SlideShare a Scribd company logo
Computer Networks
Wireless Networking
Date:
Department of Computer Engineering
Jain Group of Institution, Bangalore
Presented By:
Rubal Sagwal
Assistant Professor
Department of Computer Engineering
1ADAD
Contents
• Introduction to wireless networking
• Types of Wireless Networks
• Wireless network components
• Standard 802.11
• Wireless security protocols
ADAD 2
Wireless Networking
Wireless Technology– Benefits of Wireless Technology
ADAD 3
Wireless Technology
• Wireless – No physical transmission device –
telecommunications in which electromagnetic waves
(rather than some form of wire) carry the signal over
part or all of the communication path.
• For Example:
• Wi-Fi
• Mobile phones
• GPS (Global positioning System)
• Cordless mouse/ keyboard
• Home entertainment system
• Wireless Ethernet – Bluetooth
https://www.youtube.com/watch?time_continue=42&v=u21lNHy0
72U
ADAD 4
Benefits of Wireless Technology
• Advantage of a wireless network over a wired – users
can move around freely within the area of the network
with their laptops, handheld devices etc and get an
internet connection.
• Users are also able to share files and other resources
with other devices that are connected to the network
without having to be cabled to a port.
• Not having to lay lots of cables and put them through
walls etc – less cost.
• Wireless networks can sometimes handle a larger
amount of users because they are not limited by a
specific number of connection ports.
ADAD 5
Types of Wireless
Networks
Ad-hoc Mode – Infrastructure Mode
ADAD 6
Wireless Network
• IEEE 802.11 – Specification for wireless LAN
defined by IEEE – Covers physical and data link
layer.
ADAD 7
Architecture
BSS (Basic Service
Set)
ESS (Extended
Service Set)
1. BSS (Basic Service Set)
• Building block of a wireless LAN.
• Made of – Stationary or Mobile service station –
Assess Point ( AP, Optional central base station).
• Without an AP – Ad-hoc Architecture
• Stand-alone network, can’t send data to other BSSs.
• Can form a network without the need of an AP.
• With an AP – Infrastructure Network
ADAD 8
1. BSS (Basic Service Set)
ADAD 9
2. ESS (Extended Service Set)
• Made up of two or more BSS with Aps.
• Connected through a distribution system (Wired
LAN).
• Distribution system – connects the APs in the BSSs.
ADAD 10
2. ESS (Extended Service Set)
• It uses two station – Mobile and Stationary.
• Mobile station are normal station inside a BSS
• Stationary station are AP stations that are part of wired
LAN.
• When BSS are connected, the stations within reach
of one another can communicate without the use
of an AP.
ADAD 11
Station Type
1. No-Transition: either stationary (not moving) or
moving only inside a BSS.
2. BSS-transition: move from one BSS to another,
but the movement is confined inside one ESS.
3. ESS-transition: can move from one ESS to
another.
ADAD 12
Wireless Network
Components
Wireless Access Points – Wireless NICs
ADAD 13
Wireless Access Point
• A wireless access point (WAP) – a hardware device
or configured node on a local area network (LAN).
• That allows wireless capable devices and wired
networks to connect through a wireless standard,
including Wi-Fi or Bluetooth.
• WAPs feature antennae, which facilitate
connectivity between devices and the Internet or a
network.
ADAD 14
Wireless NIC
• A Wireless Network Card performs basically the
same operation as a normal network card, except
instead of operating through network cables, it
operates wirelessly.
• A W-NIC, just like other NICs, works on the Layer 1
and Layer 2 of the OSI Model.
• This card uses an antenna to
communicate via microwave radiate
on.
ADAD 15
Advantages of Wireless-NIC
• SETUP:
• Because wireless networks operate wirelessly, they
become very easy to setup and change.
• SECURITY:
• Today the security that wireless routers and cards offer,
is great, if you are willing to just go about setting it up.
• CHEAPER:
• wireless is so much cheaper than wired.
• SPEED:
• with the latest progressions, wireless is quickly
becoming just as fast or faster than their wired
counterparts.
ADAD 16
Wireless LAN Standards
IEEE 802.11a – IEEE 802.11b – IEEE 802.11g
ADAD 17
IEEE 802.11
• IEEE 802.11 is a set of media access control (MAC) (also
known as data link layer) and physical layer (PHY)
specifications for implementing wireless local area
network(WLAN).
• They are the world's most widely used wireless computer
networking standards, used in most home and office
networks to allow laptops, printers, and smartphones to talk
to each other and access the Internet without connecting
wires.
• They are created and maintained by the Institute of
Electrical and Electronics
Engineers (IEEE) LAN/MAN Standards Committee (IEEE 802).
• The base version of the standard was released in 1997, and
has had subsequent amendments.
ADAD 18
IEEE 802.11a
• The IEEE 802.11a standard is capable of producing a high level of
performance, and being in a band which is used less than the levels of
interference are less allowing high levels of performance.
• The 802.11a standard is alphabetically the first of the variety of 802.11
standards that are in widespread use today.
• Although 802.11a was ratified at the same time as 802.11b, it never
caught on in the same way despite the fact that it offered a much higher
data transfer rate.
ADAD 19
PARAMETER VALUE
Date of standard approval July 1999
Maximum data rate
(Mbps)
54
Typical data rate (Mbps) 25
IEEE 802.11b
ADAD 20
• IEEE 802.11b was the first wireless LAN standard to be
widely adopted and built in to many laptop computers
and other forms of equipment.
• The standard for 802.11b was ratified by the IEEE in July
1999 and the idea for wireless networking quickly
caught on with many W-Fi hotspots being set up so
that business people could access their emails and surf
the Internet as required when they were travelling.
• It was only after 802.11 was ratified and products
became available that W-Fi took off in a large way. Wi-
Fi hotspots were set up in many offices, hotels and
airports and the idea of using portable laptop
computers while travelling became far easier.
IEEE 802.11b Specifications
ADAD 21
• 802.11b boasts an impressive performance. It is
able to transfer data with raw data rates up to 11
Mbps, and has a good range, although not when
operating at its full data rate.
PARAMETER VALUE
Date of standard
approval
July 1999
Maximum data rate
(Mbps)
11
Typical data rate
(Mbps)
5
IEEE 802.11g
ADAD 22
• After the introduction of Wi-Fi with the 802.11a and
802.11b standards, the 802.11b standard became the most
popular operating in the 2.4 GHz ISM band.
• This standard proved to be the most popular despite the
faster operating speed of the a variant of the standard
because the cost of producing chips to operate at 2.4 GHz
were much less than ones to run at 5 GHz.
• In order to provide the higher speeds of 802.11a while
operating on the 2.4 GHz ISM band, a new standard was
introduced. Known as 802.11g, it soon took over from the b
standard.
• Even before the standard was ratified, 802.11g products
were available on the market, and before long it became the
dominant Wi-Fi technology.
IEEE 802.11g Specification
ADAD 23
• The 802.11g standard provided a number of
improvements over the 802.11b standard which
was its predecessor. The highlights of its
performance are given in the table below.
IEEE 802.11G WI-FI FEATURES
FEATURE 802.11G
Date of standard approval June 2003
Maximum data rate (Mbps) 54
Modulation CCK, DSSS, or OFDM
RF Band (GHz) 2.4
Channel width (MHz) 20
Wireless Security
Protocol
WEP – WPA – 802.1X
ADAD 24
1. WEP (Wired Equivalent Privacy)
ADAD 25
• Wired Equivalent Privacy (WEP) is a security
algorithm for IEEE 802.11 wireless networks.
• Specified in the IEEE Wireless Fidelity (Wi-Fi)
standard, 802.11b, that is designed to provide a
wireless local area network (WLAN) with a level of
security and privacy comparable to what is usually
expected of a wired LAN.
• A wired local area network (LAN) is generally protected
by physical security mechanisms (For example,
controlled access to a building) that are effective for a
controlled physical environment, but may be ineffective
for WLANs because radio waves are not necessarily
bound by the walls containing the network.
WEP (Wired Equivalent Privacy)
ADAD 26
• WEP seeks to establish similar protection to that offered by
the wired network's physical security measures by
encrypting data transmitted over the WLAN.
Data encryption protects the vulnerable wireless link
between clients and access points.
• Once this measure has been taken, other typical LAN
security mechanisms such as password protection, end-to-
end encryption, virtual private networks (VPNs),
and authentication can be put in place to ensure privacy.
2. Wi-Fi Protected Access (WPA)
ADAD 27
• Wi-Fi Protected Access (WPA) is a security standard for
users of computing devices equipped
with wireless internet connections.
• WPA was developed by the Wi-Fi Alliance to provide
more sophisticated data encryption and better
user authentication than Wired Equivalent Privacy
(WEP), the original Wi-Fi security standard.
• The new standard, which was ratified by the IEEE in
2004 as 802.11i , was designed to be backward-
compatible with WEP to encourage quick, easy
adoption. Network security professionals were able to
support WPA on many WEP-based devices with a
simple firmware update.
Wi-Fi Protected Access (WPA)
ADAD 28
• WPA has discrete modes for enterprise users and for
personal use.
• The enterprise mode, WPA-EAP, uses more stringent 802.1x
authentication with the Extensible Authentication Protocol
(EAP).
• The personal mode, WPA-PSK, uses preshared keys for
simpler implementation and management among
consumers and small offices.
• Enterprise mode requires the use of an authentication
server.
• WPA's encryption method is the Temporal Key Integrity
Protocol (TKIP).
Wi-Fi Protected Access (WPA)
ADAD 29
• TKIP includes a per-packet mixing function, a message integrity check,
an extended initialization vector and a re-keying mechanism.
• WPA provides strong user authentication based on 802.1x and the
Extensible Authentication Protocol (EAP). WPA depends on a central
authentication server, such as RADIUS, to authenticate each user.
• Software updates that allow both server and client computers to
implement WPA became widely available during 2003.
• Access points can operate in mixed WEP/WPA mode to support both
WEP and WPA clients. However, mixed mode effectively provides only
WEP-level security for all users.
• Home users of access points that use only WPA can operate in a special
home mode in which the user need only enter a password to be
connected to the access point. The password will trigger authentication
and TKIP encryption.
3. 802.1X
ADAD 30
• The 802.1X standard is designed to enhance the
security of wireless local area networks (WLANs)
that follow the IEEE 802.11 standard.
• 802.1X provides an authentication framework for
wireless LANs, allowing a user to be authenticated
by a central authority.
• 802.1X uses an existing protocol, the Extensible
Authentication Protocol (EAP, RFC 2284), that works
on Ethernet, Token Ring, or wireless LANs, for
message exchange during the authentication
process.
802.1X
ADAD 31
• In a wireless LAN with 802.1X, a user (known as the supplicant)
requests access to an access point (known as the authenticator).
• The access point forces the user (actually, the user's client
software) into an unauthorized state that allows the client to send
only an EAP start message.
• The access point returns an EAP message requesting the user's
identity.
• The client returns the identity, which is then forwarded by the
access point to the authentication server, which uses an
algorithm to authenticate the user and then returns an accept or
reject message back to the access point.
• Assuming an accept was received, the access point changes the
client's state to authorized and normal traffic can now take place.
Wireless security protocols: The difference between
WEP, WPA, WPA2
ADAD 32

More Related Content

What's hot

Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
Aniruddha Gupta
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
Mateen Shahid
 
Wireless communication
Wireless communicationWireless communication
Wireless communicationDarshan Maru
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDon Norwood
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
Naveen Kumar
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
Parthipan Parthi
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
Hitesh Mohapatra
 
WiMax - Technology & Architecture
WiMax - Technology & ArchitectureWiMax - Technology & Architecture
WiMax - Technology & Architecture
sashar86
 
Types of Networking Devices
Types of Networking DevicesTypes of Networking Devices
Types of Networking Devices
Shubham Bathe
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
ruledbyrobotics2080
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networks
Bikash Kumar
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
Manish8976
 
Cdma2000
Cdma2000Cdma2000
Cdma2000
vivek kumar
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
Basil John
 
Ultra wideband technology (UWB)
Ultra wideband technology (UWB)Ultra wideband technology (UWB)
Ultra wideband technology (UWB)
Mustafa Khaleel
 
Local area network
Local area networkLocal area network
Local area networkSEDYK
 
Comparison between 2g, 2.5g, 3g, lte and lte a
Comparison between 2g, 2.5g, 3g, lte and lte aComparison between 2g, 2.5g, 3g, lte and lte a
Comparison between 2g, 2.5g, 3g, lte and lte aManish Srivastava
 

What's hot (20)

Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
WiMax - Technology & Architecture
WiMax - Technology & ArchitectureWiMax - Technology & Architecture
WiMax - Technology & Architecture
 
Types of Networking Devices
Types of Networking DevicesTypes of Networking Devices
Types of Networking Devices
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networks
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Cdma2000
Cdma2000Cdma2000
Cdma2000
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
Ultra wideband technology (UWB)
Ultra wideband technology (UWB)Ultra wideband technology (UWB)
Ultra wideband technology (UWB)
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Local area network
Local area networkLocal area network
Local area network
 
Comparison between 2g, 2.5g, 3g, lte and lte a
Comparison between 2g, 2.5g, 3g, lte and lte aComparison between 2g, 2.5g, 3g, lte and lte a
Comparison between 2g, 2.5g, 3g, lte and lte a
 

Similar to Wireless Technologies and Standards

WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
Inocentshuja Ahmad
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
IJERA Editor
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
Bhushan Jadhav
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
Umme habiba
 
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITY
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITYHari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITY
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITY
IGN MANTRA
 
WI-FI and Wi Max
WI-FI and Wi MaxWI-FI and Wi Max
WI-FI and Wi Max
Siyad Ca
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
Bill Drew
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
Mostafa Ali
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
alanfhall8953
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
eceb9198
 
Presentation (2).pptx
Presentation (2).pptxPresentation (2).pptx
Presentation (2).pptx
ThejwinG
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
HemanthGowdaN1
 
Wireless LAN
Wireless LANWireless LAN
Wireless LAN
KannanKrishnana
 
Wi fi and wimax
Wi fi and wimax Wi fi and wimax
Wi fi and wimax
Sanjay Hp
 
Reg en-ap8232 ss
Reg en-ap8232 ssReg en-ap8232 ss
Reg en-ap8232 ss
Advantec Distribution
 

Similar to Wireless Technologies and Standards (20)

WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITY
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITYHari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITY
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITY
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
WI-FI and Wi Max
WI-FI and Wi MaxWI-FI and Wi Max
WI-FI and Wi Max
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
 
Wireless
WirelessWireless
Wireless
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
Presentation (2).pptx
Presentation (2).pptxPresentation (2).pptx
Presentation (2).pptx
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
Wireless LAN
Wireless LANWireless LAN
Wireless LAN
 
Wi fi and wimax
Wi fi and wimax Wi fi and wimax
Wi fi and wimax
 
Reg en-ap8232 ss
Reg en-ap8232 ssReg en-ap8232 ss
Reg en-ap8232 ss
 

More from Rubal Sagwal

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Rubal Sagwal
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
Rubal Sagwal
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
Rubal Sagwal
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
Rubal Sagwal
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
Rubal Sagwal
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
Rubal Sagwal
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
Rubal Sagwal
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
Rubal Sagwal
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
Rubal Sagwal
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
Rubal Sagwal
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
Rubal Sagwal
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
Rubal Sagwal
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
Rubal Sagwal
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
Rubal Sagwal
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
Rubal Sagwal
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
Rubal Sagwal
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
Rubal Sagwal
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
Rubal Sagwal
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
Rubal Sagwal
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
Rubal Sagwal
 

More from Rubal Sagwal (20)

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

Wireless Technologies and Standards

  • 1. Computer Networks Wireless Networking Date: Department of Computer Engineering Jain Group of Institution, Bangalore Presented By: Rubal Sagwal Assistant Professor Department of Computer Engineering 1ADAD
  • 2. Contents • Introduction to wireless networking • Types of Wireless Networks • Wireless network components • Standard 802.11 • Wireless security protocols ADAD 2
  • 3. Wireless Networking Wireless Technology– Benefits of Wireless Technology ADAD 3
  • 4. Wireless Technology • Wireless – No physical transmission device – telecommunications in which electromagnetic waves (rather than some form of wire) carry the signal over part or all of the communication path. • For Example: • Wi-Fi • Mobile phones • GPS (Global positioning System) • Cordless mouse/ keyboard • Home entertainment system • Wireless Ethernet – Bluetooth https://www.youtube.com/watch?time_continue=42&v=u21lNHy0 72U ADAD 4
  • 5. Benefits of Wireless Technology • Advantage of a wireless network over a wired – users can move around freely within the area of the network with their laptops, handheld devices etc and get an internet connection. • Users are also able to share files and other resources with other devices that are connected to the network without having to be cabled to a port. • Not having to lay lots of cables and put them through walls etc – less cost. • Wireless networks can sometimes handle a larger amount of users because they are not limited by a specific number of connection ports. ADAD 5
  • 6. Types of Wireless Networks Ad-hoc Mode – Infrastructure Mode ADAD 6
  • 7. Wireless Network • IEEE 802.11 – Specification for wireless LAN defined by IEEE – Covers physical and data link layer. ADAD 7 Architecture BSS (Basic Service Set) ESS (Extended Service Set)
  • 8. 1. BSS (Basic Service Set) • Building block of a wireless LAN. • Made of – Stationary or Mobile service station – Assess Point ( AP, Optional central base station). • Without an AP – Ad-hoc Architecture • Stand-alone network, can’t send data to other BSSs. • Can form a network without the need of an AP. • With an AP – Infrastructure Network ADAD 8
  • 9. 1. BSS (Basic Service Set) ADAD 9
  • 10. 2. ESS (Extended Service Set) • Made up of two or more BSS with Aps. • Connected through a distribution system (Wired LAN). • Distribution system – connects the APs in the BSSs. ADAD 10
  • 11. 2. ESS (Extended Service Set) • It uses two station – Mobile and Stationary. • Mobile station are normal station inside a BSS • Stationary station are AP stations that are part of wired LAN. • When BSS are connected, the stations within reach of one another can communicate without the use of an AP. ADAD 11
  • 12. Station Type 1. No-Transition: either stationary (not moving) or moving only inside a BSS. 2. BSS-transition: move from one BSS to another, but the movement is confined inside one ESS. 3. ESS-transition: can move from one ESS to another. ADAD 12
  • 13. Wireless Network Components Wireless Access Points – Wireless NICs ADAD 13
  • 14. Wireless Access Point • A wireless access point (WAP) – a hardware device or configured node on a local area network (LAN). • That allows wireless capable devices and wired networks to connect through a wireless standard, including Wi-Fi or Bluetooth. • WAPs feature antennae, which facilitate connectivity between devices and the Internet or a network. ADAD 14
  • 15. Wireless NIC • A Wireless Network Card performs basically the same operation as a normal network card, except instead of operating through network cables, it operates wirelessly. • A W-NIC, just like other NICs, works on the Layer 1 and Layer 2 of the OSI Model. • This card uses an antenna to communicate via microwave radiate on. ADAD 15
  • 16. Advantages of Wireless-NIC • SETUP: • Because wireless networks operate wirelessly, they become very easy to setup and change. • SECURITY: • Today the security that wireless routers and cards offer, is great, if you are willing to just go about setting it up. • CHEAPER: • wireless is so much cheaper than wired. • SPEED: • with the latest progressions, wireless is quickly becoming just as fast or faster than their wired counterparts. ADAD 16
  • 17. Wireless LAN Standards IEEE 802.11a – IEEE 802.11b – IEEE 802.11g ADAD 17
  • 18. IEEE 802.11 • IEEE 802.11 is a set of media access control (MAC) (also known as data link layer) and physical layer (PHY) specifications for implementing wireless local area network(WLAN). • They are the world's most widely used wireless computer networking standards, used in most home and office networks to allow laptops, printers, and smartphones to talk to each other and access the Internet without connecting wires. • They are created and maintained by the Institute of Electrical and Electronics Engineers (IEEE) LAN/MAN Standards Committee (IEEE 802). • The base version of the standard was released in 1997, and has had subsequent amendments. ADAD 18
  • 19. IEEE 802.11a • The IEEE 802.11a standard is capable of producing a high level of performance, and being in a band which is used less than the levels of interference are less allowing high levels of performance. • The 802.11a standard is alphabetically the first of the variety of 802.11 standards that are in widespread use today. • Although 802.11a was ratified at the same time as 802.11b, it never caught on in the same way despite the fact that it offered a much higher data transfer rate. ADAD 19 PARAMETER VALUE Date of standard approval July 1999 Maximum data rate (Mbps) 54 Typical data rate (Mbps) 25
  • 20. IEEE 802.11b ADAD 20 • IEEE 802.11b was the first wireless LAN standard to be widely adopted and built in to many laptop computers and other forms of equipment. • The standard for 802.11b was ratified by the IEEE in July 1999 and the idea for wireless networking quickly caught on with many W-Fi hotspots being set up so that business people could access their emails and surf the Internet as required when they were travelling. • It was only after 802.11 was ratified and products became available that W-Fi took off in a large way. Wi- Fi hotspots were set up in many offices, hotels and airports and the idea of using portable laptop computers while travelling became far easier.
  • 21. IEEE 802.11b Specifications ADAD 21 • 802.11b boasts an impressive performance. It is able to transfer data with raw data rates up to 11 Mbps, and has a good range, although not when operating at its full data rate. PARAMETER VALUE Date of standard approval July 1999 Maximum data rate (Mbps) 11 Typical data rate (Mbps) 5
  • 22. IEEE 802.11g ADAD 22 • After the introduction of Wi-Fi with the 802.11a and 802.11b standards, the 802.11b standard became the most popular operating in the 2.4 GHz ISM band. • This standard proved to be the most popular despite the faster operating speed of the a variant of the standard because the cost of producing chips to operate at 2.4 GHz were much less than ones to run at 5 GHz. • In order to provide the higher speeds of 802.11a while operating on the 2.4 GHz ISM band, a new standard was introduced. Known as 802.11g, it soon took over from the b standard. • Even before the standard was ratified, 802.11g products were available on the market, and before long it became the dominant Wi-Fi technology.
  • 23. IEEE 802.11g Specification ADAD 23 • The 802.11g standard provided a number of improvements over the 802.11b standard which was its predecessor. The highlights of its performance are given in the table below. IEEE 802.11G WI-FI FEATURES FEATURE 802.11G Date of standard approval June 2003 Maximum data rate (Mbps) 54 Modulation CCK, DSSS, or OFDM RF Band (GHz) 2.4 Channel width (MHz) 20
  • 24. Wireless Security Protocol WEP – WPA – 802.1X ADAD 24
  • 25. 1. WEP (Wired Equivalent Privacy) ADAD 25 • Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. • Specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN. • A wired local area network (LAN) is generally protected by physical security mechanisms (For example, controlled access to a building) that are effective for a controlled physical environment, but may be ineffective for WLANs because radio waves are not necessarily bound by the walls containing the network.
  • 26. WEP (Wired Equivalent Privacy) ADAD 26 • WEP seeks to establish similar protection to that offered by the wired network's physical security measures by encrypting data transmitted over the WLAN. Data encryption protects the vulnerable wireless link between clients and access points. • Once this measure has been taken, other typical LAN security mechanisms such as password protection, end-to- end encryption, virtual private networks (VPNs), and authentication can be put in place to ensure privacy.
  • 27. 2. Wi-Fi Protected Access (WPA) ADAD 27 • Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections. • WPA was developed by the Wi-Fi Alliance to provide more sophisticated data encryption and better user authentication than Wired Equivalent Privacy (WEP), the original Wi-Fi security standard. • The new standard, which was ratified by the IEEE in 2004 as 802.11i , was designed to be backward- compatible with WEP to encourage quick, easy adoption. Network security professionals were able to support WPA on many WEP-based devices with a simple firmware update.
  • 28. Wi-Fi Protected Access (WPA) ADAD 28 • WPA has discrete modes for enterprise users and for personal use. • The enterprise mode, WPA-EAP, uses more stringent 802.1x authentication with the Extensible Authentication Protocol (EAP). • The personal mode, WPA-PSK, uses preshared keys for simpler implementation and management among consumers and small offices. • Enterprise mode requires the use of an authentication server. • WPA's encryption method is the Temporal Key Integrity Protocol (TKIP).
  • 29. Wi-Fi Protected Access (WPA) ADAD 29 • TKIP includes a per-packet mixing function, a message integrity check, an extended initialization vector and a re-keying mechanism. • WPA provides strong user authentication based on 802.1x and the Extensible Authentication Protocol (EAP). WPA depends on a central authentication server, such as RADIUS, to authenticate each user. • Software updates that allow both server and client computers to implement WPA became widely available during 2003. • Access points can operate in mixed WEP/WPA mode to support both WEP and WPA clients. However, mixed mode effectively provides only WEP-level security for all users. • Home users of access points that use only WPA can operate in a special home mode in which the user need only enter a password to be connected to the access point. The password will trigger authentication and TKIP encryption.
  • 30. 3. 802.1X ADAD 30 • The 802.1X standard is designed to enhance the security of wireless local area networks (WLANs) that follow the IEEE 802.11 standard. • 802.1X provides an authentication framework for wireless LANs, allowing a user to be authenticated by a central authority. • 802.1X uses an existing protocol, the Extensible Authentication Protocol (EAP, RFC 2284), that works on Ethernet, Token Ring, or wireless LANs, for message exchange during the authentication process.
  • 31. 802.1X ADAD 31 • In a wireless LAN with 802.1X, a user (known as the supplicant) requests access to an access point (known as the authenticator). • The access point forces the user (actually, the user's client software) into an unauthorized state that allows the client to send only an EAP start message. • The access point returns an EAP message requesting the user's identity. • The client returns the identity, which is then forwarded by the access point to the authentication server, which uses an algorithm to authenticate the user and then returns an accept or reject message back to the access point. • Assuming an accept was received, the access point changes the client's state to authorized and normal traffic can now take place.
  • 32. Wireless security protocols: The difference between WEP, WPA, WPA2 ADAD 32