Computer Networking Fundamentals Chapter 4
Computer Networking Fundamentals Chapter 4
Networking Fundamental
Chapter 4: Wireless Technologies
and Basic Security
1
4.1 Wireless Technologies
2
Wireless Technologies
Wireless technologies use electromagnetic waves to carry information between
devices. An electromagnetic wave is the same medium that carries radio signals
through the air.
Some types of electromagnetic waves are not suitable for carrying data. Other
parts of the spectrum are regulated by governments and licensed to various
organizations for specific applications. Certain areas of the spectrum have been set
aside to allow public use without the restriction of having to apply for special
permits.
The most common wavelengths used for public wireless communications include
the Infrared and part of the Radio Frequency (RF) band.
3
Wireless Technologies
• Wavelength for each electromagnetic wave
4
Wireless Technologies
Infrared Band (IR)
– Low energy and unable to penetrate walls (line of sight)
– Used for PDAs, PCs, wireless mice, keyboards and remote
controls
– IrDA (Infrared Direct Access) port used for 1 to 1
connections
Radio Frequency (RF)
– Goes through walls and other obstructions, better range
– Different frequencies assigned to different types of
unlicensed devices
5
Comparison: infrared vs. radio transmission
•Infrared •Radio
– uses IR diodes, diffuse light, – typically using the license free ISM
multiple reflections (walls, band at 2.4 GHz
furniture etc.) •Advantages
•Advantages – experience from wireless WAN
– simple, cheap, available in many and mobile phones can be used
mobile devices – coverage of larger areas possible
– no licenses needed (radio can penetrate walls,
– simple shielding possible furniture etc.)
•Disadvantages •Disadvantages
– interference by sunlight, heat – very limited license free frequency
sources etc. bands
– many things shield or absorb IR – shielding more difficult,
light interference with other electrical
– low bandwidth devices
•Example •Example
– IrDA (Infrared Data Association) – WaveLAN, HIPERLAN, Bluetooth
interface available everywhere
types of wireless connections…infrared
Infrared
– transmitted by frequencies in the 300-GHz to 300,000-GHz
range, which is just above the top of the wireless spectrum.
(dihantar dengan julat frekuensi GHz 300 hingga 300.000-GHz, iaitu spektrum wayarles
tertinggi )
wireless LANs
– WLAN relies on lower frequencies in the 2.4-2.4835 GHz
band, more commonly known as the 2.4-GHz band, to send
and receive signals. (WLAN menghantar dan menerima isyarat pada frekuensi
rendah iaitu 2.4 GHz)
An ad-hoc WLAN
wireless LANs… infrastructure
An infrastructure WLAN
wireless LANs… ad hoc
15
*nota : tulisan merah yg masuk silibus
Wireless Technologies
*UMTS = Universal Mobile
Telecommunication System
Wireless
Technologies
GPRS
Bluetooth HomeRF WIFI HiperLAN I/II WLL WiMAX GSM UMTS
HiperMAN EDGE
802.15.1 802.11 ETSI 802.16 802.16 2G 3G
2.5G
16
WBAN and WPAN
• A WBAN provides the connectivity among various
devices of wearable computers whose components
are distributed on the body
– E.g. microphones, earphones, etc.
• A WPAN connects one-person’s BAN with the
environment around it (devices around the person)
– Bluetooth is an example of a wireless PAN that allows
devices within close proximity to join together in an ad hoc
fashion to exchange information
– Many cell phones have two radio interfaces: one for the
cellular network and one for PAN connections
– IEEE 802.15 (Bluetooth)
17
WPAN Applications
18
WLAN
• A WLAN provides a wider range of connectivity with higher
data rate than that of WPAN and WBAN
– Infrastructure mode: requires an AP and provide access to Internet
backbone
– Ad hoc mode: peer-to-peer communication
• Typical applications: hot spots, buildings
• Requirements of a WLAN
– High capacity
– Full connectivity among the attached nodes
– Broadcasting capability
• In terms of standardization
– In US: IEEE 802.11 (WiFi)
– In Europe: HiperLAN II
19
WWAN
• Wireless wide area networks are wireless networks
that typically cover large areas, such as between
neighboring towns and cities, or city and suburb.
• These networks can be used to connect branch offices
of business or as a public internet access system.
• The wireless connections between access points are
usually point to point microwave links using parabolic
dishes on the 2.4 GHz band, rather than
omnidirectional antennas used with smaller networks.
• When combined with renewable energy systems such
as photo-voltaic solar panels or wind systems they can
be stand alone systems.
• In addition, WAN’s also refer to Mobile Data
Communications, such as GSM, GPRS and 3G.
22
23
wireless LANs devices/components
A wireless local area network (WLAN) links two or
more devices using some wireless distribution
method and usually providing a connection through
an access point to the wider internet.
This gives users the mobility to move around within a
local coverage area and still be connected to the
network.
Most modern WLANs are based on IEEE 802.11
standards, marketed under the Wi-Fi brand name.
Wi-Fi : Wireless Fidelity
24
25
Wireless LANs Devices
26
Wireless LANs Devices/ Components
• Wireless Components
– Wireless Clients or STAs
(Wireless STAtion)
– APs (Access Points)
– Wireless Bridges
• Types of Antennas
– Omni send all
directions
• Used in APs
– Directional send in one
direction
• Used for longer links
to bridge distances
WLANs Form And Service Set Identifier (SSID)
There are Two forms of WLAN Installations:
1. Ad-hoc (IBSS) Equal Peer-to-peer & No AP
2. Infrastructure (BSS) STAs communicate
through APs
28
Advantages and limitations of the wireless
technology
Advantages
– Mobility Allows for easy connection of both stationary and
mobile clients.
– Flexibility Ability to provide anytime, anywhere
connectivity
– Cost Wireless technology is fairly easy and inexpensive
to install.
– Scalability Enables networks to be easily expanded,
without the limitations of cabled connections.
– Reduced installation time Installation of a single piece of
equipment can provide connectivity for a large number of
people.
29
Advantages Wireless Technologies
30
Advantages and limitations of the wireless
technology
Limitations
– Interference Wireless technology is susceptible to
interference from other devices that produce
electromagnetic energies. (Interferensi teknologi Wireless terdedah
terhadap gangguan dari peranti lain yang menghasilkan tenaga elektromagnet)
31
Types of wireless networks and their boundaries
32
Types of wireless networks and their
boundaries
33
Types of wireless networks and their
boundaries
Wireless networks boundaries
34
FE Dis 14 & Jun 15: cth scenario
Activity
SCENARIO
1. Charlene uses the IrDA port to connect her PDA to her laptop to
upload files.
2. Natasha calls her friend Carlos on her cell phone.
3. Trisha uses her laptop computer at a wireless HotSpot to check her
email.
4. Burt uses a wireless Bluetooth headset to listen to music from his
MP3 player.
5. Jim connects to the wireless network at his school to do research
on a new technology.
6. Ragu uses his cell phone to view a web page on the Internet.
36
FE Dis 14: types of threat
Confidential = sulit/rahsia
Intrusion - pencerobohan
Risks of network intrusion
Disruption = gangguan
Sources of network intrusion FE December 2013
External Threats
– External threats arise from individuals working outside of
an organization
– They do not have authorized access to the computer
systems or network.
Internal Threats
– occur when someone has authorized access to the network
through a user account or have physical access to the
network equipment.
Sources of network intrusion
Scenario
– There are three hosts connected via a switch. A hacker
working from inside the building is attempting to access
the network, via the switch.
Pretexting
Phishing
Vishing/Phone Phising
Pretexting
– Typically accomplished over the phone
– scenario used on the victim to get them to release
confidential information
– gaining access to your social security number
EC301:FE December 2013 & Jun 15
DEC3023:FE December 2015
Phishing
– Phishing is the attempt to acquire sensitive
information such as usernames, passwords,
and credit card details (and sometimes,
indirectly, money), often for malicious
reasons, by masquerading as a trustworthy
entity in an electronic communication.
– typically contacted via email (or IM, or fake
websites)
– attacker pretends to represent legitimate
organization
FE December 2013 & Jun 15
Vishing/Phone Phising
– User sends a voice mail instructing them to call a
number which appears to be legitimate
– Call intercepted by thief
47
How To Avoid WLAN Attack
1. Limited access to a WLAN
2. Authentication on a WLAN
3. Encryption on a WLAN
4. Traffic filtering on a WLAN
57
4. The access point decrypts the encrypted text using
its configured WEP key that corresponds to the
station’s default key. The access point compares
the decrypted text with the original challenge text.
If the decrypted text matches the original challenge
Autentication
5. The station connects to the network.
• The following steps occur when • If the decrypted text does not match
the original challenge text (that is, the
two devices use Shared Key access point and station do not share
Authentication: the same WEP key), then the access
1. The station sends an authentication request to the point will refuse to authenticate the
access point.
2. The access point sends challenge text to the station. station, and the station will be unable
3. The station uses its configured 64-bit or 128-bit to communicate with either the 802.11
default key to encrypt the challenge text, and it sends network or Ethernet network.
the encrypted text to the access point.
58
59
60
Wireless LAN Security – Traffic filtering
• Allows control of traffic types • Filtered using
sent across WLAN – MAC Addresses
• Blocks undesirable traffic from – IP Addresses
entering or leaving network – Port Numbers
WLAN Security Measures
• Security should be
planned and configured
before installing into
network or ISP
• Basic measures:
– Change Defaults for SSID,
usernames, and Psswrds
– Disable SSID broadcast
– MAC Address Filtering
• Advanced Measures
– WPA or WEP Encryption
– Authentication
– Traffic Filtering
4.4 Methods of Attacks
64
Methods of Attack
Its an attack to
make a machine or
network resource
unavailable to its
intended users.
DoS (Denial of Service) Attacks
Intended to deny services to users
– floods network with traffic
– disrupts connections between client and server
Types of DoS Attacks
– SYN (synchronous) Flooding
packets sent with invalid IP addresses
server tries to respond
– Ping of Death
larger packet size sent than allowed
leads to system crashing
Sending a ping of this size is against the rules of the TCP/IP protocol,
but hackers can bypass this by cleverly sending the packets in
fragments. When the fragments are assembled on the receiving
computer, the overall packet size is too great. This will cause a buffer
overflow and crash the device.
95
Common security measures
Identification and Authentication Policies
– only authorized persons should have access to network and
its resources (including access to physical devices)
Password Policies
– Must meet minimum requirements
– Change passwords regularly
Acceptable Use Policies
– Determine which applications are acceptable
Remote Access Policies
– Explanation of how remote users can access the network
Common security measures
Network Maintenance Procedures
– Explanation of update procedures
Incident Handling Procedures
– How incidents involving security will be handled
Update software patches
Use of updates and patches makes it harder for the hacker to gain access.
Updates
– Includes additional functionality
Patches
– Small piece of “code” used to fix the problem
Antivirus latest patterns
Any device connected to a network is susceptible to
viruses
Warning signs of a virus:
– computer acts abnormal
– sends out large quantities of email
– high CPU usage
Some Anti-virus programs
– Email checking
– Dynamic scanning
checks files when accessed
– Scheduled scans
– Automatic updates
Firewall
a firewall is a software or hardware-based network security system that
controls the incoming and outgoing network traffic by analyzing the data
packets and determining whether they should be allowed through or not,
based on a rule set.