Slide 1OutlineIntroduction & HistoryTopologyAdvantagesSlide 6HardwareSlide 8Slide 9Slide 10802.11a, b, g, nMedia Access ControlData TransmissionSecurity TypesSlide 15Slide 16Slide 17QuestionsRomney BakeBrian PetersonClay StephensMichael HathewayOutlineIntroductionTopologyAdvantages/DisadvantagesHardwareA, B, G, N ComparisonMedia Access Controls/Data TransmissionSecurity TypesRouter ConfigurationQuestionsIntroduction & HistoryWireless connections were originally developed for mobile computing devices, such as laptops, but is now increasingly used for more services, including Internet and VoIP phone access and basic connectivity of consumer electronics such as televisions and DVD players.First Wireless LAN developed in 1971, called ALOHANET.TopologyInternetInternetAdvantagesAdvantagesNo cables (Outdoor uses)MobilityWidely available productsGlobal set of standardsAvailable in more than 300,000 hot spotsWPA and WPA2 securitiesCheaper/Comparable pricesDrains batteries on laptopsSecurity issuesDefault settings for access points and routersPotential interoperability between brandsOften slower than wired connectionsLimited rangeDisadvantagesHardwareAccess Point (AP)Connects a group of wireless devices to an adjacent wired LANRelays data between connected wireless devices in addition to a (usually) single connected wired deviceWireless Adapter (WNIC)Allows a device to connect to a wireless networkConnects by either PCI, USB, PCMCIAWireless RouterAllows wired and wireless ethernet LAN devices to connect to a (usually) single WAN device such as cable modem or DSL modemallows all three devices (mainly the access point and router) to be configured through one central utilityRange ExtenderExtends the range of an existing wireless networkAllows signal area to reach around barriers such as those created in L-shaped corridorsIncrease in latency802.11a, b, g, nMedia Access ControlUses Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), similar to CSMA/CD in wired EthernetComputers listen before transmitting, if no one else is transmitting, they transmitData TransmissionDistributed Coordination FunctionRelies on computers to physically listen before transmittingStop and Wait ARQPoint Coordination FunctionComputer must send Request To Transmit to Access Point firstThe Clear To Transmit is granted for requesting computer for specific time period on the circuitWorks well with high traffic networksSecurity TypesService Set Identifier (SSID)Code attached to all packets on a wireless network to identify each packet as part of that networkCode is a case sensitive text string which consists of a maximum of 32 alphanumeric charactersMinimum securityWired Equivalent Privacy (WEP)Provide comparable confidentiality to a traditional wired networkWEP key can be cracked with readily available software in two minutes or less Easy to share key for accessExtensible Authentication Protocol (EAP)Generates WEP keys automaticallyUser login to serverAfter login sever will generate WEP key for the sessionEasy to break by professional hackersWi-Fi Protected Access (WPA and WPA2)Intended as an intermediate measure to take the place of WEP while 802.11i was preparedDesigned to work with all wireless network interface cards, but not necessarily with first generation wireless access pointsWPA2 implements the full standard, but will not work with some older network cardsNot selected by
View Full Document