290 likes | 412 Views
Wireless LAN. presented by: Damian Borth, Florian Seidel, Thomas Winterscheid. Contents. Definition The IEEE 802.11 standards Infrastructure and Impairments Hardware System Providers Advantages and Disadvantages Security Alternatives. Table of content. IEEE Standard 802.11 Basics
E N D
Wireless LAN presented by: Damian Borth, Florian Seidel, Thomas Winterscheid
Contents • Definition • The IEEE 802.11 standards • Infrastructure and Impairments • Hardware • System Providers • Advantages and Disadvantages • Security • Alternatives
Table of content • IEEE Standard 802.11 • Basics • Frequency • OSI / ISO Layer • Modulation • Net topology • Properties
Standard • There is the IEEE 802.11 Standard for WLAN`s • Sub specifications • 802.11a • 802.11b • 802.11g • 802.11e
Basics • OSI / ISO overview • Physical Layer • Wireless LAN is almost exclusively Spread Spectrum Radio • direct sequence spread spectrum (DSSS) • frequency-hopping spread spectrum (FHSS) • infrared pulse position modulation (IrDA) • Data Link Layer • Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol
Basics • Frequence • ISM band 2.4 GHz and 5 GHz • 2.4 - 2.4835 GHz frequency band • 5.725 - 5.850 GHz frequency band • Modus • Ad hoc mode • Peer to peer • Infrastructure mode • Using an access point network
Properties • Range: 100m – 400m (outdoors) • 802.11b- DSSS @11Mbps 2.4GHz • 802.11a- DSSS @54Mbps 5GHz • 802.11g- DSSS @22Mbps 2.4GHz • 802.11e- DSSS @22Mbps w/QoS
Contents (Part 2) • Definition • The IEEE 802.11 standards • Infrastructure and Impairments • Hardware • System Providers • Advantages and Disadvantages • Security • Alternatives
How to install? • Two different use modes: • AdHoc (P2P) • Infrastructured (LAN) ? ? ? ?
Adhoc • Standard P2P connection • Only for two PC`s • Same way of configuration (IP range etc...) • Transferrate 11 Mbit/s • Range ca. 30m-50m (outdoor 400m) • WEP against eavesdropping
Infrastructured • Access points are needed • Range 30m - 50m • Access points act like bridges/gateways • Installation of access points enables „Roaming“ functionality • Configuration of IP and administration like in wired network • Transferrate 11 Mbit/s
Impairments • Weakened by solid walls and concrete • No influence through glass • Range impairment can be increased with additional antenna up to 2 km • Bluetooth / IrDA
Which hardware you need? e.g. Fujitsu-Siemens I-Gate WLAN WirelessLan-Card Pre-installed Adapter USB Access Point
Wired? • Connectivity to wired LAN • Access points must be installed (bridge functionality) • Connectable to each kind of LAN
Roaming • Extended connectivity possibility • Allows free mobility • Access points transfers given IP within the network • Roaming between different networks is also possible (bridge/gateway)
Access to WAN? • ...is possible by using access points connected to ISDN / DSL • Access points can act like a gateway • No impairment to the transferrates
Producer Fujitsu-Siemens Aironet NDC Proxim Bay Networks Lucent RDC Productname I-Gate Telxon Serie 3500 Instantwave Rangelan Airsurfer Wavelan Portlan System provider
Contents (Part 3) • Definition • The IEEE 802.11 standards • Infrastructure and Impairments • Hardware • System Providers • Advantages and Disadvantages • Security • Alternatives
Advantages • mobility / flexibility • inexpensiveness • ease of installation / usage • extends LAN and doesn’t need to replace it
Disadvantages • lack of security • lower transmission rates than in wired networks
Security • basic problem: broadcast of radio data transmission • piracy tools: • AirSnort • WEPcrack • Network Stumbler, etc. • real problem: default settings of WLAN are insecure, e.g. „Accept ANY SSID“
Security - WEP • Wireless Equivalent Privacy • based on RC4 encryption algorithm • most important, but optional • 128 bit encryption algorithm for data encryption and authentification
Security - WEP • WEP does stream-encryption + generates key for each data package • to set up the stream, WEP uses the shared key and an initialization vector • the plain text information is parsed bit-by-bit and combined with pseudo random numbers (ensures that packages with same content are not equally encrypted)
Security - WEP • a carrier frequency is determined by the constallation of the data stream and broadcasted throughout the WLAN • the recipient deletes the pseudo random numbers and restores the plain text information
Weak Point • Initialization Vector (IV) • 24 bit • easily predictable (usually increment by1) • Same IV + (constant) Shared Key IV-Collision (same WEP-Key) • many IV-Collisions allow extraction
Security check • change default settings (e.g. password) • use WEP encryption • change WEP key regularly • filter MAC addresses • position APs before firewall
Security check • check log files for intrusion attempts • use “intrusion detection system” • turn off DHCP • use authentification • for extra high security use a VPN.
References & Bibliography • http://www.ieee.org • http://www.tecchannel.de • http://www.fujitsu-siemens.de • “Data and Computer Communications”,Sixth Edition, William Stallings, Prentice Hall
Any Questions? Thank you.