47
Wireless Networks  Authors: Indra Widyatama Februaty 2010 PT. Berlian Sistem I nformasi

Wireless NetworksA

Embed Size (px)

Citation preview

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 1/47

Wireless Networks Authors:Indra Widyatama

Februaty 2010

PT. Be rlian S ist em I nfor m asi

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 2/47

P resentation Outline

Wireless Technology overviewThe IEEE 802.11 WLAN StandardsSecure Wireless LANs

Migrating to Wireless LANs (Cutting the cord)

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 3/47

Wireless?

A wireless LAN or WLAN is a wireless local areanetwork that uses radio waves as its carrier.The last link with the users is wireless, to give anetwork connection to all users in a building or

campus.The backbone network usually uses cables

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 4/47

C ommon TopologiesTh e w ir e le ss L AN conn ec ts to a w ir ed L AN

There is a need of an access point that bridges wireless LAN traffic into thewired LAN.The access point (AP) can also act as a repeater for wireless nodes,effectively doubling the maximum possible distance between nodes.

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 5/47

C ommon TopologiesC o mp le t e W ir e le ss Ne t w orks

The physical size of the network is determined by the maximum reliablepropagation range of the radio signals.

Referred to as a d ho c networks Are self-organizing networks without any centralized controlSuited for temporary situations such as meetings and conferences.

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 6/47

H ow do wireless LANs work?

Wireless LANs operate in almost the same way aswired LANs, using the same networking protocolsand supporting the most of the sameapplications.

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 7/47

H ow are WLANs Different?They use specialized p hysi cal an d d ata linkprotocolsThey integrate into existing networks through a cce ss p oints which provide a bridging functionThey let you stay connected as you roa m from onecoverage area to anotherThey have unique s ec urity considerationsThey have specific int e ro pe rability requirementsThey require d iff e re nt har dw ar eThey offer pe rfor m an ce that differs from wiredLANs.

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 8/47

Phy sical and Data Link La y ersPhysi cal Lay e r:

The wireless NI C takes fra me s of data fromthe link layer, scrambles the data in apredetermined way, then uses the modifieddata stream to modulate a ra d io carri e r signal .

Data Link Lay e r: Uses C arriers- Sense- Multiple- Access with

C ollision Avoidance (CS M A/CA).

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 9/47

I ntegration Wit h Existing Networks

Wireless Access Points (APs) - a small devicethat bridges wireless traffic to your network.

Most access points bridge wireless LANs intoEthernet networks, but Token- R ing options are

available as well.

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 10/47

I ntegration Wit h Existing Networks

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 11/47

R oaming Users maintain a continuous connection as they roam

from one physical area to another Mobile nodes automatically register with the new

access point. Methods: DHCP, M obile IP

IEEE 802.11 standard does not address roaming, you may needto purchase equipment from onevendor if your users need to roamfrom one access point to another.

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 12/47

S ecurit yIn theory, spread spectrum radio signals are

inherently difficult to decipher without knowingthe exact hopping sequences or direct sequence codes usedThe IEEE 802.11 standard specifies optionalsecurity called " W ired Equivalent P rivacy"whose goal is that a wireless LAN offer privacyequivalent to that offered by a wired LAN. Thestandard also specifies optional authenticationmeasures.

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 13/47

I nteroperabilit y Before the IEEE 802.11 interoperability was based on

cooperation between vendors.IEEE 802.11 only standardizes the physical andmedium access control layers.

Vendors must still work with each other to ensuretheir IEEE 802.11 implementations interoperateWireless Ethernet Compatibility Alliance (WECA)introduces the Wi-Fi Certification to ensure cross-

vendor interoperability of 802.11b solutions

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 14/47

H ardware

PC Card, either with integral antenna or withexternal antenna/ R F module.ISA Card with external antenna connected bycable.

Handheld terminals Access points

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 15/47

H ardware

CISCO Aironet 350 series Wireless Handheld Terminal

Semi Parabolic Antenna BreezeCO M AP

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 16/47

P erformance802 .11 a offers speeds with a theoreticallymaximum rate of 54 M bps in the 5 GHz band802 .11 b offers speeds with a theoreticallymaximum rate of 11 M bps at in the 2.4 GHz

spectrum band802 .11 g is a new standard for data rates of upto a theoretical maximum of 54 M bps at 2.4

GHz.

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 17/47

Wh at is 802.11? A family of wireless LAN (WLAN) specifications

developed by a working group at the Institute of Electrical and Electronic Engineers (IEEE)Defines standard for WLANs using the following fourtechnologies

Frequency Hopping Spread Spectrum (FHSS)Direct Sequence Spread Spectrum (DSSS)Infrared (I R )Orthogonal Frequency Division M ultiplexing (OFD M )

Versions: 802.11a, 802.11b, 802.11g, 802.11e,802.11f, 802.11i

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 18/47

802.11 - Transmission Most wireless LAN products operate in

unlicensed radio bands2.4 GHz is most popular

Available in most parts of the worldNo need for user licensing

Most wireless LANs use spread-spectrum radio Resistant to interference, secureTwo popular methods

Frequency Hopping (FH)Direct Sequence (DS)

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 19/47

F requenc y H opping Vs. Direct S equenceFH systems use a radio carrier that hops from frequency tofrequency in a pattern known to both transmitter and receiver

Easy to implement Resistance to noise

Limited throughput (2-3 Mbps @ 2.4 GHz)DS systems use a carrier that remains fixed to a specific

frequency band. The data signal is spread onto a much largerrange of frequencies (at a much lower power level) using aspecific encoding scheme.

Much higher throughput than FH (11 Mbps) Better range

Less resistant to noise (made up for by redundancy it transmits at least 10 fully redundant copies of the original signal at the same time)

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 20/47

802.11a

Employs Orthogonal Frequency DivisionM ultiplexing (OFD M )

Offers higher bandwidth than that of 802.11b, DSSS(Direct Sequence Spread Spectrum)

802.11aM AC (

Media Access Control) is same as802.11b

Operates in the 5 GHz range

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 21/47

802.11a Advantages U ltra-high spectrum efficiency

5 GHz band is 300 M Hz (vs. 83.5 M Hz @ 2.4 GHz) More data can travel over a smaller amount of bandwidth

High speed Up to 54 M bps

Less interferenceFewer products using the frequency

2.4 GHz band shared by cordless phones, microwaveovens, B luetooth, and WLANs

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 22/47

802.11a DisadvantagesStandards and Interoperability

Standard not accepted worldwideNo interoperability certification availablefor 802.11a productsNot compatible or interoperable with 802.11b

Legal issuesLicense-free spectrum in 5 GHz band not available worldwide

Market Beyond LAN-LAN bridging, there is limited interest for5 GHz adoption

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 23/47

802.11a Disadvantages

Cost 2.4 GHz will still has >40% cost advantage

Range At equivalent power, 5 GHz range will be ~50% of

2.4 GHzPower consumption

Higher data rates and increased signal require morepower

OFDM is less power-efficient then DSSS

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 24/47

802.11a Applications Building-to-building connections

Video, audio conferencing/streaming video,and audioLarge file transfers, such as engineeringCAD drawingsFaster Web access and browsingHigh worker density or high throughput scenarios

Numerous PCs running graphics-intensive applications

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 25/47

802.11a Vs. 802.11b802.11a vs.

802.11b

802.11a 802.11b

R aw data rates U p to 54 Mbps(54, 48, 36, 24,18, 12and 6 Mbps)

U p to 11 Mbps(11, 5.5, 2, and1 Mbps)

R ange 50M

eters 100M

eters

Bandwidth U NII and IS M (5 GHz range)

ISM (2.40002.4835 GHz range)

Modulation OFDM technology DSSS technology

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 26/47

802.11g802.11g is a high-speed extension to 802.11b

Compatible with 802.11bHigh speed up to 54 M bps2.4 GHz (vs. 802.11a, 5 GHz)

Using ODF

Mfor backward compatibility Adaptive R ate Shifting

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 27/47

802.11g AdvantagesProvides higher speeds and higher capacityrequirements for applications

Wireless Public AccessCompatible with existing 802.11b standardLeverages Worldwide spectrum availabilityin 2.4 GHzLikely to be less costly than 5 GHz alternativesProvides easy migration for current users of 802.11bWLANs

Delivers backward support for existing 802.11b products

Provides path to even higher speeds in the future

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 28/47

802.11e I ntroduces Qualit y of S ervice

Also know as P802.11 TGe

Purpose:To enhance the 802.11 Medium AccessControl ( M AC) to improve and manage

Quality of Service (QoS)Cannot be supported in current chip design Requires new radio chips

Can do basic QoS inM AC layer

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 29/47

802.11f ² I nter Access P oint P rotocol

Also know as P802.11 TGf

Purpose:To develop a set of requirements for Inter-AccessPoint Protocol (IAPP), including operational and

management aspects

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 30/47

802.11b S ecurit y F eaturesWired Equivalent Privacy ( WEP ) A protocol to

protect link-level data during wireless transmissionbetween clients and access points.Services:

Auth e nti cation : provides access control to the network by

denying access to client stations that fail to authenticateproperly.C onfi de ntiality : intends to prevent informationcompromise from casual eavesdropping

I nt e grity : prevents messages from being modified while intransit between the wireless client and the access point.

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 31/47

Aut h enticationMeans:

Based on cryptographyNon-cryptographic

Both are identity-based verification mechanisms(devices request access based on the SSID Service Set Identifier of the wireless network).

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 32/47

Aut h entication

Authentication techniques

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 33/47

P rivac yCryptographic techniques

WEP U ses R C4 symmetric key, stream cipheralgorithm to generate a pseudo random datasequence. The stream is XO R ed with the datato be transmitted

K ey sizes: 40bits to 128bits Unfortunately, recent attacks have shown that the WEP approach for privacy is vulnerable to

certain attack regardless of key size

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 34/47

Data I ntegrit y

Data integrity is ensured by a simple encrypted

version of C R C (Cyclic R edundant Check) Also vulnerable to some attacks

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 35/47

S ecurit y P roblemsSecurity features in Wireless products are frequently

not enabled. Use of static WEP keys (keys are in use for a very longtime). WEP does not provide key management.Cryptographic keys are short.

No user authentication occurs only devices areauthenticated. A stolen device can access thenetwork.Identity based systems are vulnerable.

Packet integrity is poor.

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 36/47

Ot h er WLAN S ecurit y Mec h anisms3Com Dynamic Security Link

CISCO LEAP - Lightweight Extensible AuthenticationProtocolIEEE 802.1x Port- Based Network Access Control

R ADIU S Authentication Support EAP-M D5EAP-TLSEAP-TTLSPEAP - Protected EAPTK IP - Temporal K ey Integrity ProtocolIEEE 802.11i

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 37/47

WLAN Migration ² C utting T h e C ord

Essential Questions

Choosing the R ight TechnologyData R ates

Access Point Placement and Power Antenna Selection and Placement Connecting to the Wired LANThe Site Survey

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 38/47

Essential Questions

Why is the organization considering wireless?

Allows to clearly define requirements of theWLAN -> development planHow many users require mobility?

What are the applications that will run over theWLAN? Helps to determine bandwidthrequirements, a criteria to choose betweenavailable technologies. Wireless is a shar edmedium, not switched!!!

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 39/47

Ch oose t h e rig h t tec h nolog y Usually IEEE 802.11b or 802.11a

802.11b offers interoperability (WECA Wi-FiCertification Program)802.11a offers higher data rates (up to 54

mbps) -> higher throughput per user. Limitedinteroperability.

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 40/47

Data ratesData rates affect range

802.11b 1 to 11 Mbps in 4 increments802.11a 6 to 54 M bps in 7 incrementsThe minimum data rate must be determined at designtimeSelecting only the highest data rate will require agreater number of APs to cover a specific areaCompromise between data rates and overall system

cost

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 41/47

Access P oint P lacement and P ower

Typically mounted at ceiling height. Between 15 and 25 feet (4.5m to 8m)The greater the height, the greater thedifficulty to get power to the unit. Solution:consider devices that can be powered usingCAT5 Ethernet cable (CISCO Aironet 1200Series).

Access points have internal or external

antennas

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 42/47

Antenna S election and P lacementPermanently attached.

Remote antennas connected using an antenna cable.Coax cable used for R F has a high signal loss, shouldnot be mounted more than a 1 or 2 meters away fromthe device.Placement: consider building construction, ceilingheight, obstacles, and aesthetics. Different materials(cement, steel) have different radio propagationcharacteristics.

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 43/47

C onnecting to t h e Wired LANConsider user mobility

If users move between subnets, there arechallenges to consider.OSes like Windows XP and 2000, Linux support DHCP to obtain the new IP address for thesubnet. Certain applications such as VPN willfail.Solution: access points in a roaming area are

on the same segment.

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 44/47

T h e S ite S urve y

Helps define the coverage areas, data rates,

the precise placement of access point.Gather information: diagramming the coveragearea and measuring the signal strength, SN R

(signal to noise ratio), R F interference levels

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 45/47

S ite S urve y

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 46/47

Vendor I nformationC IS CO Syst em s W ir e le ss htt p :// www.c is co .c o m / w ar p / p ubli c /44/ju mp / w ir e le ss.sht m l3 C o m W ir e le ss htt p :// www. 3 co m.c om / p ro d u c ts/ e n_U S / p ro d list . js p? tab= cat& p athty pe = p ur chas e &cat= 1 3&s e lcat= W ir e le ss+ P ro d u c tsBreeze W ir e le ss C omm uni cations http://www.breezecom.comLu ce nt Tec hnologi e s http://www.wavelan.com

Sym bol Tec hnologi e s http://www.symbol.com

8/8/2019 Wireless NetworksA

http://slidepdf.com/reader/full/wireless-networksa 47/47

R eferencesCISCO Packet M agazine, 2 nd Quarter 2002

http://www.cisco.com/en/ U S/about/ac123/ac114/ac173/ac168/about_cisco_packet_issue_home.html3Com U niversity Wireless LANs A TechnologyOverview www.3com.com/3comu

N ational Institute of Standards and TechnologyWireless N etwork Security

http://csrc.nist.gov/publications/drafts/draft-sp800-48.pdf