levit

Business research for NETW_440 Network Architecture
Business research for NETW_440 Network ArchitectureBusiness research for NETW_440 Network Architecture
Business research for NETW_440 Network ArchitectureShai Levit
 
15min teaching demo for consideration as an adjunct professor at a local Univ...
15min teaching demo for consideration as an adjunct professor at a local Univ...15min teaching demo for consideration as an adjunct professor at a local Univ...
15min teaching demo for consideration as an adjunct professor at a local Univ...Shai Levit
 
WSRM_WriteUp
WSRM_WriteUpWSRM_WriteUp
WSRM_WriteUpShai Levit
 
Wire Framing
Wire FramingWire Framing
Wire FramingShai Levit
 
Wire framing
Wire framingWire framing
Wire framingShai Levit
 
Psychiatric Nurse Practitioners Emr System
Psychiatric Nurse Practitioners Emr SystemPsychiatric Nurse Practitioners Emr System
Psychiatric Nurse Practitioners Emr SystemShai Levit
 

More from Shai Levit (6)

Business research for NETW_440 Network Architecture
Business research for NETW_440 Network ArchitectureBusiness research for NETW_440 Network Architecture
Business research for NETW_440 Network Architecture
 
15min teaching demo for consideration as an adjunct professor at a local Univ...
15min teaching demo for consideration as an adjunct professor at a local Univ...15min teaching demo for consideration as an adjunct professor at a local Univ...
15min teaching demo for consideration as an adjunct professor at a local Univ...
 
WSRM_WriteUp
WSRM_WriteUpWSRM_WriteUp
WSRM_WriteUp
 
Wire Framing
Wire FramingWire Framing
Wire Framing
 
Wire framing
Wire framingWire framing
Wire framing
 
Psychiatric Nurse Practitioners Emr System
Psychiatric Nurse Practitioners Emr SystemPsychiatric Nurse Practitioners Emr System
Psychiatric Nurse Practitioners Emr System
 

Recently uploaded

JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Christopher Logan Kennedy
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 

Recently uploaded (20)

JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 

Bar camp presentation

  • 2. A QUICK INTRODUCTION OUTLINE OF THIS PRESENTATION â–¸Components â–¸Measurements â–¸Communication / Signal â–¸Security â–¸Questions and/or Applause
  • 3. RADIO FREQUENCY CREATION HOW A SIGNAL IS CREATED1. Data is sent to the Transmitter, which creates the wireless medium. 2. Transmitter is responsible for the modulation of the signal (carrier signal) and the signal strength (Amplitude/Power). 3. The Antenna radiates the carrier signal in a pattern specific to the type of antenna and receive signals from air to propagate it back to the transmitter
  • 4. SIGNAL DEMYSTIFIED MEASUREMENTS â–¸Equivalent Isotropic Radiated Power (EIRP) - Highest signal strength that is transmitted from a particular antenna. â–¸Antennas tend to focus the RF signal, altering the effective output. â–¸Decibel (dB) - a unit of comparison, NOT a unit of power. â–¸identifies the difference between 2 values. â–¸A relative expression and a measurement in change of power
  • 5. SIGNAL DEMYSTIFIED MEASUREMENTS CONTINUED â–¸Decibel notations: â–¸dBi (decibel isotropic) - comparison of an antenna to an isotropic radiator (think antenna gain). â–¸dBd (decibel dipole) - comparison of an antenna to a dipole antenna (omnidirectional). â–¸dBi = dBd + 3 â–¸dBm - a signal comparison to 1 milliwatt of power.
  • 6. SIGNAL DEMYSTIFIED MEASUREMENTS MATH EXAMPLES â–¸Problem: 2.4GHz AP transmitting at 100mW, Laptop is 100m (0.1Km) from AP. â–¸Solution: Laptop receives 0.000001mW or if we use FSPL formula -> dB = 32.4 + (20log10(2400)) + (20log10(0.1)) or 80.004dB ~ 80dB of signal loss. â–¸dBm: 0dBm = 1mW then what would 100mW be? â–¸dBm = 10 X log10(PmW) or +20dBm â–¸the reverse formula is: PmW = 10(dBm/10)
  • 7. RF SIGNAL UNDERSTANDING SOME KEY METHODS AND WAVE FUNCTIONS â–¸Manipulation of signal is called Keying Method. â–¸Aptitude Shift-Keying (ASK) â–¸Frequency Shift-Keying (FSK) â–¸Phase Shift-Keying (PSK)
  • 8. RF SIGNAL UNDERSTANDING SOME KEY METHODS AND WAVE FUNCTIONS â–¸All RF signals will experience some type of degradation. â–¸Absorption - loss of attenuation due to various materials â–¸Reflection - diversion or bouncing of a signal â–¸Scattering - multiple reflections of signal in various directions â–¸Refraction - bending of a signal as it passes through a medium of different density. â–¸Diffraction - bending of a signal around an object â–¸Free Space Path Loss - loss of signal strength caused by natural broadening of the waves (Beam Divergence)
  • 9. SIGNAL PROPAGATION RF TRANSMISSION METHODS â–¸Narrowband â–¸uses very little bandwidth â–¸more susceptible to interference and intentional jamming â–¸Spread Spectrum â–¸wide range of bandwidth â–¸less susceptible to jamming and interference
  • 10.
  • 11. SIGNAL PROPAGATION TYPES OF SPREAD SPECTRUM â–¸Frequency Hopping Spread Spectrum (FHSS) â–¸Components: â–¸Hopping sequence - predefined pattern of frequencies â–¸Dwell time - measure of time of signal transmission â–¸Hop time - measure of time between transmission signal change â–¸Modulation (Gaussian Frequency Shift-Keying) GFSK
  • 13. SIGNAL PROPAGATION TYPES OF SPREAD SPECTRUM â–¸Direct Sequence Spread Spectrum (DSSS) â–¸Signal transmission is spread across the range of frequencies that make up that channel. â–¸The process of spreading the data is known as: Data Encoding. â–¸Modulation â–¸Differential Binary Phase Shift-Keying (DBPSK) â–¸Differential Quadrature Phase Shift-Keying (DQPSK)
  • 14. SIGNAL PROPAGATION ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) â–¸Most popular and used in either 5GHz or 2.4GHz range â–¸Looks like Spread Spectrum, but it uses subcarriers (52 separate closely and precisely spaced frequencies) â–¸More resistant to ISI and negative effects from multi-path interference. â–¸Utilizes harmonics overlap to cancel unwanted signals. â–¸Modulation is BPSK or QPSK (at higher rates uses 16-QAM or 64-QAM).
  • 15. OFDM
  • 18. SECURITY THE CHALLENGE â–¸Unauthorized access â–¸open systems for customers and consumers â–¸data and information is in the open and easy to view both in promiscuous mode and in attack mode â–¸Rogue AP’s â–¸redirect traffic â–¸out-signal the original transmission
  • 19. CONNECTIVITY PROCESS OF GETTING CONNECTED â–¸It’s a 4 step process 1. Authentication ‣ Open - no verification of identity (null authentication) ‣ Varied - open to join but data encrypted to outside ‣ Private - some type of encryption / shared key 2. Association ‣ becoming a part of the BSS
  • 20. SECURITY TYPES OF PROTECTION â–¸Access Control â–¸MAC address filtering â–¸Restrictions â–¸Encryption â–¸Wireless Equivalent Protection (WEP) â–¸Wi-Fi Protected Access (WPA) â–¸Wi-Fi Protected Access v2 (WPA2) â–¸SSID Cloaking
  • 21. SECURITY VULNERABILITIES AND ATTACKS â–¸Leaving the Default access (Passwords, set-up) â–¸open Authentication and/or Authorization â–¸Use of SNMP-managed devices (Simple Network Management Protocol) in unsecured mode â–¸Improper configuration of gateways, extenders, bridged devices, etc. â–¸MAC Spoofing and MAC Layer Attacks â–¸session hijacking, MITM, DoS and Disassociation(s)
  • 22. SECURITY ENCRYPTION TYPES AND DEFINITION â–¸Static WEP â–¸Layer 2 encryption using RC4 streaming cipher â–¸64-bit and 128-bit encryption (24-bit IV) â–¸Weakness â–¸IV Collision attacks - 24-bit IV is in clear text and repeats itself after 16 million. â–¸RC4 Key-scheduling Algorithm uses 24-bit IV â–¸Reinjection Attack â–¸Bit-Flip Attack - ICV considered weak and packet can be compromised
  • 23. SECURITY ENCRYPTION TYPES AND DEFINITION CONT. â–¸Wi-Fi Protected Access (WPA) â–¸Temporal Key Integrity Protocol (TKIP) - 40-bit encryption and 128-bit key. Generates keys dynamically for each packet, avoiding some collisions. â–¸Message Integrity Check (MIC) - avoids the capturing, changing and resending the packets. Also uses the MIC as a seed for the mathematic encryption keys.
  • 24. SECURITY ENCRYPTION TYPES AND DEFINITION CONT. â–¸Wi-Fi Protected Access 2 (WPA2) â–¸Advanced Encryption Standard (AES) â–¸AES-CCMP â–¸Counter Mode with Cipher Block Chaining Authentication Code Protocol (CCMP) â–¸Message Integrity Check (MIC) - avoids the capturing, changing and resending the packets. Also uses the MIC as a seed for the mathematic encryption keys.

Editor's Notes

  1. IR - FCC regulation on a device that intentionally generates and emits RF energy by radiation or induction.
  2. Why use Decibels as a measuring mechanism at all?