The document outlines a presentation on wireless technology and migrating to wireless LANs. It discusses key topics such as the IEEE 802.11 standards, securing wireless LANs, and considerations for cutting the cord to wired networks. An overview of wireless LAN technologies like 802.11a, 802.11b, 802.11g is provided along with their advantages and disadvantages. The presentation also covers wireless LAN fundamentals, security issues, and best practices for planning a wireless network migration through access point placement and site surveys.
This document provides an overview of wireless local area networks (WLANs). It discusses wireless technology and standards including 802.11, WLAN topologies, how they integrate with wired networks, security considerations, and performance comparisons between standards such as 802.11a, 802.11b, and 802.11g. Wireless LANs use radio waves to connect devices within a building and bridge to the wired network backbone. Standards specify protocols for authentication, encryption, and quality of service, though some early security features like WEP have proven vulnerable. Migration to wireless offers mobility but introduces new design challenges.
This presentation provides an overview of Wi-Fi technology. It discusses how Wi-Fi works by creating hotspots using access points connected to the internet. It covers the key components of Wi-Fi including access points and Wi-Fi cards. The presentation compares different Wi-Fi versions and standards over time. It also addresses topics such as security, topology, configurations, applications, advantages, and limitations of Wi-Fi technology.
This document discusses wireless network design considerations for deploying Cisco's Unified Wireless Network (UWN) architecture. It covers topics such as wireless technologies, wireless network topologies, wireless network components, wireless LAN controllers, autonomous and lightweight access points, wireless security, site survey processes, and controller redundancy designs. The goal is to introduce the Cisco UWN architecture and discuss principles for designing wireless networks using lightweight access points and wireless LAN controllers.
This document discusses eTribeca, a New York-based wireless network and security integrator. It provides an overview of eTribeca's services, including Wi-Fi site surveys, network design, implementation, troubleshooting, and proactive Wi-Fi management software. The software provides visibility into network performance and user experience through sensors, agents, and analytics to identify and address issues before they impact users. This helps reduce support costs and improve the overall Wi-Fi experience for clients.
The document discusses wireless network security. It covers topics like Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and virtual private networks (VPNs). WEP was an early security standard with flaws that led to the development of WPA and WPA2 with stronger encryption. The document discusses wireless attacks and defenses, as well as secure wireless network design considerations like using encryption, mutual authentication, and intrusion detection systems. It also covers mobile IP and VPN tunneling protocols like PPTP and L2TP that allow secure remote access.
This document provides a summary of basic wireless networking concepts for new users. It discusses the need for wireless networks and their benefits over wired networks. It then covers fundamental wireless topics like wireless topologies, regulatory bodies, wireless network components, and wireless network types. It also addresses wireless design concepts such as ad-hoc vs infrastructure networks and wireless access point types. The document aims to give new wireless users a high-level understanding of wireless fundamentals and common industry terminology.
The document discusses best practices for wireless LAN deployment and security. It covers wireless concepts and standards, security issues with wireless networks like weak encryption and rogue access points, and common attacks. It also provides countermeasures like using encryption, limiting the broadcast range of access points, implementing authentication, and monitoring for unauthorized devices on the network.
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of wireless technology, outlines the 802.11 standards including 802.11a, 802.11b, 802.11g, security features, and challenges. It also summarizes how WLANs integrate with existing networks through access points and allow roaming between coverage areas.
This document provides an overview of wireless local area networks (WLANs). It discusses wireless technology and standards including 802.11, WLAN topologies, how they integrate with wired networks, security considerations, and performance comparisons between standards such as 802.11a, 802.11b, and 802.11g. Wireless LANs use radio waves to connect devices within a building and bridge to the wired network backbone. Standards specify protocols for authentication, encryption, and quality of service, though some early security features like WEP have proven vulnerable. Migration to wireless offers mobility but introduces new design challenges.
This presentation provides an overview of Wi-Fi technology. It discusses how Wi-Fi works by creating hotspots using access points connected to the internet. It covers the key components of Wi-Fi including access points and Wi-Fi cards. The presentation compares different Wi-Fi versions and standards over time. It also addresses topics such as security, topology, configurations, applications, advantages, and limitations of Wi-Fi technology.
This document discusses wireless network design considerations for deploying Cisco's Unified Wireless Network (UWN) architecture. It covers topics such as wireless technologies, wireless network topologies, wireless network components, wireless LAN controllers, autonomous and lightweight access points, wireless security, site survey processes, and controller redundancy designs. The goal is to introduce the Cisco UWN architecture and discuss principles for designing wireless networks using lightweight access points and wireless LAN controllers.
This document discusses eTribeca, a New York-based wireless network and security integrator. It provides an overview of eTribeca's services, including Wi-Fi site surveys, network design, implementation, troubleshooting, and proactive Wi-Fi management software. The software provides visibility into network performance and user experience through sensors, agents, and analytics to identify and address issues before they impact users. This helps reduce support costs and improve the overall Wi-Fi experience for clients.
The document discusses wireless network security. It covers topics like Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and virtual private networks (VPNs). WEP was an early security standard with flaws that led to the development of WPA and WPA2 with stronger encryption. The document discusses wireless attacks and defenses, as well as secure wireless network design considerations like using encryption, mutual authentication, and intrusion detection systems. It also covers mobile IP and VPN tunneling protocols like PPTP and L2TP that allow secure remote access.
This document provides a summary of basic wireless networking concepts for new users. It discusses the need for wireless networks and their benefits over wired networks. It then covers fundamental wireless topics like wireless topologies, regulatory bodies, wireless network components, and wireless network types. It also addresses wireless design concepts such as ad-hoc vs infrastructure networks and wireless access point types. The document aims to give new wireless users a high-level understanding of wireless fundamentals and common industry terminology.
The document discusses best practices for wireless LAN deployment and security. It covers wireless concepts and standards, security issues with wireless networks like weak encryption and rogue access points, and common attacks. It also provides countermeasures like using encryption, limiting the broadcast range of access points, implementing authentication, and monitoring for unauthorized devices on the network.
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of wireless technology, outlines the 802.11 standards including 802.11a, 802.11b, 802.11g, security features, and challenges. It also summarizes how WLANs integrate with existing networks through access points and allow roaming between coverage areas.
The document summarizes the key aspects of ZigBee, a wireless networking standard targeted for low-power devices. It describes ZigBee's technical goals of low data rates, long battery life, and secure networking. It also outlines ZigBee's device types, network formation process, and traffic modes including beacon-enabled and non-beacon modes.
The document discusses Zigbee wireless communication networks. It provides an overview of Zigbee, including the basics of the underlying 802.15.4 standard. The presentation covers the architecture of Zigbee networks, including the different device types, layers of the protocol stack, and application profiles. Examples of applications of Zigbee technology are also discussed, along with technical trends such as improved power management and interoperability standards.
Wireless networking allows devices to connect to a network without cables by using technologies like Wi-Fi, Bluetooth, and HomeRF. Common types of wireless networks include peer-to-peer networks connecting devices directly and infrastructure networks with an access point connecting devices to a larger network. Key components of setting up a wireless network include wireless adapters, access points, antennas, and configuring standards and security protocols like WEP, WPA, and MAC address filtering.
Wi-Fi uses radio waves to transmit data through the air according to the IEEE 802.11 standards. It allows computers and other devices to connect to the internet and each other wirelessly. The 802.11 standards include 802.11b, 802.11a, 802.11g, 802.11n, and 802.11ac which provide different speeds and capabilities. Wi-Fi networks use access points, wireless cards, and security protocols like WEP, WPA, and WPA2 to transmit data securely between devices over short ranges.
The document provides an overview of ZigBee/IEEE 802.15.4 wireless technology. It discusses the need for low-power, low-cost wireless connectivity for applications like home automation, medical devices, and industrial sensors. It describes the ZigBee Alliance's role in developing networking and application standards on top of the IEEE 802.15.4 physical radio specification. Key features of ZigBee networks include low power consumption, large network capacity, low data rates, and flexibility for many applications.
The document discusses WiMax (Worldwide Interoperability for Microwave Access), which is a wireless broadband technology defined by the IEEE 802.16 standard. It can deliver broadband speeds up to 75 Mbps within a range of 50 kilometers. The standard supports point-to-multipoint and mesh networks. WiMax operates in several frequency bands between 2-66 GHz and provides non-line-of-sight connectivity. It is used for broadband internet access, VoIP, IPTV, and cellular networks.
Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc.
In this module, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures you can put in place to protect against such attacks.
The document discusses ZigBee, a wireless technology standard for low-power wireless networks. ZigBee targets monitoring and control applications with low data rates and infrequent data transmissions from sensors and controllers. It operates on the IEEE 802.15.4 standard and forms mesh networks for reliability and range. The ZigBee Alliance has over 150 member companies working to enable interoperable, low-cost products based on the ZigBee standard across various market applications including home automation, lighting, HVAC, security, and industrial control.
Cisco Unified Wireless Network and Converged access – Design sessionCisco Russia
This document discusses Cisco's unified wireless network and converged access design session. It provides an overview of wireless standards past and present, including expected developments. Cisco's unified access vision is described, bringing wired and wireless onto a single policy and management framework. The document highlights Cisco's leadership in wireless networking and reviews Cisco's wireless product portfolio, including new access point models. Key capabilities such as RF management and advanced mobility services are also summarized.
The document discusses wireless local area networks (WLANs), including an overview of common WLAN standards such as 802.11b, 802.11a, and 802.11g. It covers topics such as how WLANs integrate with existing wired networks using access points, security considerations for WLANs, and factors to consider when migrating to a wireless network such as performing a site survey.
The document discusses the Motorola AP 7131 adaptive access point, which features three radios that allow it to provide multiple concurrent services on a single device. This reduces costs compared to using multiple single-radio access points. Key features include supporting client access, mesh networking, and dedicated wireless intrusion prevention system sensing using the radios. The access point can operate in standalone mode for small/medium businesses or be centrally managed by a wireless switch/controller in larger environments. It provides security, wireless coverage, and performance comparable to wired networks at a lower cost than alternatives.
Wireless Communication And Mobile Network - ZigBeeXaver Y.R. Chen
The document discusses Zigbee wireless networks and Wireless Sensor Networks (WSNs). It provides details on:
1) What a WSN is and its applications in monitoring and controlling environments.
2) The technology requirements for WSNs including low cost, small size, low power consumption, and operating in unlicensed radio bands.
3) Standards for WSNs including IEEE 802.15.4, Zigbee, Bluetooth, and WiFi and their differences in features.
Zigbee is a wireless networking technology used for low-power, low data rate applications. It operates in the industrial, scientific and medical radio bands between 868-915MHz and 2.4GHz. Zigbee devices include low-power digital radios, sensors and controls that allow for wireless monitoring and control applications. Zigbee uses mesh networking which allows many devices to interconnect to extend wireless range and connectivity. Its low power consumption allows longer life with smaller batteries. Common applications include wireless lighting, HVAC and security systems.
The document provides an overview of wireless LAN (WLAN) fundamentals, including:
- WLANs use radio frequencies or infrared to transmit signals without wires, allowing mobility within a local area.
- Common WLAN standards include 802.11a, 802.11b, and 802.11g, which operate in the 2.4GHz and 5GHz licensed-free bands.
- Factors driving WLAN adoption include mobility, ease of deployment, and growth in compatible devices. However, ensuring security, coverage, and managing interference remains important.
The Differences of between ZigBee and Bluetooth technologiesCan KAYA
ZigBee and Bluetooth are wireless network technologies but they have key differences. ZigBee is intended for low data rate, long battery life applications like sensor networks and home automation. It has a range of 10-100m, very low power consumption, supports large networks, and a long battery life. Bluetooth is intended for cable replacement between devices like phones, laptops, and headsets within 10m. It has higher data rates but also higher power consumption and shorter battery life than ZigBee.
This document provides an overview of ZigBee wireless communication technology. It discusses the ZigBee protocol which is based on the IEEE 802.15.4 standard and adds network construction, security, and application services. The ZigBee Alliance develops the ZigBee specification and promotes its adoption. ZigBee is designed for low data rate, long battery life applications like home automation, lighting control, and sensor networks. It supports star, tree, and mesh network topologies operating in the 2.4GHz band with data rates up to 250kbps. The document outlines the physical, MAC and network layers of ZigBee and discusses security, topologies, and applications of the protocol.
This document presents a project proposal for a short-distance wireless voice communication system using ZigBee sensors. The objectives are to implement a handheld device for voice communication using ZigBee. It describes the ZigBee technology, provides a block diagram of the transmitter and receiver components, and outlines the advantages as low cost, high capacity, reliability and security. It presents a timeline for the project in 5 phases over 12 months and estimates the total project cost to be around $23,200.
Zigbee is a technological standard designed for control and sensor networks based on IEEE 802.15.4. The standard is developed and promoted by the Zigbee Alliance.
Low Power Wireless Technologies and Standards for the Internet of ThingsDuncan Purves
Presentation on low power wireless technologies and standards for the Internet of Things (iOT), given at the BCS Communications Management Association AGM on 5th April 2016
This seminar report provides an overview of ZigBee technology. It defines ZigBee as a wireless networking standard intended for low-power devices. The report outlines ZigBee's key characteristics including low cost, low power consumption, mesh networking topology, and built-in security. It also describes ZigBee's protocol stack and compares it to other wireless technologies like Bluetooth and Wi-Fi. Common applications of ZigBee technology include home automation, wireless sensor networks, and industrial control.
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of wireless technology, outlines the 802.11 standards including 802.11a, 802.11b, 802.11g, security features, and challenges. It also summarizes how WLANs integrate with existing networks through access points and allow roaming between coverage areas.
The document discusses wireless networks and wireless local area networks (WLANs). It provides an overview of wireless technology, IEEE 802.11 WLAN standards including 802.11a, 802.11b, security considerations, and migrating to wireless networks. The key topics covered include how wireless LANs work and differ from wired LANs, common network topologies, hardware requirements, and performance comparisons between the different 802.11 standards.
The document summarizes the key aspects of ZigBee, a wireless networking standard targeted for low-power devices. It describes ZigBee's technical goals of low data rates, long battery life, and secure networking. It also outlines ZigBee's device types, network formation process, and traffic modes including beacon-enabled and non-beacon modes.
The document discusses Zigbee wireless communication networks. It provides an overview of Zigbee, including the basics of the underlying 802.15.4 standard. The presentation covers the architecture of Zigbee networks, including the different device types, layers of the protocol stack, and application profiles. Examples of applications of Zigbee technology are also discussed, along with technical trends such as improved power management and interoperability standards.
Wireless networking allows devices to connect to a network without cables by using technologies like Wi-Fi, Bluetooth, and HomeRF. Common types of wireless networks include peer-to-peer networks connecting devices directly and infrastructure networks with an access point connecting devices to a larger network. Key components of setting up a wireless network include wireless adapters, access points, antennas, and configuring standards and security protocols like WEP, WPA, and MAC address filtering.
Wi-Fi uses radio waves to transmit data through the air according to the IEEE 802.11 standards. It allows computers and other devices to connect to the internet and each other wirelessly. The 802.11 standards include 802.11b, 802.11a, 802.11g, 802.11n, and 802.11ac which provide different speeds and capabilities. Wi-Fi networks use access points, wireless cards, and security protocols like WEP, WPA, and WPA2 to transmit data securely between devices over short ranges.
The document provides an overview of ZigBee/IEEE 802.15.4 wireless technology. It discusses the need for low-power, low-cost wireless connectivity for applications like home automation, medical devices, and industrial sensors. It describes the ZigBee Alliance's role in developing networking and application standards on top of the IEEE 802.15.4 physical radio specification. Key features of ZigBee networks include low power consumption, large network capacity, low data rates, and flexibility for many applications.
The document discusses WiMax (Worldwide Interoperability for Microwave Access), which is a wireless broadband technology defined by the IEEE 802.16 standard. It can deliver broadband speeds up to 75 Mbps within a range of 50 kilometers. The standard supports point-to-multipoint and mesh networks. WiMax operates in several frequency bands between 2-66 GHz and provides non-line-of-sight connectivity. It is used for broadband internet access, VoIP, IPTV, and cellular networks.
Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc.
In this module, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures you can put in place to protect against such attacks.
The document discusses ZigBee, a wireless technology standard for low-power wireless networks. ZigBee targets monitoring and control applications with low data rates and infrequent data transmissions from sensors and controllers. It operates on the IEEE 802.15.4 standard and forms mesh networks for reliability and range. The ZigBee Alliance has over 150 member companies working to enable interoperable, low-cost products based on the ZigBee standard across various market applications including home automation, lighting, HVAC, security, and industrial control.
Cisco Unified Wireless Network and Converged access – Design sessionCisco Russia
This document discusses Cisco's unified wireless network and converged access design session. It provides an overview of wireless standards past and present, including expected developments. Cisco's unified access vision is described, bringing wired and wireless onto a single policy and management framework. The document highlights Cisco's leadership in wireless networking and reviews Cisco's wireless product portfolio, including new access point models. Key capabilities such as RF management and advanced mobility services are also summarized.
The document discusses wireless local area networks (WLANs), including an overview of common WLAN standards such as 802.11b, 802.11a, and 802.11g. It covers topics such as how WLANs integrate with existing wired networks using access points, security considerations for WLANs, and factors to consider when migrating to a wireless network such as performing a site survey.
The document discusses the Motorola AP 7131 adaptive access point, which features three radios that allow it to provide multiple concurrent services on a single device. This reduces costs compared to using multiple single-radio access points. Key features include supporting client access, mesh networking, and dedicated wireless intrusion prevention system sensing using the radios. The access point can operate in standalone mode for small/medium businesses or be centrally managed by a wireless switch/controller in larger environments. It provides security, wireless coverage, and performance comparable to wired networks at a lower cost than alternatives.
Wireless Communication And Mobile Network - ZigBeeXaver Y.R. Chen
The document discusses Zigbee wireless networks and Wireless Sensor Networks (WSNs). It provides details on:
1) What a WSN is and its applications in monitoring and controlling environments.
2) The technology requirements for WSNs including low cost, small size, low power consumption, and operating in unlicensed radio bands.
3) Standards for WSNs including IEEE 802.15.4, Zigbee, Bluetooth, and WiFi and their differences in features.
Zigbee is a wireless networking technology used for low-power, low data rate applications. It operates in the industrial, scientific and medical radio bands between 868-915MHz and 2.4GHz. Zigbee devices include low-power digital radios, sensors and controls that allow for wireless monitoring and control applications. Zigbee uses mesh networking which allows many devices to interconnect to extend wireless range and connectivity. Its low power consumption allows longer life with smaller batteries. Common applications include wireless lighting, HVAC and security systems.
The document provides an overview of wireless LAN (WLAN) fundamentals, including:
- WLANs use radio frequencies or infrared to transmit signals without wires, allowing mobility within a local area.
- Common WLAN standards include 802.11a, 802.11b, and 802.11g, which operate in the 2.4GHz and 5GHz licensed-free bands.
- Factors driving WLAN adoption include mobility, ease of deployment, and growth in compatible devices. However, ensuring security, coverage, and managing interference remains important.
The Differences of between ZigBee and Bluetooth technologiesCan KAYA
ZigBee and Bluetooth are wireless network technologies but they have key differences. ZigBee is intended for low data rate, long battery life applications like sensor networks and home automation. It has a range of 10-100m, very low power consumption, supports large networks, and a long battery life. Bluetooth is intended for cable replacement between devices like phones, laptops, and headsets within 10m. It has higher data rates but also higher power consumption and shorter battery life than ZigBee.
This document provides an overview of ZigBee wireless communication technology. It discusses the ZigBee protocol which is based on the IEEE 802.15.4 standard and adds network construction, security, and application services. The ZigBee Alliance develops the ZigBee specification and promotes its adoption. ZigBee is designed for low data rate, long battery life applications like home automation, lighting control, and sensor networks. It supports star, tree, and mesh network topologies operating in the 2.4GHz band with data rates up to 250kbps. The document outlines the physical, MAC and network layers of ZigBee and discusses security, topologies, and applications of the protocol.
This document presents a project proposal for a short-distance wireless voice communication system using ZigBee sensors. The objectives are to implement a handheld device for voice communication using ZigBee. It describes the ZigBee technology, provides a block diagram of the transmitter and receiver components, and outlines the advantages as low cost, high capacity, reliability and security. It presents a timeline for the project in 5 phases over 12 months and estimates the total project cost to be around $23,200.
Zigbee is a technological standard designed for control and sensor networks based on IEEE 802.15.4. The standard is developed and promoted by the Zigbee Alliance.
Low Power Wireless Technologies and Standards for the Internet of ThingsDuncan Purves
Presentation on low power wireless technologies and standards for the Internet of Things (iOT), given at the BCS Communications Management Association AGM on 5th April 2016
This seminar report provides an overview of ZigBee technology. It defines ZigBee as a wireless networking standard intended for low-power devices. The report outlines ZigBee's key characteristics including low cost, low power consumption, mesh networking topology, and built-in security. It also describes ZigBee's protocol stack and compares it to other wireless technologies like Bluetooth and Wi-Fi. Common applications of ZigBee technology include home automation, wireless sensor networks, and industrial control.
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of wireless technology, outlines the 802.11 standards including 802.11a, 802.11b, 802.11g, security features, and challenges. It also summarizes how WLANs integrate with existing networks through access points and allow roaming between coverage areas.
The document discusses wireless networks and wireless local area networks (WLANs). It provides an overview of wireless technology, IEEE 802.11 WLAN standards including 802.11a, 802.11b, security considerations, and migrating to wireless networks. The key topics covered include how wireless LANs work and differ from wired LANs, common network topologies, hardware requirements, and performance comparisons between the different 802.11 standards.
This document provides an overview of wireless networks and the IEEE 802.11 wireless LAN standards. It discusses how wireless LANs connect to wired networks through access points and allow mobility. The 802.11 standards including 802.11a, 802.11b, 802.11g, and 802.11e are summarized, outlining their data rates, frequencies, and other key aspects. Security features of 802.11 such as Wired Equivalent Privacy (WEP) are also summarized, noting vulnerabilities in the authentication and encryption methods.
This document provides an overview of wireless networks and the IEEE 802.11 wireless LAN standards. It discusses how wireless LANs operate similarly to wired LANs but use radio waves instead of cables for the last link to users. Access points are used to bridge wireless traffic to a wired network backbone. The document also covers wireless topologies, standards such as 802.11a, 802.11b, 802.11g, and security features like WEP as well as their limitations. It provides guidance on planning a wireless LAN migration including access point placement and site surveys.
This document provides an overview of wireless networks and the IEEE 802.11 wireless LAN standards. It discusses how wireless LANs connect to wired networks through access points and allow mobility. The 802.11 standards including 802.11a, 802.11b, 802.11g, and 802.11e are described in terms of their data rates, frequencies used, and other characteristics. The document also covers wireless LAN security features like authentication, encryption, and integrity checking provided by Wired Equivalent Privacy (WEP) as well as problems with WEP security.
1.2 Wireless Local Area Netw BASICS.pptxstephen972973
This document provides an overview of wireless local area networks (WLANs), including:
- An outline of topics such as wireless technology, IEEE 802.11 standards, securing WLANs, and migrating to wireless networks.
- Descriptions of how WLANs work and integrate with existing wired networks using access points, allowing users to roam between coverage areas while maintaining a continuous connection.
- Details on the 802.11 standards including 802.11a, 802.11b, 802.11g, security features, and comparisons of their data rates and frequencies.
This document provides an overview of wireless communication and networking. It defines wireless communication and discusses wireless network topologies and integration with wired networks. It describes the IEEE 802.11 wireless standards including 802.11a, 802.11b, 802.11g and 802.11n. It also discusses wireless networking devices such as access points, wireless LAN controllers, and bridges. Finally, it covers common wireless security measures including SSID hiding, MAC address filtering, static IP addressing, 802.1X authentication, WEP, WPA, and WPA2 encryption.
This chapter discusses exploiting wireless networks. It begins by explaining wireless technology and standards such as 802.11. It describes the basic components of a wireless network including access points and service set identifiers. It then covers wireless authentication methods like Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA), and wireless hacking tools and techniques like wardriving. The goal is to help security professionals understand wireless networks and how attackers may exploit them.
A wireless local area network (WLAN) uses radio waves to wirelessly connect devices within a local area like a home or office, often including an access point to connect to the internet. WLANs use specialized protocols at the physical and data link layers and integrate into existing networks through access points. Common WLAN standards include IEEE 802.11b, 802.11a, and 802.11g which provide speeds up to 11Mbps, 54Mbps, and 54Mbps respectively in the 2.4GHz and 5GHz bands. Real-time services like voice can be transported over WLANs using protocols like PCF but may require echo cancellation to meet latency requirements.
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standard. It provides an overview of wired and wireless LANs, the development and specifications of IEEE 802.11, and differences between wireless and wired networks that 802.11 addresses like power management, security, and bandwidth. It also covers wireless LAN topologies, media access control, security issues, and physical layer standards defined in original 802.11 like frequency hopping spread spectrum and direct sequence spread spectrum.
The document discusses the components and characteristics of wireless local area networks (WLANs). It describes the basic components of a WLAN including access points, WLAN adapters, and software. It discusses characteristics such as typical ranges of access points, the number of users supported, and how multiple access points can be connected. It also covers topics such as roaming between access points, infrastructure versus ad-hoc network architectures, and standards like IEEE 802.11.
Wireless networks use radio waves to connect devices without cables. They integrate with wired networks through access points and allow mobility as users move between coverage areas. The 802.11 standards define the physical and data link layers for wireless LANs and include specifications like 802.11a, b, g which provide different speeds and frequencies. Security is important for wireless networks and features like WEP have known vulnerabilities. Careful planning of access point placement and antennas is needed for effective coverage.
The document discusses wireless local area networks (WLANs). It describes how an access point is used to connect wireless devices like laptops and desktops to a wired local area network. The access point bridges the wireless and wired networks. It also discusses the benefits of WLANs like providing mobility and reducing installation costs compared to wired networks.
The document discusses wireless networks and IEEE 802.11 standards. It describes the components of wired LANs like repeaters, hubs, bridges, and switches. It then covers wireless networks including wireless LAN standards like 802.11b, 802.11a, and 802.11g. It also discusses wireless network topologies, services, and the medium access control of 802.11 which uses CSMA/CA for distributed coordination function and an alternative point coordination function for centralized access control.
This document provides an overview of wireless networks and the 802.11 wireless LAN standard. It describes how wireless LANs connect to wired LANs through access points and can also operate as independent ad hoc networks. Key aspects of 802.11 wireless LANs covered include the physical and data link layers, integration with existing networks through roaming between access points, security considerations, interoperability requirements, hardware requirements, and performance differences from wired LANs. Specific 802.11 standards like 802.11a, 802.11b, 802.11g, 802.11e, and 802.11f are also summarized.
The document discusses Wi-Fi technology, including its standards, architecture, security techniques, and applications. It describes the IEEE 802.11 standards for Wi-Fi networks, including 802.11b, 802.11a, and 802.11g. It outlines the basic components of a Wi-Fi network including access points, Wi-Fi cards, and security measures. It also summarizes common Wi-Fi network configurations, topologies, and applications as well as security techniques such as SSID, WEP, WPA, and 802.1x access control.
Wireless comm & wireless network my seminarNaveed Farhana
The document is a presentation about wireless communications and wireless networks. It discusses key topics such as wireless technology, IEEE 802.11 wireless LAN standards, secure wireless LANs, and migrating to wireless LANs. The presentation outlines different wireless network types, how wireless LANs work and differ from wired LANs, common wireless network topologies, and details of specific 802.11 wireless standards including 802.11a, 802.11b, and 802.11g.
This document provides an overview of wireless networking standards and security. It describes wireless technology components like access points and wireless network interface cards. It explains wireless networking standards established by IEEE like 802.11b, 802.11g, and 802.11n. The document also covers wireless authentication methods including wired equivalent privacy (WEP), Wi-Fi protected access (WPA), 802.1X, and protocols like EAP, PPP, and CHAP. It discusses vulnerabilities of early security standards and improvements made by newer standards to strengthen wireless network security.
2. Presentation Outline
Wireless Technology overview
The IEEE 802.11 WLAN Standards
Secure Wireless LANs
Migrating to Wireless LANs (Cutting the cord)
3. Wireless?
A wireless LAN or WLAN is a wireless local area
network that uses radio waves as its carrier.
The last link with the users is wireless, to give a
network connection to all users in a building or
campus.
The backbone network usually uses cables
4. Common Topologies
There is a need of an access point that bridges wireless LAN traffic into the wired LAN.
The access point (AP) can also act as a repeater for wireless nodes, effectively doubling the maximum possible distance
between nodes.
5. Common Topologies
Complete Wireless Networks
The physical size of the network is determined by the maximum reliable
propagation range of the radio signals.
Referred to as ad hoc networks
Are self-organizing networks without any centralized control
Suited for temporary situations such as meetings and conferences.
6. How do wireless LANs work?
Wireless LANs operate in almost the same way as
wired LANs, using the same networking protocols
and supporting the most of the same
applications.
7. How are WLANs Different?
They use specialized physical and data link
protocols
They integrate into existing networks through
access points which provide a bridging function
They let you stay connected as you roam from one
coverage area to another
They have unique security considerations
They have specific interoperability requirements
They require different hardware
They offer performance that differs from wired
LANs.
8. Physical and Data Link Layers
Physical Layer:
The wireless NIC takes frames of data from the link
layer, scrambles the data in a predetermined way, then
uses the modified data stream to modulate a radio
carrier signal.
Data Link Layer:
Uses Carriers-Sense-Multiple-Access with Collision
Avoidance (CSMA/CA).
9. Integration With Existing Networks
Wireless Access Points (APs) - a small device that
bridges wireless traffic to your network.
Most access points bridge wireless LANs into Ethernet
networks, but Token-Ring options are available as well.
11. Roaming
Users maintain a continuous connection as they roam
from one physical area to another
Mobile nodes automatically register with the new access
point.
Methods: DHCP, Mobile IP
IEEE 802.11 standard does not
address roaming, you may need
to purchase equipment from one
vendor if your users need to roam
from one access point to another.
12. Security
In theory, spread spectrum radio signals are inherently
difficult to decipher without knowing the exact
hopping sequences or direct sequence codes used
The IEEE 802.11 standard specifies optional security
called "Wired Equivalent Privacy" whose goal is that a
wireless LAN offer privacy equivalent to that offered by
a wired LAN. The standard also specifies optional
authentication measures.
13. Interoperability
Before the IEEE 802.11 interoperability was based
on cooperation between vendors.
IEEE 802.11 only standardizes the physical and
medium access control layers.
Vendors must still work with each other to ensure
their IEEE 802.11 implementations interoperate
Wireless Ethernet Compatibility Alliance (WECA)
introduces the Wi-Fi Certification to ensure cross-
vendor interoperability of 802.11b solutions
14. Hardware
PC Card, either with integral antenna or with external
antenna/RF module.
ISA Card with external antenna connected by cable.
Handheld terminals
Access points
16. Performance
802.11a offers speeds with a theoretically maximum
rate of 54Mbps in the 5 GHz band
802.11b offers speeds with a theoretically maximum
rate of 11Mbps at in the 2.4 GHz spectrum band
802.11g is a new standard for data rates of up to a
theoretical maximum of 54 Mbps at 2.4 GHz.
17. What is 802.11?
A family of wireless LAN (WLAN) specifications
developed by a working group at the Institute of
Electrical and Electronic Engineers (IEEE)
Defines standard for WLANs using the following
four technologies
Frequency Hopping Spread Spectrum (FHSS)
Direct Sequence Spread Spectrum (DSSS)
Infrared (IR)
Orthogonal Frequency Division Multiplexing (OFDM)
Versions: 802.11a, 802.11b, 802.11g, 802.11e, 802.11f,
802.11i
18. 802.11 - Transmission
Most wireless LAN products operate in unlicensed
radio bands
2.4 GHz is most popular
Available in most parts of the world
No need for user licensing
Most wireless LANs use spread-spectrum radio
Resistant to interference, secure
Two popular methods
Frequency Hopping (FH)
Direct Sequence (DS)
19. Frequency Hopping Vs. Direct Sequence
FH systems use a radio carrier that “hops” from frequency to
frequency in a pattern known to both transmitter and receiver
Easy to implement
Resistance to noise
Limited throughput (2-3 Mbps @ 2.4 GHz)
DS systems use a carrier that remains fixed to a specific
frequency band. The data signal is spread onto a much larger
range of frequencies (at a much lower power level) using a
specific encoding scheme.
Much higher throughput than FH (11 Mbps)
Better range
Less resistant to noise (made up for by redundancy – it transmits at
least 10 fully redundant copies of the original signal at the same time)
20. 802.11a
Employs Orthogonal Frequency Division Multiplexing
(OFDM)
Offers higher bandwidth than that of 802.11b, DSSS
(Direct Sequence Spread Spectrum)
802.11a MAC (Media Access Control) is same as 802.11b
Operates in the 5 GHz range
21. 802.11a Advantages
Ultra-high spectrum efficiency
5 GHz band is 300 MHz (vs. 83.5 MHz @ 2.4 GHz)
More data can travel over a smaller amount of
bandwidth
High speed
Up to 54 Mbps
Less interference
Fewer products using the frequency
2.4 GHz band shared by cordless phones, microwave ovens,
Bluetooth, and WLANs
22. 802.11a Disadvantages
Standards and Interoperability
Standard not accepted worldwide
No interoperability certification available
for 802.11a products
Not compatible or interoperable with 802.11b
Legal issues
License-free spectrum in 5 GHz band not
available worldwide
Market
Beyond LAN-LAN bridging, there is limited interest for
5 GHz adoption
23. 802.11a Disadvantages
Cost
2.4 GHz will still has >40% cost advantage
Range
At equivalent power, 5 GHz range will be ~50% of 2.4
GHz
Power consumption
Higher data rates and increased signal require more
power
OFDM is less power-efficient then DSSS
24. 802.11a Applications
Building-to-building connections
Video, audio conferencing/streaming video,
and audio
Large file transfers, such as engineering
CAD drawings
Faster Web access and browsing
High worker density or high throughput scenarios
Numerous PCs running graphics-intensive applications
25. 802.11a Vs. 802.11b
802.11a vs.
802.11b
802.11a 802.11b
Raw data rates Up to 54 Mbps
(54, 48, 36, 24,18, 12
and 6 Mbps)
Up to 11 Mbps
(11, 5.5, 2, and
1 Mbps)
Range 50 Meters 100 Meters
Bandwidth UNII and ISM
(5 GHz range)
ISM (2.4000—
2.4835 GHz range)
Modulation OFDM technology DSSS technology
26. 802.11g
802.11g is a high-speed extension to 802.11b
Compatible with 802.11b
High speed up to 54 Mbps
2.4 GHz (vs. 802.11a, 5 GHz)
Using ODFM for backward compatibility
Adaptive Rate Shifting
27. 802.11g Advantages
Provides higher speeds and higher capacity
requirements for applications
Wireless Public Access
Compatible with existing 802.11b standard
Leverages Worldwide spectrum availability
in 2.4 GHz
Likely to be less costly than 5 GHz alternatives
Provides easy migration for current users of 802.11b
WLANs
Delivers backward support for existing 802.11b products
Provides path to even higher speeds in the future
28. 802.11e Introduces Quality of Service
Also know as P802.11 TGe
Purpose:
To enhance the 802.11 Medium Access
Control (MAC) to improve and manage
Quality of Service (QoS)
Cannot be supported in current chip design
Requires new radio chips
Can do basic QoS in MAC layer
29. 802.11f – Inter Access Point Protocol
Also know as P802.11 TGf
Purpose:
To develop a set of requirements for Inter-Access Point
Protocol (IAPP), including operational and
management aspects
30. 802.11b Security Features
Wired Equivalent Privacy (WEP) – A protocol to
protect link-level data during wireless transmission
between clients and access points.
Services:
Authentication: provides access control to the network by
denying access to client stations that fail to authenticate
properly.
Confidentiality: intends to prevent information compromise
from casual eavesdropping
Integrity: prevents messages from being modified while in
transit between the wireless client and the access point.
31. Authentication
Means:
Based on cryptography
Non-cryptographic
Both are identity-based verification mechanisms
(devices request access based on the SSID – Service Set
Identifier of the wireless network).
33. Privacy
Cryptographic techniques
WEP Uses RC4 symmetric key, stream cipher
algorithm to generate a pseudo random data sequence.
The stream is XORed with the data to be transmitted
Key sizes: 40bits to 128bits
Unfortunately, recent attacks have shown that the
WEP approach for privacy is vulnerable to certain
attack regardless of key size
34. Data Integrity
Data integrity is ensured by a simple encrypted version
of CRC (Cyclic Redundant Check)
Also vulnerable to some attacks
35. Security Problems
Security features in Wireless products are
frequently not enabled.
Use of static WEP keys (keys are in use for a very
long time). WEP does not provide key
management.
Cryptographic keys are short.
No user authentication occurs – only devices are
authenticated. A stolen device can access the
network.
Identity based systems are vulnerable.
Packet integrity is poor.
37. WLAN Migration – Cutting The
Cord
Essential Questions
Choosing the Right Technology
Data Rates
Access Point Placement and Power
Antenna Selection and Placement
Connecting to the Wired LAN
The Site Survey
38. Essential Questions
Why is the organization considering wireless? Allows
to clearly define requirements of the WLAN ->
development plan
How many users require mobility?
What are the applications that will run over the
WLAN? Helps to determine bandwidth requirements,
a criteria to choose between available technologies.
Wireless is a shared medium, not switched!!!
39. Choose the right technology
Usually IEEE 802.11b or 802.11a
802.11b offers interoperability (WECA Wi-Fi
Certification Program)
802.11a offers higher data rates (up to 54 mbps) ->
higher throughput per user. Limited interoperability.
40. Data rates
Data rates affect range
802.11b 1 to 11 Mbps in 4 increments
802.11a 6 to 54 Mbps in 7 increments
The minimum data rate must be determined at
design time
Selecting only the highest data rate will require a
greater number of APs to cover a specific area
Compromise between data rates and overall
system cost
41. Access Point Placement and Power
Typically – mounted at ceiling height.
Between 15 and 25 feet (4.5m to 8m)
The greater the height, the greater the difficulty to get
power to the unit. Solution: consider devices that can
be powered using CAT5 Ethernet cable (CISCO
Aironet 1200 Series).
Access points have internal or external antennas
42. Antenna Selection and Placement
Permanently attached.
Remote antennas connected using an antenna
cable.
Coax cable used for RF has a high signal loss,
should not be mounted more than a 1 or 2 meters
away from the device.
Placement: consider building construction, ceiling
height, obstacles, and aesthetics. Different
materials (cement, steel) have different radio
propagation characteristics.
43. Connecting to the Wired LAN
Consider user mobility
If users move between subnets, there are challenges to
consider.
OSes like Windows XP and 2000, Linux support DHCP
to obtain the new IP address for the subnet. Certain
applications such as VPN will fail.
Solution: access points in a roaming area are on the
same segment.
44. The Site Survey
Helps define the coverage areas, data rates, the precise
placement of access point.
Gather information: diagramming the coverage area
and measuring the signal strength, SNR (signal to
noise ratio), RF interference levels