Top Banner
802.11 Network Architecture 802.11 Network Architecture Chapter 6 Chapter 6
25

802.11 Network Architecture

Feb 03, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 802.11 Network Architecture

802.11 Network Architecture802.11 Network Architecture

Chapter 6Chapter 6

Page 2: 802.11 Network Architecture

Locating a Wireless LANLocating a Wireless LAN

The client will automatically “listen" to see if there is a wireless LAN within range.

Scanning occurs before any other process, since scanning is how the client finds the network.

Page 3: 802.11 Network Architecture

Service Set IdentifierService Set Identifier

A unique, case sensitive, alphanumeric value from 2 - 32 characters long used by wireless LANs as a network name.

SSID is that it must match EXACTLY between access points and clients.

Page 4: 802.11 Network Architecture

BeaconsBeacons

Short frames that are sent from the access point to stations (infrastructure mode) or station-to-station (ad hoc mode) in order to organize and synchronize wireless communication on the wireless LAN.

Page 5: 802.11 Network Architecture

Passive ScanningPassive Scanning

The process of listening for beacons on each channel for a specific period of time after the station is initialized.

Page 6: 802.11 Network Architecture

Active ScanningActive Scanning

The sending of a probe request frame from a wireless station

• Stations send this probe frame when they are actively seeking a network to join.

Page 7: 802.11 Network Architecture

Authentication & AssociationAuthentication & Association

The process of connecting to a wireless LAN consists of :

authentication association

Page 8: 802.11 Network Architecture

AuthenticationAuthentication

The process through which a wireless node has its identity verified by the network to which the node is attempting to connect.

Page 9: 802.11 Network Architecture

AssociationAssociation

The state at which a client is allowed to pass data through an access point

Page 10: 802.11 Network Architecture

States of Authentication & AssociationStates of Authentication & Association

Unauthenticated and unassociatedAuthenticated and unassociatedAuthenticated and associated

Page 11: 802.11 Network Architecture

Authentication MethodsAuthentication Methods

Open System authentication Shared Key authentication.

Page 12: 802.11 Network Architecture

Open System AuthenticationOpen System Authentication

Page 13: 802.11 Network Architecture

Shared Key AuthenticationShared Key Authentication

Page 14: 802.11 Network Architecture

Authentication SecurityAuthentication Security

Open System authentication is considered more secure than Shared Key authentication.

Page 15: 802.11 Network Architecture

Emerging Wireless Security SolutionsEmerging Wireless Security Solutions

802.1x using Extensible Authentication Protocol (EAP).

VPN (Virtual Private Network)

Page 16: 802.11 Network Architecture

802.1x and EAP802.1x and EAP

The 802.1x is port-based network access control standard

EAP is a layer 2 protocol that is a flexible replacement for PAP or CHAP under PPP that works over local area networks.

In the 802.1x standard model, network authentication consists of three pieces:

the supplicant, the authenticator, the authentication server.

Page 17: 802.11 Network Architecture

802.1x and EAP802.1x and EAP

Page 18: 802.11 Network Architecture

VPN SolutionsVPN Solutions

VPN technology provides three levels of security:

user authenticationencryption data authentication.

Page 19: 802.11 Network Architecture

Service SetsService Sets

Basic service setExtended service setIndependent basic service set

Page 20: 802.11 Network Architecture

Basic Service Set (BSS)Basic Service Set (BSS)

A basic service setconsists of only one access point and one or more wireless clients

Page 21: 802.11 Network Architecture

Extended Service Set (ESS)Extended Service Set (ESS)

Two or more basic service sets connected by a common distribution system.

Page 22: 802.11 Network Architecture

Independent Basic Service Set (IBSS)Independent Basic Service Set (IBSS)

Independent basic service set is also known as an ad hoc network

Page 23: 802.11 Network Architecture

RoamingRoaming

Roaming in an ESS

Page 24: 802.11 Network Architecture

ReassociationReassociation

Page 25: 802.11 Network Architecture

Access point with an external VPN serverAccess point with an external VPN server