1 / 39

Wireless LAN Technology

Wireless LAN Technology. Julie Vogel Jim Faxon Kevin Meehan Rob Belote. The Wireless LAN Industry exceeded $300 million in 1998 and will grow to $1.6 billion in 2005. Source: Frost and Sullivan. Why Go Wireless?. Business solutions = OPPO RTUNITY Increase Productivity

jereni
Download Presentation

Wireless LAN Technology

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless LAN Technology Julie Vogel Jim Faxon Kevin Meehan Rob Belote

  2. The Wireless LAN Industry exceeded $300 million in 1998 and will grow to $1.6 billion in 2005. Source: Frost and Sullivan

  3. Why Go Wireless? • Business solutions = OPPORTUNITY • Increase Productivity • Better Customer Service • Future Cost Savings • Access all the time, anywhere • No need for Ethernet jack hookups

  4. Why Go Wireless (cont) • University Solutions • Cloud of Connectivity • Enhance Education Possibilities • Live Remote Classes • Mobile Study / Group Work

  5. Is It Worth It? • Aspects to Consider • Cost • Performance • Interoperability • Lifespan and Upgrades

  6. 802.11b 11 Mbps @ 2.4 GHz Longer Distances Up to 100 feet Basic Access Points ~ $100 Wireless PC Cards < $100 802.11a 54 Mbps @ 5 GHz Shorter Distances Up to 50 feet Basic Access Points ~ $250- 500 Wireless PC Cards ~ $200 Cost / Performance

  7. Interoperability • Integration of Standards • 802.11b and 802.11a • Future Technology • Integration of Manufacturers • D-Link vs. Linksys

  8. New Wireless Technology • Harmony by Proxim • 802.11a and b integration • “Central” Access Point Controller • Ability to Roam Subnets • Cost • $900

  9. 802.11b + • AirPlus by D-Link • 22 Mbps @ 2.4 Ghz • Opposed to 11 Mbps • Upgrade available soon • 12 Mbps Real World Performance • Cost • Roughly same as 802.11b • ~ $100 per Access Point and PC Card

  10. 802.11g and VoIP • PRISM GT Chip by Intersil • VoIP to fit Wireless Bandwidth • Quality of Service (QoS) • Ability to maintain video data while mobile

  11. PX20 by Philips Advanced Access Gateway Allows integration of Bluetooth and 802.11b standards Not on market yet Blue802 by Intersil Mini-PCI card Mixes Bluetooth and 802.11b standards Cost = $50 802.11 and Bluetooth

  12. Mobius by Symbol Technologies Central Switch Access “Ports” Offers Central Control of Access WG-1000 by Bluesocket Employee vs. Guest Access Specific Levels of Access Usernames and Passwords $6000 Security Devices

  13. Wireless LAN Standards • Institute of Electrical and Electronic Engineers (IEEE) in charge of creating standards • 802.11 Working Group deals with Wireless • Divided up into Task Groups • MAC Task Group • PHY Task Group • Task Groups assigned letters (a through i)

  14. 802.11 Standards • 802.11 standards released, followed by the 802.11b standards • 802.11a standards release followed 802.11b despite being finished first • 802.11a standards didn’t seem feasible until the 802.11b standards were in place

  15. Wireless Fidelity (Wi-Fi) certification • 802.11b and Wi-Fi certification form the baseline standard across the world • Assures that your device can work with other Wi-Fi certified devices from other vendors • Given by Wi-Fi alliance • Non-Profit International Trade Organization

  16. Standards in the Works • 802.11g is a promising new standard • Similar to parts of 802.11a & b standards • Transmission rate (54Mbps) same as 802.11a • Number of channels (3), Frequency band used (2.4GHz), Clients per Access Point (256) same as 802.11b • Uses OFDM modulation in 2.4GHz frequency band, (802.11b =DSS in 2.4GHz band

  17. Standards in the works (cont) • 802.11g • Backward compatible with 802.11b • 802.11h • Deals with MAC and Physical Layer standards for 5GHz in Europe • 802.11i • Deals with improving the security measures in the 802.11a,b,&g standards

  18. Security: Wireless Versus Wired LANs • Wireless LANs have increased security risks because of the nature of radio communication • Radio communication makes it practically impossible to prevent certain types of attacks

  19. Wireless LAN Attacks • Main types of security attacks on wireless LANs: • Eavesdropping or Sniffing • Transitive Trust • Infrastructure • Denial of Service (DoS)

  20. Eavesdropping • Eavesdropping, or sniffing, is a way for attackers to capture messages being transmitted between two parties. • When one wireless device sends a message over a radio path, an attacker equipped with a special transceiver in the range of the transmission, can eavesdrop the message. • Businesses should not assume that their wireless LAN is contained inside the building, except for the presence of electromagnetic shielding and other costly security precautions.

  21. Transitive Trust Attacks • The largest security issue associated with transitive trust is authentication, the ability to verify the other parties identify. • Two ways to break into a network: 1. The attacker fools the wireless LAN into trusting the mobile device, allowing the attacker access inside the network’s firewall. 2. Attacker fools the mobile device into logging onto their network, instead of the intended network. The attacker can then scan for passwords and encryption keys.

  22. Infrastructure Attacks • Attackers have information about the known weaknesses in computer’s: • server operating system • client operating system • application programs • A company can protect itself by downloading patches.

  23. Denial of Service (DoS) • With a powerful transceiver, an attacker can generate a radio interference that disables the wireless LAN from using a radio path. • Attackers have to act quickly on these attacks because it is fairly easy for authorities to locate the transceiver.

  24. Secure Communication • Because of the vulnerabilities associated with wireless LANs, users can provide the most protection for their networks byusing: • Encryption • Authentication

  25. Encryption and Authentication • Symmetric key encryption: • method is efficient • not very secure because an attacker can intercept the key and decode all the information • Public key encryption: • more secure than symmetric key encryption • inefficient and is usually used for small messages • Hashing: • uses a mathematical process • Digital Signatures: • authenticates a message • Digital Certificates: • certificate authority

  26. Security Management • Companies must be in control of their wireless network by: • implementing security policies • testing network for weaknesses • educating employees on security threats

  27. Policy and Regulation • Legislation • Congress • Common Law / Interpertation of Law • Courts • Administrative Law • Federal Communication Commission (FCC)

  28. Legislation • Bill introduced in House or Senate • Bill approved by both House and Senate • Approved by executive branch • Creates a law that can do anything from create a tax to prohibit an action

  29. Common Law

  30. Administrative Law • FCC • Created in Communication Act of 1934 • Strengthened by Telecommunications Act of 1996 • Opened Markets to exchange carriers, including broadband Ethernet. • Title I of ’96 Act • Wireless Telecommunications Bureau of FCC

  31. FCC Rulemaking Process • Notice of Inquiry • Notice of Proposed Rulemaking • Comments received and reviewed • Further Notice of Proposed Rulemaking (if needed) • Report & Order * Carries Full “Force of Law”

  32. FCC Enforcement Measures • “Letter in the file” • Cease-and-Desist Order • Consent Order • Forfeitures (fines) • FCC Hearings • Administrative Law Judge • Witness, Testimony, Evidence, and Council

  33. Today's FCC • 5 Commissioners with five-year overlapping terms • Chairman appointed by Executive Branch • Sets direction and philosophy of FCC • Current Goals • Unregulated Competitive Environment • Eliminate Unnecessary Regulation • Planning in International Arena • “E-Rate” Program • “lap dog” or “watch dog” ?

  34. The Future of Wireless Networks • Internet access to most US residents • Home PC • Television (MSN TV) • Video Game Consoles (X-Box) • Schools • Libraries

  35. Current Application of WLANs • Denver / San Diego Wireless MAN • Santana Row: “Silicon Valley’s Rodeo Drive” • IBM Emergency Network • Windows XP • Boingo

  36. Do people trust wireless? • 76% of people polled at www.techtv.com said that they did NOT trust their secrets on wireless networks. • The Lawrence Livermore and Los Alamos National Laboratories banning wireless networks. • People are pleased with wireless, but are not yet willing to use it • Early Internet Vendors and Credit Cards • Is 128-bit encryption safe?

  37. Where to go from here? • Future is bright for Wireless Networkers • users becoming comfortable in new technology • businesses able to make money • anticipate BOOM in wireless markets • Prices are falling • Access Points becoming easier to find • Security Issues being addressed • Need more regulation from FCC $69.88 @ Amazon.com

  38. Questions? Comments?

More Related