Transcript
Wireless Technologies
Networking for Home and Small Businesses – Chapter 7
Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright Cisco Systems Inc. 1
Wireless Technologies The use of electromagnetic waves to carry information. We call them “radio waves” Common wireless technologies – Infrared
Electromagnetic Spectrum
– Radio Frequency
2
Infrared Technology Line of sight transmission Unable to penetrate through walls IRDA port (Infrared Direct Access) – used to exchange information between devices
Used by: – remote controls – wireless mouse and keyboard
3
Radio Frequency (RF) Technology Signal able to transmit through walls RF bands set aside for wireless devices, including cordless phones and computer peripherals 900 MHz – used by cell phones 2.4 GHz – Bluetooth technology – low speed, short range – can communicate with many devices at once
5 GHz – Wireless LAN – transmit at a higher level = greater distance – conform to 802.11 standards 4
Benefits of Wireless Mobility Scalability – can be added to a network easily – use of “hotspots”
Flexibility – anytime, anywhere connectivity
Cost – inexpensive to install – reduced installation costs
5
Limitations/Risks of Wireless Uses unlicensed regions of the RF spectrum – used by many different devices
Interference – cordless phones – microwaves
Security – easy access to the network – encryption/authentication helps with security issues
6
Wireless Technologies WPAN – Wireless Personal Area Network – used for: • mice • keyboards • PDAs
7
Wireless Technologies WLAN – Wireless LAN – uses RF standards – conform to 802.11 standards – connects through Wireless AP
8
Wireless Technologies WWAN – Wireless WAN – coverage over large areas – cell phone network
9
IEEE Wireless Standards Define how wireless devices communicate 802.11 – wireless standards – group of all 802.11 standards = Wi-Fi Wireless Fidelity
Wi-Fi Alliance – tests wireless devices from manufacturers
10
Components of a WLAN Wireless client – any host that can participate in a wireless network
Access point (AP) – control access between wired and wireless networks
11
Components of a WLAN Wireless Bridge – connects two wired networks through a wireless link – offers long range connectivity • 25 miles – Uses unlicensed RF frequencies
12
Access Point Antennas – increases output signal strength (gain) – receives the wireless signal – higher gain = increased distance
Directional antenna – concentrates signal in one direction – allows for greater distances
Omni-directional antenna – emits signal equally in all directions – used by most Access Points
13
Purpose of SSID Service Set Identifier Allows wireless components to connect to the WLAN – tells wireless devices which WLAN they belong to – tells devices whom then can talk to
All wireless devices must have same SSID to communicate with each other Characteristics – case sensitive – alphanumeric characters – sent in the header of the frame 14
Ad-hoc Installation Simplest form Used to connect 2 or more wireless devices together in a peer to peer network No Access Point (AP) needed IBSS – Independent Basic Service Set – area covered by the Ad-hoc network
15
Infrastructure Installation Used by larger networks Uses an Access Point (AP) – makes sure all STAs have equal access
Each device must receive permission to communicate BSS – Basic Services Set – area covered by a AP
16
Distribution System ESS (Extended Service Set) Use of multiple Access Points Each BSS should overlap by 10% – will help prevent loss of signal
17
Channels in a WLAN Use of channels help to control conversations – allows multiple Access Points close to one another to function – each AP must be on different channel
Each channel capable of carrying a different conversation
18
CSMA/CA Carrier Sense Multiple Access with Collision Avoidance Ensures collisions do not occur on a wireless network Reserves a channel for communication – Device requests permission from AP (Request to Send–RTS) – If available, AP responds with all clear message • Clear to Send Message (CTS) – CTS is broadcast to all other devices • informs everyone the channel is being used –Upon completion of conversation • Device that requested channel send ACK to AP • ACK indicates to AP that channel can be used again • ACK sent to other devices letting them know the channel can be used again
19
Configuring a Wireless Access Point Modes – Specific to a device – Mixed Mode – supports multiple types of hosts • decreases performance – supports more devices
SSID – used to identify the WLAN – all devices that participate must use the same SSID – SSID broadcast to everyone • allows for easy detection
Wireless Channel – auto locate • finds the least congested channel
20
Configuring a Wireless Client Wireless host (STA) – device that contains a wireless NIC and wireless software – client configuration must match that of the Access Point
Windows XP – wireless client software – included as part of the operating system – can control most configurations
21
Configuring a Wireless Client Using stand-alone software – supplied with the wireless NIC – includes enhanced functions
Not possible to allow both XP and the stand-alone software at the same time Once software is installed, check connectivity – connection data rate – connection status – wireless channel used – ping
22
Wireless Security No physical connection needed Attacker can “tune into” your network just like tuning into a radio station Easy access if all settings are set to default, so . . . CHANGE THE SETTINGS – disable SSID broadcast – change default password – change default IP
But . . – SSID transmitted in clear text – still possible to learn the SSID 23
MAC Address Filtering Another security feature Will limit access to your network MAC address used to identify which device can connect to the wireless network – wireless AP looks up MAC in a list (database) – only those addresses listed will gain access
24
Security – Authentication Controls who connects to the network Permitted based on set of credentials Helps to verify the “trustworthiness” of the device – usernames – passwords
Occurs before client is connected to WLAN
25
Open Authentication On by default Any and all clients can access AP Should only be used on public wireless networks – Schools – Internet Café
26
PSK (Pre-Shared Keys) Authentication Both AP and client must have the same secret key or word Here’s how it works: – AP sends random string of bytes to client – Client accepts it, encrypts it, and sends it back to AP – AP receives encrypted string, decrypts it – if decrypted string = original string client is added
27
EAP (Extensible Authentication Protocol) EAP software must be installed on the client device Client talks with RADIUS Server – Remote Authentication Dial-in User Services – server functions separately from the AP – server keeps a database of valid users – username and password checked by the server
28
Encryption Process of transforming data so if intercepted, will still be unusable WEP (Wired Equivalency Protocol) – advanced security feature – encrypts network traffic as it travels – 64 – 128 bits (letters and/or numbers) – AP and every device on the network must have the same WEP key
29
Traffic Filtering Controls the type of traffic allowed across a WLAN Able to block traffic based on: – IP Address – MAC Address – Port Numbers
30
Planning the WLAN Determine the type of wireless standard – 802.11b, g, n operates at 2.4 GHz – travels farther than 5 GHz – Less equipment = lower cost
Determine layout – look at existing infrastructure – if using 802.11a, will it work with the newest standards??
Installation/Security – Total Cost of Ownership (TCO) – Site Survey • signal strength • possible interference
Backup/Updating Devices 31
Securing the AP Basic Security – Changing values (SSID, usernames, passwords) – Disable Broadcast SSID – MAC Address filtering
Advanced Security – Encryption – Authentication – Traffic Filtering
32
Configure an Integrated Wireless Access Point and Wireless Client Describe options for backing-up and restoring AP configurations
33
Configure an Integrated Wireless Access Point and Wireless Client Identify current version of firmware and describe how to update firmware
34
End of lesson
35