1 / 14

802.11 Standard: Comparison and Security

802.11 Standard: Comparison and Security. Jason Gibson TCM471 Professor Crum. Introduction: History . Television Remote Control Cordless Phones Cellular Phones Business Applications. IEEE Institute of Electrical and Electronics Engineers. Ensure Compatibility Define Standards

stormy
Download Presentation

802.11 Standard: Comparison and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 802.11 Standard:Comparison and Security Jason Gibson TCM471 Professor Crum

  2. Introduction: History • Television Remote Control • Cordless Phones • Cellular Phones • Business Applications

  3. IEEEInstitute of Electrical and Electronics Engineers • Ensure Compatibility • Define Standards • Research New Technology • Wireless Standards • 802.11 • 802.11b • 802.11a • 802.11g

  4. Developed in 1997 Supports High Data Rates - 1 to 2 Mbps Operates at 2.4 GHz Layer 1 FHSS DSSS Layer 2 - CSMA/CA IEEE 802.11

  5. Released in 1999 Support Higher Data Rates - 5.5 to 11 Mbps Operates at 2.4 GHz 3 non-overlapping channels Long Range Problem Interference IEEE 802.11b

  6. Released September 1999 Support Higher Data Rates - 54 Mbps Operates at 5 GHz OFDM Problems Limited Range Interoperability IEEE 802.11a

  7. IEEE 802.11g • Scheduled Approval, May 2003 • Support High Data Rates like 802.11a - 54 Mbps • Operates at 2.4 GHz like 802.11b • Backward Compatibility

  8. Wireless Local Area Networks

  9. Ad-hoc Mode - IBSS • Clients in same cell communicate directly • Other clients act as gateways within cell • Bluetooth

  10. Infrastructure Mode - BSS • Centrally located access point • Management Frame Exchange • Association Process

  11. Security Methods • Wired Equivalency Protocol (WEP) • Security Measures • Authentication • Confidentiality • Integrity • Vulnerabilities

  12. Types of Attacks • Passive Attack • Eavesdropping • Traffic Analysis • Active Attack • Masquerading • Denial of Service

  13. Security Solutions • Utilize Multiple Defensive Strategies • Virtual Private Networks (VPN’s) • Regular Password Updates • Changing Default SSID and Cryptographic Keys • Install Intrusion Detection system

  14. QUESTIONS?

More Related