You are on page 1of 25

m  

V 
V 
V  
V !"#
AGENDA
r Introduction
r Wi-Fi Technologies

r Wi-Fi Topologies

r Wi-Fi Working

r Wi-Fi Security Threats

r Wi-Fi Security Techniques

r Wi-Fi Applications

r Advantages and Disadvantages


INTRODUCTION
þ Wi-Fi (Wireless Fidelity) is a generic term that refers
to the IEEE 802.11 communications standard for
Wireless Local Area Networks (WLANs).
þ Wireless Technology is an alternative to Wired
Technology, which is commonly used, for connecting
devices in wireless mode.
þ Wi-Fi Network connect computers to each other, to
the internet and to the wired network
þ Wi-fi networks uses the Radio Technologies to
transmits and receive the data in high
speed.
WI-FI TECHNOLOGY
Wi-Fi Networks use Radio Technologies to
transmit & receive data at high speed:

1. IEEE 802.11b

2. IEEE 802.11a

3. IEEE 802.11g
IEEE 802.11b
þ Appear in late 1999
þ Operates at 2.4GHz radio spectrum

þ 11 Mbps (theoretical speed) - within 30 m Range

þ 4-6 Mbps (actual speed)

þ 100 -150 feet range

þ Most popular, Least Expensive

þ Interference from mobile phones and Bluetooth


devices which can reduce the transmission
speed.
IEEE 802.11A
þ Introduced in 2001
þ Operates at 5 GHz (less popular)

þ 54 Mbps (theoretical speed)

þ 15-20 Mbps (Actual speed)

þ 50-75 feet range

þ More expensive

þ Not compatible with 802.11b


IEEE 802.11G
þ Introduced in 2003
þ Operates at 2.4GHz

þ 54 Mbps (theoretical speed)

þ compatible with 802.11b hardware

þ 100-150 feet range

þ Combine the feature of both standards (a,b)


WIFI NETWORK TOPOLOGIES

þ AP Based

þ Point-to-Point

þ Point-to-Multipoint
AP-BASED TOPOLOGY
þ The client communicate through Access Point.
þ BSA-RF coverage provided by an AP.

þ ESA-It consists of 2 or more BSA.

þ ESA cell includes 10-15% overlap to allow roaming.


POINT-TO-POINT TOPOLOGY
þ AP is not required
þ Client devices within a cell can communicate
directly with each other.
þ It is useful for setting up of a wireless network
quickly and easily.
POINT-TO-MULTIPOINT BRIDGE TOPOLOGY
þ This is used to connect a LAN in one building to a
LANs in other buildings even if the buildings are
miles apart.These conditions receive a clear line of
sight between buildings. The line-of-sight range
varies based on the type of wireless bridge and
antenna used as well as the environmental
conditions.
$%&'(()
! ) *

A wireless client access process involves three steps:


VActive/passive scanning surrounding wireless services
VAuthentication
VAssociation
FIRST STEP: SYNCHRONZATION AND SCANNING
SECOND STEP:AUTHENTICATION
THIRD STEP:ASSOCIATION

VCreates a logical link between the 802.11 station and the access point
VAssign association id to network card interface

ë+

VWhen the AP receives a packet from the 802.11 station, it checks to


see if the destination is in the same BSS.
VIf the packet is in the same BSS, the AP forwards it to the BSS
VIf the destination is another BSS, the AP forwards the data packets to
another BSS or a portal to send it over the wired network.
REASSOCIATION PROCESS
WIFI SECURITY THREATS

þ Eavesdropping

þ Man-in-the-middle attacks

þ Denial of Service

þ Identity theft (MAC spoofing)


WI-FI SECURITY TECHNIQUES
þ Service Set Identifier (SSID)

þ Wired Equivalent Privacy (WEP)

þ 802.1X Access Control

þ Wireless Protected Access (WPA)


Wired Equivalent Privacy (WEP)
þ 32 bit ICV (Integrity check value)
þ Provide same level of security as by wired network
þ No. of bits in keyschedule is equal to sum of length of the
plaintext and ICV
þ 64 bit preshared key-WEP
þ Security Issue with WEP
R Short IV
R Static key
þ Uses RC4 encryption with pre-shared keys and 24 bit
initialization vectors (IV)
ADVANTAGES
‡ Mobility
‡ Ease of Installation
‡ Flexibility
‡ Cost
‡ Reliability
‡ Security
‡ Use unlicensed part of the radio spectrum
‡ Roaming
‡ Speed
DISADVANTAGES

þ Power consumption is fairly high compared to some


other standards
þ crowded with other devices cause degradation in
performance.
þ Wi-Fi networks have limited range
þ Inter-operability issues between brands or deviations
can cause limited connection or lower output speeds
þ Free AP makes vulnerable to malicious and anonymous
attack
þ Access points could be used to steal personal and
confidential information transmitted from WiFi
consumers.
þ spectrum assignments and operational limitations are
not consistent worldwide
APPLICATIONS OF WIFI
þ Small Businesses or SOHO
þ Large corporations and campuses

þ Wireless ISP (WISP)

þ Spiroscout inhaler uses WiFi to track asthma


attacks
þ Turn Your Smartphone into a Remote Control

þ Two laptops are easily connected without access


point
þ Travellers
VThe outlook of Wi-Fi broadband wireless internet is boundless
Vgreater and longer connection ranges with faster transfer
speeds
VMany Applications
VIn the futures we would also see better securities measures
in protecting personal and confidential data's being received
and sent out.

You might also like