7: wireless technologies

83
7: Wireless Technologies Networking for Home & Small Business

Upload: wynter-haney

Post on 04-Jan-2016

24 views

Category:

Documents


0 download

DESCRIPTION

7: Wireless Technologies. Networking for Home & Small Business. Objectives. Understanding Wireless. Electromagnetic Spectrum Radio, TV, Light, X-Rays, Gamma Rays Each has a specific wavelength Like the distance between waves Wireless uses Electromagnetic Waves - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: 7: Wireless Technologies

7: Wireless TechnologiesNetworking for Home & Small Business

Page 2: 7: Wireless Technologies

Objectives

Page 3: 7: Wireless Technologies

Understanding Wireless

• Electromagnetic Spectrum– Radio, TV, Light, X-Rays, Gamma Rays– Each has a specific wavelength

• Like the distance between waves

• Wireless uses Electromagnetic Waves– Same as carrying radio signals

• We’ll discuss the most common wavelengths

Page 4: 7: Wireless Technologies

Infrared (IR)

• Low energy

• Can’t go through walls, short range (30’)

• One to one communication– Wireless Mice & Keyboards, Remotes, PDA– Infrared Direct Access (IrDA) port

Page 5: 7: Wireless Technologies

IR & Your TV

• Your TV remote has an infrared LED inside• Switches on & off to create 0’s and 1’s when you

push a button– Push a button to send a 7 digit sequence of 0’s & 1’s– Sony TV Channel Up is 0000011, channel down is

0010001

Page 6: 7: Wireless Technologies

Radio Frequency (RF)• Wireless LAN, cordless phone, Bluetooth

• LAN & Phone– Signal travels through walls, longer range, higher power– 900 MHz, 2.4 GHz and the 5 GHz frequency

• Bluetooth– Low speed, short range, lower power– One to many devices– Uses 2.4GHz– Starting to use Bluetooth for wireless mice, etc.

Page 7: 7: Wireless Technologies

Activity- Which is it?

Page 8: 7: Wireless Technologies

Review

• Bluetooth or RF. Which has higher power output?– RF

• Two doctors are beaming their business cards to each other through their PDAs. Which signal is being used?– IR

Page 9: 7: Wireless Technologies

Wireless Benefits

Page 10: 7: Wireless Technologies

Wireless Limitations

• Cordless Phones 2.4GHz Interference

• Microwave Ovens Interference

• Not as fast as wired

• Security– Ease of Access

• Size of Building– Range

• Solid Walls

Page 11: 7: Wireless Technologies

WPAN

• Wireless Personal Area Network– Used to connect wireless mice, keyboards &

PDA’s to computer– IR or Bluetooth– Short Range– Device to device

Page 12: 7: Wireless Technologies

WLAN

• Wireless Local Area Network– RF– IEEE 802.11 standards– Users connect to a wired network through an

Access Point (AP)– Medium range

Page 13: 7: Wireless Technologies

Access Point

• Between your wired equipment and your wireless devices

Page 14: 7: Wireless Technologies

WWAN

• Wireless Wide Area Network– Cell phone network– GSM, CDMA– Long range– Government regulated

Page 15: 7: Wireless Technologies

Review

Page 16: 7: Wireless Technologies

Wireless Standards

• Specifies data speed, range, RF spectrum

• IEEE standards, Wi-Fi

• 802.11a, 802.11b, 802.11g and 802.11n

• Wi-Fi Alliance tests devices from manufacturer

• Will work with other devices w/ same logo

Page 17: 7: Wireless Technologies

802.11b

• 1999

• 2.4GHz

• 11Mbps

• 150ft range indoors

• 300 ft range outdoors

Page 18: 7: Wireless Technologies

802.11a

• 1999• 5GHz

– Unused at that time – Less congestion

• 54Mbps (faster than B)• NOT compatible with b/g/n• 75ft-150ft range• Originally too expensive• Now hard to find

Page 19: 7: Wireless Technologies

802.11g

• 2003

• 2.4GHz

• 54Mbps

• 150ft range indoors

• 300 ft range outdoors

• Compatible with 802.11b

Page 20: 7: Wireless Technologies

802.11n

• In development

• 2.4Ghz

• Up to 750ft range

• Backwards compatible b/g

Page 21: 7: Wireless Technologies

Wireless Components

• Access Point– Connects wireless devices to wired network

• Client– Any host device that connects to wireless– Also known as STA (station)

• Bridge

• Antenna

Page 22: 7: Wireless Technologies

Omni-Directional Antenna

• Equally in all directions

• Found on APs

Page 23: 7: Wireless Technologies

Directional Antenna

• Concentrate signal in one direction

• Better distance

• Connects networks 25 miles or more apart

• Bridge to Bridge- connects 2 networks wirelessly

Page 24: 7: Wireless Technologies

Want a bridge? Aironet 1400

• Find it on www.cdwg.com

Page 25: 7: Wireless Technologies

Activity

Page 26: 7: Wireless Technologies

7.2.3

• WLANs & the SSID

• 2 Forms of WLAN installations

Page 27: 7: Wireless Technologies

SSID-Service Set Identifier• Tells wireless devices which WLAN they belong

to & which other devices they can communicate with

• Case-sensitive & up to 32 characters• All of your devices MUST have same SSID

– Broadcast or Not?

Page 28: 7: Wireless Technologies

Ad-hoc Mode- IBSS

• Wireless devices can talk to each other without involving Access Point

• Peer-to-peer or small networks

• Less $$$, no AP

Page 29: 7: Wireless Technologies

Infrastructure Mode- BSS

• Most used

• AP/Router controls communication– Access to Internet– Basic Service Set (BSS)

• Area covered by a single AP

Page 30: 7: Wireless Technologies

Cover More Areas

• Connect many BSS’s to get expanded area– You get an ESS, Extended Service Set

• Areas should overlap– Think about this school & coverage

Page 31: 7: Wireless Technologies

Question?

Page 32: 7: Wireless Technologies

Question?

Page 33: 7: Wireless Technologies

Question?

Page 34: 7: Wireless Technologies

Question?

Page 35: 7: Wireless Technologies

Lab Activity

• 7.2.3.4

• READ THE INSTRUCTIONS!!!

• Click Topology, then the host

• View browser, follow directions

Page 36: 7: Wireless Technologies

Wireless Channels

• Used to control multiple conversations– Like how all of your TV channels travel across a cable– Divides up the 2.4GHz for each conversation

• Selection of channels is usually automatic

• Sometimes they use a single wide channel to get more bandwidth

Page 37: 7: Wireless Technologies

Going to a Concert

• General Admission compared to tickets for a seat– What’s the different experiences?

• Wireless has a method to avoid collisions

• A “ticketing” system

Page 38: 7: Wireless Technologies

Wireless Detecting Collisions

• CSMA/CA• Reserves a channel for conversation

– No one else may use that channel

• Request to Send (RTS) to the AP• If available, a Clear to Send (CTS) is sent

– OK to send– Broadcast is sent to all, notifying channel in

use

• ACK sent to AP to notify done– All devices see ACK & know channel is open

Page 39: 7: Wireless Technologies

CSMA/CA- (7.2.4.2)

Page 40: 7: Wireless Technologies

Activity- Setting the Channel

• 7.2.4.3

Page 41: 7: Wireless Technologies

Configuring an AP

Page 42: 7: Wireless Technologies

Configuring the Client

• What is a wireless host known as?– STA (station)

• It’s a device with wireless NIC & software for it

• Settings MUST match AP– SSID, security settings, and channel

Page 43: 7: Wireless Technologies

Configuring the Client- Software

• As part of the OS• OR supplied with Wireless NIC

– Contains link info, profiles, etc.

• Usually the OS one is okay

Page 44: 7: Wireless Technologies

Now Test It…

• Look at signal strength• Then test data transmission

– Use the ping test– Ping another PC 1st

– If that doesn’t work, ping the AP

Page 45: 7: Wireless Technologies

Lab 7.2.5.3 & 7.2.6.4

• Configure the AP and Wireless Client

Page 46: 7: Wireless Technologies

Wireless Security

• Tradeoff:– Ease & convenience of availability vs. putting

info to the airwaves

• What can they do?– Use your Internet for FREE– Access your computers– Damage files– Steal private info

• Solution…SET UP SECURITY!

Page 47: 7: Wireless Technologies

Why is security important?

• It’s possible that an individual or a business owner can be held responsible for what an unauthorized user does with your network

• Computer Fraud Law– Accessing a computer without authorization

Page 48: 7: Wireless Technologies

Which Security Measures??

• Use all of the following to secure your wireless network:

1. Change the router password from the default

2. Change the SSID & disable the broadcast

3. Use MAC Address Filtering

4. Authentication (PSK)

5. Encryption (WPA)

Page 49: 7: Wireless Technologies
Page 50: 7: Wireless Technologies

Change the Password!

Page 51: 7: Wireless Technologies
Page 52: 7: Wireless Technologies

Change & Disable SSID

• SSID– Must be known to connect– Broadcast by default

• Solutions– TURN SSID BROADCAST OFF!!– Change the default settings

• SSID• Passwords• IP addresses

– These solutions help, but you can still be hacked!

Page 53: 7: Wireless Technologies

The SSID’s- Discovered!!!

Page 54: 7: Wireless Technologies
Page 55: 7: Wireless Technologies

Get your MAC Addresses

Page 56: 7: Wireless Technologies

Set up MAC Address Filtering

Page 57: 7: Wireless Technologies

MAC Address Filtering

• Use your device’s MAC address to limit connectivity to you KNOWN devices

• You pre-configure the MACs in the AP

• The AP will check its list

• Only those in list will connect

Page 58: 7: Wireless Technologies

MAC Address Filtering

• What could go wrong?– Typo on the MAC address– New devices can’t enter network without

adding Mac to the AP configuration– MAC address cloning

1. Sniff network traffic (MAC address in packet)

2. Find MAC addresses on that network

3. Change your MAC address to match one on the target network.

Page 59: 7: Wireless Technologies

Sniffing to Clone

Page 60: 7: Wireless Technologies
Page 61: 7: Wireless Technologies

Authentication

• Permitting entry on WLAN based on credentials

• Used before connecting to the WLAN– Checks authentication 1st

– Then MAC address filtering

1. Open authentication (DEFAULT SETTING)

2. PSK (good)….THIS IS USED AT HOME.

3. EAP (better than PSK)…BUSINESSES.

Page 62: 7: Wireless Technologies

Open Authentication

• Public networks

Page 63: 7: Wireless Technologies

Pre-Shared Keys (PSK)

• Client & AP have secret word/keys• One-way

– Client authenticates to the AP– AP DOES NOT authenticate the user

Page 64: 7: Wireless Technologies

Extensible Authentication Protocol- EAP

• Two-way PLUS user authentication

• Uses a separate server (RADIUS)– Built into some AP’s now– More for medium to large businesses

• The user provides a username & password

Page 65: 7: Wireless Technologies

Overview

Page 66: 7: Wireless Technologies

Configuring Auth & Encrypt• WEP• WPA Personal, uses PSK

– TKIP (Temporal Key Integrity Protocol)– AES (Advanced Encryption System)

• WPA2– TKIP or AES

• WPA Enterprise, RADIUS• RADIUS• AES is only supported by newer devices that

contain a co-processor. – To ensure compatibility with all devices, select TKIP.

Page 67: 7: Wireless Technologies

Problems Still???

• Authentication & MAC filtering won’t stop the hacker– They can sniff the info from the air

• Encrypt the data– WEP– WPA

Page 68: 7: Wireless Technologies

WEP- Wired Equivalency Protocol

• String of letters & numbers

• 64 or 128 bits

• Passphrase

• All devices in WLAN must have same WEP key

• Can work in conjunction with PSK– WEP-PSK

• WEAK!!!!!– Static key

Page 69: 7: Wireless Technologies

WPA- Wi-Fi Protected Access

• Better than WEP• 64-256 bits• New keys for each time it connects

Page 70: 7: Wireless Technologies

Review

• WEP/WPA _______________ the data.– Encrypt

• PSK/EAP are used to _____________ the user to the WLAN.– Authenticate

• WEP or WPA. Which is stronger?– WPA

• What’s the difference between open authentication & PSK?– PSK has the secret key

Page 71: 7: Wireless Technologies

Activity

• 7.3.4• Configure

authentication

Page 72: 7: Wireless Technologies

Traffic Filtering

• You can control the type of data– Entering or leaving the AP– Going to/from a specific MAC or IP– Block by port #

Page 73: 7: Wireless Technologies

Lab

• 7.3.5.2

• Configuring Wireless Security

Page 74: 7: Wireless Technologies

Planning the WLAN

• Determining the type of wireless standard to use

• Determining the most efficient layout of devices

• An installation and security plan

• A strategy for backing up and updating the firmware of the wireless devices.

Page 75: 7: Wireless Technologies

Wireless Standard• Bandwidth requirements, coverage areas,

existing implementations, and cost. – This information is gathered by determining end-user

requirements.

• Ask the following… – What throughput is actually required by the

applications running on the network? – How many users will access the WLAN?– What is the necessary coverage area?– What is the existing network structure?– What is the budget?

Page 76: 7: Wireless Technologies

Planning the WLAN

• Which 802.11 standards support a larger BSS?– Means less equipment to buy

• Is there an existing standard in use?

• Total Cost of Ownership (TCO) which includes the purchase of the equipment as well as installation and support costs

Page 77: 7: Wireless Technologies

Installation of Devices

• Site Survey– Measurements– Consider interference sources & locations

Page 78: 7: Wireless Technologies

Install & Secure the AP

Page 79: 7: Wireless Technologies

Back It Up!!! 7.4.3.2 Activity

• Home & Small Business– Select Backup Configuration in Menu– To restore, select it– Factory Default Setting

Page 80: 7: Wireless Technologies

Updating the Firmware

• The OS of the device is in firmware– Update for new features, etc

1. Get the current version

2. Research issues & features that may cause you to want the upgrade

3. Download it to a HD (directly connected machine)

4. Select Firmware upgrade

• DO NOT INTERRUPT THE PROCESS!

Page 81: 7: Wireless Technologies

7.4.4.2 Activity

• Upgrade the firmware

Page 82: 7: Wireless Technologies

Review

Page 83: 7: Wireless Technologies

7: Wireless TechnologiesNetworking for Home & Small Business