Top Banner
WIRELESS SYSTEMS WIRELESS SYSTEMS By: Eric Ferreira & Dan Erb By: Eric Ferreira & Dan Erb
15
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Wireless

WIRELESS SYSTEMSWIRELESS SYSTEMS

By: Eric Ferreira & Dan ErbBy: Eric Ferreira & Dan Erb

Page 2: Wireless

What is wireless? What is wireless?

Radio signals are transmitted from antennas Radio signals are transmitted from antennas and routers and are picked up by WiFi and routers and are picked up by WiFi receivers such as computers and cell phones receivers such as computers and cell phones that are equipped with WiFi cards.that are equipped with WiFi cards.

Send and receives packets of information Send and receives packets of information between the clients.between the clients.

Page 3: Wireless

Types of wirelessTypes of wireless

Wi-Fi is a brand originally licensed by the Wi-Fi Alliance to Wi-Fi is a brand originally licensed by the Wi-Fi Alliance to describe the embedded technology of wireless local area describe the embedded technology of wireless local area networks (WLAN) based on the IEEE 802.11 specificationsnetworks (WLAN) based on the IEEE 802.11 specifications

BLUETOOTHBLUETOOTHBluetooth is an industrial specification for wireless personal Bluetooth is an industrial specification for wireless personal area networks (PANs).area networks (PANs). Bluetooth provides a way to connect and exchange Bluetooth provides a way to connect and exchange information between devices information between devices such as mobile phones, laptops, PCs, printers, digital such as mobile phones, laptops, PCs, printers, digital cameras, and video game consoles over a secure, globally cameras, and video game consoles over a secure, globally unlicensed short-range radio frequencyunlicensed short-range radio frequency

Page 4: Wireless

Differences Differences between Bluetooth between Bluetooth

and Wifiand WifiBluetoothBluetoothMainly for direct exchange of data between clients like cell Mainly for direct exchange of data between clients like cell phones.phones.Has better security.Has better security.Lower battery consumptionLower battery consumptionDon't require high bandwidth Don't require high bandwidth

WifiWifi Access the internet through many providers (using a WAP)Access the internet through many providers (using a WAP)Transmits a longer rangeTransmits a longer rangeFaster transfer speedsFaster transfer speeds

Page 5: Wireless

ARCHITECTUREARCHITECTURE

Page 6: Wireless

Advantages of Wi-Fi Advantages of Wi-Fi Allows LANs to be deployed without cabling, typically reducing the costs of Allows LANs to be deployed without cabling, typically reducing the costs of network deployment and expansion.network deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and historical Spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs. buildings, can host wireless LANs. Built into most modern devices Built into most modern devices

Wi-Fi chipset pricing continues to come down, making Wi-Fi a very Wi-Fi chipset pricing continues to come down, making Wi-Fi a very economical networking option. economical networking option. Products are widely available in the market. Different brands of access Products are widely available in the market. Different brands of access points and client network interfaces are interoperable at a basic level of points and client network interfaces are interoperable at a basic level of service. service.

Widely available in more than 250,000 public hot spots and millions of Widely available in more than 250,000 public hot spots and millions of homes and corporate and university campuses worldwide. homes and corporate and university campuses worldwide.

As of 2006, WPA and WPA2 encryption are not easily crack able if strong As of 2006, WPA and WPA2 encryption are not easily crack able if strong passwords are used passwords are used

Page 7: Wireless

Disadvantages of Wi-Disadvantages of Wi-Fi Fi The most common wireless encryption standard, Wired The most common wireless encryption standard, Wired

Equivalent Privacy or WEP, has been shown to be breakable Equivalent Privacy or WEP, has been shown to be breakable even when correctly configured.even when correctly configured.

Many 2.4 GHz frequencies default to the same channel, Many 2.4 GHz frequencies default to the same channel, contributing to congestion on certain channels. E.g. cordless contributing to congestion on certain channels. E.g. cordless phones.phones.Wi-Fi networks have limited range.. Wi-Fi networks have limited range..

Wi-Fi networks can be monitored and used to read and copy Wi-Fi networks can be monitored and used to read and copy data (including personal information) transmitted over the data (including personal information) transmitted over the network unless encryption such as WPA is used. network unless encryption such as WPA is used. Further distance from the access point causes slower speeds.Further distance from the access point causes slower speeds.

Page 8: Wireless

Standard Devices Standard Devices

Wireless Access Point (WAP) Wireless Access Point (WAP) Connects a group of wireless devices to an adjacent wired Connects a group of wireless devices to an adjacent wired LAN.LAN. An access point is similar to an Ethernet hub, relaying data An access point is similar to an Ethernet hub, relaying data

between connected wireless devicesbetween connected wireless devices

Wireless AdapterWireless AdapterAllows a device to connect to a wireless network. Allows a device to connect to a wireless network. Adapters connect to devices using various interconnects such Adapters connect to devices using various interconnects such as as pci, mini pci, express cards, PCMCIA and USB.

Page 9: Wireless

Standard DevicesStandard DevicesWireless Router Wireless Router integrates a WAP, Ethernet switch, and internal Router integrates a WAP, Ethernet switch, and internal Router firmware application that provides IP Routing, NAT, and DNS firmware application that provides IP Routing, NAT, and DNS forwarding through an integrated WAN interface. forwarding through an integrated WAN interface. Allows wired and wireless Ethernet LAN devices to connect to Allows wired and wireless Ethernet LAN devices to connect to a single WAN device such as cable modem or DSL modem. a single WAN device such as cable modem or DSL modem.

Page 10: Wireless

IEEE 802.11 IEEE 802.11

Page 11: Wireless

Wireless SecurityWireless SecurityWired Equivalent PrivacyWired Equivalent Privacy is a scheme that is part of the IEEE 802.11 wireless networking standard is a scheme that is part of the IEEE 802.11 wireless networking standard

to secure IEEE 802.11 wireless networks. Because a wireless network to secure IEEE 802.11 wireless networks. Because a wireless network broadcasts messages using radio, it is particularly susceptible to broadcasts messages using radio, it is particularly susceptible to eavesdropping.eavesdropping.

128 bit encryption uses 26 Hexadecimal characters. 128 bit encryption uses 26 Hexadecimal characters. 256 bit encryption uses 58 Hexadecimal characters.256 bit encryption uses 58 Hexadecimal characters.

Wi-Fi Protected Access Wi-Fi Protected Access WPA is a class of systems to secure wireless (Wi-Fi) computer networks. WPA is a class of systems to secure wireless (Wi-Fi) computer networks.

It was created in response to several serious weaknesses researchers It was created in response to several serious weaknesses researchers had found in the previous system of WEP. had found in the previous system of WEP.

Password must be longer than 6-8 characters long.Password must be longer than 6-8 characters long. Is designed for use with an IEEE 802.1X authentication server, which Is designed for use with an IEEE 802.1X authentication server, which

distributes different keys to each user; however, it can also be used in a distributes different keys to each user; however, it can also be used in a less secure "pre-shared key" (PSK) mode, where every user is given the less secure "pre-shared key" (PSK) mode, where every user is given the same pass-phrasesame pass-phrase

Page 12: Wireless

VENDORSVENDORS

Most Popular BrandsMost Popular Brands Trend microTrend micro DlinkDlink LinksysLinksys Net GearNet Gear

Page 13: Wireless

DEMO TIMEDEMO TIME

Watch the miracle of wireless connectivity.Watch the miracle of wireless connectivity.

Page 14: Wireless

CONCLUSIONCONCLUSION

Wireless connectivity is growing and Wireless connectivity is growing and becoming more popular as the devices becoming more popular as the devices become stronger and faster.become stronger and faster.

Disadvantages can be overcome easily Disadvantages can be overcome easily through little knowledge and progression through little knowledge and progression of technology.of technology.

Page 15: Wireless

THE ENDTHE END