SlideShare a Scribd company logo
LAN Switching and Wireless
If you found any mistake’s’ on these slides or if you have any
other questions or comments, please feel free to contact me at:
abdu.elsaid@gmail.com or abdu.elsaid@yahoo.com
Linkedin : https://www.linkedin.com/in/AbdelkhalikMosa
Twitter : https://twitter.com/AbdelkhalikMosa
Facebook : https://www.facebook.com/Abdelkhalik.Mosa
Thanks,
Abdelkhalik Mosa
Suez Canal University
Faculty of Computers and Informatics - Ismailia - Egypt
Note …
Introduction
• Wireless technologies use electromagnetic waves to carry
information between devices.
• WLANs use radio frequencies (RF) instead of cables at the
Physical layer and MAC sub-layer of the Data Link layer.
Wireless LAN Vs. Ethernet LAN
Wireless PAN, LAN, MAN and WAN
PAN : Personal Area Networks
LAN : Local Area Networks
WLAN : Wireless Local Area Networks
MAN : Metropolitan Area Networks
WAN : Wide Area Networks
Introduction: Infrared
• Infrared (IR) is relatively low energy and cannot penetrate
through walls or other obstacles.
• A specialized communication port known as an Infrared Direct
Access (IrDA) port uses IR to exchange information between
devices.
• IR only allows a one-to-one type of connection.
• IR is also used for remote control devices, wireless mice, and
wireless keyboards.
• IR generally used for short-range, line-of-sight, communications.
Introduction: Radio Frequency (RF)
• RF waves can penetrate through walls and other obstacles,
allowing a much greater range than IR.
• Certain areas of the RF bands have been set aside for use by
unlicensed devices such as WLANs, and computer peripherals.
– This includes the 900 MHz, 2.4 GHz, and the 5 GHz frequency ranges.
These ranges are known as the ISM bands.
Benefits of Wireless Technology
Limitations of Wireless Technology
Wireless LANs (WLANs)
• 802.11 wireless LANs extend the 802.3 Ethernet LAN
infrastructures to provide additional connectivity options.
Wireless LAN Standards
• The governmental agencies in countries, license some frequency
bands, leaving some frequency bands unlicensed.
• Licensed bands:
– The most common are AM and FM radio, shortwave radio (for
police department communications), and mobile phones.
• Unlicensed frequencies:
– Can be used by all kinds of devices; however, the devices must
still conform to the rules set up by the regulatory agency.
• A device using an unlicensed band must use power levels at or
below a particular setting so as not to interfere too much with
other devices sharing that unlicensed band.
Wireless LAN Standards
• OFDM have faster data rates than DSSS.
• DSSS is simpler and less expensive to implement than OFDM.
Wireless Fidelity (Wi-Fi) Certification
• Wi-Fi Alliance, a global, nonprofit, industry trade association
devoted to promoting the growth and acceptance of WLANs.
• The Wi-Fi Alliance is an association of vendors whose objective is
to improve the interoperability of products that are based on the
802.11 standard.
• The Wi-Fi logo on a device means it meets standards and should
interoperate with other devices of the same standard.
• The three key organizations influencing WLAN standards are:
ITU-R regulates allocation of RF bands.
IEEE specifies how RF is modulated to carry info.
Wi-Fi ensures that vendors make devices that
are interoperable.
Wireless Infrastructure Components: Wireless NIC
Wireless NIC encodes a data stream onto an RF signal.
Wireless Infrastructure Components: Wireless Access Points
• An access point is a Layer 2 device that functions like a 802.3
Ethernet hub.
• An access point connects wireless clients to the wired LAN.
• Association is the process by which a client joins an 802.11
network.
• RF signals attenuate as they move away from their point of
origin, causing the Hidden node problem.
• One means of resolving the hidden node problem is a CSMA/CA
feature called request to send/clear to send (RTS/CTS).
Wireless Infrastructure Components: Wireless Access Points
• The hidden node problem
Wireless Infrastructure Components: Wireless Routers
• Wireless routers perform the role of access point, Ethernet
switch, and router.
Configurable Parameters for Wireless Endpoints
Network Modes
Channels
SSID
802.11 Topologies: Ad Hoc (IBSS)
Independent Basic Service Set (IBSS)
802.11 Topologies: BSS
Basic Service Set (BSS)
802.11 Topologies: ESS
Extended Basic Service Set (ESS)
Client and Access Point Association: Beacons
• Beacons: Frames used by the WLAN network to advertise its
presence.
Client and Access Point Association: Probes
• Probes: Frames used by WLAN clients to find their networks.
Client and Access Point Association: Authentication
Client and Access Point Association: Association
• Association: The process for establishing the data link between
an access point and a WLAN client.
Threats to Wireless Security: Unauthorized Access
• Major categories of threats that lead to unauthorized access:
1. War Drivers:
• Find open networks and use them to gain free internet
access.
2. Hackers:
• Exploit weak privacy measures to view sensitive WLAN
information and even break into WLANs.
3. Employees:
• Plug consumer-grade APIs/gateways into company
Ethernet ports to create their own WLANs.
Threats to Wireless Security: Man-in-the-Middle Attacks
Threats to Wireless Security: Denial of Service
Wireless Security Protocol Overview
• Open Authentication: no authentication.
• WEP authentication: was supposed to provide privacy to a link.
Static, crackable, and not scalable.
Cloaking SSIDs and filtering MAC addresses were used.
Authenticating to the Wireless LAN
Authenticating to the Wireless LAN
• EAP is a framework for authenticating network access.
Encryption – TKIP and AES
• TKIP is the encryption method certified as WPA.
It encrypts the Layer 2 payload.
It carries out a message integrity check (MIC) in the encrypted
packet which ensures against a message being tampered with.
• AES is the encryption method certified as WPA2.
• PSK or PSK2 with TKIP is the same as WPA.
• PSK or PSK2 with AES is the same as WPA2.
• PSK2, without an encryption method, is the same as WPA2.
Controlling Access to the Wireless LAN
• The concept of depth means having multiple solutions available.
• Implement this three-step approach:
1. SSID cloaking: Disable SSID broadcasts from access points
2. MAC address filtering: Permit or deny clients based on their
MAC address
3. WLAN security implementation: WPA or WPA2.
• Neither SSID cloaking nor MAC address filtering are considered
a valid means of securing a WLAN for the following reasons:
1. MAC addresses are easily spoofed.
2. SSIDs are easily discovered even they aren’t broadcasted.
Configuring the Wireless Access PointSetup
Configuring the Wireless Access Point
Management
Configuring Basic Wireless Settings
NetworkMode
Configuring Basic Wireless Settings
NetworkName(SSID)
Configuring Basic Wireless Settings
RadioBand
Configuring Basic Wireless Settings
WideChannel
Configuring Basic Wireless Settings
StandardChannel
Configuring Security
• "Personal“ means no AAA server is used.
• "Enterprise“ means a AAA server and EAP authentication is used.
Configuring Security
Configuring a wireless NIC
Scan for SSIDs
Selecting the Wireless
Security Protocol
WLAN Troubleshooting: Incorrect Channel Settings
WLAN Troubleshooting: Incorrect Channel Settings
WLAN Troubleshooting: Incorrect Channel Settings
WLAN Troubleshooting: Solving RF Interference
WLAN Troubleshooting: Solving RF Interference
WLAN Troubleshooting: Solving RF Interference
WLAN Troubleshooting: Access Point Misplacement
WLAN Troubleshooting: Access Point Misplacement
WLAN Troubleshooting: Access Point Misplacement
WLAN Troubleshooting: Authentication and Encryption
WLAN Troubleshooting: Authentication and Encryption
WLAN Troubleshooting: Authentication and Encryption
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

More Related Content

PPTX
Network Fundamentals: Ch5 - Network Layer
PPTX
Network Fundamentals: Ch9 - Ethernet
PPTX
LAN Switching and Wireless: Ch1 - LAN Design
PDF
Accessing the WAN: Ch4 - Network Security
PPTX
Network Fundamentals: Ch6 - Addressing the Network IP v4
PPTX
Cn fundamentals of networks
PPTX
Ethernet - Networking presentation
PPTX
Local Area Network – Wired LAN
Network Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch9 - Ethernet
LAN Switching and Wireless: Ch1 - LAN Design
Accessing the WAN: Ch4 - Network Security
Network Fundamentals: Ch6 - Addressing the Network IP v4
Cn fundamentals of networks
Ethernet - Networking presentation
Local Area Network – Wired LAN

What's hot (20)

PPTX
Ccna PPT
PPTX
01 coms 525 tcpip - networking concepts review
PPTX
Wireless LAN technologies
PPT
Networking Chapter 16
PPT
Wireless lan
PPT
Networking Chapter 14
PPTX
A presentation on networking and ccna
DOCX
Wireless lan
PDF
IEEE 802 Standards
PDF
WLAN AND IEEE STANDARDS
PPT
Troubleshooting Industrial Ethernet & TCP/IP Networks
PPTX
Wireless Local Area Networks
PDF
Telecommunications and Network Security Presentation
PPTX
Topic 2.1 network communication using osi model part1
PPTX
Ieee standards
PPTX
Topic 1.1 basic concepts of computer network
PPT
Chapter10
PPTX
Wireless Technologies and Standards
PPT
IEEE Standards
Ccna PPT
01 coms 525 tcpip - networking concepts review
Wireless LAN technologies
Networking Chapter 16
Wireless lan
Networking Chapter 14
A presentation on networking and ccna
Wireless lan
IEEE 802 Standards
WLAN AND IEEE STANDARDS
Troubleshooting Industrial Ethernet & TCP/IP Networks
Wireless Local Area Networks
Telecommunications and Network Security Presentation
Topic 2.1 network communication using osi model part1
Ieee standards
Topic 1.1 basic concepts of computer network
Chapter10
Wireless Technologies and Standards
IEEE Standards
Ad

Similar to LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration (20)

PPTX
Topic 4.0 wireless technology
PPTX
Recent Trends in Wireless communication
PPT
wifi-technology
PPTX
Wireless communication and networking
PPTX
Build Small Wireless LAN -CISCO ppt.pptx
PPTX
Wireless LAN Security
PPT
POLITEKNIK MALAYSIA
PPTX
Wireless Network security
PPTX
0 lecture 5 wp wireless protocol
PDF
Wireless networks & cellular wireless networks
PPTX
TOPIC 4 WIRELESS TECHNOLOGIES AND BASIC SECURITY (1).pptx
PPT
Wireless LAN security
PDF
Ceh v5 module 15 hacking wireless networks
PPTX
PPT
4g security presentation
PPTX
Wireless_Networks_Paragraph_Stkkkkkkkkkkkkkkkkkkkyle.pptx
PPTX
wireless networks for Lecture 02.pptx
PPTX
LECTURE-2 (UNIT 1) adhoc sensor wireless network
PPTX
Wireless_Networks_Paragraph_Style_Final.pptx
PDF
Adhoc & WSN-Unit-I-Ragavan
Topic 4.0 wireless technology
Recent Trends in Wireless communication
wifi-technology
Wireless communication and networking
Build Small Wireless LAN -CISCO ppt.pptx
Wireless LAN Security
POLITEKNIK MALAYSIA
Wireless Network security
0 lecture 5 wp wireless protocol
Wireless networks & cellular wireless networks
TOPIC 4 WIRELESS TECHNOLOGIES AND BASIC SECURITY (1).pptx
Wireless LAN security
Ceh v5 module 15 hacking wireless networks
4g security presentation
Wireless_Networks_Paragraph_Stkkkkkkkkkkkkkkkkkkkyle.pptx
wireless networks for Lecture 02.pptx
LECTURE-2 (UNIT 1) adhoc sensor wireless network
Wireless_Networks_Paragraph_Style_Final.pptx
Adhoc & WSN-Unit-I-Ragavan
Ad

More from Abdelkhalik Mosa (15)

PPTX
Towards a Cloud Native Big Data Platform using MiCADO
PDF
Virtual machine consolidation for cloud data centers using parameter based ad...
PPTX
Cloud computing and Cloud Enabling Technologies
PDF
Academic Poster Design, Review and Presentation
PPTX
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
PPTX
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
PPTX
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
PPTX
Routing Protocols and Concepts: Ch9 - EIGRP
PPTX
Network Fundamentals: Ch11 - Configuring and Testing your Network
PPTX
Network Fundamentals: Ch8 - Physical Layer
PPTX
Network Fundamentals: Ch7 - Data Link Layer
PPTX
Network Fundamentals: Ch4 - Transport Layer
PPTX
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
PPTX
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Towards a Cloud Native Big Data Platform using MiCADO
Virtual machine consolidation for cloud data centers using parameter based ad...
Cloud computing and Cloud Enabling Technologies
Academic Poster Design, Review and Presentation
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
Routing Protocols and Concepts: Ch9 - EIGRP
Network Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)

Recently uploaded (20)

PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Modernizing your data center with Dell and AMD
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Approach and Philosophy of On baking technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Modernizing your data center with Dell and AMD
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
Chapter 3 Spatial Domain Image Processing.pdf
cuic standard and advanced reporting.pdf
Spectral efficient network and resource selection model in 5G networks
Diabetes mellitus diagnosis method based random forest with bat algorithm
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Dropbox Q2 2025 Financial Results & Investor Presentation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Approach and Philosophy of On baking technology
Empathic Computing: Creating Shared Understanding
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration

  • 1. LAN Switching and Wireless
  • 2. If you found any mistake’s’ on these slides or if you have any other questions or comments, please feel free to contact me at: abdu.elsaid@gmail.com or abdu.elsaid@yahoo.com Linkedin : https://www.linkedin.com/in/AbdelkhalikMosa Twitter : https://twitter.com/AbdelkhalikMosa Facebook : https://www.facebook.com/Abdelkhalik.Mosa Thanks, Abdelkhalik Mosa Suez Canal University Faculty of Computers and Informatics - Ismailia - Egypt Note …
  • 3. Introduction • Wireless technologies use electromagnetic waves to carry information between devices. • WLANs use radio frequencies (RF) instead of cables at the Physical layer and MAC sub-layer of the Data Link layer.
  • 4. Wireless LAN Vs. Ethernet LAN
  • 5. Wireless PAN, LAN, MAN and WAN PAN : Personal Area Networks LAN : Local Area Networks WLAN : Wireless Local Area Networks MAN : Metropolitan Area Networks WAN : Wide Area Networks
  • 6. Introduction: Infrared • Infrared (IR) is relatively low energy and cannot penetrate through walls or other obstacles. • A specialized communication port known as an Infrared Direct Access (IrDA) port uses IR to exchange information between devices. • IR only allows a one-to-one type of connection. • IR is also used for remote control devices, wireless mice, and wireless keyboards. • IR generally used for short-range, line-of-sight, communications.
  • 7. Introduction: Radio Frequency (RF) • RF waves can penetrate through walls and other obstacles, allowing a much greater range than IR. • Certain areas of the RF bands have been set aside for use by unlicensed devices such as WLANs, and computer peripherals. – This includes the 900 MHz, 2.4 GHz, and the 5 GHz frequency ranges. These ranges are known as the ISM bands.
  • 8. Benefits of Wireless Technology
  • 10. Wireless LANs (WLANs) • 802.11 wireless LANs extend the 802.3 Ethernet LAN infrastructures to provide additional connectivity options.
  • 11. Wireless LAN Standards • The governmental agencies in countries, license some frequency bands, leaving some frequency bands unlicensed. • Licensed bands: – The most common are AM and FM radio, shortwave radio (for police department communications), and mobile phones. • Unlicensed frequencies: – Can be used by all kinds of devices; however, the devices must still conform to the rules set up by the regulatory agency. • A device using an unlicensed band must use power levels at or below a particular setting so as not to interfere too much with other devices sharing that unlicensed band.
  • 12. Wireless LAN Standards • OFDM have faster data rates than DSSS. • DSSS is simpler and less expensive to implement than OFDM.
  • 13. Wireless Fidelity (Wi-Fi) Certification • Wi-Fi Alliance, a global, nonprofit, industry trade association devoted to promoting the growth and acceptance of WLANs. • The Wi-Fi Alliance is an association of vendors whose objective is to improve the interoperability of products that are based on the 802.11 standard. • The Wi-Fi logo on a device means it meets standards and should interoperate with other devices of the same standard. • The three key organizations influencing WLAN standards are: ITU-R regulates allocation of RF bands. IEEE specifies how RF is modulated to carry info. Wi-Fi ensures that vendors make devices that are interoperable.
  • 14. Wireless Infrastructure Components: Wireless NIC Wireless NIC encodes a data stream onto an RF signal.
  • 15. Wireless Infrastructure Components: Wireless Access Points • An access point is a Layer 2 device that functions like a 802.3 Ethernet hub. • An access point connects wireless clients to the wired LAN. • Association is the process by which a client joins an 802.11 network. • RF signals attenuate as they move away from their point of origin, causing the Hidden node problem. • One means of resolving the hidden node problem is a CSMA/CA feature called request to send/clear to send (RTS/CTS).
  • 16. Wireless Infrastructure Components: Wireless Access Points • The hidden node problem
  • 17. Wireless Infrastructure Components: Wireless Routers • Wireless routers perform the role of access point, Ethernet switch, and router.
  • 18. Configurable Parameters for Wireless Endpoints Network Modes Channels SSID
  • 19. 802.11 Topologies: Ad Hoc (IBSS) Independent Basic Service Set (IBSS)
  • 20. 802.11 Topologies: BSS Basic Service Set (BSS)
  • 21. 802.11 Topologies: ESS Extended Basic Service Set (ESS)
  • 22. Client and Access Point Association: Beacons • Beacons: Frames used by the WLAN network to advertise its presence.
  • 23. Client and Access Point Association: Probes • Probes: Frames used by WLAN clients to find their networks.
  • 24. Client and Access Point Association: Authentication
  • 25. Client and Access Point Association: Association • Association: The process for establishing the data link between an access point and a WLAN client.
  • 26. Threats to Wireless Security: Unauthorized Access • Major categories of threats that lead to unauthorized access: 1. War Drivers: • Find open networks and use them to gain free internet access. 2. Hackers: • Exploit weak privacy measures to view sensitive WLAN information and even break into WLANs. 3. Employees: • Plug consumer-grade APIs/gateways into company Ethernet ports to create their own WLANs.
  • 27. Threats to Wireless Security: Man-in-the-Middle Attacks
  • 28. Threats to Wireless Security: Denial of Service
  • 29. Wireless Security Protocol Overview • Open Authentication: no authentication. • WEP authentication: was supposed to provide privacy to a link. Static, crackable, and not scalable. Cloaking SSIDs and filtering MAC addresses were used.
  • 30. Authenticating to the Wireless LAN
  • 31. Authenticating to the Wireless LAN • EAP is a framework for authenticating network access.
  • 32. Encryption – TKIP and AES • TKIP is the encryption method certified as WPA. It encrypts the Layer 2 payload. It carries out a message integrity check (MIC) in the encrypted packet which ensures against a message being tampered with. • AES is the encryption method certified as WPA2. • PSK or PSK2 with TKIP is the same as WPA. • PSK or PSK2 with AES is the same as WPA2. • PSK2, without an encryption method, is the same as WPA2.
  • 33. Controlling Access to the Wireless LAN • The concept of depth means having multiple solutions available. • Implement this three-step approach: 1. SSID cloaking: Disable SSID broadcasts from access points 2. MAC address filtering: Permit or deny clients based on their MAC address 3. WLAN security implementation: WPA or WPA2. • Neither SSID cloaking nor MAC address filtering are considered a valid means of securing a WLAN for the following reasons: 1. MAC addresses are easily spoofed. 2. SSIDs are easily discovered even they aren’t broadcasted.
  • 34. Configuring the Wireless Access PointSetup
  • 35. Configuring the Wireless Access Point Management
  • 36. Configuring Basic Wireless Settings NetworkMode
  • 37. Configuring Basic Wireless Settings NetworkName(SSID)
  • 38. Configuring Basic Wireless Settings RadioBand
  • 39. Configuring Basic Wireless Settings WideChannel
  • 40. Configuring Basic Wireless Settings StandardChannel
  • 41. Configuring Security • "Personal“ means no AAA server is used. • "Enterprise“ means a AAA server and EAP authentication is used.
  • 43. Configuring a wireless NIC Scan for SSIDs Selecting the Wireless Security Protocol
  • 47. WLAN Troubleshooting: Solving RF Interference
  • 48. WLAN Troubleshooting: Solving RF Interference
  • 49. WLAN Troubleshooting: Solving RF Interference
  • 50. WLAN Troubleshooting: Access Point Misplacement
  • 51. WLAN Troubleshooting: Access Point Misplacement
  • 52. WLAN Troubleshooting: Access Point Misplacement