Wireless LAN Technology

Download Report

Transcript Wireless LAN Technology

Wireless LAN Technology

Julie Vogel Jim Faxon Kevin Meehan Rob Belote

The Wireless LAN Industry exceeded $300 million in 1998 and will grow to $1.6 billion in 2005.

Source: Frost and Sullivan

Why Go Wireless?

 Business solutions = OPPO

RTUNITY

– Increase Productivity – Better Customer Service – Future Cost Savings – Access all the time, anywhere – No need for Ethernet jack hookups

Why Go Wireless (cont)

 University Solutions – Cloud of Connectivity – Enhance Education Possibilities  Live Remote Classes  Mobile Study / Group Work

Is It Worth It?

 Aspects to Consider – Cost – Performance – Interoperability – Lifespan and Upgrades

 802.11b

Cost / Performance

 802.11a

– – 11 Mbps @ 2.4 GHz Longer Distances  Up to 100 feet – Basic Access Points  ~ $100 – Wireless PC Cards  < $100 – – 54 Mbps @ 5 GHz Shorter Distances  Up to 50 feet – Basic Access Points  ~ $250- 500 – Wireless PC Cards  ~ $200

Interoperability

 Integration of Standards – 802.11b and 802.11a

 Future Technology  Integration of Manufacturers – D-Link vs. Linksys

New Wireless Technology

Harmony

by Proxim – – – 802.11a and b integration “Central” Access Point Controller Ability to Roam Subnets – Cost  $900

802.11b +

AirPlus

by D-Link – 22 Mbps @ 2.4 Ghz  Opposed to 11 Mbps – Upgrade available soon  12 Mbps Real World Performance – Cost  Roughly same as 802.11b

 ~ $100 per Access Point and PC Card

802.11g and VoIP

PRISM GT

Chip by Intersil – VoIP to fit Wireless Bandwidth – Quality of Service (QoS)  Ability to maintain video data while mobile

802.11 and Bluetooth

PX20

by Philips – Advanced Access Gateway – Allows integration of Bluetooth and 802.11b standards – Not on market yet 

Blue802

by Intersil – Mini-PCI card  Mixes Bluetooth and 802.11b standards – Cost = $50

Security Devices

Mobius

by Symbol Technologies – – Central Switch Access “Ports” – Offers Central Control of Access 

WG-1000

by Bluesocket – Employee vs. Guest Access – Specific Levels of Access – Usernames and Passwords – $6000

Wireless LAN Standards

 Institute of Electrical and Electronic Engineers (IEEE) in charge of creating standards – 802.11 Working Group deals with Wireless  Divided up into Task Groups – MAC Task Group – PHY Task Group – Task Groups assigned letters (a through i)

802.11 Standards

 802.11 standards released, followed by the 802.11b standards – 802.11a standards release followed 802.11b despite being finished first – 802.11a standards didn’t seem feasible until the 802.11b standards were in place

802.11a

802.11b

Transfer speed 54 Mbps* (33) Available Channels Range Users per Access Point 11 25 ft 1024 11 Mbps* (6) 3 100 in / 200 out 256

Wireless Fidelity (Wi-Fi) certification

 802.11b and Wi-Fi certification form the baseline standard across the world  Assures that your device can work with other Wi-Fi certified devices from other vendors  Given by Wi-Fi alliance – Non-Profit International Trade Organization

Standards in the Works

 802.11g is a promising new standard  Similar to parts of 802.11a & b standards – – Transmission rate (54Mbps) same as 802.11a

Number of channels (3), Frequency band used (2.4GHz), Clients per Access Point (256) same as 802.11b

 Uses OFDM modulation in 2.4GHz frequency band, (802.11b =DSS in 2.4GHz band

Standards in the works (cont)

 802.11g

– Backward compatible with 802.11b

 802.11h

– Deals with MAC and Physical Layer standards for 5GHz in Europe  802.11i

– Deals with improving the security measures in the 802.11a,b,&g standards

Security: Wireless Versus Wired LANs

 Wireless LANs have increased security risks because of the nature of radio communication  Radio communication makes it practically impossible to prevent certain types of attacks

Wireless LAN Attacks

Main types of security attacks on wireless LANs:

Eavesdropping or Sniffing

Transitive Trust

Infrastructure

Denial of Service (DoS)

Eavesdropping

 Eavesdropping, or sniffing, is a way for attackers to capture messages being transmitted between two parties.

 When one wireless device sends a message over a radio path, an attacker equipped with a special transceiver in the range of the transmission, can eavesdrop the message.  Businesses should not assume that their wireless LAN is contained inside the building, except for the presence of electromagnetic shielding and other costly security precautions.

Transitive Trust Attacks

 The largest security issue associated with transitive trust is authentication, the ability to verify the other parties identify.  Two ways to break into a network: 1. The attacker fools the wireless LAN into trusting the mobile device, allowing the attacker access inside the network’s firewall. 2. Attacker fools the mobile device into logging onto their network, instead of the intended network. The attacker can then scan for passwords and encryption keys.

Infrastructure Attacks

 Attackers have information about the known weaknesses in computer’s: – – – server operating system client operating system application programs  A company can protect itself by downloading patches.

Denial of Service (DoS)

 With a powerful transceiver, an attacker can generate a radio interference that disables the wireless LAN from using a radio path.  Attackers have to act quickly on these attacks because it is fairly easy for authorities to locate the transceiver.

Secure Communication

 Because of the vulnerabilities associated with wireless LANs, users can provide the most protection for their networks by using: – Encryption – Authentication

 Encryption and Authentication Symmetric key encryption: – method is efficient – not very secure because an attacker can intercept the key and decode all the information  Public key encryption: – more secure than symmetric key encryption – inefficient and is usually used for small messages  Hashing: – uses a mathematical process  Digital Signatures: – authenticates a message  Digital Certificates: – certificate authority

Security Management

 Companies must be in control of their wireless network by: – implementing security policies – testing network for weaknesses – educating employees on security threats

Policy and Regulation

Legislation

Congress

Common Law / Interpertation of Law

Courts

Administrative Law

Federal Communication Commission (FCC)

Legislation

Bill introduced in House or Senate

Bill approved by both House and Senate

Approved by executive branch

Creates a law that can do anything from create a tax to prohibit an action

Common Law

FCC

Administrative Law

• Created in Communication Act of 1934 • Strengthened by Telecommunications Act of 1996 • Opened Markets to exchange carriers, including broadband Ethernet.

• Title I of ’96 Act • Wireless Telecommunications Bureau of FCC

FCC Rulemaking Process

• Notice of Inquiry • Notice of Proposed Rulemaking • Comments received and reviewed • Further Notice of Proposed Rulemaking (if needed) • Report & Order

* Carries Full “Force of Law”

FCC Enforcement Measures

• “Letter in the file” • Cease-and-Desist Order • Consent Order • Forfeitures (fines) • FCC Hearings • Administrative Law Judge • Witness, Testimony, Evidence, and Council

Today's FCC

• 5 Commissioners with five-year overlapping terms • Chairman appointed by Executive Branch • Sets direction and philosophy of FCC • Current Goals • Unregulated Competitive Environment • Eliminate Unnecessary Regulation • Planning in International Arena • “E-Rate” Program • “lap dog” or “watch dog” ?

The Future of Wireless Networks

Internet access to most US residents

Home PC

Television (MSN TV)

Video Game Consoles (X-Box)

Schools

Libraries

Current Application of WLANs

• Denver / San Diego Wireless MAN • Santana Row: “Silicon Valley’s Rodeo Drive” • IBM Emergency Network • Windows XP • Boingo

Do people trust wireless?

76% of people polled at www.techtv.com

said that they did NOT trust their secrets on wireless networks.

• The Lawrence Livermore and Los Alamos National Laboratories banning wireless networks.

• People are pleased with wireless, but are not yet willing to use it •

Early Internet Vendors and Credit Cards

• Is 128-bit encryption safe?

Where to go from here?

Future is bright for Wireless Networkers

users becoming comfortable in new technology

businesses able to make money

anticipate BOOM in wireless markets

Prices are falling

Access Points becoming easier to find

Security Issues being addressed

Need more regulation from FCC $69.88 @ Amazon.com

Questions?

Comments?