Escolar Documentos
Profissional Documentos
Cultura Documentos
Table of Contents...Pages
1.0 Introduction ................................................................................................................................... 1 2.0 Differences between WLANs and LANs...................................................................................... 3 3.0 Different WLAN Technologies .................................................................................................... 4 4.0 Types of WLAN ........................................................................................................................... 5 4.1 WLAN standards ...................................................................................................................... 7 5.0 Advantages and Disadvantages of WLANs .................................................................................. 7 6.0 What are Benefits of a Wireless Network? ................................................................................... 9 7.0 Technology of WLAN ................................................................................................................ 10 8.0 Wireless LAN applications in business fields............................................................................. 11 Wireless LANs Applications ............................................................................................................ 11 9.0 Range of coverage and cost aspects of WLAN........................................................................... 14 9.1 Range of coverage................................................................................................................... 14 10.0 Security issues and challenges .................................................................................................. 15 10.1 Wireless LAN Security Threats ............................................................................................ 15 10.2 Mitigating Security Threats .................................................................................................. 15 10.3 Attacks on WEP .................................................................................................................... 17 11.0 Conclusion ................................................................................................................................ 18 12.0 References ................................................................................................................................. 19
1|Page
Wireless LANs are a boon for organizations that don't have time to setup wired LANs, make networked- temporary offices a reality and remove the wire work that goes on in setting LANs. They are reported to reduce setting up costs by 15%. Wireless LANs (WLANs) are quickly gaining popularity due to their ease of installation and higher employee mobility. Together with personal digital assistants (PDA) and other mobility devices, they go on to improve the quality of life. Even at home, people have changed the way they live and learn. The Internet has become a standard in homes, right along with TV and phone service. Even the method of accessing the Internet has quickly moved from temporary modem dialup service to dedicated digital subscriber line (DSL) or cable service, which is always connected and is faster than dialup. In 2005, users of PCs purchased more Wi-Fienabled mobile laptops (i.e., products that are based on the IEEE 802.11 standards) than fixed-location desktops.
The most tangible benefit of wireless is the cost reduction. First, with a wireless infrastructure already in place, savings are realized when moving a person from one location in an office to another, or when moving from temporary locations or project sites. The second situation to consider is when a company moves into a new building that does not have a wired
2|Page
1) WLANs use carrier sense multiple access with collision avoidance (CSMA/CA) instead of carrier sense multiple access collision detect (CSMA/CD), which is used by Ethernet LANs. Collision detection is not possible in WLANs, because a sending station cannot receive at the same time that it transmits and, therefore, cannot detect a collision. Instead, WLANs use the Ready To Send (RTS) and Clear To Send (CTS) protocols to avoid collisions.
2) WLANs use a different frame format than wired Ethernet LANs use. WLANs require additional information in the Layer 2 header of the frame. Radio waves cause problems not found in LANs, such as the following: a) Connectivity issues occur because of coverage problems, RF transmission, multipath distortion, and interference from other wireless services or other WLANs. b) Privacy issues occur because radio frequencies can reach outside the facility. In WLANs, mobile clients connect to the network through an access point, which is the equivalent of a wired Ethernet hub.
These connections are characterized as follows: (i) There is no physical connection to the network.
(ii) The mobile devices are often battery-powered, as opposed to plugged-in LAN devices. WLANs must meet country-specific RF regulations. The aim of standardization is to make WLANs available worldwide. Because WLANs use radio frequencies, they must follow country-specific regulations of RF power and frequencies. This requirement does not apply to wire LANs.
3|Page
5|Page
(ii) Extended Services Set (ESS): The wireless topology is extended with two or more BSSs connected by a distribution system (DS) or a wired infrastructure. An ESS generally includes a common SSID to allow roaming from access point to access point without requiring client configuration.
6|Page
Pros
Cons
Less
susceptible
to
interference 802.11b
Doesn't
support
as
many
simultaneous connections
802.11g
802.11n
The 802.11n standard was recently ratified by the Institute of Electrical and Electronics Engineers (IEEE), as compared to the previous three standards. Though specifications may change, it is expected to allow data transfer rates up to 600Mbps, and may offer larger ranges.
It is easier to add or move workstations. It is easier to provide connectivity in areas where it is difficult to lay cable. Installation is fast and easy, and it can eliminate the need to pull cable through walls and
ceilings.
Access to the network can be from anywhere within range of an access point. Portable or semi permanent buildings can be connected using a WLAN. Although the initial investment required for WLAN hardware can be similar to the cost of
When a facility is located on more than one site (such as on two sides of a road), a
directional antenna can be used to avoid digging trenches under roads to connect the sites.
In historic buildings where traditional cabling would compromise the faade, a WLAN can
Long-term cost benefits can be found in dynamic environments requiring frequent moves
and changes.
As the number of computers using the network increases, the data transfer rate to each
As standards change, it may be necessary to replace wireless cards and/or access points. Lower wireless bandwidth means some applications such as video streaming will be more
8|Page
Devices will only operate at a limited distance from an access point, with the distance
determined by the standard used and buildings and other obstacles between the access point and the user.
Long-term cost benefits are harder to achieve in static environments that require few
Mobility: Wireless LAN systems can provide LAN users with access to real-time
information anywhere in their organization. This mobility supports productivity and service opportunities not possible with wired networks. There are now thousands of universities, hotels and public places with public wireless connection. These free you from having to be at home or at work to access the Internet.
Installation Speed and Simplicity: Installing a wireless LAN system can be fast and easy
and can eliminate the need to pull cable through walls and ceilings.
Reduced Cost-of-Ownership: While the initial investment required for wireless LAN
hardware can be higher than the cost of wired LAN hardware, overall installation expenses and life-cycle costs can be significantly lower. Long-term cost benefits are greatest in dynamic environments requiring frequent moves and changes.
the needs of specific applications and installations. Configurations are easily changed and range from peer-to-peer networks suitable for a small number of users to full infrastructure networks of thousands of users that enable roaming over a broad area.
9|Page
Examples 1: For WLANs that connect to the Internet, Wireless Application Protocol (WAP) technology allows Web content to be more easily downloaded to a WLAN and rendered on wireless clients like cell phones and PDAs. (WLAN)
Example 2: WLANs are most often used on mobile systems as an extension to a wired LAN, as illustrated in Figure 4. (Source: wireless LAN pdf)
Wireless LANs Applications In the past, wireless LAN products, were introduced in the late 1980s, and they were marketed as substitutes for traditional wired LANs. A wireless LAN saves the cost of the installation of LAN cabling and eases the task of relocation and other modifications to
11 | P a g e
1) Inventory Control Many businesses profit from using wireless LANs when managing their manufacturing processes at work. Thus this will lower the operating costs as the connections between the manufacturing equipment and main control systems are wireless. Therefore, the company can reconfigure the assembly process at anytime from anywhere, saving time and money. Through the use of a wireless LAN, a company can track and update inventory in real time, enabling efficiency and accuracy to increase radically. For instance, in a retail environment, as soon as a clerk purchases a product, a wireless management solution can update the inventory. 2) Health Care More and more hospitals are adopting wireless networks to improve operational efficiency and convenience. In most cases, it is implementing in high patient-traffic areas including emergency rooms, critical care wards, nursing stations, as well as in doctor's offices and patient waiting areas. Thus, through this way, hospital staff can use mobile computer devices to increase efficiency and accuracy when caring for patients. As a result, health-care centers must maintain accurate records to ensure quality patient care. A simple mistake can cost someone's life. As a result, doctors and nurses must carefully record test results, physical data, pharmaceutical orders, and surgical procedures. This paperwork often overwhelms health-care staff, taking 50-70 percent of their time. This improvement is possible by providing each nurse and doctor with a wireless pen-based computer, such as a tablet or PDA, coupled with a wireless network to databases that store critical medical information about the patients.
12 | P a g e
4) Field Service Field service personnel spend most of their time on the road installing and maintaining systems or inspecting facilities under construction and as to complete their jobs, these individuals need access to product documentation and procedures. In some cases, the field person might not be able to take all the documents to a job site, causing delay while obtaining the proper information. Thus, with the help of wireless LAN field service personnel can get access to documentation. A field service employee, for example, can carry a portable computer that connects to the office LAN that contains accurate documentation of all applicable information.
5) Vending Beverage and snack companies place vending machines in hotels, airports, and office buildings to improve the sales of their products. Vending machines get rid of the need for a human salesclerk. However, these companies must send employees around to stock the machines occasionally. Nevertheless, machines might become empty before the restocking occurs as the company has no way of knowing when the machine runs out of a particular product.
13 | P a g e
The distance over which RF (radio frequency) and IR (infrared) waves can communicate depends on product design (including transmitted power and receiver design) and the propagation path, especially in indoor environments. Interactions with typical building objects, such as walls, metal, and even people, can affect the propagation of energy, and thus also the range and coverage of the system. IR is blocked by solid objects, which provides additional limitations. Most wireless LAN systems use RF, because radio waves can penetrate many indoor walls and surfaces. The range of a typical WLAN node is about 100 m. Coverage can be extended, and true freedom of mobility achieved via roaming. This means using access points to cover an area in such a way that their coverages overlap each other. Thereby the user can wander around and move from the coverage area of one access point to another without even knowing he has, and at the same time seamlessly maintain the connection between his node and an access point.
Finally, the cost of installing and maintaining a WLAN is on average lower than the cost of installing and maintaining a traditional wired LAN, for two reasons. First, WLAN eliminates the direct costs of cabling and the labor associated with installing and repairing it. Second, because WLANs simplify moving, additions, and changes, the indirect costs of user downtime and administrative overhead are reduced.
14 | P a g e
Figure 6: Traditional wired LAN and WLAN (source: understanding wireless LAN pdf)
With the lower costs of IEEE 802.11b/g systems, it is predictable that hackers have many more unsecured WLANs from which to choose. A survey had been conducted by people using numerous open source applications to collect and exploit vulnerabilities in the IEEE 802.11 standard security mechanism, Wired Equivalent Privacy (WEP). Wireless sniffers enable network engineers to passively capture data packets so that they can be examined to correct system problems. These same sniffers can be used by hackers to exploit known security weaknesses.
10.2 Mitigating Security Threats
1) Authentication 802.11 specify two authentication mechanisms: a) Open system authentication b) Shared key authentication
15 | P a g e
Shared system authentication The client cannot authenticate himself if he doesn't have the WEP shared secret key. WEP protocol is used for encryption.
2) Association An SSID is used to differentiate two networks logically. To successfully associate to a WS, one must have the SSID of the other WS. This was not intended to be a security feature, and in fact SSID is sent in open in the beacon frame of the AP (access point).
3) Encryption and Decryption-The WEP Protocol The WLAN administrator has an option (if the administrator decides to send the packets unencrypted) to make all the communication over the air encrypted, i.e. every frame that is below the Ethernet Header is encrypted using the WEP protocol.
Fig 7.2: Encryption & Decryption on WEP (source: wireless LAN security pdf) 16 | P a g e
WEP is considered to be very susceptible to attackers. Any attacker sitting in the parking lot of a building can attack the building's WLAN security. This is unlike the wired case whereby the attacker needs a physical access to the wires. The following known attacks have been employed on WEP.
Type of Attacks The following known attacks are known to be effective: 1) Passive Attacks Passive threats do not require an opponent to do anything other than sit back and take advantage of what is already in place and being used.
Passive threats include but are not limited to exploits such as the following: tapping of communications links (wire line, RF); exploitation of software vulnerabilities; or traffic analysis.
2) Active attacks An active threat requires an adversary to initiate a sequence of events to attempt to exploit vulnerability. During an active attack, the adversary attempts to probe the system, or cause mischief or upsets in order to compromise the system(s).
As with other networks, the active attacks are riskier but provide greater powers to the attacker. Passive Attacks No risk involved Riskier No need to be the part of networks, because the WLAN cards support monitor mode, whereby one can listen to the communication without being a part of the network The attacker can only listen to whatever is going on. He cannot fiddle with the network Active attacks Riskier The attacker has to first get into the network, before doing damages
The attacker can interrupt, hijack and
Passive attacks v/s active attacks (source: securities and solution WLAN pdf) 17 | P a g e
18 | P a g e
19 | P a g e