SlideShare a Scribd company logo
1 of 56
LAN Switching and Wireless
If you found any mistake’s’ on these slides or if you have any
other questions or comments, please feel free to contact me at:
abdu.elsaid@gmail.com or abdu.elsaid@yahoo.com
Linkedin : https://www.linkedin.com/in/AbdelkhalikMosa
Twitter : https://twitter.com/AbdelkhalikMosa
Facebook : https://www.facebook.com/Abdelkhalik.Mosa
Thanks,
Abdelkhalik Mosa
Suez Canal University
Faculty of Computers and Informatics - Ismailia - Egypt
Note …
Introduction
• Wireless technologies use electromagnetic waves to carry
information between devices.
• WLANs use radio frequencies (RF) instead of cables at the
Physical layer and MAC sub-layer of the Data Link layer.
Wireless LAN Vs. Ethernet LAN
Wireless PAN, LAN, MAN and WAN
PAN : Personal Area Networks
LAN : Local Area Networks
WLAN : Wireless Local Area Networks
MAN : Metropolitan Area Networks
WAN : Wide Area Networks
Introduction: Infrared
• Infrared (IR) is relatively low energy and cannot penetrate
through walls or other obstacles.
• A specialized communication port known as an Infrared Direct
Access (IrDA) port uses IR to exchange information between
devices.
• IR only allows a one-to-one type of connection.
• IR is also used for remote control devices, wireless mice, and
wireless keyboards.
• IR generally used for short-range, line-of-sight, communications.
Introduction: Radio Frequency (RF)
• RF waves can penetrate through walls and other obstacles,
allowing a much greater range than IR.
• Certain areas of the RF bands have been set aside for use by
unlicensed devices such as WLANs, and computer peripherals.
– This includes the 900 MHz, 2.4 GHz, and the 5 GHz frequency ranges.
These ranges are known as the ISM bands.
Benefits of Wireless Technology
Limitations of Wireless Technology
Wireless LANs (WLANs)
• 802.11 wireless LANs extend the 802.3 Ethernet LAN
infrastructures to provide additional connectivity options.
Wireless LAN Standards
• The governmental agencies in countries, license some frequency
bands, leaving some frequency bands unlicensed.
• Licensed bands:
– The most common are AM and FM radio, shortwave radio (for
police department communications), and mobile phones.
• Unlicensed frequencies:
– Can be used by all kinds of devices; however, the devices must
still conform to the rules set up by the regulatory agency.
• A device using an unlicensed band must use power levels at or
below a particular setting so as not to interfere too much with
other devices sharing that unlicensed band.
Wireless LAN Standards
• OFDM have faster data rates than DSSS.
• DSSS is simpler and less expensive to implement than OFDM.
Wireless Fidelity (Wi-Fi) Certification
• Wi-Fi Alliance, a global, nonprofit, industry trade association
devoted to promoting the growth and acceptance of WLANs.
• The Wi-Fi Alliance is an association of vendors whose objective is
to improve the interoperability of products that are based on the
802.11 standard.
• The Wi-Fi logo on a device means it meets standards and should
interoperate with other devices of the same standard.
• The three key organizations influencing WLAN standards are:
ITU-R regulates allocation of RF bands.
IEEE specifies how RF is modulated to carry info.
Wi-Fi ensures that vendors make devices that
are interoperable.
Wireless Infrastructure Components: Wireless NIC
Wireless NIC encodes a data stream onto an RF signal.
Wireless Infrastructure Components: Wireless Access Points
• An access point is a Layer 2 device that functions like a 802.3
Ethernet hub.
• An access point connects wireless clients to the wired LAN.
• Association is the process by which a client joins an 802.11
network.
• RF signals attenuate as they move away from their point of
origin, causing the Hidden node problem.
• One means of resolving the hidden node problem is a CSMA/CA
feature called request to send/clear to send (RTS/CTS).
Wireless Infrastructure Components: Wireless Access Points
• The hidden node problem
Wireless Infrastructure Components: Wireless Routers
• Wireless routers perform the role of access point, Ethernet
switch, and router.
Configurable Parameters for Wireless Endpoints
Network Modes
Channels
SSID
802.11 Topologies: Ad Hoc (IBSS)
Independent Basic Service Set (IBSS)
802.11 Topologies: BSS
Basic Service Set (BSS)
802.11 Topologies: ESS
Extended Basic Service Set (ESS)
Client and Access Point Association: Beacons
• Beacons: Frames used by the WLAN network to advertise its
presence.
Client and Access Point Association: Probes
• Probes: Frames used by WLAN clients to find their networks.
Client and Access Point Association: Authentication
Client and Access Point Association: Association
• Association: The process for establishing the data link between
an access point and a WLAN client.
Threats to Wireless Security: Unauthorized Access
• Major categories of threats that lead to unauthorized access:
1. War Drivers:
• Find open networks and use them to gain free internet
access.
2. Hackers:
• Exploit weak privacy measures to view sensitive WLAN
information and even break into WLANs.
3. Employees:
• Plug consumer-grade APIs/gateways into company
Ethernet ports to create their own WLANs.
Threats to Wireless Security: Man-in-the-Middle Attacks
Threats to Wireless Security: Denial of Service
Wireless Security Protocol Overview
• Open Authentication: no authentication.
• WEP authentication: was supposed to provide privacy to a link.
Static, crackable, and not scalable.
Cloaking SSIDs and filtering MAC addresses were used.
Authenticating to the Wireless LAN
Authenticating to the Wireless LAN
• EAP is a framework for authenticating network access.
Encryption – TKIP and AES
• TKIP is the encryption method certified as WPA.
It encrypts the Layer 2 payload.
It carries out a message integrity check (MIC) in the encrypted
packet which ensures against a message being tampered with.
• AES is the encryption method certified as WPA2.
• PSK or PSK2 with TKIP is the same as WPA.
• PSK or PSK2 with AES is the same as WPA2.
• PSK2, without an encryption method, is the same as WPA2.
Controlling Access to the Wireless LAN
• The concept of depth means having multiple solutions available.
• Implement this three-step approach:
1. SSID cloaking: Disable SSID broadcasts from access points
2. MAC address filtering: Permit or deny clients based on their
MAC address
3. WLAN security implementation: WPA or WPA2.
• Neither SSID cloaking nor MAC address filtering are considered
a valid means of securing a WLAN for the following reasons:
1. MAC addresses are easily spoofed.
2. SSIDs are easily discovered even they aren’t broadcasted.
Configuring the Wireless Access PointSetup
Configuring the Wireless Access Point
Management
Configuring Basic Wireless Settings
NetworkMode
Configuring Basic Wireless Settings
NetworkName(SSID)
Configuring Basic Wireless Settings
RadioBand
Configuring Basic Wireless Settings
WideChannel
Configuring Basic Wireless Settings
StandardChannel
Configuring Security
• "Personal“ means no AAA server is used.
• "Enterprise“ means a AAA server and EAP authentication is used.
Configuring Security
Configuring a wireless NIC
Scan for SSIDs
Selecting the Wireless
Security Protocol
WLAN Troubleshooting: Incorrect Channel Settings
WLAN Troubleshooting: Incorrect Channel Settings
WLAN Troubleshooting: Incorrect Channel Settings
WLAN Troubleshooting: Solving RF Interference
WLAN Troubleshooting: Solving RF Interference
WLAN Troubleshooting: Solving RF Interference
WLAN Troubleshooting: Access Point Misplacement
WLAN Troubleshooting: Access Point Misplacement
WLAN Troubleshooting: Access Point Misplacement
WLAN Troubleshooting: Authentication and Encryption
WLAN Troubleshooting: Authentication and Encryption
WLAN Troubleshooting: Authentication and Encryption
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

More Related Content

What's hot

Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts reviewPalanivel Kuppusamy
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologiesbalasubramani p
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16mlrbrown
 
Networking Chapter 14
Networking Chapter 14Networking Chapter 14
Networking Chapter 14mlrbrown
 
A presentation on networking and ccna
A presentation on networking and ccnaA presentation on networking and ccna
A presentation on networking and ccnavivek kumar
 
Troubleshooting Industrial Ethernet & TCP/IP Networks
Troubleshooting Industrial Ethernet & TCP/IP NetworksTroubleshooting Industrial Ethernet & TCP/IP Networks
Troubleshooting Industrial Ethernet & TCP/IP NetworksLiving Online
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDilum Bandara
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security PresentationWajahat Rajab
 
Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1Atika Zaimi
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkAtika Zaimi
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and StandardsRubal Sagwal
 

What's hot (20)

Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Networking Chapter 14
Networking Chapter 14Networking Chapter 14
Networking Chapter 14
 
A presentation on networking and ccna
A presentation on networking and ccnaA presentation on networking and ccna
A presentation on networking and ccna
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
IEEE 802 Standards
IEEE 802 StandardsIEEE 802 Standards
IEEE 802 Standards
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
Troubleshooting Industrial Ethernet & TCP/IP Networks
Troubleshooting Industrial Ethernet & TCP/IP NetworksTroubleshooting Industrial Ethernet & TCP/IP Networks
Troubleshooting Industrial Ethernet & TCP/IP Networks
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 
Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1
 
Ieee standards
Ieee standardsIeee standards
Ieee standards
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Chapter10
Chapter10Chapter10
Chapter10
 
Vo ip
Vo ipVo ip
Vo ip
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 

Similar to LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technologyAtika Zaimi
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communicationJigsAshley
 
wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networkingM Sabir Saeed
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocolumardanjumamaiwada
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networksSweta Kumari Barnwal
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Ceh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksCeh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksVi Tính Hoàng Nam
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
Adhoc & WSN-Unit-I-Ragavan
Adhoc & WSN-Unit-I-RagavanAdhoc & WSN-Unit-I-Ragavan
Adhoc & WSN-Unit-I-RagavanRagavan K
 
Network Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless SecurityNetwork Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless SecuritySUBHAK25
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringeceb9198
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless TechnologyNetwax Lab
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyahSeptafiansyah P
 

Similar to LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration (20)

Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Ceh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksCeh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networks
 
MVA slides lesson 3
MVA slides lesson 3MVA slides lesson 3
MVA slides lesson 3
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Adhoc & WSN-Unit-I-Ragavan
Adhoc & WSN-Unit-I-RagavanAdhoc & WSN-Unit-I-Ragavan
Adhoc & WSN-Unit-I-Ragavan
 
Network Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless SecurityNetwork Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless Security
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
Wireless
WirelessWireless
Wireless
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyah
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 

More from Abdelkhalik Mosa

Towards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOTowards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOAbdelkhalik Mosa
 
Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Abdelkhalik Mosa
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesAbdelkhalik Mosa
 
Academic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAcademic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)Abdelkhalik Mosa
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)Abdelkhalik Mosa
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationAbdelkhalik Mosa
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPAbdelkhalik Mosa
 
Network Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkNetwork Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkAbdelkhalik Mosa
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerAbdelkhalik Mosa
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerAbdelkhalik Mosa
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerAbdelkhalik Mosa
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsAbdelkhalik Mosa
 
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Abdelkhalik Mosa
 

More from Abdelkhalik Mosa (15)

Towards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOTowards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADO
 
Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
 
Academic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAcademic Poster Design, Review and Presentation
Academic Poster Design, Review and Presentation
 
IPv6
IPv6IPv6
IPv6
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRP
 
Network Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkNetwork Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your Network
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical Layer
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link Layer
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
 
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

  • 1. LAN Switching and Wireless
  • 2. If you found any mistake’s’ on these slides or if you have any other questions or comments, please feel free to contact me at: abdu.elsaid@gmail.com or abdu.elsaid@yahoo.com Linkedin : https://www.linkedin.com/in/AbdelkhalikMosa Twitter : https://twitter.com/AbdelkhalikMosa Facebook : https://www.facebook.com/Abdelkhalik.Mosa Thanks, Abdelkhalik Mosa Suez Canal University Faculty of Computers and Informatics - Ismailia - Egypt Note …
  • 3. Introduction • Wireless technologies use electromagnetic waves to carry information between devices. • WLANs use radio frequencies (RF) instead of cables at the Physical layer and MAC sub-layer of the Data Link layer.
  • 4. Wireless LAN Vs. Ethernet LAN
  • 5. Wireless PAN, LAN, MAN and WAN PAN : Personal Area Networks LAN : Local Area Networks WLAN : Wireless Local Area Networks MAN : Metropolitan Area Networks WAN : Wide Area Networks
  • 6. Introduction: Infrared • Infrared (IR) is relatively low energy and cannot penetrate through walls or other obstacles. • A specialized communication port known as an Infrared Direct Access (IrDA) port uses IR to exchange information between devices. • IR only allows a one-to-one type of connection. • IR is also used for remote control devices, wireless mice, and wireless keyboards. • IR generally used for short-range, line-of-sight, communications.
  • 7. Introduction: Radio Frequency (RF) • RF waves can penetrate through walls and other obstacles, allowing a much greater range than IR. • Certain areas of the RF bands have been set aside for use by unlicensed devices such as WLANs, and computer peripherals. – This includes the 900 MHz, 2.4 GHz, and the 5 GHz frequency ranges. These ranges are known as the ISM bands.
  • 8. Benefits of Wireless Technology
  • 10. Wireless LANs (WLANs) • 802.11 wireless LANs extend the 802.3 Ethernet LAN infrastructures to provide additional connectivity options.
  • 11. Wireless LAN Standards • The governmental agencies in countries, license some frequency bands, leaving some frequency bands unlicensed. • Licensed bands: – The most common are AM and FM radio, shortwave radio (for police department communications), and mobile phones. • Unlicensed frequencies: – Can be used by all kinds of devices; however, the devices must still conform to the rules set up by the regulatory agency. • A device using an unlicensed band must use power levels at or below a particular setting so as not to interfere too much with other devices sharing that unlicensed band.
  • 12. Wireless LAN Standards • OFDM have faster data rates than DSSS. • DSSS is simpler and less expensive to implement than OFDM.
  • 13. Wireless Fidelity (Wi-Fi) Certification • Wi-Fi Alliance, a global, nonprofit, industry trade association devoted to promoting the growth and acceptance of WLANs. • The Wi-Fi Alliance is an association of vendors whose objective is to improve the interoperability of products that are based on the 802.11 standard. • The Wi-Fi logo on a device means it meets standards and should interoperate with other devices of the same standard. • The three key organizations influencing WLAN standards are: ITU-R regulates allocation of RF bands. IEEE specifies how RF is modulated to carry info. Wi-Fi ensures that vendors make devices that are interoperable.
  • 14. Wireless Infrastructure Components: Wireless NIC Wireless NIC encodes a data stream onto an RF signal.
  • 15. Wireless Infrastructure Components: Wireless Access Points • An access point is a Layer 2 device that functions like a 802.3 Ethernet hub. • An access point connects wireless clients to the wired LAN. • Association is the process by which a client joins an 802.11 network. • RF signals attenuate as they move away from their point of origin, causing the Hidden node problem. • One means of resolving the hidden node problem is a CSMA/CA feature called request to send/clear to send (RTS/CTS).
  • 16. Wireless Infrastructure Components: Wireless Access Points • The hidden node problem
  • 17. Wireless Infrastructure Components: Wireless Routers • Wireless routers perform the role of access point, Ethernet switch, and router.
  • 18. Configurable Parameters for Wireless Endpoints Network Modes Channels SSID
  • 19. 802.11 Topologies: Ad Hoc (IBSS) Independent Basic Service Set (IBSS)
  • 20. 802.11 Topologies: BSS Basic Service Set (BSS)
  • 21. 802.11 Topologies: ESS Extended Basic Service Set (ESS)
  • 22. Client and Access Point Association: Beacons • Beacons: Frames used by the WLAN network to advertise its presence.
  • 23. Client and Access Point Association: Probes • Probes: Frames used by WLAN clients to find their networks.
  • 24. Client and Access Point Association: Authentication
  • 25. Client and Access Point Association: Association • Association: The process for establishing the data link between an access point and a WLAN client.
  • 26. Threats to Wireless Security: Unauthorized Access • Major categories of threats that lead to unauthorized access: 1. War Drivers: • Find open networks and use them to gain free internet access. 2. Hackers: • Exploit weak privacy measures to view sensitive WLAN information and even break into WLANs. 3. Employees: • Plug consumer-grade APIs/gateways into company Ethernet ports to create their own WLANs.
  • 27. Threats to Wireless Security: Man-in-the-Middle Attacks
  • 28. Threats to Wireless Security: Denial of Service
  • 29. Wireless Security Protocol Overview • Open Authentication: no authentication. • WEP authentication: was supposed to provide privacy to a link. Static, crackable, and not scalable. Cloaking SSIDs and filtering MAC addresses were used.
  • 30. Authenticating to the Wireless LAN
  • 31. Authenticating to the Wireless LAN • EAP is a framework for authenticating network access.
  • 32. Encryption – TKIP and AES • TKIP is the encryption method certified as WPA. It encrypts the Layer 2 payload. It carries out a message integrity check (MIC) in the encrypted packet which ensures against a message being tampered with. • AES is the encryption method certified as WPA2. • PSK or PSK2 with TKIP is the same as WPA. • PSK or PSK2 with AES is the same as WPA2. • PSK2, without an encryption method, is the same as WPA2.
  • 33. Controlling Access to the Wireless LAN • The concept of depth means having multiple solutions available. • Implement this three-step approach: 1. SSID cloaking: Disable SSID broadcasts from access points 2. MAC address filtering: Permit or deny clients based on their MAC address 3. WLAN security implementation: WPA or WPA2. • Neither SSID cloaking nor MAC address filtering are considered a valid means of securing a WLAN for the following reasons: 1. MAC addresses are easily spoofed. 2. SSIDs are easily discovered even they aren’t broadcasted.
  • 34. Configuring the Wireless Access PointSetup
  • 35. Configuring the Wireless Access Point Management
  • 36. Configuring Basic Wireless Settings NetworkMode
  • 37. Configuring Basic Wireless Settings NetworkName(SSID)
  • 38. Configuring Basic Wireless Settings RadioBand
  • 39. Configuring Basic Wireless Settings WideChannel
  • 40. Configuring Basic Wireless Settings StandardChannel
  • 41. Configuring Security • "Personal“ means no AAA server is used. • "Enterprise“ means a AAA server and EAP authentication is used.
  • 43. Configuring a wireless NIC Scan for SSIDs Selecting the Wireless Security Protocol
  • 47. WLAN Troubleshooting: Solving RF Interference
  • 48. WLAN Troubleshooting: Solving RF Interference
  • 49. WLAN Troubleshooting: Solving RF Interference
  • 50. WLAN Troubleshooting: Access Point Misplacement
  • 51. WLAN Troubleshooting: Access Point Misplacement
  • 52. WLAN Troubleshooting: Access Point Misplacement