Wireless LAN

Download Report

Transcript Wireless LAN

Wireless LAN
presented by:
Damian Borth, Florian Seidel,
Thomas Winterscheid
Contents
Definition
 The IEEE 802.11 standards
 Infrastructure and Impairments
 Hardware
 System Providers
 Advantages and Disadvantages
 Security
 Alternatives

Table of content
IEEE Standard 802.11
 Basics

Frequency
 OSI / ISO Layer
 Modulation
 Net topology


Properties
Standard
There is the IEEE 802.11 Standard
for WLAN`s
 Sub specifications

802.11a
 802.11b
 802.11g
 802.11e

Basics

OSI / ISO overview

Physical Layer
• Wireless LAN is almost exclusively
Spread Spectrum Radio
• direct sequence spread spectrum (DSSS)
• frequency-hopping spread spectrum (FHSS)
• infrared pulse position modulation (IrDA)

Data Link Layer
• Carrier Sense Multiple Access with
Collision Avoidance (CSMA/CA) protocol
Basics

Frequence




ISM band 2.4 GHz and 5 GHz
2.4 - 2.4835 GHz frequency band
5.725 - 5.850 GHz frequency band
Modus

Ad hoc mode
• Peer to peer

Infrastructure mode
• Using an access point network
Properties
Range: 100m – 400m (outdoors)
 802.11b- DSSS @11Mbps 2.4GHz
 802.11a- DSSS @54Mbps 5GHz
 802.11g- DSSS @22Mbps 2.4GHz
 802.11e- DSSS @22Mbps w/QoS

Contents (Part 2)
Definition
 The IEEE 802.11 standards
 Infrastructure and Impairments
 Hardware
 System Providers
 Advantages and Disadvantages
 Security
 Alternatives

How to install?

Two different use modes:
AdHoc (P2P)
 Infrastructured (LAN)

?
?
?
?
Adhoc
Standard P2P connection
 Only for two PC`s
 Same way of configuration (IP range
etc...)
 Transferrate 11 Mbit/s
 Range ca. 30m-50m (outdoor 400m)
 WEP against eavesdropping

Infrastructured






Access points are needed
Range 30m - 50m
Access points act like bridges/gateways
Installation of access points enables
„Roaming“ functionality
Configuration of IP and administration like in
wired network
Transferrate 11 Mbit/s
Impairments
Weakened by solid walls and concrete
 No influence through glass
 Range impairment can be increased
with additional antenna up to 2 km
 Bluetooth / IrDA

Which hardware you need?
e.g. Fujitsu-Siemens
I-Gate WLAN
WirelessLan-Card
Pre-installed
Adapter USB
Access Point
Wired?
Connectivity to wired LAN
 Access points must be installed
(bridge functionality)
 Connectable to each kind of LAN

Roaming




Extended connectivity possibility
Allows free mobility
Access points transfers given IP within the network
Roaming between different networks is also
possible (bridge/gateway)
Access to WAN?
...is possible by using access points
connected to ISDN / DSL
 Access points can act like a gateway
 No impairment to the transferrates

System provider
Producer
 Fujitsu-Siemens
 Aironet
 NDC
 Proxim
 Bay Networks
 Lucent
 RDC
Productname
 I-Gate
 Telxon Serie 3500
 Instantwave
 Rangelan
 Airsurfer
 Wavelan
 Portlan
Contents (Part 3)
Definition
 The IEEE 802.11 standards
 Infrastructure and Impairments
 Hardware
 System Providers
 Advantages and Disadvantages
 Security
 Alternatives

Advantages
mobility / flexibility
 inexpensiveness
 ease of installation / usage
 extends LAN and doesn’t need to
replace it

Disadvantages
lack of security
 lower transmission rates than in wired
networks

Security


basic problem: broadcast of radio data
transmission
piracy tools:




AirSnort
WEPcrack
Network Stumbler, etc.
real problem: default settings of WLAN are
insecure, e.g. „Accept ANY SSID“
Security - WEP
Wireless Equivalent Privacy
 based on RC4 encryption algorithm
 most important, but optional
 128 bit encryption algorithm for data
encryption and authentification

Security - WEP
WEP does stream-encryption +
generates key for each data package
 to set up the stream, WEP uses the
shared key and an initialization vector
 the plain text information is parsed bitby-bit and combined with pseudo
random numbers (ensures that
packages with same content are not
equally encrypted)

Security - WEP
a carrier frequency is determined by
the constallation of the data stream
and broadcasted throughout the
WLAN
 the recipient deletes the pseudo
random numbers and restores the
plain text information

Weak Point

Initialization Vector (IV)
24 bit
 easily predictable (usually increment
by1)
 Same IV + (constant) Shared Key
 IV-Collision (same WEP-Key)
 many IV-Collisions allow extraction

Security check
change default settings
(e.g. password)
 use WEP encryption
 change WEP key regularly
 filter MAC addresses
 position APs before firewall

Security check
check log files for intrusion attempts
 use “intrusion detection system”
 turn off DHCP
 use authentification


for extra high security use a VPN.
References & Bibliography
http://www.ieee.org
 http://www.tecchannel.de
 http://www.fujitsu-siemens.de
 “Data and Computer
Communications”,Sixth Edition,
William Stallings, Prentice Hall

Any Questions?
Thank you.