Você está na página 1de 46

EC301 : Computer Network Fundamental

Chapter 5: Wireless Technologies


Noted prepared by: Pn. Wan Fazlini Idayu binti Wan Fakari
1

CLO 3: you should be able to you should be able to select addressing scheme of TCP/IP in Local Area Network (LAN) properly using network configuration tool. (C4) CLO 4: you should be able to create a simple network connection using Wireless Local Area Network (WLAN) in accordance to IEEE 802.11 protocols. (P7)
note: C4 = analysis, P7=origination

Chapter5 will appear in: Lab (4) Quiz (4)


2

5.1 Wireless Technologies

Wireless Technologies
Wireless technologies use electromagnetic waves to carry information between devices. An electromagnetic wave is the same medium that carries radio signals through the air.
The electromagnetic spectrum includes such things as radio and television broadcast bands, visible light, x-rays and gamma-rays. Each of these has a specific range of wavelengths and associated energies as shown in the diagram. Some types of electromagnetic waves are not suitable for carrying data. Other parts of the spectrum are regulated by governments and licensed to various organizations for specific applications. Certain areas of the spectrum have been set aside to allow public use without the restriction of having to apply for special permits. The most common wavelengths used for public wireless communications include the Infrared and part of the Radio Frequency (RF) band.
4

Wireless Technologies
Wavelength for each electromagnetic wave

Wireless Technologies
Infrared Band

(IR)

Low energy and unable to penetrate walls (line of sight) Used for PDAs, PCs, wireless mice, keyboards and remote controls IrDA (Infrared Direct Access) port used for 1 to 1 connections
Radio Frequency (RF)

Goes through walls and other obstructions, better range Different frequencies assigned to different types of unlicensed devices

Comparison: infrared vs. radio transmission


Infrared
uses IR diodes, diffuse light, multiple reflections (walls, furniture etc.)

Radio
typically using the license free ISM band at 2.4 GHz

Advantages
simple, cheap, available in many mobile devices no licenses needed simple shielding possible

Advantages
experience from wireless WAN and mobile phones can be used coverage of larger areas possible (radio can penetrate walls, furniture etc.)

Disadvantages
interference by sunlight, heat sources etc. many things shield or absorb IR light low bandwidth

Disadvantages
very limited license free frequency bands shielding more difficult, interference with other electrical devices

Example
IrDA (Infrared Data Association) interface available everywhere

Example
WaveLAN, HIPERLAN, Bluetooth

Wireless Technologies
Wireless Body Area Networks Wireless Personal Area Networks Wireless Local Area Network Wireless Metropolitan Area Network Wireless Wide Area Network
WWAN 802.16e-802.20 WMAN 802.16/HIPERMAN

Varies in terms of transmission range


Up to 1m from 1m to 10m From 10 to 500m From 500 to 20-50 km Beyond 50km

WLAN 802.11/HIPERLAN
802.21 WPAN 802.15

Wireless Technologies
Wireless Technologies

WPAN

WLAN

WMAN

WWAN

Bluetooth 802.15.1

HomeRF

WIFI 802.11

HiperLAN I/II ETSI

WLL 802.16

WiMAX 802.16

HiperMAN

GSM 2G

GPRS EDGE 2.5G

UMTS 3G

WBAN and WPAN


A WBAN provides the connectivity among various devices of wearable computers whose components are distributed on the body
E.g. microphones, earphones, etc.

A WPAN connects one-persons BAN with the environment around it (devices around the person)
Bluetooth is an example of a wireless PAN that allows devices within close proximity to join together in an ad hoc fashion to exchange information Many cell phones have two radio interfaces: one for the cellular network and one for PAN connections
10

WPAN Applications

11

WLAN
A WLAN provides a wider range of connectivity with higher data rate than that of WPAN and WBAN
Infrastructure mode: requires an AP and provide access to Internet backbone Ad hoc mode: peer-to-peer communication

Typical applications: hot spots, buildings Requirements of a WLAN


High capacity Full connectivity among the attached nodes Broadcasting capability

In terms of standardization
In US: IEEE 802.11 and IEEE 802.15 (Bluetooth) In Europe: HiperLAN II

12

WBAN/WPAN/WLAN Applications

13

WMAN
WMAN provides a broadband and fast access (higher data rate) with even wider range than that of WLAN Standards:
In US: IEEE 802.16 In Europe: HiperACCESS (>11GHz) and HiperMAN (<11 GHz)

IEEE802.16:
Support multiple services simultaneously with QoS
IPv4, IPv6, ATM, ETHERNET

Support multiple frequency allocation (2-66GHz) Point-to-multipoint topology with mesh extension
BS is connected to public networks BS serves subscriber stations (building, residence)

Link adaptation (adaptive coding and modulation) Support for advanced antenna systems

WiMAX Forum (Worldwide Interoperability for Microwave Access)


Promotes deployment of BWA (Broad Band Wireless Access) by using a global standard and certifying interoperability of products and technologies Support IEEE802.16
14

WMAN Applications

15

WWAN
Wireless wide area networks are wireless networks that typically cover large areas, such as between neighboring towns and cities, or city and suburb. These networks can be used to connect branch offices of business or as a public internet access system. The wireless connections between access points are usually point to point microwave links using parabolic dishes on the 2.4 GHz band, rather than omnidirectional antennas used with smaller networks. When combined with renewable energy systems such as photo-voltaic solar panels or wind systems they can be stand alone systems. In addition, WANs also refer to Mobile Data Communications, such as GSM, GPRS and 3G.
16

17

Advantages and limitations of the wireless technology


Advantages
Mobility Allows for easy connection of both stationary and mobile clients. Flexibility Ability to provide anytime, anywhere connectivity Cost Wireless technology is fairly easy and inexpensive to install. Scalability Enables networks to be easily expanded, without the limitations of cabled connections.

18

Advantages and limitations of the wireless technology


Reduced installation time Installation of a single piece of equipment can provide connectivity for a large number of people.

19

Advantages and limitations of the wireless technology


Limitations
Interference Wireless technology is susceptible to interference from other devices that produce electromagnetic energies. (Interferensi teknologi Wireless terdedah
terhadap gangguan dari peranti lain yang menghasilkan tenaga elektromagnet)

Wireless provides ease of access. It does this by broadcasting data in a manner that allows anyone the ability to access it. Wireless LAN technology does not currently provide the speed or reliability of wired LAN's.

20

Types of wireless networks and their boundaries


Type of wireless networks
Wireless Personal Area networks (WPAN) This is the smallest wireless network used to connect various peripheral devices such as mice, keyboards and PDAs to a computer. Wireless Local Area networks (WLAN) WLAN is typically used to extend the boundaries of the local wired network (LAN). An Access Point provides a connection between wireless hosts and hosts on an Ethernet wired network. Wireless Wide Area networks (WWAN) WWAN networks provide coverage over extremely large areas.

21

Types of wireless networks and their boundaries

22

Types of wireless networks and their boundaries


Wireless networks boundaries

23

Activity
SCENARIO
1. 2. 3. 4. Charlene uses the IrDA port to connect her PDA to her laptop to upload files. Natasha calls her friend Carlos on her cell phone. Trisha uses her laptop computer at a wireless HotSpot to check her email. Burt uses a wireless Blue tooth headset to listen to music from his MP3 player. Jim connects to the wireless network at his school to do research on a new technology. Ragu uses his cell phone to view a web page on the Internet.

5.
6.

Select answer for question 1 to 6:-

WPAN

WLAN

WWAN
24

5.2 Wireless LANs

25

Wireless LANs Standards Protocols


IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802).

Figure : Wireless Network Devise (WiFi)

26

Wireless LANs Standards Protocols


Many different standards have been adopted for wireless networks
IEEE 802.11n is latest standard adopted (except for 802.11y) Wi-Fi Alliance tests devices from various manufacturers to make sure they operate together.
RF Freq. Through put Data Rate (Max) Max Range Notes & Comments

Protocol Release Date 802.11 802.11a 802.11b 802.11g 802.11n 802.11y 1997 1999 1999 2003 2009* 2008*

2.4 GHz 0.9 Mbps 2 Mbps 5 GHz 23 Mbps 54 Mbps

Undefined Legacy 50m 100m 100m Not compatible with b, g, n Expensive First 2.4 GHz Technology Backward compatible with b Shares range with b Newest Standard Newest Standard

2.4 GHz 4.3 Mbps 11 Mbps 2.4 GHz 19 Mbps 54 Mbps 2.4 & 5 GHz

74 Mbps 248 Mbps 250m 5000m

3.7 GHz 23 Mbps 54 Mbps

wireless LANs devices/components


A wireless local area network (WLAN) links two or more devices using some wireless distribution method and usually providing a connection through an access point to the wider internet. This gives users the mobility to move around within a local coverage area and still be connected to the network. Most modern WLANs are based on IEEE 802.11 standards, marketed under the Wi-Fi brand name.

28

Wireless LANs Devices

29

Wireless LANs Devices/ Components


Wireless Components
Wireless Clients or STAs (Wireless STAtion) APs (Access Points) Wireless Bridges

Types of Antennas
Omni send all directions Used in APs Directional send in one direction Used for longer links to bridge distances

WLANs Form And Service Set Identifier (SSID)


There are Two forms of WLAN Installations: 1. Ad-hoc (IBSS) Equal Peer-to-peer & No AP 2. Infrastructure (BSS) STAs communicate through APs

31

Wireless Channels
Channels are created by giving each a part of the RF spectrum
Each one can carry on a separate conversation (Think of a TV) Can be set manually or automatically

Channels will often overlap frequencies, but conversations cannot overlap Newer technologies combine channels into a wider one for better bandwidth

32

Wireless Channels

33

CSMA/CA
A WLAN technology designed to make collisions impossible (teknologi WLAN direka untuk mengelakkan pertembungan.) Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA).
Reserves a channel for use by a conversation No other devices can transmit on that channel

34

CSMA/CA
CSMA/CA Reservation Process
For a Device to use a channel, it asks the AP by using a Request To Send (RTS) message. If channel is not in use, AP will send Clear To Send (CTS) message to all devices in the BSS so they know the channel is being used. Data is sent from STA After conversation is done, an Acknowledgement (ACK) is transmitted.

35

CSMA/CA

36

5.3 Security on a Wireless LANs

37

Bersambung pada 17/9/2012.

How To Avoid WLAN Attack


1. 2. 3. 4. Limited access to a WLAN Authentication on a WLAN Encryption on a WLAN Traffic filtering on a WLAN

Authentication = pengesahan / ketulenan Encryption = penyulitan

38

Wireless LAN Security - Limiting Access


MAC Address Filtering
MAC address filtering uses the MAC address to identify which devices are allowed to connect to the wireless network. Only devices whose MAC addresses have been prerecorded in the router's database will be allowed to connect.

MAC=Media Access Control


39

Wireless LAN Security - Limiting Access


Controls exactly which devices have access to the LAN Uses MAC addresses to ID clients authorized to access WLAN. Limitations:
MAC addresses for authorized clients must be input manually. This makes adding new clients difficult MAC Address cloning or spoofing can allow an unauthorized user to get into the WLAN.

Wireless LAN Security - Authentication


This process requires a client to present credentials in order to use the network. Most common is a username and password, but for a wireless network, this is handled differently. Because the transaction is wireless and can be heard by anyone, the authentication is done before connecting. Three Types of Authentication:
Open Used for Public Networks Networks where another method of authentication is used. PSK EAP

Wireless LAN Security - Authentication


PSK (Pre-Shared Key) EAP (Extensible Authentication Protocol) Both client and AP are configured
with a shared key Password is encrypted by client using shared key, then sent to AP, where it is decrypted using the same key. Doesnt authenticate AP or User, only one way Authentication is 2-way Client communicates through AP to (usually) a RADIUS server which has list of authorized users and clients. Both user and client must authenticate.

Wireless LAN Security Data Encryption


Use of Wireless Authentication Authentication can prevent unauthorized users from accessing WLAN, but data is still transmitted to anyone with a receiver. Encryptions methods were developed to encrypt wireless communications to prevent snooping by outsiders.

Two main encryption methods: WEP (Wired Equivalency Protocol) WPA (Wi-FI Protected Access)

Wireless LAN Security Data Encryption


WEP (Wired Equivalency Protocol)
Uses pre-configured 64, 128, or 256 bit keys to encrypt data before transmission. WEP keys are just a string of letters or numbers and can also be automatically generated using a passphrase. WEP is not a secure protocol and can easily be cracked by a knowledgeable wireless hacker.

WPA (Wi-Fi Protected Access)


Also uses a 64 to 256 encryption key. WPA doesnt always use the same key, but generates new, dynamic keys each time a client connects. WPA is considered the current standard of encryption for wireless networks.
44

Wireless LAN Security Traffic filtering


Allows control of traffic types Filtered using sent across WLAN MAC Addresses Blocks undesirable traffic from IP Addresses entering or leaving network Port Numbers

WLAN Security Measures


Security should be planned and configured before installing into network or ISP
Basic measures:
Change Defaults for SSID, usernames, and Psswrds Disable SSID broadcast MAC Address Filtering

Advanced Measures
WPA or WEP Encryption Authentication Traffic Filtering

Você também pode gostar