Professional Documents
Culture Documents
Aniket Bhoir
Roll no – 03
SY BSc IT
Objective:
To Study How Wi-Fi Works? & it’s Secure
Applications.
3
What Is
Wi-Fi Certification.
Wi-Fi technology builds on IEEE 802.11 standards. The IEEE develops and
publishes these standards, but does not test equipment for compliance with
them. The non-profit Wi-Fi Alliance formed in 1999 to fill this void — to
establish and enforce standards for interoperability and backward
compatibility, and to promote wireless local-area-network technology. As of
2009 the Wi-Fi Alliance consisted of more than 300 companies from around
the world. Manufacturers with membership in the Wi-Fi Alliance, whose
products pass the certification process, gain the right to mark those
products with the Wi-Fi logo.
Specifically, the certification process requires conformance to the IEEE
802.11 radio standards, the WPA and WPA2 security standards, and the EAP
authentication standard. Certification may optionally include tests of IEEE
802.11 draft standards, interaction with cellular-phone technology in
converged devices, and features relating to security set-up, multimedia, and
power-saving.
Uses of
In addition to private use in homes and offices, Wi-Fi can provide public
access at Wi-Fi hotspots provided either free-of-charge or to subscribers to
6
City wide Wi-Fi: In the early 2000s, many cities around the world
announced plans for city-wide Wi-Fi networks. This proved to be much more
difficult than their promoters initially envisioned with the result that most of
these projects were either canceled or placed on indefinite hold. A few were
successful, for example in 2005, Sunnyvale, California became the first city in
the United States to offer city-wide free Wi-Fi.
In May, 2010, London, UK Mayor Boris Johnson pledged London-wide Wi-Fi
by 2012. Both the City of London, UK and Islingto already have extensive
outdoor Wi-Fi coverage
Interactive TV
Wi-Fi’s Interactive TV content is rich in graphic and are uniquely designed to
suite viewers locally. Games are enabled by a high-end broadcast quality
production platform and are tested by our skilled team of broadcasting
technicians. We also make certain that our clients are always upfront in this
swiftly developing market, by leveraging the most up-to-date and most
advanced technology in the market
1) Flexible and powerful content management system for moderation
and processing of viewer feedback.
Why
?
Introduction:
Wi-Fi, or Wireless Fidelity, is a technology standard developed in 1997 by
the Institute of Electrical and Electronics Engineers (IEEE). Wi-Fi is all about
high speed wireless internet access. In today’s scenario, workers typically
move about a lot and need to operate from several stations other than their
office cabin. As gadgets like laptops and PDAs were developed to meet this
need, it was also necessary to develop wireless internet technologies to
enhance their function. This is where Wi-Fi comes in.
Wi-Fi is fast
Wi-Fi typically offers much faster internet access than cable and DSL
connections, a definite advantage for businesses. The high speed is also
useful when you’re on the move. There is a promise of enhanced
productivity here.
Wi-Fi is Convenient
You can access internet from your Wi-Fi enabled device from wherever you
are, as long as you are within range of a base station or source. Thus the
workers can move about with their gadgets from their cabin down the
corridor to the conference room all without losing connection. You can also
access your company’s network from your own laptop or PDA, even when
you are in another place, like a business associate’s office, a hotel or
convention center, as long as this place has a Wi-Fi network.
11
It is also faster and more cost effective for the company to set up a wireless
network than a wired connection.
Wi-Fi is Ubiquitous
The Wi-Fi technology is already commercialized, so most of the computing
and communication gadgets like laptops and PDAs come Wi-Fi enabled.
Further, this Wi-Fi certified gadgets are interoperable regardless of the
brand.
On the other hand, public Wi-Fi access sites or hot spots are also on the
increase. More and more offices, bookstores, airport lounges and food
outlets are setting up Wi-Fi hotspots in the hope that this will induce their
tech-savvy customers to stay on. In some cities, entire neighborhoods and
business districts are setting up bigger hotspots.
Drawbacks
The small range is the biggest drawback for Wi-Fi. Even while you can move
about without the wires, the mobility is severely restricted. Most typically, it
is about a radius of 100 feet or so from the hotspot.
Earlier versions of Wi-Fi radios drain a lot of power, which is a disadvantage
for laptops as they are battery dependent. Also, nearby equipment like
microwave ovens and cordless phones can cause interference.
Security is another big threat. It is easy for anyone to access your wireless
networks if you are not careful. Therefore it is important to install stringent
security precautions depending on the sensitivity of the information you
handle.
What Happens ?
Wi-Fi uses radio technology for communication, and mostly operates at 2.4
or 5 GHz frequency. Most of the new connectible devices are today Wi-Fi
certified, which means not only that they are Wi-Fi enabled, but also that
these devices are interoperable.
In a Wi-Fi network, computers with a Wi-Fi network card can connect
wirelessly to a Wi-Fi router. The router is connected to internet using a cable
12
Advantages and
challenges
Wi-Fi operates in more than 220,000 public hotspots and in tens of millions
of homes and corporate and university campuses worldwide. The current
version of Wi-Fi Protected Access encryption (WPA2) as of 2010 is
considered secure, provided users employ a strong passphrase. New
protocols for quality-of-service (WMM) make Wi-Fi more suitable for
latency-sensitive applications (such as voice and video); and power saving
mechanisms (WMM Power Save) improve battery operation.
15
Reach - Wi-Fi networks have limited range. A typical wireless router using
802.11b or 802.11g with a stock antenna might have a range of 32 m (120 ft)
indoors and 95 m (300 ft) outdoors. The IEEE 802.11n however, can exceed
that range by more than two times. Range also varies with frequency band.
Wi-Fi in the 2.4 GHz frequency block has slightly better range than Wi-Fi in
the 5 GHz frequency block. Outdoor ranges - through use of directional
antennas - can be improved with antennas located several kilometers or
more from their base. In general, the maximum amount of power that a Wi-
Fi device can transmit is limited by local regulations, such as FCC Part 15 in
USA.
Due to reach requirements for wireless LAN applications, Wi-Fi has fairly
high power consumption compared to some other standards. Technologies
such as Bluetooth (designed to support wireless PAN applications) provide a
16
configure the device, usually via a software graphical user interface (GUI).
On unencrypted Wi-Fi networks connecting devices can monitor and record
data (including personal information), but such networks may use other
means of protection, such as a virtual private network or secure Hypertext
Transfer Protocol (HTTPS) and Transport Layer Security.
Hardware
Standard devices:- A wireless access point (WAP) connects a group of
wireless devices to an adjacent wired LAN. An access point resembles a
network hub, relaying data between connected wireless devices in addition
to a (usually) single connected wired device, most often an ethernet hub or
switch, allowing wireless devices to communicate with other wired devices.
An embedded RouterBoard 112 with U.FL-RSMA pigtail and R52 mini PCI Wi-Fi card
widely used by wireless Internet service providers (WISPs) in the Czech Republic
OSBRiDGE 3GN - 802.11n Access Point and UMTS/GSM Gateway in one device
Network security
The main issue with wireless network security is its simplified access to the
network compared to traditional wired networks such as ethernet. With
wired networking one must either gain access to a building (physically
connecting into the internal network) or break through an external firewall.
Most business networks protect sensitive data and systems by attempting to
disallow external access. Enabling wireless connectivity provides an attack
vector, particularly if the network uses inadequate or no encryption.
An attacker who has gained access to a Wi-Fi network router can initiate a
DNS spoofing attack against any other user of the network by forging a
response before the queried DNS server has a chance to reply.
Under these circumstances, the precautions have to come from the users
who access a Wi-Fi public hotspot. Here are a few things you can do to
protect yourself while using a public hotspot.
Emails, usernames and passwords and virtually anything you beam from
your device to the access point can be intercepted by someone close by. A
lot of this information is going as clear text and not in a converted format,
making it possible for the interceptor to access your information. Therefore
23
encrypt any sensitive information you send via email from a public hotspot.
There are numerous file encryption programs, freeware and shareware to
help you with this.
3. Use a VPN
A VPN or virtual private network creates a tunnel between your device and
the hotspot, thus preventing anyone in between from intercepting your
data. This has become a standard requirement for companies to allow
remote employees to connect to their networks. If your company does not
provide you with a corporate VPN, you can go for a commercial one like
JiWire SpotLock.
Connecting to a public wireless network implies that you are joining a local
network of unknown computers. These are on the same IP subnet, so it is
easier for them to capture the traffic between your computer and the
hotspot. Therefore always install a personal firewall program to protect your
personal laptop. In the case of a corporate device, consult the IT manager
before installing any firewall.
Public networks are places where your machine is the most vulnerable to
attacks from viruses and other malicious code. It is more important here to
have effective antivirus software in your system. Also take care to visit the
vendor’s website and download the latest update, or avail the auto-update
features.
6. Update your OS
Most large utility and business software vendors like Microsoft and Apple
frequently develop additional security patches for their operating System
and programs. In the case of Microsoft Windows, you can visit the Windows
Update site to get the new patches. In the case of Mac OS, enable the
automatic Software Update feature in System Preferences.
Also be wary of the attachments that come with emails, as most of the
recent viruses and worms have spread through them.
24
7. Ensure privacy
Take care while you are typing information like name and password while
you are at a public hotspot. There are people around you.
Avoid sending emails through Outlook, Eudora or Apple Mail when you’re
using a public hotspot. Always use web-based email that uses secure http.
You may be using file sharing while you are using your home or office
network. Make sure that this feature is turned off before you access a public
hotspot, for obvious reasons.
Use a strong password for access to your computer and a separate password
to protect sensitive files. It would be a good idea to back up this with your
most important data stored in an encrypted keychain storage device.
Here are a few tips that can help you establish reasonably good security
measures for your home or small office Wi-Fi network, with a standard
wireless router and one or more roaming access points.
25
This is the most fundamental step, as intruders can easily find out the
default name and password of the manufacturer. In fact most of the
manufacturers stick to the IP addresses 192.168.1.1 or 192.16.2.1. Therefore
ensure to rename the router and have a strong password to access the
router configuration software. You may even consider changing the IP
addressing.
Go for the infrastructure mode on all access points and do not allow the ad-
hoc mode that would permit intruders to enter your network through a
legitimate user of your network.
This again is not foolproof, as it is still possible for hackers to intercept the
wireless data packets as they travel from your network to an authorized
user. And with these data packets, the hacker also gets the SSID and the
26
MAC address of the authorized user. The hacker can then easily use this
MAC address to help his system look like an accepted user.
Use either WEP (Wired Equivalent Privacy) or WPA (Wi-Fi Protected Access)
encryption. It has been found that WEP is relatively easy to crack however
some protection is still better than none at all. WPA and its more recent
version WPA2 are safer bets, as they require all the devices including the
source as well as the clients be set to its code.
Wi-Fi gateways usually show the MAC addresses of current users on a status
screen. Many gateways can also keep a log of the users. Scout around
regularly for anything that looks suspicious, like an unauthorized user
staying connected for long- and not connected because he happens to pass
by. Change the encryption if you spot anything that maybe suspicious.
You can also install a packet sniffer like Ethereal that not only shows if
unauthorized users are accessing your information but also shows what
information they are getting.
The steps we discussed so far can only prevent a wireless user from
accessing the information in your network. In other words, WEP and WPA
encryption protect only data in the air. They do not take care of a hacker
breaking into your hotspot from the wired end.
Standard home networking routers have built-in firewalls and they usually
monitor incoming traffic. Typically, they block all incoming ports. There are
also Stateful Packet Inspection (SPI) firewalls that can report attacks,
intrusions and all suspicious activities.
The standard firewalls can take care of your requirements in most cases.
However if you are part of peer-to-peer file sharing networks, you need to
take special precautions. TCP ports 135, 137, 138, 139 and 445 are best
27
blocked from external access. You would also do well to disable NetBIOS
over TCP/IP. Personal firewalls are also worth considering.
This aspect is typically ignored in home networks, but can easily add more
security. You may choose to password to your computer or special files or
areas. It makes sense to choose passwords that are not easy to guess.
Make sure to preserve sensitive or confidential files in folders that are set to
authorized access. All the new operating systems like Windows 2000,
Windows XP and Mac OS X have built-in password capability.
10. Switch off your connectible devices when you are not using them
The logic is simple. No one can access your laptop or computer when it is
switched off. If you have multiple users to your network, you may need to
leave the wired connection on even when you are not using them. But you
can still switch off your own PC or laptop.
breach the Terms of Service or contract with the ISP. These activities do not
result in sanctions in most jurisdictions; however, legislation and case law
differ considerably across the world. A proposal to leave graffiti describing
available services was called warchalking. A Florida court case determined
that owner laziness was not to be a valid excuse.
Operating System
Support
Wi-Fi operating system support usually consists of two pieces: driver level
support, and configuration and management support.
Driver support is usually provided by multiple manufacturers of the chip set
hardware or end manufacturers. Also available are Unix clones such as Linux
and FreeBSD, sometimes through open source projects.
Configuration and management support consists of software to enumerate,
join, and check the status of available Wi-Fi networks. This also includes
support for various encryption methods. These systems are often provided
by the operating system backed by a standard driver model. In most cases,
drivers emulate an Ethernet device and use the configuration and
management utilities built into the operating system. In cases where built in
configuration and management support is non-existent or inadequate;
hardware manufacturers may include their own software to handle the
respective tasks.
30
Wireless Electronic
Devices & Health
The World Health Organization has acknowledged that electromagnetic
fields (EMFs) are influencing the environment (but not people), and that
some people are worried about possible effects. In response to public
concern, the World Health Organization established the International EMF
Project in 1996 to assess the scientific evidence of possible health effects of
EMF in the frequency range from 0 to 300 GHz. They have stated that
although extensive research has been conducted into possible health effects
of exposure to many parts of the frequency spectrum, all reviews conducted
so far have indicated that exposures are below the limits recommended in
the ICNIRP (1998) EMF guidelines, covering the full frequency range from 0–
300 GHz, and do not produce any known adverse health effect.
International guidelines on exposure levels to microwave frequency EMFs
such as ICNIRP limit the power levels of wireless devices and it is uncommon
for wireless devices to exceed the guidelines. These guidelines only take into
account thermal effects, as nonthermal effects have not been conclusively
demonstrated. The official stance of the Health Protection Agency is that
“There is no consistent evidence to date that Wi-Fi and WLANs adversely
affect the health of the general population.” And also that “...it is a sensible
precautionary approach...to keep the situation under ongoing review...”
31
How to Use
Basic Requirements:
1) A Computer System working as Server.
3) Internet Connection.
4) Ethernet Port.
6) Wi-Fi Router.
Server Configuration:
1) Processor : Intel Core i7 – 965 3.0 GHz
HTC HD2
Client Configuration:
Apple Macbook Pro 2.4 GHz:
1) Processor : Intel Core i5 2.4GHz
2) L3 Cache : 3 MB Shared
3) Memory : 4 GB DDR3-1066
HTC HD2:
1) Huge 4.3" 65K-color WVGA glass-covered capacitive touch screen
2) Multi-touch input
3) Windows Mobile 6.5 Professional OS with Sense UI
4) Qualcomm Snapdragon QSD8250 1 GHz CPU and 448MB RAM
5) Wi-Fi connectivity
6) 5 MP autofocus camera with dual LED flash and touch focus
7) MS Office Mobile document editor
8) Standard microUSB port and Bluetooth v2.0 with A2DP
9) Built-in GPS receiver with A-GPS support
35
Wi-Fi Hotspots:
If you want to take advantage of public WiFi hotspots or start a wireless
network in your home, the first thing you need to do is make sure your
computer has the correct speed. Most new laptops and many new desktop
computers are built with wireless transmitters. If your laptop does not work,
you can buy a wireless adapter that plugs into the PC card or USB port.
Desktop computers can use USB adapters, or you can buy an adapter that
plugs into the PCI slot inside the computer. Many of these cards can use
more than one 802.11 standard.
Once you have installed your wireless adapter and drivers that can run, your
computer must be able to automatically discover existing networks. This
means that when you turn your computer into a WiFi hotspot, the computer
informs you that the network exists and asks if you want to connect. If you
have an older computer, you May need to use a program to detect and
connect to a wireless network.
Building a Wireless
Network
If you have multiple computers networked in your home, you can create a
wireless network with a wireless access point. If you have multiple
computers that are not networked, or if you want to replace your Ethernet
network, you need a wireless router. It is a single unit that contains:
As with wireless adapters, many routers can use more than one 802.11
standard. 802.11b routers are slightly cheaper, but because the standard is
older, they are slower than 802.11a, 802.11g and 802.11n routers. Most
people choose the option of standard 802.11g for its speed and reliability.
37
The router comes with four LAN ports and one WAN port on the back. All
are Gigabit capable, meaning they support throughput up to 1,000Mbps.
Also on the back you'll find a power switch and a USB 2.0 port that can host
a USB external storage device for the router's NAS function. Unfortunately,
the E3000's USB port can't be used to host a printer, which is a little
disappointing.
On the front, the router has an array of sleek-looking blue LEDs to show the
status of the ports, the NAS function, the Internet connection, and the
wireless connection. In the middle of these lights is the Wi-Fi Protected
Setup button that initiates the 2-minute window time for hooking up a WPS-
enabled wireless device to a wireless network.
The E3000 comes with the same setup procedure as the Valet Plus, which is
as easy as it gets. The only difference is that the E3000's software comes on
a CD; the Valet Plus includes it in a USB thumb drive. The rest is the same.
To get the router to work, insert the Cisco Connect software CD into a
computer's CD drive and follow the instructions. During your initial install,
you'll be guided through the necessary steps including plugging in the
38
The Cisco Connect software makes it easy for home users to set up and
manage the router and the wireless network but doesn't provide access to
many advanced features. It also would stop working with the router if you
have used the Web interface to change certain settings.
39
Though this new setup method is great for novices on a home network,
experienced users may want to skip it entirely and stick with the router's
Web interface by pointing a browser to its default IP address: 192.168.1.1.
The Web interface allows for much further customization and access to the
routers other advanced functions, such as its network storage capability.
The Web interface is also the only way you can use the E3000 in situations
where no Internet connection is needed; for example, when you want to set
up an isolated network. The Cisco Connect software will not finish the initial
setup process when it can't detect a connection to the Internet.
Note that if you use the software, the default log-in password, which is
"admin," changes to something random. If you later use the Web interface
to alter the password or change other major settings, the Cisco Connect
software will stop working with the router. This means, in most cases, you'll
need to use either the Cisco Connect software or the Web interface to
manage the router, but not both.
The good: The Cisco Linksys High Performance Wireless-N Router E3000
delivers most of what you'd expect from a high-end router, including true
dual-band, Gigabit Ethernet, fast throughput, a long range, NAS
functionality, a nice set of networking features, and a good Web interface. It
also has an aesthetically pleasing compact design and an intuitive software
application to help home users set up and manage their home wireless
network with ease.
The bad: The Cisco Linksys E3000's built-in network storage function lacks
speed, and its guest networking feature is limited. It doesn't support USB
printers and its Media Server doesn't work well with large video files. The
included desktop application can't be used together with the router's Web
interface, and neither provides the complete control over the router's
features and functions.
40
The bottom line: The Cisco Linksys E3000 is the first advanced router that's
also easy to use for novices. It provides great wireless performance and a
good set of useful networking features. Its mediocre NAS performance and
limited guest networking feature, however, make it significantly less than
perfect.
Other Settings: When you connect your router, it should start working to
its default settings. Most routers allow you to use a web interface to change
your settings. You can choose:
* Name of the network, known as its Service Set Identifier (SSID) - default
setting is usually the manufacturer’s name.
* The channel that the router uses - Most routers use channel 6 by default.
If you live in an apartment and your neighbors are also using channel 6, May
you interference. Switching to another channel should eliminate the
problem.
To keep your network private, you can use one of the following ways:
* Wi-Fi Protected Access (WPA) is a step up from WEP and is now part of the
802.11i wireless network security protocol. It uses Temporal Key Integrity
Protocol (TKIP) encryption. As with WEP, WPA security for signature with a
password, most public hotspots are open or use WPA or WEP 128-bit
technology, although some still use the approach more vulnerable WEP.
* MAC (Media Access Control) address filtering is a little different from WEP
or WPA. It is not a password to authenticate users - it uses physical
computer hardware. Each computer has its own unique MAC address. MAC
address filtering allows only machines with MAC addresses for network
access. You must specify which addresses are allowed when you set up your
router. This method is very safe, but if you buy a new computer or if your
visitors will use your home network, you must add the new machines’ MAC
addresses to the list of addresses. The system is not infallible. A skilled
attacker can spoof a MAC address - ie copy the MAC address is known to
trick the computer network that he uses on the network belongs.
FAQ:
Frequently Asked
Questions
What is Wi-Fi?
A way to get Internet access, the term Wi-Fi is a play upon the decades-old
term HiFi that describes the type of output generated by quality musical
hardware, Wi-Fi stands for Wireless Fidelity and is used to define any of the
wireless technology in the IEEE 802.11 specification - including (but not
necessarily limited to) the wireless protocols 802.11a, 802.11b, and 802.11g.
The Wi-Fi Alliance is the body responsible for promoting the term and its
association with various wireless technology Standards.
Conclusion:
Wi-Fi is wireless technology which enables connection
between two or more devices wirelessly for data sharing
purposes. It is wireless networking which is based on IEEE
802.11 standards. it is now being used by millions of people
using various devices such as personal computers, laptops,
PDAs', printers, camera, games, mp3 players etc, more and
more gadgets are coming with built in feature of this
amazing wireless technology.