Professional Documents
Culture Documents
Agenda
IV.
Wireless 101 - Dave Packham (45 minutes) a. b. Overview of Wireless Technology (3500 foot level) U of U Wireless Direction, Standards i. ii. iii. c. ITC -> Wireless Committee White Paper: 802.1x, WPA Wireless Requirements for Task Force funding
i.
ii. iii. iv.
v.
WAP registration
Joe Breen and CHPC. For the wonderful lab facilities and dealing with us every Friday. Chris Hessing and Terry Simons and the Library folk. For designing and pushing 802.1x and security in the wireless arena, willing to test out live networks for us to watch (Library 802.1x) Pankos Business Data Networks and Telecommunications, 5th edition Copyright 2005 Prentice-Hall 5G Wireless for the campus wide coverage maps Cisco for some great slides on wireless antennas and spectrum Wayne Peay and the Wireless working group. That has facilitated us to unite and develop many new ideas. To work on campus wide deployment of COMMON authentication look and feel
Steve Hess and OIT for the resources to deploy products like Perfigo campus wide.
PDAs Printers Projectors Tablet PCs Barcode scanners Custom devices for vertical markets: Healthcare Manufacturing Retail Restaurants
4
Market Realities
802.11b
Dominates
the installed base but not for sale much longer because of 802.11g
802.11g dominates sales today 802.11a is not thriving in the market 802.11n is under development
100 Fast
Antennas
Unidirectional
Hemispherical Toroidal Active Antennas
Energy beams
Mass transfer conversion Transporters
Dish Antenna Concentrates incoming and outgoing signals in a narrow range ----Must point at receiver Good for fixed subscribers
Omnidirectional Antenna Signal spreads as a sphere Rapid signal attenuation ----No need to point at receiver Good for mobile subscribers
Laptop
Radio Channels
What
are they? Why do the collide? B/G Why are there only 3 distinct channels with 11 available? A Why are there 56 channels?
Wireless Technologies
WAN
(Wide Area Network)
MAN
(Metropolitan Area Network)
LAN
(Local Area Network)
PAN
(Personal Area Network)
PAN Standards
Bluetooth 802.15.3
LAN
802.11
MAN
802.11 802.16 802.20 10-100+ Mbps
WAN
GSM, CDMA, Satellite
Speed
< 1 Mbps
11 to 54 Mbps
10 Kbps2 Mbps
Range
Applications
Short
Peer-to-Peer Device-to-Device
Medium
Enterprise Networks
Medium-Long
Last Mile Access
Long
Mobile Data Devices
802.11b
802.11a
2.4 GHz
5 GHz
8 to 14 3 In future, 19 to 24
OK
OK
Commercial
spread spectrum transmission reduces certain propagation effects (multipath interference and narrowband EMI);
With spread spectrum transmission, most of the signal will get through
Does
Frequency Hopping
2.483 GHz 8
9
7 6
Frequency
4 3
1 2
2.400 GHz
Time
79 Channels, 1 MHz Each Changes frequency (Hops) at least every 0.4 seconds Synchronized hopping required
2.402 GHz
2.483 GHz
2.4835 GHz
2.4835 GHz
Hopping
Channel 1
Frequency
Frequency
Interference
2.4 GHz
2.4 GHz
2 1
Channel 2
Channel 3
Time
Data may be decoded from redundant bits Can move to an alternate channel to avoid interference
Wireless Security
No Security by Default
In
No Security
No Security
WarChalking, WarDriving.
Can
read traffic from outside the building walls Can also send malicious traffic into the network
Standard WEP
Initial
flawed security method developed by the 802.11 Working Group for 802.11 devices stations share the same encryption key with the access point
All
This
key is rarely changed because of the difficulty of coordinating the many users sharing it
is a shared static key
This
Standard WEP
Shared
static keys means that a large volume of traffic is encrypted with the same key so much traffic generated with one unchanging key, cryptanalysts can crack the key by collecting data for a few days the key is cracked, the attacker can read all messages and send attack messages into the network without going through a firewall filter
With
Once
Standard WEP
Software
VPNs
VPNs
protect transmission over the untrusted Internet (Chapter 1) can also be used to protect transmission over the untrusted WLAN
VPNs
Effective
set up
802.11i
802.11i Security
Later,
802.11i
Each station gets a separate key for confidentiality This key is changed frequently
801.11i
802.11i Security
802.11i
Authentication involves a device proving its identity to another device Authenticate with an authentication server (Figure 5-17)
OK
Notebook
OK
4. Client PC
Authentication Server Large Wired Ethernet LAN
If an OK is sent back, the access point may accept an association request from the client If a bad report is sent back, the access point may decline an association request from the client
802.11 continued
802.11i Security
Products
Stopgap
security method introduced before full 802.11i security could be developed some parts of 802.11i in 2002 and 2003
Introduced
It
Stronger Security
We
will soon have a mix of no security, WEP, 802.11i, WPA, and other security protocols as strong as the weakest link
Only
Legacy
equipment that cannot be upgraded to 802.11i will have to be discarded is sometimes called WPA2)
(802.11i
Security?
Unauthorized
or individual
Often
have very poor security, leaving a big opening for hackers operate at high power, attracting many clients to these access points with weak security
Often
BlueTooth?
Where
BlueTooth
Replace A few
A few
802.11 vs BlueTooth
802.11 Focus Bluetooth Local Area Network Personal Area (LAN) Network (PAN) 722 kbps with back channel of 56 kbps. May increase. 10 meters
11 Mbps to 54 Rated Speed Mbps (Actual Throughput in both directions Will Be Lower) Distance 30 to 100 meters
Number of Devices
802.11 vs BlueTooth
802.11 Scalability Good because allows multiple access points Bluetooth Poor
Cost
Battery Drain Application Profiles
Higher
Higher No
Lower
Lower Yes
Should I BlueTooth?
Devices
with compatible application profiles (a printer and PC, for instance) can work together automatically useful; nothing like it in 802.11
Extremely However,
designed
Also,
Whats up Next?
Here
Stations
E.g., 802.11g when in reach of WLAN (fast & cheap) Expensive 3G when nothing else is available
The University of Utah
Mesh Networks
Move
(P2P) Adjust signal power, etc. when an element fails or is turned off
Management Console
WLAN switch has the management intelligence for multiple inexpensive dumb access points
Wireless on Campus
What Where When Why
Every Friday at 10 am CHPC lab/conf room Talk about hardware Talk about software Put together proposals for ITAC and Wireless working groups Design and workout kinks in wireless networks on campus
Adhere
to the Wireless Whitepaper policy Agree to adopt to changing wireless environments Provide secure.utah.edu for clients with an 802.1x supplicant Provide insecure.utah.edu for device that dont support 802.1x Request approved AP and wireless hardware Provide these wireless services to every student
The University of Utah
Wireless Links
http://www.it.utah.edu/leadership/committees/wireless/index.html http://www.it.utah.edu/leadership/committees/wireless/index.html http://www.it.utah.edu/services/networking/wireless/index.html http://www.it.utah.edu/services/networking/wireless/index.html