5 - Wireless Technologies

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 100

WIRELESS

TECHNOLOGIES
After completion of this chapter, you
should be able to :
 Describe wireless technology
 Describe the various components and structure of a
wireless LAN.
 Describe wireless security and mitigation strategies.
 Configure an integrated wireless access point and
wireless client.
Definition
 Wireless technologies use electromagnetic waves to
carry information between devices.
 Electromagnetic wave is the same medium that carries
radio signals through the air.
Electromagnetic Spectrum
 Electromagnetic spectrum includes
 Radio & Tv broadcast bands
 Visible light

 X-rays & Gamma-rays

 Infrared

 Radio Frequency
EM SPCTRUM
Wireless Tech & Devices
Infrared
 Low energy & cannot penetrate trough walls or other
obstacles.
 Used to connect & move data between devices such as
PDA and PCs.
 A specialized communication port known as Infrared
Direct Access (IrDA) port uses IR to exchange
information between devices.
Cont..
 IR only allows a one-to-one type of connection.
 Also used for remote control devices, wireless mice
and wireless keyboard.
Radio Frequency (RF)
 RF can penetrate through walls & other obstacles.
 Certain areas of RF bands have been set aside for use
unlicensed such as wireless LANs. Range include
900MHz, 2.4GHz & 5GHz frequency ranges.
 This ranges known as Industrial Scientific & Medical
(ISM).
Bluetooth
 Makes use of the 2.4GHz band.
 Limited to low-speed, short-range communications.
 One to many communications connecting computer
peripherals such as mice, keyboards and printers.
Wireless LANs
 Use of 2.4GHz and 5GHz bands are the modern
wireless LAN that conform to various IEEE 802.11
standards
 Transmit at a much higher power level, which gives
them a greater range.
Benefits of Wireless Tech
 Mobility-allows for easy connection of both stationary
& mobile clients
 Scalability-can be easily expanded to allow more users
to connect & to increase the coverage area.
 Flexibility-Provides anytime, anywhere connectivity.
 Cost Savings-Equipment costs continue to fall as the
technology matures
Cont..
 Reduce Installation Time-Installation of a single piece
of equipment can provide connectivity for a large
number of people.
 Reliability in harsh environments-easy to install in
emergency & hostile environments.
Wireless Tech limitations
 Interference-Wireless technology is susceptible to
interference from other devices that produce
electromagnetic energies. Includes cordless phones,
microwaves, televisions & others.
 Network & Data Security-WLAN tech is designed to
provide access to the data being transmitted, not
security of the data. Additionally it can provide &
unprotected entrance into the wired network.
Cont..
 Technology-WLAN tech continues to evolve. WLAN
tech does not currently provide the speed or reliability
of wired LANS.
Types of Wireless Networks
Cont..
 WPAN
 Smallest wireless network used to connect various peripheral
devices such as mice, keyboards & PDAs to a computer.
 All devices are dedicated to a single host with usually use IR or
Bluetooth tech.
Cont..
 WLAN
 Used to extend the boundaries of the LANs
 Use RF technology & conform to the IEEE 802.11 standards.

 Allow many users to connect to a wired network through


device known as an Access Point (AP)
 AP provides a connection between wireless hosts & hosts on
Ethernet Wired network.
Cont..
 WWAN
 Provide coverage over extremely large areas.
 Example of WWAN is cell phone network.
 These networks use technologies such as CDMA & GSM
& are often regulated by government agencies.
Cont..
WLANs Standards
 802.11a:
 Uses 5 GHz RF spectrum
 Not compatible with 2.4 GHz spectrum, i.e. 802.11 b/g/n
devices
 Range is approximately 33% that of the 802.11 b/g
 Relatively expensive to implement compared to other
technologies
 Increasingly difficult to find 802.11a compliant
equipment
Cont..
 802.11b:
First of the 2.4 GHz technologies
Maximum data-rate of 11 Mbps
Range of approximately 46 m (150 ft)
indoors/96 m (300 ft) outdoors
Cont..
 802.11g
 2.4 GHz technologies
 Maximum data-rate increase to 54 Mbps
 Same range as the 802.11b
 Backwards compatible with 802.11b
Cont..
 802.11n:
 Newest standard in development
 2.4 GHz technologies (draft standard specifies support
for 5 GHz)
 Extends the range and data throughput
 Backwards compatible with existing 802.11g and 802.11b
equipment (draft standard specifies 802.11a support)
Cont..
WLANs Components
WLANs Components
 Wireless Client
 Any host device that participate in the WLAN network
equipped with the proper wireless NIC & software.
 Can be stationary or mobile
 Commonly referred to as STA(Station)
 Examples : Laptops, PDAs, printers etc.
Cont..
 Access Point
 Controls access between a wired & a wireless network,
i.e allows wireless clients to gain access to a wired
network & vice versa.
 Acts as a media converter accepting the Ethernet frames
from the wired network & converting them to 802.11
compliant.
Cont..
 Wireless Bridge
 Used to connect two wired networks through a wireless
link.
 Allows long-range point-to-point connections between
networks.
 Using the unlicensed RF frequencies, networks 40km or
more apart can be connected w/o the use of wires.
WLANs & SSID
 SSID – Service Set Identifier
 A case-sensitive, alphanumeric string that is up to 32
characters.
 It is sent in the header of all frames transmitted over
the WLAN
 SSID is used to tell the wireless devices which WLAN
they belong to & with which other devices they can
communicate.
 All wireless devices in a WLAN must be configured
with the same SSID in order to communicate.
Cont..
Basic forms of WLAN Installation
 Ad-hoc
 Simplest form of wireless network is created by
connecting two or more wireless client together in a
peer-to-peer network.
 Known as ad-hoc network & does not include an AP.
 All clients within ad-hoc is equal & known as
IBSS(Independent Basic Service Set)
 Used to exchange files & information.
Cont..
Cont..
 Infrastructure Mode
 AP control who can talk & when.
 To communicate, each device must obtain permission
from the AP.
 AP controls all communications & ensures that all STAs
have equal access to the medium.
 The area covered by a single AP is known as BSS(Basic
Service Set) or cell
Cont..
Extended Service Set (ESS)
 Connect multiple BSSs trough the Distribution
System (DS).
 An ESS uses multiple APs. Each is in a separate BSS.
 To allow movement between the cells w/o the loss of
signal, BSSs must overlap by approximately 10%.
 This allows the clients to connect to the second AP
before disconnecting the first AP.
Cont..
Wireless Channels
 Channel is used to controlled the conversation
between sender & receiver either in IBSS, BSS or ESS.
 Channels are created by dividing up the available RF
spectrum.
 Each channel is carrying a different conversation.
Similar to a TV that carries a multiple channels &
transmitted across a single medium.
 Multiple APs can function in close proximity to one
another as long as they use different channels for
communication.
 it is possible for the frequencies used by some
channels to overlap with those used by others.
 Different conversations must be carried on non-
overlapping channels.
 The number and distribution of channels vary by
region and technology.
 The selection of channel used for a specific
conversation can be set manually or automatically,
based on factors such as current usage and available
throughput.
 Normally each wireless conversation makes use of a
separate channel.
 Some of the newer technologies combine the channels
to create a single wide channel, which provides more
bandwidth and increases the data rate.
CSMA/CA
 Within a WLAN, the lack of well-defined boundaries
makes it impossible to detect if collisions occur
during transmission.
 Wireless technology uses an access method called
Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA).
 CSMA/CA creates a reservation on the channel for
use by a specific conversation.
 While a reservation is in place, no other device may
transmit on the channel thus possible collisions are
avoided.
Reservation Process-1
Reservation Process-2
Reservation Process-3
Reservation Process-4
Configuring the AP
Cont..
 Network Mode-Determines the type of technology
that must be supported. E.g. 802.11b, 802.11g, 802.11n
or Mixed Mode.
 SSID-Used to identify the WLAN. All devices that
wish to participate in the WLAN must have the same
SSID.
 Standard Channel-Specifies the channel over which
communication will occur. By default, this is set to
Auto to allow the AP to determine the optimum
channel to use.
Cont..
 SSID Broadcast-Determines if the SSID will be
broadcast to all devices within range. By default set to
Enable.
Configuring the Wireless Client
 Wireless host (STA) is defined as any device that
contains a wireless NIC & wireless client software.
 Client software allows the hardware to participate in
the WLAN.
 The wireless client software used can be software
integrated into the device operating system, or can be
a stand-alone, downloadable, wireless utility software
specifically designed to interact with the wireless
NIC.
INTEGRATED WIRELESS UTILITY SOFTWARE
 The Windows XP wireless client software is an
example of a popular wireless client utility that is
included as part of the device OS.
 This client software is basic management software
that can control most wireless client configurations. It
is user friendly and offers a simple connection process.
STAND-ALONE WIRELESS UTILITY SOFTWARE
 Usually supplied with the wireless NIC & offers
enhanced function over window XP such as:
 Link Information - displays the current strength and
quality of a wireless single
 Profiles - allows configuration options such as channel
and SSID to be specified for each wireless network
 Site Survey - enables the detection of all wireless
networks in the vicinity
Cont..
 Once the client software is configured, verify the link
between the client and the AP.
 Open the wireless link information screen to display
information such as the connection data rate,
connection status, and wireless channel used.
 The Link Information feature, if available, displays
the current signal strength and quality of the wireless
signal.
Cont..
 Ping test is used to verify the successful data
transmission .
 If the ping is successful, data transmission is possible.
 If the ping is unsuccessful from source to destination,
then ping the AP from the wireless client to ensure
that wireless connectivity is available.
 If this fails as well, the issue is between the wireless
client and the AP.
 Check the setting information and try to re-establish
connectivity.
Security Consideration on A
WLAN
Use Internet Service for Access computer in the
free network

Why people
Attack WLANs

Steal information
Cont..
 One easy way to gain entry to a wireless network is
through the network name, or SSID.
 All computers connecting to the wireless network must
know the SSID.
 By default, wireless routers and access points broadcast
SSIDs to all computers within the wireless range.
 With SSID broadcast activated, any wireless client can
detect the network and connect to it, if no other security
features are in place.
 The SSID broadcast feature can be turned off. When it is
turned off, the fact that the network is there is no longer
made public.
 Any computer trying to connect to the network must
already know the SSID.
Limiting Access to a WLAN
 MAC address filtering
 MAC address filtering uses the MAC address to
identify which devices are allowed to connect to the
wireless network.
 When a wireless client attempts to connect, or
associate, with an AP it will send MAC address
information.
 If MAC filtering is enabled, the wireless router or AP
will look up its MAC address a preconfigured list.
 Only devices whose MAC addresses have been pre-
recorded in the router's database will be allowed to
connect.
Cont..
 If the MAC address is not located in the database, the
device will not be allowed to connect to or
communicate across the wireless network.
 There are some issues with this type of security. For
example, it requires the MAC addresses of all devices
that should have access to the network be included in
the database before connection attempts occur.
 A device that is not identified in the database will not
be able to connect.
 Additionally, it is possible for an attacker's device to
clone the MAC address of another device that has
access.
Authentication on a WLAN
1)Open Authentication
 By default, wireless devices do not require authentication.
 Any and all clients are able to associate regardless of who
they are.
 This is referred to as open authentication.
 Open authentication should only be used on public
wireless networks such as those found in many schools
and restaurants.
 It can also be used on networks where authentication will
be done by other means once connected to the network.
Open Authentication
Cont..
2) Pre-shared keys (PSK)
 With PSK both the AP and client must be configured with
the same key or secret word.
 The AP sends a random string of bytes to the client. The
client accepts the string, encrypts it (or scrambles it)
based on the key, and sends it back to the AP.
 The AP gets the encrypted string and uses its key to
decrypt (or unscramble) it.
 If the decrypted string received from the client matches
the original string sent to the client, the client is allowed
to connect.
 PSK performs one-way authentication, that is, the host
authenticates to the AP.
 PSK does not authenticate the AP to the host, nor does it
authenticate the actual user of the host.
Pre-Shared Key
Cont..
3) Extensible Authentication Protocol (EAP)
 EAP provides mutual, or two-way, authentication as well
as user authentication.
 When EAP software is installed on the client, the client
communicates with a backend authentication server such
as Remote Authentication Dial-in User Service (RADIUS).
 This backend server functions separately from the AP
and maintains a database of valid users that can access
the network.
 When using EAP, the user, not just the host, must provide
a username and password which is checked against the
RADIUS database for validity. If valid, the user is
authenticated.
Extensible Authentication
Protocol
Authentication & Association
Process
Authentication & Association
Process
Authentication & Association
Process
 In conclusion Authentication and MAC filtering may
stop an attacker from connecting to a wireless
network but it will not prevent them from being able
to intercept transmitted data.
 Since there are no distinct boundaries on a wireless
network, and all traffic is transmitted through the air,
it is easy for an attacker to intercept, or sniff the
wireless frames.
 Encryption is the process of transforming data so that
even if it is intercepted it is unusable.
Encryption on a WLAN
1)Wired Equivalency Protocol (WEP)
 Wired Equivalency Protocol (WEP) is an advanced
security feature that encrypts network traffic as it
travels through the air.
 WEP uses pre-configured keys to encrypt and decrypt
data.
 A WEP key is entered as a string of numbers and letters
and is generally 64 bits or 128 bits long.
 WEP also supports 256 bit keys.
 To simplify creating and entering these keys, many
devices include a Passphrase option.
 The passphrase is an easy way to remember the word or
phrase used to automatically generate a key.
Cont..
 In order for WEP to function, the AP, as well as every
wireless device allowed to access the network must
have the same WEP key entered.
 Without this key, devices will not be able to
understand the wireless transmissions.
2) Wi-Fi Protected Access(WPA)
WPA also uses encryption keys from 64 bits up to 256
bits.
WPA, unlike WEP, generates new, dynamic keys each
time a client establishes a connection with the AP.
 For this reason, WPA is considered more secure than
WEP because it is significantly more difficult to crack.
WPA
Traffic Filtering on a WLAN
 Traffic filtering blocks undesirable traffic from entering or
leaving the wireless network.
 Filtering is done by the AP as traffic passes through it.
 It can be used to remove traffic from, or destined to, a
specific MAC or IP address.
 Also block certain applications by port numbers.
 By removing unwanted, undesirable and suspicious traffic
from the network, more bandwidth is devoted to the
movement of important traffic and improves the
performance of the WLAN.
 For example, traffic filtering can be used to block all
telnet traffic destined for a specific machine, such as an
authentication server. Any attempts to telnet into the
authentication server would be considered suspicious and
blocked.
Planning the WLAN
 Determining the type of wireless standard to use
 Determining the most efficient layout of devices
 An installation and security plan
 A strategy for backing up and updating the firmware
of the wireless devices
Wireless Standard
Coverage Area

Bandwidth Existing
WLAN
Requirement STANDARD Implementation

Cost
 Bandwidth
 The bandwidth available in a BSS must be shared
between all the users in that BSS. Even if the
applications do not require a high-speed connection,
one of the higher-speed technologies may be necessary
if multiple users are connecting at the same time.
 Coverage Areas
 Different standards support different coverage areas.
 The 2.4 GHz signal, used in 802.11 b/g/n technologies,
travels a greater distance than does the 5 GHz signal,
used in 802.11a technologies.
 Thus 802.11 b/g/n supports a larger BSS.
 Existing Network
 The existing network also affects new implementation
of WLAN standards.
 For example, the 802.11n standard is backward
compatible with 802.11g and 802.11b but not with 802.11a.
 If the existing network infrastructure and equipment
support 802.11a, new implementations must also
support the same standard.
 Cost
 Total Cost of Ownership (TCO) which includes the
purchase of the equipment as well as installation and
support costs.
 In a medium to large business environment, TCO has a
greater impact on the WLAN standard chosen than in
the home or small business environment.
 This is because in the medium to large business, more
equipment is necessary and installation plans are
required, increasing cost.
End User Requirement
The best way to learn end-user requirements is to
ask questions.
 What throughput is actually required by the
applications running on the network?
 How many users will access the WLAN?
 What is the necessary coverage area?
 What is the existing network structure?
 What is the budget?
Installation of Wireless Devices
 Installation consists of limited amount of equipment
which can be easily relocated to provide optimum
coverage and throughput.
 Determine the optimum number and location of APs
to provide this coverage at the least amount of cost.
 In order to accomplish this, a site survey is usually
conducted.
 In all cases, it is necessary to consider known sources
of interference such as high-voltage wires, motors,
and other wireless devices when determining the
placement of WLAN equipment.
Site Survey
Installing & Securing the AP
 Some of the more basic security measures include:
 Change default values for the SSID, usernames and
passwords
 Disable broadcast SSID
 Configure MAC Address Filtering
Installing & Securing the AP
 Some of the more advanced security measures include:
 Configure encryption using WEP or WPA
 Configure authentication
 Configure traffic filtering
Installing & Securing the AP
Backing-up and Restoring
Configuration Files

After Installation process is done, configuration


backup
Should be performed on the devices.
Once the backup is done it is easy to restore the
original configuration.
Updating the Firmware
 The operating system on most integrated routers is
stored in firmware. As new features are developed or
problems with the existing firmware are discovered, it
may become necessary to update the firmware on the
device.
 The process for updating firmware on an integrated
router, such as the Linksys wireless router, is simple.
However, it is important that once the process is
started, it is not interrupted. If the update process is
interrupted before completion, the device may be
rendered non-operable.
Updating the Firmware
Summary
 Wireless technologies use electromagnetic radiation
in the form of radio signals to carry information
between devices
 The most common wavelengths used for public
wireless communications include the IR & RF
 Remote control devices, wireless mice & wireless
keyboards use either IR or Bluetooth.
Cont..
 Devices such as microwave ovens & cordless phones
can interface with WLAN communications, because
use similar frequencies.
 Wireless networks are grouped into 3 major categories
WPAN, WLAN, WWAN.
 The main organization responsible for the creation of
wireless technical standards is the IEEE.
Cont..
 Standards that govern the WLAN environment include
802.11a, 802.11b, 802.11g, 802.11n & are known as Wi-Fi
standards
 Devices in a WLAN include: wireless clients, AP,
wireless bridges & antennas.
 A small WLAN, peer-to-peer network, is known as an
ad-hoc network & does not include an AP.
Cont..
 Wireless devices use antennas to transmit & receive
information. There are 2 types of antenna: directional
& Omnidirectional.
 All wireless devices in a WLAN must be configured
with the same SSID & operate using the same
standards in order to communicate.
 To separate conversations, the RF spectrum is divided
into different channels.
Cont..

 APs & clients uses an access method called CSMA/CA


that creates a reservation on the channel for use by a
specific conversation.
 Because they can operate w/o much configuration &
transmit information through the open air, wireless
networks are more susceptible to attacks than wired
network.
 An attacker can access your network from any
location your wireless signal reaches.
 Attackers can use your internet for free or damage
files & steal private information from your network.
 Basic security measure-change default values for
SSID, username & password. Disable broadcast SSID.
Configure MAC Address Filtering.
Cont..
 Advanced security-Configure encryption using WEP
or WPA. Configure authentication. Configure traffic
filtering.
 Before installing a wireless network, an installation
plan should be created that includes the standards to
be used, the location of devices, a securit

You might also like