Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures

Size: px
Start display at page:

Download "Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures"

Transcription

1 Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures (IEEE Wireless Networks) James Burrell Research project submission for the partial fulfillment of the requirements for the degree of Master of Science in Telecommunications Advisor Dr. Jeremy Allnutt Director, M.S. Telecom Program George Mason University School of Information Technology & Engineering December 2002

2 Introduction To WLAN Technology

3 Introduction Wireless networking technologies offers many advantages over traditional wired (or physical) network connectivity, to include:!mobility support!rapid deployment of network resources!flexible implementation!scalability

4 Basic WLAN Components Wireless Network Interface Card (PCMCIA) Wireless Access Point

5 WLAN Spectrum Allocation

6 WLAN Spectrum Allocation ISM FREQUNCY BANDS Frequency (Lower Limit) Frequency (Upper Limit) Total Bandwidth 902 MHz 928 MHz 26 MHz 2.4 GHz GHz 83.5 MHz GHz GHz 125 MHz Industrial, Scientific, and Medical (ISM) Frequency Allocations (Source: Bruce)

7 WLAN Standards

8 WLAN Standards b HomeRF IrDA a g Bluetooth Max Speed 11Mbps 10Mbps 4Mbps 54Mbps 54Mbps 1 Mbps Frequency 2.4GHz 2.4 GHz Light waves 5GHz 2.4GHz 2.4 GHz Indoor Range feet 150 feet 1 meter feet feet 30 feet Applicatio n WLAN WLAN Device Beaming WLAN WLAN Personal Area Network Wireless Networking Standards and Specifications (Source: Anderson)

9 WLAN Transmission Technologies

10 WLAN Transmission Technologies Spread Spectrum Narrowbeam Microwave Infrared

11 Comparison of WLAN Transmission Technologies Transmission Technology Range Limitation Signal Interception Susceptibility Susceptibility To Interference / Jamming Low High Low High Low High Spread Spectrum **** **** **** Narrowband Microwave **** ******************** ******************** Infrared ****************** * **** ********************

12 WLAN Network Topologies

13 WLAN Topologies Laptop PDA Wireless Segment Ethernet Segment Peer-to-Peer (Ad hoc) Topology Hybrid Topology Laptop PDA Wireless Bridge Wireless Bridge Infrastructure Topology Point-to-Point Topology

14 IEEE Hybrid WLAN Topology Physical Network Segment LAN Switch Internet Router Network Firewall Laptop PDA Wireless Access Point Wireless Network Segment

15 WLAN Applications

16 WLAN Applications WLAN Topology Application Peer-to-Peer Ad hoc networking between mobile devices Hybrid (Wireless/Wired) Network extension for wired LAN infrastructure WLAN Client location flexibility and mobility Point-to-Point Wireless connectivity between buildings or facilities

17 WLAN Applications Organization Application Advantage Educational Institutions Classroom and student connectivity!relocation of devices to different locations in classrooms Health Care / Hospitals Patient monitoring and access to patient medical information!mobility Inventory Control Manufacturing Conference Centers Connectivity for portable inventory devices with central storage facility Network connectivity for machinery in open locations and hazardous environments Provide connectivity to attendees with enabled devices!real-time reporting!relocation of devices to different locations!hazardous environments!rapid deployment Education Shared computer resources among student classrooms and laboratories!mobility

18 WLAN Applications Tactical/Military Multimedia Resources Rapid establishment of network with mobility support in hazardous environments Provide wireless access to multimedia resources!mobility Rapid network deployment!shared Resources Small Office/Home Office (SOHO) Residential Rapid establishment of low cost network infrastructure Rapid establishment of low cost network infrastructure Low cost networking solution!low cost networking solution

19 WLAN Security Risks

20 WLAN Security Risks Network Detection RF Signal Limiting Interference and RF Disruption Unauthorized Network Access Denial of Service Insider Threat Compromised Devices Illicit Access Point Deployment Data Interception

21 WLAN Security Risks Security Vulnerability Relative Security Risk Level Low High Security Countermeasures Detecting WLANs RF Signal Propagation ******************** ******************** Deactivate access point beacon and advertisement transmission Minimize access point transmission level Interference and RF Disruption ******* Unauthorized Access ************************** Conduct RF environment analysis Strategic location of access point deployments Use strong authentication

22 WLAN Security Risks Data Interception **************************!Use encryption Denial of Service *************!Implement measures to secure against unauthorized access Insider Threat *********************!Background investigations!require change of encryption key upon employee termination/dismissal Compromised Devices *********************!Security awareness!reporting requirement for lost or stolen devices!require change of encryption key if compromise is suspected Illicit Access Point Deployment *********************!Limit physical access to wired network infrastructure!conduct routine monitoring for illicit/improperly configured access point

23 WEP Authentication / Encryption

24 WEP Encryption Process PLAINTEXT MESSAGE CRC Logical Exclusive-Or (XOR) Operation GENERATED ENCRYPTION SEQUENCE IV ENCRYPTED MESSAGE CRC IV LEGEND Cyclic Redundency Check Initialization Vector

25 Weaknesses of WEP Algorithm The primary issues that have led to the defeating the security provided by WEP, is related to the:!implementation of the encryption algorithm!relatively short length of the shared encryption key!iv being transmitted with its associated encrypted message!static nature associated with WEP encryption key management

26 WEP Encryption Process Initialization Vector (IV) Initialization Vector (IV) used to generate the used to generate the psuedo-random encryption psuedo-random encryption sequence is transmitted sequence is transmitted along with the encrypted along with the encrypted message message IV IV ENCRYPTED MESSAGE ENCRYPTED MESSAGE

27 RF Signal Limiting

28 SNR Measurements At Selected Distances (100mW Output Power) ' 20' 100'

29 SNR Measurements For Selected Output Power Levels SNR (db) mW 50mW 5mW 1mW Distance (Feet)

30 RF Interference Source Norma l Interference Source Figure X.X Microwave Interference Source Effect On WLAN Transmissions (Distance From Wireless Device 10 Feet)

31 Maximum Distances For Output Power Levels IEEE b 2.4 GHz Wireless Access Point Distance (Feet) Output Pow er (mw)

32 Firewall / Intrusion Detection System / VPN Integration

33 Firewall Integration Into A Wireless Network Segment Laptop PDA LAN Switch Firewall Wireless Access Point Wireless Network Segment

34 IDS Integration Into A Wireless Network Segment Intrusion Detection System Laptop PDA LAN Switch Firewall Wireless Access Point Wireless Network Segment

35 VPN Integration Into A Wireless Network Segment Laptop PDA LAN Switch VPN Gateway VPN / IPSec Tunnel Wireless Access Point Wireless Network Segment

36 Emerging Security Technology and Standards

37 Emerging Security Technology and Standards IEEE e - Quality of Service (QoS) IEEE g - 54 Mbps over 2.4 GHz band IEEE h Spectrum Manager a IEEE i - Enhanced security

38 Summary / Conclusion

39 Summary! The optimal security solution for WLANs involves a combination of security technologies! A detailed threat risk assessment and analysis is essential to determine which security measures, or combination of measures are the most effective! The implementation of preventive and protective end-toend security measures, such as firewalls, intrusion detection, and VPN technologies, provides the most secure and effective defense against the threats associated with the transmission of data over an insecure wireless medium

40 Summary! Requires implementation of policy requirements to ensure the effectiveness of security solutions! Training information will emphasize the importance of security to network users

41 Conclusion A combination of security measures will further increase the security offered by WLAN technologies Increased security will support new WLAN applications Emerging security technology will reduce the increasing security threats associated with providing wireless network connectivity

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

Wireless LAN Security Mechanisms

Wireless LAN Security Mechanisms Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,

More information

Wireless Network Policy

Wireless Network Policy Wireless Network Policy Purpose Guide the deployment and integrity of wireless networking on the Kettering University campus to ensure reliable, compatible, and secure operation Protect the security of

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What

More information

HANDBOOK 8 NETWORK SECURITY Version 1.0

HANDBOOK 8 NETWORK SECURITY Version 1.0 Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives

More information

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge

More information

Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan 2004. Wharf T&T Limited. Version: 1.0 Date: 26 January 2004

Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan 2004. Wharf T&T Limited. Version: 1.0 Date: 26 January 2004 Wharf T&T Limited Version: 1.0 Date: 26 January 2004 This document is the property of Wharf T&T Limited who owns the copyright therein. Without the written consent of Wharf T&T Limited given by contract

More information

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G. Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics

More information

The next generation of knowledge and expertise Wireless Security Basics

The next generation of knowledge and expertise Wireless Security Basics The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

More information

EKT 331/4 COMMUNICATION NETWORK

EKT 331/4 COMMUNICATION NETWORK UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 331/4 COMMUNICATION NETWORK LABORATORY MODULE LAB 5 WIRELESS ACCESS POINT Lab 5 : Wireless Access Point Objectives To learn

More information

LTE, WLAN, BLUETOOTHB

LTE, WLAN, BLUETOOTHB LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed

More information

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE

More information

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Patrick McCurdy Product Marketing Manager Phoenix Contact Inc. [email protected] Ira Sharp Product Specialist Phoenix

More information

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

Wireless data communication in Control Systems

Wireless data communication in Control Systems Rules, standards and challenges for class Ståle Sneen Index DNV / class systematics Rules, standards Challenges and future work 2 DNV / class systematics 3 More than 140 years of managing risk Det Norske

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia

More information

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong

More information

WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION

WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION United States Department of Agriculture Marketing and Regulatory Programs Grain Inspection, Packers and Stockyards Administration Directive GIPSA 3140.5 11/30/06 WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION

More information

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

CHAPTER 1 1 INTRODUCTION

CHAPTER 1 1 INTRODUCTION CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful

More information

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005 SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems

More information

Wireless LAN Networking White Paper

Wireless LAN Networking White Paper Wireless LAN Networking White Paper Introduction Wireless technology has helped to simplify networking by enabling multiple computer users to simultaneously share resources in a home or business without

More information

Wired & Wireless LAN Connections

Wired & Wireless LAN Connections Lecture 5 Wired & Wireless LAN Connections Network Interface Card (NIC) Ethernet Wiring - Thick Ethernet - Thin Ethernet - Star (Hub) Ethernet Extending LAN - Fiber Modem - Repeater - Bridge - Switch Short

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

Wireless Networking for Small Businesses, Branches and Home Offices

Wireless Networking for Small Businesses, Branches and Home Offices Wireless Networking for Small Businesses, Branches and Home Offices Whether one believes in the Internet revolution or not, it is true that the Internet today has become an essential element in running

More information

Security Design. [email protected] http://wwwiuk.informatik.uni-rostock.de/

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Security Design [email protected] http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing

More information

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: [email protected]; Web: http://www.dlink-intl.

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl. Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use

More information

802.11b and associated network security risks for the home user

802.11b and associated network security risks for the home user 802.11b and associated network security risks for the home user by Michael Osten [email protected] Background ================= Approved in 1997 by the IEEE 802 committee, 802.11 details the framework

More information

CHAPTER. Wireless Networking

CHAPTER. Wireless Networking 11 CHAPTER Wireless Networking CHAPTER OUTLINE 11-1 Introduction 11-2 The IEEE 802.11 Wireless LAN Standard 11-3 802.11 Wireless Networking 11-4 Bluetooth, WiMAX, and RFID 11-5 Securing Wireless LANs 11-6

More information

WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network

WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless

More information

WIRELESS NETWORK VISUALIZATION USING RADIO PROPAGATION MODELLING. Johanna Janse van Rensburg and Barry Irwin

WIRELESS NETWORK VISUALIZATION USING RADIO PROPAGATION MODELLING. Johanna Janse van Rensburg and Barry Irwin WIRELESS NETWORK VISUALIZATION USING RADIO PROPAGATION MODELLING Johanna Janse van Rensburg and Barry Irwin [email protected], [email protected] ABSTRACT Wireless technologies have had an enormous

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Link Layer and Network Layer Security for Wireless Networks

Link Layer and Network Layer Security for Wireless Networks Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

Mobile Office Security Requirements for the Mobile Office

Mobile Office Security Requirements for the Mobile Office Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used

More information

WLAN and IEEE 802.11 Security

WLAN and IEEE 802.11 Security WLAN and IEEE 802.11 Security Agenda Intro to WLAN Security mechanisms in IEEE 802.11 Attacks on 802.11 Summary Wireless LAN Technologies WLAN technologies are becoming increasingly popular, and promise

More information

The Basics of Wireless Local Area Networks

The Basics of Wireless Local Area Networks The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of

More information

White Paper. Wireless Network Considerations for Mobile Collaboration

White Paper. Wireless Network Considerations for Mobile Collaboration White Paper Wireless Network Considerations for Mobile Collaboration Table of Contents I. Introduction... 3 II. Wireless Considerations... 4 Channel Selection... 4 Interference... 4 Coverage... 5 Covering

More information

How To Manage An 802.11 Wireless Network At A University

How To Manage An 802.11 Wireless Network At A University WIRELESS POLICY 1 INTRODUCTION 1.1 Wireless networking is a fast emerging technology and is set to continue to grow for the foreseeable future. It is recognised that wireless networking could offer benefits

More information

CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs

CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs Wireless LANs were once considered expensive and slow solutions to certain network connectivity issues. Wireless LAN sales are now

More information

ITL BULLETIN FOR AUGUST 2012

ITL BULLETIN FOR AUGUST 2012 ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

TL-WN310G 54M Wireless CardBus Adapter

TL-WN310G 54M Wireless CardBus Adapter 54M Wireless CardBus Adapter Rev: 1.0.1 1910010042 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and

More information

OpenWay Radio Frequency FAQ

OpenWay Radio Frequency FAQ OpenWay Radio Frequency FAQ March 10, 2010 2010, Itron Inc. All rights reserved. 1 Overview This document provides general information about radiofrequency (RF) electromagnetic fields from OpenWay wireless

More information

This chapter discusses how to design a wireless network, and includes the following sections: Making the Business Case. Wireless Technology Overview

This chapter discusses how to design a wireless network, and includes the following sections: Making the Business Case. Wireless Technology Overview This chapter discusses how to design a wireless network, and includes the following sections: Making the Business Case Wireless Technology Overview Wireless Security Wireless Management Wireless Design

More information

1.3 Understand VLANs, Wired LANs, and Wireless LANs. 1.5 Understand Wide Area Network Connections

1.3 Understand VLANs, Wired LANs, and Wireless LANs. 1.5 Understand Wide Area Network Connections L E S S O N 1 1.1 Understand the Concepts of the Internet, Intranet, and Extranet 1.2 Understand the Local Area Network (LAN) 1.3 Understand VLANs, Wired LANs, and Wireless LANs 1.4 Understand the Wide

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009

More information

Wireless Local Area Network Proposal

Wireless Local Area Network Proposal ITS@CAO - County of Los Angeles Wireless Local Area Network Proposal CAO - State Advocacy Office Location Sacramento, CA Prepared by: CAO ITS June 27, 2002 Edwin Ro [email protected] (213) 974-1336 Table

More information

Wireless Local Area Network

Wireless Local Area Network Wireless Local Area Network ดร. อน นต ผลเพ ม Anan Phonphoem, Ph.D. [email protected] http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand iwing Lab CPE

More information

DRAFT Wireless Network Security

DRAFT Wireless Network Security Special Publication 800-48 DRAFT Wireless Network Security 802.11, Bluetooth and Handheld Devices Tom Karygiannis Les Owens 1 1 2 NIST Special Publication 800-48 Wireless Network Security Recommendations

More information

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks. Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted

More information

Networks. The two main network types are: Peer networks

Networks. The two main network types are: Peer networks Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among

More information

Network Security Best Practices

Network Security Best Practices CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual

More information

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA coursemonster.com/uk Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA View training dates» Overview This new market-leading course from us delivers the best in Wireless LAN training,

More information

Abstract. 1. IEEE 802.11. a. 802.11a b. 802.11b c. 802.11g 2. HiperLAN/2. 3. Bluetooth. 4. HomeRF.

Abstract. 1. IEEE 802.11. a. 802.11a b. 802.11b c. 802.11g 2. HiperLAN/2. 3. Bluetooth. 4. HomeRF. A Detailed Study on Wireless LAN Technologies Vijay Chandramouli Department of Computer Science and Engineering The University of Texas at Arlington [email protected] Abstract Wireless Communication is an

More information

Conducting a WLAN Site Survey and Implementation for the Cisco Unified Wireless Network

Conducting a WLAN Site Survey and Implementation for the Cisco Unified Wireless Network Conducting a WLAN Site Survey and Implementation for the Cisco Unified Wireless Network Author: Keven Dech, Director of Training Services, CCSI, CCDA All content is the property of GigaWave Technologies

More information

This KnowledgeShare document addresses the main types of wireless networking today based on the IEEE 802.11 standard.

This KnowledgeShare document addresses the main types of wireless networking today based on the IEEE 802.11 standard. Wireless Networking Q&A Increased use of laptop computers within the enterprise, and increase in worker mobility have fuelled the demand for wireless networks. Up until recently, wireless technology was

More information

Narrowband and Broadband Access Technologies

Narrowband and Broadband Access Technologies Computer Networks and Internets, 5e Chapters 12 and 16 Access and Interconnection Technologies (slidesets abridged/combined) By Douglas Comer Modified from the lecture slides of Lami Kaya ([email protected])

More information

Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth

Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Henrich C. Poehls Master s Thesis M.Sc. in Information Security Information Security Group Royal Holloway,

More information

SmartDiagnostics Application Note Wireless Interference

SmartDiagnostics Application Note Wireless Interference SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine

More information

ENHWI-N3. 802.11n Wireless Router

ENHWI-N3. 802.11n Wireless Router ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

PCMCIA Wireless LAN Card User s Manual

PCMCIA Wireless LAN Card User s Manual PCMCIA Wireless LAN Card User s Manual Rev 1.0 Regulatory compliance FCC Warning This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of

More information

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997

More information

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 9, Sep 2015, pp. 65-74, Article ID: IJECET_06_09_008 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=6&itype=9

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Cabling LANs and WANs

Cabling LANs and WANs Cabling LANs and WANs CCNA 1 v3 Module 5 10/11/2005 NESCOT CATC 1 Cabling the LAN Each media has advantages and disadvantages: Cable length Cost Ease of installation Susceptibility to interference The

More information

Telecom Regulatory Authority Technical Affairs & Technology Sector WiFi Technology

Telecom Regulatory Authority Technical Affairs & Technology Sector WiFi Technology 120 Telecom Regulatory Authority Technical Affairs & Technology Sector WiFi Technology Technology Tracking Department July, 2003 WiFi Technology 1 Preface Wireless communication is becoming the standard

More information

For the purpose of setting up a home network, all you need to worry about are two major categories of components:

For the purpose of setting up a home network, all you need to worry about are two major categories of components: Access Points, Routers, and Hubs In the first lesson, you learned about the world of wireless standards -- what frequencies are used, distances involved, and other general topics. In this lesson, you learn

More information

Closing Wireless Loopholes for PCI Compliance and Security

Closing Wireless Loopholes for PCI Compliance and Security Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop

More information

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka What is a network? A computer network is two or more computers connected together using a telecommunication system for the purpose

More information

Chapter 1 Instructor Version

Chapter 1 Instructor Version Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly

More information

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key

More information

Recommended 802.11 Wireless Local Area Network Architecture

Recommended 802.11 Wireless Local Area Network Architecture NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless

More information

5GHz 300Mbps 802.11a/n Wireless Outdoor Access Point

5GHz 300Mbps 802.11a/n Wireless Outdoor Access Point 5GHz 300Mbps 802.11a/n Wireless Outdoor Access Point Key Features Wireless LAN & LAN Compliant with IEEE 802.11n wireless technology capable of up to 300Mbps data rate Backward compatible with 802.11a

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

Huawei One Net Campus Network Solution

Huawei One Net Campus Network Solution Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information