You are on page 1of 45

1.

Introduction
Wi-Fi, or Wireless Fidelity, is freedom: it allows you to connect to the Internet from your couch at home, a bed in a hotel room or at a conference room at work without wires. How? Wi-Fi is a wireless technology like a cell phone. Wi-Fi enabled computers send and receives data indoors and out: anywhere within the range of a base station. And the best thing of all, its fast. In fact, its several times faster than the fastest cable modem connection.

However, you only have true freedom to be connected anywhere if your computer is configured with a Wi-Fi CERTIFIED radio (a PC Card or similar device). Wi-Fi certification means that you will be able to connect anywhere there are other Wi-Fi CERTIFIED products-whether you are at home, the office or corporate campus, or in airports, hotels, coffee shops and other public areas equipped with a Wi-Fi access available.

The Wi-Fi certified logo is your only assurance that the product has met rigorous interoperability testing requirements to assure products from different vendors will work together .The Wi-Fi CERTIFIED logo means that its a safe buy.

Wi-Fi certification comes from the Wi-Fi Alliance, a nonprofit international trade organization that tests 802.11-based wireless equipment to make sure it meets the Wi-Fi standard and works with all other manufacturers Wi-Fi equipment on the market .Thanks to the Wi-Fi Alliance, you dont have to read the fine print or study technical journals: if it says Wi-Fi, it will work.

2.

IEEE Standards for Wi-Fi

The IEEE (Institute of Electrical and Electronics Engineers) has produced a set of standards and specifications for wireless networks under the title IEEE 802.11 that defines the format and structure of radio signals sent out by Wi-Fi networking routers and antennas.

A. IEEE 802.11b

802.11b is the slowest and least expensive standard. For a while, its cost made it popular, but now it's becoming less common as faster standards become less expensive. 802.11b transmits in the 2.4 GHz frequency band of the radio spectrum. It can handle up to 11 megabits of data per second, and it uses complementary code keying (CCK) modulation to improve speeds.

B. IEEE 802.11a

802.11a transmits at 5 GHz and can move up to 54 megabits of data per second. It also uses orthogonal frequency-division multiplexing (OFDM), a more efficient coding technique that splits that radio signal into several sub-signals before they reach a receiver. This greatly reduces interference.

C.IEEE 802.11g

802.11g transmits at 2.4 GHz like 802.11b, but it's a lot faster -- it can handle up to 54 megabits of data per second. 802.11g is faster because it uses the same OFDM coding as 802.11a.

D. IEEE 802.11n

802.11n is the newest standard that is widely available. This standard is significantly improves speed and range. For instance, although 802.11g theoretically moves 54 Megabytes of data per second because of network congestion. 802.11n, however, reportedly can achieve speeds as high as 140MBps. The standard is currently in draft form. The Institute of Electrical and Electronic Engineers (IEEE) plans to formally ratify 802.11n by the end of 2009.

Speed Specification

Frequency Compatible Band with

802.11b

11 Mb/s

2.4 GHz

802.11a

54 Mb/s

5 GHz

802.11g

54 Mb/s

2.4 GHz

b, g

802.11n

100 Mb/s 2.4 GHz

b, g, n

In most of the world, the frequencies used by Wi-Fi do not require user licenses from local regulators (e.g., the Federal Communications Commission in the US). 802.11a equipment, using a higher frequency, has reduced range, all other things being equal.

Why Wi-Fi?
Because chances are that, within the next year or so, you'll use Wi-Fi regularly at work, at home, or on the road. You may well depend on Wi-Fi as much as you do your cell phone, your laptop computer, or your personal digital assistant (PDA). In fact, all those devices increasingly come ready to work with Wi-Fi. (One example: By 2007, according to IDC Research of Framingham, Mass., 98% of all new notebook PCs will be sold with Wi-Fi capability). That means the next time you invest in hardware, you're likely to invest in the Wi-Fi label as well. So it makes sense to learn what Wi-Fi does well -- and where it still needs work. Wi-Fi refers to products certified to work with the high-tech industry's global standard for high-speed wireless networking .Hardware carrying the Wi-Fi logo has passed rigorous testing by the Wi-Fi Alliance, a trade association based in Mountain View, Calif. Certification means that, regardless of which company manufactured it, the equipment should play nicely with other Wi-Fi devices and networks. As Wi-Fi compatibility grows -- to date, the alliance has certified nearly 865 products -- so has its popularity. Currently, about 4.7 million Americans regularly use Wi-Fi, according to Stamford, Conn.-based research group Gartner Inc. In four years, that figure will grow to 31 million users in the United States alone.

3. Working of Wi-Fi

A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across a wireless network is a lot like two-way radio communication. Here's what happens: 1. A computer's wireless adapter translates data into a radio signal and transmits it using an antenna. 2. A wireless router receives the signal and decodes it. The router sends the information to the Internet using a physical, wired Ethernet connection. The process also works in reverse, with the router receiving information from the Internet, translating it into a radio signal and sending it to the computer's wireless adapter. The radios used for Wi-Fi communication are very similar to the radios used for walkie-talkies, cell phones and other devices. They can transmit and receive radio waves, and they can convert 1s and 0s into radio waves and convert the radio waves back into 1s and 0s. But Wi-Fi radios have a few notable differences from other radios: They transmit at frequencies of 2.4 GHz or 5 GHz. This frequency is considerably higher than the frequencies used for cell phones, walkietalkies and televisions. The higher frequency allows the signal to carry more data.

A. OFDM

Orthogonal Frequency Division Multiplexing (OFDM) is a promising technique to provide multiplexing in high-speed wireless applications (e.g. broadband wireless, 4G systems, LANs) in a hostile multipath environment with frequencyselective fading. OFDMA (Orthogonal Frequency Division Multiple Access is the multiuser OFDM) achieves high efficiency in multiuser environment by dividing the total available bandwidth to orthogonal narrow sub-bands to be shared by users in an efficient manner.

Fig.1. Frequency domain view of principle of orthogonality.

By using OFDM desired bit rate can be achieved, bandwidth is used efficiently. OFDM is robust to fading. But guard intervals are necessary to avoid ISI (Inter Symbol Interference) and ICI (Inter Channel Interference). This OFDM has become a promising technology in the next generation of wireless communication.

Fig.2. Spectral Efficiency of OFDMA.

With the advent of OFDM there will no more be dedicated single user channels, thus improving the data rates, increasing flexibility.

B. CCKM

CCK is a variation on M-ary Orthogonal Keying modulation, which uses I/Q modulation architecture with complex symbol structures. CCK allows the 802.11b for multi-channel operation in the 2.4 GHz band using the existing 802.11 DSSS channel structure scheme. The spreading employs the same chipping rate and spectrum shape as the 802.11 Barkers code word. Spreading functions, allows three non-interfering channels in the 2.4 to 2.483 GHz band.

Fig.3. Multipath channel model

CCK Modulation performs well in single-path channel. CCK Modulation does not achieve acceptable error probability in a multi-path channel with this detector.

4. IMPORTANCE OF WIFI
WIFI gives you an extremely large amount of freedom because you can basically use it from anywhere. From your couch to your local shopping mall, wireless fidelity can always lend a helping hand. Also, WIFI is not restricted to certain groups. No matter who you are, you can use it. And, on top of its convenience, WIFI is fast, reliable, and easy to use. In the corporate enterprise, wireless LANs are usually implemented as the final link between the existing wired network and a group of client computers. This gives these users wireless access to the full resources and services of the corporate network across a building or campus setting. Wireless Fidelity is important to the wireless LAN world, because it is securely tested to assure operability of equipment of the same frequency band and feature. WIFI is the certification logo given by the WIFI Alliance for equipments that passes the tests for compatibility for IEEE 802.11 standards. The WIFI Alliance organization, is a nonprofit organization that promotes the acceptance of 802.11 wireless technology and they ensures all WIFI certified 802.11 based wireless networking equipments works with all other WIFI certified equipments of the same frequency. The WIFI Alliance works with technical-groups like the IEEE and other companies that are developing new wireless networking equipments.

5. DEPENDABILITY
Wi-Fi is becoming rapidly ingrained in our daily lives via public hotspots and digital home networks. However, because a technologys dependability

requirements are proportional to its pervasiveness, newer applications mandate a deeper understanding of how much we can rely on Wi-Fi and its security promises. Authentication and confidentiality are crucial issues for corporate Wi-Fi use, but privacy and availability tend to dominate pervasive usage. So far, Wi-Fi hasnt had the best track record: researchers and hackers easily defeated its first security mechanism, Wired Equivalent Privacy (WEP). Although the 802.11i standard addresses this failure and the larger issues of confidentiality and authentication, no ongoing standardization effort handles Wi-Fi availability, and problems with robustness mean that a successful attack can block a network and its services, at least for the attacks duration. Another oft-neglected aspect of 802.11 networks is privacynot payload confidentiality but node activity monitoring. This kind of monitoring has value on its own (for example, for contrasting user identification and location), but it also has a strong link to dependability in attacks targeted at a specific node. To our knowledge, no current practical or theoretical framework handles Wi-Fi dependability issues. Moreover, no previous work has analyzed Wi-Fi security from this viewpoint. Most research examines Wi-Fi confidentiality and authentication by explaining the problems related to native 802.11 security and showing how inadequate such mechanisms are. The same effort hasnt been put into analyzing a wireless networks availability and robustness: in fact, many denial-of-service (DoS) attacks against WLANs are known, but so far only one research effort describes the actual implementation of two DoS attacks and possible countermeasures. We present an overview of Wi-Fi vulnerabilities and investigate their proximate and ultimate origins. The intended goal is to provide a foundation to discuss Wi-Fi dependability and its impact on current and future usage scenarios. Although a wireless networks overall security depends on the network stack to the application layer, this report focuses on specific vulnerabilities at the physical (PHY) and data (MAC) layers of 802.11 networks.
9

OSI Layer

10

6. WIRELESS NETWORKING COMPONENTS


Wi-Fi is a friendly term for IEEE 802.11b Ethernet standard. It operates in the unlicensed frequency band of 2.4 GHz with a maximum data rate of 11 Mbps. IEEE 802.11b wireless networking consists of the following components:

Stations
A station (STA) is a network node that is equipped with a wireless network device. A personal computer with a wireless network adapter is known as a wireless client. Wireless clients can communicate directly with each other or through a wireless access point (AP). Wireless clients are mobile.

Figure1. Wireless station

Access Points
A wireless AP is a wireless network node that acts as a bridge between STAs and a wired network. A wireless AP contains:

At least one interface that connects the wireless AP to an existing


wired network (such as an Ethernet backbone).

A wireless network device with which it creates wireless


connections with STAs.

11

IEEE 802.1D bridging software, so that it can act as a transparent


bridge between the wireless and wired networks.

The wireless AP is similar to a cellular phone network's base station. Wireless clients communicate with both the wired network and other wireless clients through the wireless AP. Wireless APs are not mobile and act as peripheral bridge devices that extend a wired network.

Figure2. Wireless Access point

12

7. OPERATION MODES
IEEE 802.11 defines two operating modes: Ad hoc mode and Infrastructure mode.

AD HOC MODE: In ad hoc mode, also known as peer-to-peer mode,


wireless clients communicate directly with each other (without the use of a wireless AP). Two or more wireless clients who communicate using ad hoc mode form an Independent Basic Service Set (IBSS). Ad hoc mode is used to connect wireless clients when a wireless AP is not present.

Figure 3: The ad-hoc network structure in the 802.11 protocol

INFRA STRUCTURE MODE: In infrastructure mode, there is at least


one wireless AP and one wireless client. The wireless client uses the wireless AP to access the resources of a wired network. The wired network can be an organization intranet or the Internet, depending on the placement of the wireless AP.

13

Figure 4: The infrastructure network structure in the 802.11 protocol A single wireless AP that supports one or multiple wireless clients is known as a Basic Service Set (BSS). A set of two or more wireless APs that are connected to the same wired network is known as an Extended Service Set (ESS). An ESS is a single logical network segment (also known as a subnet), and is identified by its Service Set Identifier (SSID). If the available physical areas of the wireless APs in an ESS overlap, then a wireless client can roam, or move from one location (with a wireless AP) to another (with a different wireless AP) while maintaining Network layer connectivity.

14

8. RADIO TECHNOLOGY

Wi-Fi network uses radio technology called IEEE 802.11b to provide secure, fast, reliable, wireless connectivity. 11b defines the physical layer and media access control (MAC) sub layer for communications across a shared, wireless local area network (WLAN). At the physical layer, IEEE 802.11b operates at the radio frequency of 2.45 gigahertz (GHz) with a maximum bit rate of 11 Mbps. It uses the direct sequence spread spectrum (DSSS) transmission technique. At the MAC sub layer of the Data Link layer, 802.11b uses the carrier sense multiple access with collision avoidance (CSMA/CA) media access control (MAC) protocol.

DIRECT SEQUENCE SPREAD SPECTRUM

Direct Sequence is the best known Spread Spectrum Technique. A DSSS transmitter converts an incoming data stream into a symbol stream where each symbol represents a group of one or more bits. Using a phase varying modulation technique, DSSS transmitter modulates or multiplies each symbol with a noise like code called chip sequence. This is also called processing gain. The multiplication operation in a DSSS transmitter artificially increases the used bandwidth based on the length of chip sequence.

15

Figure 5: Direct Sequence Spread Spectrum transmitter

When receiving the DSSS signal, a matched filter correlate is used. The correlate removes the PN sequence and recovers the original data stream. As shown in figure, the PN sequence spreads the transmitted bandwidth of the resulting signal (thus the term, spread spectrum) and reduces peak power. Note however, that total power is unchanged. Upon reception, the signal is correlated with the same PN sequence to reject narrow band interference and recover the original binary data (Fig. 5b). Regardless of whether the data rate is 1, 2, 5.5, or 11 Mbps, the channel bandwidth is about 20 MHz for DSSS systems. Therefore, the ISM band will accommodate up to three non-overlapping channels.

16

Figure 6a: Effect of PN Sequence on Transmit Spectrum

Figure 6b. Received Signal is Correlated with PN to Recover Data and Reject Interference

Figure 7: Three Non-Overlapping DSSS Channels in the ISM Band

17

CARRIER SENSE MULTIPLE ACCESS/COLLISION AVOIDANCE

The basic access method for 802.11 is the Distributed Coordination Function (DCF) which uses Carrier Sense Multiple Access / Collision Avoidance (CSMA / CA). This requires each station to listen for other users. If the channel is idle, the station may transmit. However if it is busy, each station waits until transmission stops, and then enters into a random back off procedure. This prevents multiple stations from seizing the medium immediately after completion of the preceding transmission.

Figure 8: CSMA/CD Back-off Algorithm Packet reception in DCF requires acknowledgement as shown in figure. The period between completion of packet transmission and start of the ACK frame is one Short Inter Frame Space (SIFS). ACK frames have a higher priority than other traffic. Fast acknowledgement is one of the salient features of the 802.11 standard, because it requires ACKs to be handled at the MAC sub layer.
18

Transmissions other than ACKs must wait at least one DCF inter frame space (DIFS) before transmitting data. If a transmitter senses a busy medium, it determines a random back-off period by setting an internal timer to an integer number of slot times. Upon expiration of a DIFS, the timer begins to decrement. If the timer reaches zero, the station may begin transmission. However, if the channel is seized by another station before the timer reaches zero, the timer setting is retained at the decremented value for subsequent transmission.

OPERATION BASICS

When a wireless adapter is turned on, it begins to scan across the wireless frequencies for wireless APs and other wireless clients in ad hoc mode. Assuming that the wireless client is configured to operate in infrastructure mode, the wireless adapter chooses a wireless AP with which to connect. This selection is made automatically by using SSID and signal strength and frame error rate information. Next, the wireless adapter switches to the assigned channel of the selected wireless AP and negotiates the use of a port. This is known as establishing an association.

If the signal strength of the wireless AP is too low, the error rate too high, or if instructed by the operating system (in the case of Windows XP), the wireless adapter scans for other wireless APs to determine whether a different wireless AP can provide a stronger signal or lower error rate. If such a wireless AP is located, the wireless adapter switches to the channel of that wireless AP and negotiates the use of a port. This is known as reassociation.

Reassociation with a different wireless AP can occur for several reasons. The signal can weaken as either the wireless adapter moves away
19

from the wireless AP or the wireless AP becomes congested with too much traffic or interference. By switching to another wireless AP, the wireless adapter can distribute the load to other wireless APs, increasing the performance for other wireless clients. You can achieve contiguous coverage over large areas by placing your wireless APs so that their signal areas overlap slightly. As a wireless client roams across different signal areas, it can associate and reassociate from one wireless AP to another, maintaining a continuous logical connection to the wired network.

RANGE IN A Wi-Fi NETWORK


One of the factors that affect the range of a Wi-Fi network is the distance of the client devices to your base station. In an open area with no walls, furniture or interfering radio devices you may be able to get a range of 500 feet or more from your base station to the Wi-Fi equipped computer. In fact you could get a signal from up to a mile away depending on the antennas you use and environmental conditions. Many base stations can also act as relay stations for your network. For example if you locate one Wi-Fi equipped computer 100 feet away from your base station, another Wi-Fi computer 100 feet away in another

direction and then position your base station in the middle, you can create a network with a range of 200 feet from the Wi-Fi computer to the other. Wi-Fi, or IEEE 802.11b, speed decreases the farther you move away from your network. For example when you are close to the base station your Wi-Fi computer should be able to get the full 11Mbps data rate. Move farther away, and depending on the environment, the data rate will drop to 2Mbps, and finally to 1Mbps. But getting just 1Mbps throughput is still a perfectly acceptable performance level. 1Mbps is faster than most DSL and cable connections, which means its still a satisfactory high speed transmission if you are sending and receiving e-mail, cruising the internet or just performing data entry tasks from a mobile computer.

20

AREA

Maximum Range

Range 11Mbps

at

Outdoors/open Space with standard antennae

750-1000 feet

150-350 feet

Office/light setting Residential setting

industrial

250-350 feet

100-150 feet

125-200 feet

60-80 feet

21

9. Designing Wi-Fi Network

Step 1Planning
Setting Up A Wireless Network: Once you've decided to free yourself by "going wireless," you can reap all the benefits of mobile computing and it's simple and easy to set up and operate a wireless network. Here's how to plan for, install and operate your Wi-Fi network

What Makes Up a Wireless Network? Do I Need a Peer-To-Peer Network, or One with a Base Station (An Access Point Or Gateway)?

What Are the Wi-Fi Radio Options For My Laptops, Desktops and PDAs? Planning for Access Points and Gateways How Many Users Can Use a Single Access Point? Choosing Components for Your Network Count The Total Number of Users and Computers Place a Wi-Fi Radio In Each Computer Determine the Number Of Base Stations (Access Points or Gateways) You Need

How Do You Connect Your Wi-Fi Network to the Internet? How Do You Make Printers Work on Your Wi-Fi Network? Can You Share Devices on Your Network to Save Money?

Types of Equipment There are currently two types of Wi-Fi components you'll need to build your home or office network: Wi-Fi radio (also known as client devices) devices (desktops, laptops, PDAs, etc.), and access points or gateways that act as base stations. A third type, Wi-Fi equipped peripherals, are emerging and will soon be commonplace. This group includes printers, scanners, cameras, video monitors, set-top boxes and other peripheral equipment
22

PC Card Radio Mini-PCI Modules and Embedded Radios USB Adapters PCI and ISA Bus Adapters Compact Flash and Other Small-Client Formats

10 Easy Steps to Setting Up Your Home or Small Office Network Wi-Fi networks are easy to set up and operate but if you've never done this before the process may seem daunting and most likely you don't know where to start. Use this step-by-step guide to help you through the process of planning and setting up your wireless network 1. Count Your Computers 2. Pick out the Right Kind of Wi-Fi Radios for Your Computers 3. Decide Between a Wi-Fi Gateway or Access Point 4. Get the Right Wi-Fi Radio and Accessories 5. Read the Installation Instructions 6. Read the Instructions Again 7. Install Your Access Point or Gateway First 8. Install the First Wi-Fi Radio Device 9. Configure the Access Point 10. Connect the Rest of Your Computers and the Printer Step 4Adding Wi-Fi to a Desktop Computer The procedures necessary to complete these steps are often different for each manufacturer. Whenever you see this image, you should look in your specific product manual for the correct procedure to follow.

USB Radio Installation PCI Adapter Installation Is a USB or a PCI Solution Better For You?

23

You can easily add Wi-Fi to a laptop computer, but some desktop computers can take a little more effort. For most laptops, you simply slide in a Type II PC Card Wi-Fi radio, install the software, and you're up and running. Since very few desktop computers provide PC Card slots, they require a USB [Universal Serial Bus] Wi-Fi radio adapter or a PCI-based [Peripheral Component Interconnect] Wi-Fi radio adapter to connect to a Wi-Fi network

Securing your Wi-Fi Network Here are a few simple steps you can take to maximize the security of your wireless network and to protect your data from prying eyes and ears. This section is intended for the home, home office and small office user.

The procedures necessary to complete these steps are often different for each manufacturer. Whenever you see this image, you should look in the encryption or security section of your specific product manual for the correct procedure to follow.

Deploy WPA (Wi-Fi Protected Access) or WPA2 Change Your Default Password Close Your Network (If Possible) Change Your Network Name Move Your Access Point Use MAC Control Tables Other Simple Solutions Use a VPN (Virtual Private Network) Additional Information

24

10. Hot Spots


Wi-Fi hotspots were first proposed by Brett Stewart at the NetWorld+Interop conference in The Moscone Center in San Francisco in August 1993. Stewart did not use the term 'hotspot' but referred to publicly accessible wireless LANs. Stewart went on to found the companies PLANCOM in 1994 (for Public LAN Communications, which became Mobile Star and then the Hotspot unit of T-Mobile USA) and Way port in 1996.The term 'Hotspot' may have first been advanced by Nokia about five years after Stewart first proposed the concept. During the dot-com boom and subsequent burst in 2000, dozens of companies had the notion that Wi-Fi could become the payphone for broadband. The original notion was that users would pay for broadband access at hotspots. Although some companies like T-mobile, and Bingo have had some success with charging for access, over 90% of the over 300,000 hotspots offer free service to entice customers to their venue.[citation needed] Both paid and free hotspots continue to grow. Wireless networks that cover entire cities, such as municipal broadband have mushroomed. MuniWireless reports that over 300 metropolitan projects have been started. Wi-Fi hotspots can be found in remote RV / Campground Parks across the US [1]. Many business models have emerged for hotspots. The final structure of the hotspot marketplace will ultimately have to consider the intellectual property rights of the early movers; portfolios of more than 1,000 allowed and pending patent claims are held by some of these parties. The public can use a laptop, Wi-Fi phone, or other suitable portable device to access the wireless connection (usually Wi-Fi) provided. Of the estimated 150 million laptops, 14 million PDAs, and other emerging Wi-Fi devices sold per year for the last few years, most include the Wi-Fi feature. For venues that have broadband Internet access, offering wireless access is as simple as purchasing one AP, in conjunction with a router and Connecting the AP to the Internet connection. A single wireless router combining these functions may suffice. Hotspots are often found at restaurants, train stations, airports, military bases, libraries, hotels, hospitals, coffee shops, bookstores, fuel
25

stations, department stores, supermarkets, RV parks and campgrounds and other public places. Many universities and schools have wireless networks in their campus.

Fig.4.Wi-Fi Hotspots

A. Wi-Fi Cards
In order for computers to receive these radio signals, a network adapter must be installed on the computer. The network adapter in this case is called the Wi-Fi Card and it can take several physical forms. For laptops, this card will be a PCMCIA card in which you insert to the PCMCIA slot on the laptop. The other way is to buy a external adapter and plug it into a USB port. For personal computers, you can install plug-in PCI cards or a small external adapter for the USB port just like the one used for laptops. A network adaptor should be capable to use in any operating system such as WINDOWS, MAC OS, LINUX and UNIX as long as the driver for the adapter is accessible to download or install. As you already know, there are three forms of standards used for wireless networking: 802.11b, 802.11a, and 802.11g.

26

Therefore, there are three different kinds of Wi-Fi cards that are available to purchase. The recommended Wi-Fi card to buy is the 802.11g because it has the advantage of higher speeds than the 802.11b (see the chart in the radio signals section). Although it is bit more expensive than the 802.11b, it is still worth the cost. A hotspot which contains 802.11 standards can hold up to as much as 100 802.11 cards within the vicinity. Below are pictures of how Wi-Fi cards appear and how it fits in the MCMCIA slot on the laptop.

Fig.5. Wi-Fi Cards

27

Fig.6. Wi-Fi External adapter

28

B. Access points
Access points are often combined with other network functions. It is very likely that you will discover a separate access point that just plugs into a wired Local Area Network (LAN). If you already have more than one computer hooked together on the same network and want to have a good hotspot, you can buy a wireless access point and plug it in to the network. As mentioned earlier, radio signals can be received and transmitted by an antenna and a router. The router is an example of an access point of how multiple computers can be connected together in the same network both including the use of wires and wireless technology. So once you turn on your access point on, you will have a hotspot in your home and will have radio signal within a 100 feet radius. As for antennas, they have a higher signal transmission at a 300-500 feet radius. That is why hotels, campuses, libraries, etc, anything that is larger than your home is required to use antennas rather than routers. Below are two different kinds of routers used to connect multiple computers on the same connection. The physical designs of access points various from one brand to the other. Here you can see one of Net Gears router and on the right, Linksyss wireless router have different physical forms. Some look like devices that were intended to be placed in a standing position jut like the router on the right. Others have those normal flat looking routers like the one on the left. Some have internal antennas (which are not shown here) and others have short vertical antennas permanently affixed to the router just like the ones shown here. Regardless of its size and shape, all access points consist of a radio that transmits and receive signals and data between network stations and an Ethernet port that connects to a wired network (normal connection).

29

11. SECURITY
Because wireless is a shared medium, everything that is transmitted or received over a wireless network can be intercepted. Encryption and authentication are always considered when developing a wireless networking system. The goal of adding these security features is to make wireless traffic as secure as wired traffic. The IEEE 802.11b standard provides a mechanism to do this by encrypting the traffic and authenticating nodes via the Wired Equivalent Privacy (WEP) protocol. The IEEE 802.11 standard defines the following mechanisms for wireless security:

Authentication through the open system and shared key


authentication types

Data confidentiality through Wired Equivalent Privacy (WEP)


Open system authentication does not provide authentication, only identification using the wireless adapter's MAC address. Open system authentication is used when no authentication is required. Some wireless APs allow the configuration of the MAC addresses of allowed wireless clients. However, this is not secure because the MAC address of a wireless client can be spoofed.

Shared key authentication verifies that an authenticating wireless client has knowledge of a shared secret. This is similar to preshared key authentication in Internet Protocol security (IPsec). The 802.11 standard currently assumes that the shared key is delivered to participating STAs through a secure channel that is independent of IEEE 802.11. In practice, this secret is manually configured for both the wireless AP and client. Because the shared key authentication secret must be distributed manually, this method of authentication does not scale to a large infrastructure mode network (for example, corporate campuses and public places, such as malls and airports). Additionally, shared key authentication is not secure and is not recommended for use.
30

WIRED EQUIVALENT PRIVACY (WEP)

WEP utilizes RC42, a symmetric algorithm known as a stream cipher, for encryption. A symmetric algorithm is one that relies on the concept of a single shared key (as opposed to a public key) that is used at one end to encrypt plaintext (the data) into cipher text (the encrypted data), and at the other end to decrypt it - convert the cipher text back to plaintext. Thus, the sender and the receiver share the same key, and it must be kept secret.

Stream ciphers encrypt data as it is received, as opposed to block ciphers that collect data in a buffer and then encrypt it a block at a time. Stream ciphers are tempting to use for applications requiring hardware implementation (i.e. wireless LAN cards), because they can be implemented very efficiently in silicon.

WEP VULNARABILITIES

Not long after WEP was developed, a series of independent research studies began to expose its cryptographic weaknesses. Even with WEP enabled, third parties with a moderate amount of technical know-how and resources could breach WLAN security. Three key difficulties were identified: 1. WEP uses a single, static shared key. It remains the same unless a network administrator manually changes it on all devices in the WLAN, a task that becomes ever more daunting as the size of the WLAN increases. 2. At the time of its introduction, WEP employed a necessarily short 40-bit encryption scheme. The scheme was the maximum allowed by US export standards at that time. In 1997, the US government deemed the export of data cryptography to be as threatening to national security as the export of weapons of mass destruction. By necessity, Wi-Fi security had to be weak

31

if the specification was to be adopted as an international standard and if products were to be freely exported.

3. Other technical problems contributed to its vulnerability, including attacks that could lead to the recovery of the WEP key itself.

Together, these issues exposed that WEP was not sufficient for enterprise-class security.

VIRTUAL PRIVATE NETWORKS (VPNs)


Virtual Private Network technology (VPN) has been used to secure communications among remote locations via the Internet since the 1990s. A familiar and already widely used technology in the enterprise, it can readily be extended to Wi-Fi WLAN segments on existing wired networks. Although VPNs were originally developed to provide point-to-point encryption for long Internet connections between remote users and their corporate networks, they have recently been deployed in conjunction with Wi-Fi WLANs. When a WLAN client uses a VPN tunnel, communications data remains encrypted until it reaches the VPN gateway, which sits behind the wireless AP. Thus, intruders are effectively blocked from intercepting all network

communications. Since the VPN encrypts the entire link from the PC to the VPN gateway in the heart of the corporate network, the wireless network segment between the PC and the AP is also encrypted. This is why VPNs have been recommended to help secure Wi-Fi. While VPNs are generally considered an enterprise solution, integrated products that offer VPN pass-through connections, firewalls and routers are available to accommodate telecommuters who work from home. Although they provide excellent security, VPNs are not self-managing. User credentials and, often, VPN software must be distributed to each client. However, when properly installed, VPNs extend the high level of security they provide on wired networks to WLANs. In fact, some Wi-Fi vendors themselves have utilized VPNs in networks to secure their own internal Wi-Fi networks.
32

Wi-Fi PROTECTED ACCESS

Wi-Fi Protected Access is a specification of standards-based, interoperable security enhancements that strongly increase the level of data protection and access control for existing and future wireless LAN systems. Designed to run on existing hardware as a software upgrade, Wi-Fi Protected Access is derived from and will be forward-compatible with the upcoming IEEE 802.11i standard. When properly installed, it will provide wireless LAN users with a high level of assurance that their data will remain protected and that only authorized network users can access the network. Wi-Fi Protected Access had several design goals, i.e.,: be a strong, interoperable, security replacement for WEP, be software upgradeable to existing Wi-Fi CERTIFIED products, be applicable for both home and large enterprise users, and be available immediately. To meet these goals, two primary security enhancements needed to be made. Wi-Fi Protected Access was constructed to provide an improved data encryption, which was weak in WEP, and to provide user authentication, which was largely missing in WEP.

Enhanced Data Encryption through TKIP


To improve data encryption, Wi-Fi Protected Access utilizes its Temporal Key Integrity Protocol (TKIP). TKIP provides important data encryption enhancements including a per-packet key mixing function, a message integrity check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. Through these enhancements, TKIP addresses all WEPs known vulnerabilities.

33

Enterprise-level User Authentication via 802.1x and EAP


WEP has almost no user authentication mechanism. To strengthen user authentication, Wi-Fi Protected Access implements 802.1x and the Extensible Authentication Protocol (EAP). Together, these implementations provide a framework for strong user authentication. This framework utilizes a central authentication server, such as RADIUS, to authenticate each user on the network before they join it, and also employs mutual authentication so that the wireless user doesnt accidentally join a rogue network that might steal its network credentials.

34

12. SPECIAL FEATURES OF Wi-Fi


Unlike today's wired network, a Wi-Fi network requires little more than an Access point (AP). Access to a Wi-Fi- network does not require an expensive connection to each user. Wi-Fi technology is also far less expensive to deploy than the limited wireless technologies of currently existing cellular servicing providers.

Access to a Wi-Fi broad band can be provided both outdoors and indoors. Whether from an outdoor cafe or a park bench a person can access the Internet if they are in range of a service station. Such a Wi-Fi broadband is much power full and can transmit data at a rate of 11 Mbps which is sufficient for all types of multimedia.

Many schools and businesses have unsuitable building layouts or walls that cannot be wired for various reasons making it difficult or impossible to build a wired network. Wi-Fi is a very cost effective alternative in these environments.

A Wi-Fi network can provide many benefits for the society. It can provide local hospitals. Though the radio waves are of relatively high frequency, they are not powerful enough to pass through multiple layers of building materials. Specifically radio waves are completely blocked by steel. For this reasons the factors deciding performance are proximity to access point and the degree tc which the signal is blocked by the surroundings.

As more computers begin to communicate with the same access point ,a bottleneck occurs. An access point has a finite amount of network bandwidth tc which it is physically linked. As a result, all computers that are associated with a specific access point must share the same bandwidth. More computers mean the possibility for a slower network connection.

Since Wi-Fi technology is constantly improving these shortcomings will get removed soon.

35

13. Applications of Wi-Fi

Wi-Fi networks can take advantage of available infrastructure such as existing GSM sites, street lights, telephone poles Provide high speed internet service for the citizens of a neighborhood (Buildings, offices, libraries, coffee shops, restaurants)

Campus WI-FI Network:


School campuses or colleges needing to connect several buildings together Security Cameras. Classrooms or auditoriums looking for wireless connectivity.

36

Retail

Direct inventory management Mobile POS Self-checkout Mobile scanners Manufacturing

Field based data collections Product management Inventory visibility and planning

37

Education

More efficient learning methods Wireless is ideal for campus-wide coverage Healthcare

Lab administration People with disabilities Point-of-Care testing Homecare administration Controlling patient data

38

14. ADVANTAGES

1. Wi-Fi allows LANs to be deployed without cabling, typically reducing the cost of network deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs. 2. Wi-Fi silicon pricing continues to come down, making Wi-Fi a very economical networking option and driving inclusion of Wi-Fi in an ever-winding array of devices. 3. Wi-Fi products are widely available in market. Different brands of access points and client network interfaces are interoperable at a basic level of service. Products designated as Wi-Fi certified by the Wi-Fi Alliance are interoperable and include WPA2 security. 4. Wi-Fi networks support roaming, in which a mobile client station such as a laptop computer can move from one access point to another as the user moves around a building or area. 5. Wi-Fi is a global set of standards. Unlike cellular carriers, the same Wi-Fi client works in different countries around the world. 6. Security: Some Hotspots require WEP key to connect that is the connection is considered to be private or secure. As for open connections, anyone with a Wi-Fi card can gain access to that hotspot. WEP stands for Wired Equivalence Privacy. It is considered to be a complex encryption system that is made up of two differences. The first is the 64-bit encryption and the other is the 128-bit encryption. The 64-bit encryption was the original standard until it was easily bypassed. With the 64-bit encryption out of the way, the new and improved 128-bit encryption was made. It is much secure and is what most people use to enable WEP. So in order for a user to gain access to the internet under WEP, the user must input the WEP key code.

39

15. LIMITATIONS

1. Spectrum assignments and operational limitations are not consistent worldwide; most of Europe allows for an additional 2 channels beyond those permitted in the US; Japan has one more on top of that-and some countries like Spain, prohibit use of lower-numbered channels. Furthermore some countries such as Italy, used to require a general authorization for any Wi-Fi used outside an operators own premises, or require something akin to an operator registration. 2. EIRP in the EU is limited to 20 dbm consumption is fairly high compared to some other standards, making battery life and heat a concern. 3. The most common wireless encryption standard wired equivalent privacy or WEP, has been shown to be breakable even when correctly configured. 4. Wi-Fi Access points typically default to an open (encryption free) mode. Novice users benefit from a zero configuration device that works out of the box but might not intend to provide open wireless access to their LAN.

40

Comparison of Wi-Fi with other parallel technologies

A comparison chart of Wi-Fi with other parallel technologies is shown in the table given at the bottom.

Comparison of Wi-Fi With other parallel technologies.

41

16. FUTURE TRENDS

IEEE 802.11a

The 802.11a supplement to 802.11 was published in 1999. It uses Orthogonal Frequency Division Multiplexing (OFDM) to provide data rates to 54 Mbps in the 5 GHz U-NII bands. In addition to being uncrowded, more spectrums in the U-NII bands allow room for 12 non-overlapping channels, compared to just three in the 2.4 GHz ISM bands. Both of these factors make operating in the U-NII bands far less prone to interference. However, at 5 GHz, more path loss occurs due to increased absorption of the RF energy by walls and other solid objects. This, combined with a decrease in range due to the higher data rates, may require that more access points be installed to effectively cover an area comparable to that of 802.11b.

IEEE 802.11g

The 802.11g task group is working on a supplement to the 802.11 standard that defines a technology for operation at 2.4 GHz that offers higher data rates (up to 22 Mbps) using OFDM, while remaining backwards compatible to 802.11b. In addition, the supplement will specify even higher data rates using two different methods (up to 33 Mbps using PBCC-DSSS and up to 54 Mbps using CCK-OFDM) which manufactures can optionally incorporate. When compared to 802.11a, 802.11g offers the advantages of lower cost, backwards compatibility to existing 802.11b equipment, and less path loss than 802.11a. This translates into higher data rates for a given range, or increased range for a given data rate.

42

17. CONCLUSION

Wi-Fi provides freedom: freedom to physically move around your home or business and still stay connected to the Internet or local network; freedom to grow and move an office or business without having to install new cables and wires; freedom to be connected while travelling and on the road. Wireless Hotspots (airports, hotels, coffee shops, convention centres and any other place where someone can connect to a wireless network) are being installed worldwide. All this means Wi-Fi truly does provide unprecedented freedom. Plus, it is cool, and it is fun as those in the know say, Once you go wireless, you will never want to use a cable again.

There are real and measurable benefits to using a wireless network versus a standard wired network. For a home installation customer, the greatest benefit is that there are no wires needed: you dont need to drill holes in walls and floors; you dont need to drag cables or hide them under rugs. One Wi-Fi access point can provide network access for any typically sized home. And if you live in a rental or a historical building, you may not be allowed to drill holes-that makes wireless your only solution.

Wi-Fi use is growing fast in homes, public access areas and businesses- both large and small. The Wi-Fi Alliance is active with many industry organizations and is working closely with manufacturers to make sure that existing Wi-Fi gear is compatible with wireless technologies developed in future.

43

18. REFERENCES

1. Wi-Fi: Whats next, Paul S.Henry, Hui Luo, IEEE Communications Magazine, December 2002. 2. Wireless LANs and smart homes, Mahmoud Nagnshineh, IEEE Wireless Communications, August 2002.

3. Why Wi-Fi is so hot, Data Quest, June 2003.

4. Overview of IEEE 802.11 Security, www.techonline.com.

5. Wireless Networking Handbook, Jim Geier.

6. Wireless Digital Communications, Dr. Kamilo Feher.

44

45

You might also like