romney bake brian peterson clay stephens michael hatheway

18
Romney Bake Brian Peterson Clay Stephens Michael Hatheway

Upload: lindsay-kelly

Post on 15-Jan-2016

227 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

Romney BakeBrian PetersonClay Stephens

Michael Hatheway

Page 2: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

OutlineIntroductionTopologyAdvantages/DisadvantagesHardwareA, B, G, N ComparisonMedia Access Controls/Data TransmissionSecurity TypesRouter ConfigurationQuestions

Page 3: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

Introduction & HistoryWireless connections were originally

developed for mobile computing devices, such as laptops, but is now increasingly used for more services, including Internet and VoIP phone access and basic connectivity of consumer electronics such as televisions and DVD players.

First Wireless LAN developed in 1971, called ALOHANET.

Page 4: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

TopologyInternetInternet

Page 5: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

AdvantagesAdvantagesNo cables (Outdoor uses)MobilityWidely available productsGlobal set of standardsAvailable in more than 300,000 hot spotsWPA and WPA2 securitiesCheaper/Comparable prices

Page 6: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

Drains batteries on laptopsSecurity issuesDefault settings for access points and routersPotential interoperability between brandsOften slower than wired connectionsLimited range

Disadvantages

Page 7: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

HardwareAccess Point (AP)Connects a group of wireless devices to an

adjacent wired LANRelays data between connected wireless

devices in addition to a (usually) single connected wired device

Page 8: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

Wireless Adapter (WNIC)Allows a device to connect to a wireless

networkConnects by either PCI, USB, PCMCIA

Page 9: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

Wireless RouterAllows wired and wireless ethernet LAN

devices to connect to a (usually) single WAN device such as cable modem or DSL modem

allows all three devices (mainly the access point and router) to be configured through one central utility

Page 10: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

Range ExtenderExtends the range of an existing wireless

networkAllows signal area to reach around barriers

such as those created in L-shaped corridorsIncrease in latency

Page 11: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

802.11a, b, g, n

Page 12: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

Media Access ControlUses Carrier Sense Multiple Access with

Collision Avoidance (CSMA/CA), similar to CSMA/CD in wired Ethernet

Computers listen before transmitting, if no one else is transmitting, they transmit

Page 13: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

Data TransmissionDistributed Coordination FunctionRelies on computers to physically listen

before transmittingStop and Wait ARQPoint Coordination FunctionComputer must send Request To Transmit to

Access Point firstThe Clear To Transmit is granted for

requesting computer for specific time period on the circuit

Works well with high traffic networks

Page 14: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

Security TypesService Set Identifier (SSID)Code attached to all packets on a wireless

network to identify each packet as part of that network

Code is a case sensitive text string which consists of a maximum of 32 alphanumeric characters

Minimum security

Page 15: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

Wired Equivalent Privacy (WEP)Provide comparable confidentiality to a

traditional wired networkWEP key can be cracked with readily

available software in two minutes or less Easy to share key for access

Page 16: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

Extensible Authentication Protocol (EAP)Generates WEP keys automaticallyUser login to serverAfter login sever will generate WEP key for

the sessionEasy to break by professional hackers

Page 17: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

Wi-Fi Protected Access (WPA and WPA2)Intended as an intermediate measure to take

the place of WEP while 802.11i was preparedDesigned to work with all wireless network

interface cards, but not necessarily with first generation wireless access points

WPA2 implements the full standard, but will not work with some older network cards

Not selected by default

Page 18: Romney Bake Brian Peterson Clay Stephens Michael Hatheway

Questions?