You are on page 1of 50

Explaining Wireless

LAN Technology &


Standards

BCMSN Module 6 Lesson 3

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Objectives

 Identify the characteristics of the 802.11b standard.


 Identify the characteristics of the 802.11a standard.
 Identify the characteristics of the 802.11g standard.
 Compare and contrast the 802.11a/b/g standards.
 Describe common Wireless LAN security threats.
 Describe ways to mitigate common security threats.

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Unlicensed Frequency Bands

 ISM: Industry, Scientific, and  No exclusive use


Medical frequency band  Best effort
 No license required  Interference possible
BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Radio Frequency Transmission
 Radio frequencies are radiated into the air via an
antenna, creating radio waves.
 Radio waves are absorbed when they are propagated
through objects (e.g. walls).
 Radio waves are reflected by objects (e.g. metal
surfaces).
 This absorption and reflection can cause areas of low
signal strength or low signal quality.

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Radio Frequency Transmission
 Higher data rates have a shorter transmission range.
The receiver needs more signal strength and better SNR
to retrieve information.
 Higher transmit power results in greater distance.
 Higher frequencies allow higher data rates.
 Higher frequencies have a shorter transmission range.

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
WLAN Regulation and Standardization
 Regulatory agencies
FCC (United States)
ETSI (Europe)
 Standardization
IEEE 802.11
http://standards.ieee.org/getieee802/
 Certfication of equipment
Wi-Fi Alliance certifies
interoperability between products.
Certifications include 802.11a,
802.11b, 802.11g, dual-band
products, and security testing.
Certified products can be found at
http://www.wi-fi.org.
BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Standards and Implementation Process
Standards Group Industry Group Company

802.11 WiFi Cisco

The Nature of The Industry Cisco® Adds


Engineers and Bodies’ Role Differentiating
the “Design-by- Is Remove Features to the
Committee” Much of the “Minimal” Set
Environment “Bloat” Defined by
Mean the IEEE Introduced as Wi-Fi; in the
Often Defines “Features” Past, This Has
Overly Feature into the IEEE Included More
Rich Standards Standards, Security.
with Many Often by
Options People Not
Even Selling
Equipment
“Differentiated
“Feature Bloat” “Minimal Features” Features”

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
802.11b

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
802.11b Standard
 Standard was ratified in September 1999
 Operates in the 2.4-GHz band
 Specifies Direct Sequence Spread Spectrum (DSSS)
 Specifies four data rates up to 11 Mbps
1, 2, 5.5, 11 Mbps
 Provides specifications for vendor interoperability (over
the air)
 Defines basic security, encryption, and authentication for
the wireless link
 Is the most commonly deployed wireless LAN standard

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
2.4-GHz Channels
Channel Channel Center Channel Frequency Regulatory Domain
Identifier Frequency Range [MHz]
Americas Europe, Middle Japan
East, and Asia

1 2412 MHz 2401 – 2423 X X X


2 2417 MHz 2406 – 2428 X X X
3 2422 MHz 2411 – 2433 X X X
4 2427 MHz 2416 – 2438 X X X
5 2432 MHz 2421 – 2443 X X X
6 2437 MHz 2426 – 2448 X X X
7 2442 MHz 2431 – 2453 X X X
8 2447 MHz 2436 – 2458 X X X
9 2452 MHz 2441 – 2463 X X X
10 2457 MHz 2446 – 2468 X X X
11 2462 MHz 2451 – 2473 X X X
12 2467 MHz 2466 – 2478 X X
13 2472 MHz 2471 – 2483 X X
14 2484 MHz 2473 – 2495 X

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
2.4-GHz Channel Use

 Each channel is 22 MHz wide.


 North America: 11 channels
 Europe: 13 channels
 There are three nonoverlapping channels: 1, 6, 11.
 Using any other channels will cause interference.
 Three access points can occupy the same area.
BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
802.11b/g (2.4 GHz) Channel Reuse

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
802.11b Access Point Coverage

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
802.11a

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
802.11a Standard
 Standard was ratified September 1999
 Operates in the 5-GHz band
 Uses orthogonal frequency-division multiplexing (OFDM)
 Uses eight data rates of up to 54 Mbps
6, 9, 12, 18, 24, 36, 48, 54 Mbps
 Has from 12 to 23 nonoverlapping channels (FCC)
 Has up to 19 nonoverlapping channels (ETSI)
 Regulations different across countries
Transmit (Tx) power control and dynamic frequency
selection required (802.11h)

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Understanding the 5 GHz Spectrum
5 GHz 5.15 5.25 5.35 5.470 5.725 5.825
UNII Band
4 Ch 4 Ch 11 Ch 4 Ch

UNII-1 UNII-2 UNII-3


US (FCC) To Be Defined
17dBm 24dBm 30dBm

Europe 23dBm 30dBm

UNII-1: Indoor Use, Antenna Must Be Fixed to the Radio


UNII-2: Indoor/Outdoor Use, Fixed or Remote Antenna
(Must Implement 802.11h After Jul 19, 2007)
UNII-3: Indoor/Outdoor; Fixed, Pt-to-Pt Can Employ Higher Gain Antenna
Europe: Must Implement 802.11h

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
IEEE 802.11h
Spectrum Management
 Primary use of 5 GHz bands outdoors is radar in many
countries.
 802.11h is an addition to the 802.11 family of standards.
 802.11h rules are designed to minimize interference.
 Uses Dynamic Frequency Selection (DFS) and Transmit
Power Control (TPC).
 Radios must comply to benefit from 11 new channels.

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
802.11a Channel Reuse
 802.11h DFS not available
Manual channel assignment
required
 802.11h DFS implemented
Channel assignment done by
Dynamic Frequency
Selection (DFS)
Only frequency bands can be
selected

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
802.11g

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
802.11g Standard
 Standard was ratified June 2003
 Operates in the 2.4-GHz band as 802.11b
Same three nonoverlapping channels: 1, 6,
11
 DSSS (CCK) and OFDM transmission
 12 data rates of up to 54 Mbps
1, 2, 5.5, 11 Mbps (DSSS / 802.11b)
6, 9, 12, 18, 24, 36, 48, 54 Mbps (OFDM)
 Full backward compatiblity to 802.11b
standard

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
802.11g Protection Mechanism
Problem: 802.11b stations cannot decode 802.11g radio signals.

 802.11b/g AP communicates with


802.11b clients with max. 11 Mbps.
 802.11b/g AP communicates with
802.11g clients with max. 54 Mbps.
 802.11b/g AP activates RTS/CTS to
avoid collisions when 802.11b clients
are present.
 Additonal overhead reduces
throughput.

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Self Check

1. What are the 3 non-overlapping channels available in


802.11b/g?
2. Which standards operate in the 2.4-GHz band?
3. What frequency band does 802.11a operate in?
4. Which standards offer data rates of up to 54Mbps?
5. What is data rate shifting?

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
802.11
Standards
Comparison

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
802.11 RF Comparison
802.11b – 2.4 GHz 802.11g – 2.4 GHz 802.11a – 5 GHz
 Most commonly  Higher throughput  Highest throughput
Pro

deployed WLAN
standard  OFDM technology  OFDM technology
reduces multipath reduces multipath
issues issues
 Provides up to 23
nonoverlapping
channels
 Interference and noise  Interference and noise  Lower market
Con

from other services in from other services in penetration


the 2.4-GHz band the 2.4GHz band
 Only 3 nonoverlapping  Only 3 nonoverlapping
channels channels
 Distance limited by  Throughput degraded in
multipath issues the presence of 802.11b
clients

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
802.11 Standards Comparison
802.11b 802.11g 802.11a

Ratified 1999 2003 1999

Frequency band 2.4 GHz 2.4 GHz 5 GHz

No of non- 3 3 Up to 23
overlapping
channels
Transmission DSSS DSSS OFDM OFDM

Data rates [Mbps] 1, 2, 5.5, 11 1, 2, 5.5, 11 6, 9, 12, 18, 24, 6, 9, 12, 18, 24,
36, 48, 54 36, 48, 54

Throughput Up to 6 Up to 22 Up to 28
[Mbps]

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
WLAN Industry Standards
Network Radio Speeds
IEEE 802.11n
Multichannel
Greater Than 100 Mbps
IEEE 802.11g
2.4 GHz—OFDM
Up to 54 Mbps
IEEE 802.11a
5 GHz—OFDM
Up to 54 Mbps
IEEE 802.11b
2.4 GHz—DS
Up to 11 Mbps
 IEEE 802.11a/b
Proprietary
Ratified

1999 2000 2001 2002 2003 2004 2005 2006 2007

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Range Comparisons

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Ratified IEEE 802.11 Standards
 802.11: WLAN 1 and 2 Mbps at 2.4 GHz
 802.11a: WLAN 54-Mbps at 5 GHz
 802.11b: WLAN 11-Mbps at 2.4 GHz
 802.11d: Multiple regulatory domains
 802.11e: Quality of Service
 802.11f: Inter-Access Point Protocol (IAPP)
 802.11g: WLAN 54-Mbps at 2.4 GHz
 802.11h: Dynamic Frequency Selection (DFS)
Transmit Power Control (TPC) at 5 GHz
 802.11i: Security
 802.11j: 5-GHz channels for Japan
BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Worldwide Availability

http://www.cisco.com/go/aironet/compliance

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
General Office Wireless LAN Design
 Eight 802.11g access
points deployed 54 Cubes—4 Conference Rooms
 7 users per access Conference
Room
Conference
Room
points with no
conference rooms
provides 3.8 Mbps
120
throughput per user Feet

 7 users + 1 conference
room (10 users) = 17
total users, provides Conference
Room
Reception Conference
Room
1.5 Mbps throughput
per user 95 Feet

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Activity

Data rate shifting.


 Use a laptop to associate to an access point in your area.
It is important that you know the physical location of this
AP.
 Open the wireless management utility to determine the
current data rate for your connection.
 Move the laptop to an area geographically farther away
from the AP. You might also try moving to a room behind
a thick wall.
 Did your data rate change? What about signal quality?

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Self Check

1. What technology is 802.11n based on?


2. What is the 802.11e standard?
3. What wireless standard has the highest throughput,
providing up to 28 Mbps throughput?

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
WLAN Security

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Why WLAN Security?
 Wide availability and low cost of
IEEE 802.11 wireless equipment
 802.11 standard ease of use and
deployment
 Availability of sniffers
 Statistics on WLAN security
 Media hype about
hot spots, WLAN hacking,
war driving
 Nonoptimal implementation of
encryption in standard Wired
Equivalent Privacy (WEP)
encryption
 Authentication vulnerability
BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Wireless LAN Security Threats

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
WLAN Sniffing and SSID Broadcasting

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Mitigating the Threats
Control and Integrity Privacy and Protection and
Confidentiality Availability

Authentication Encryption Intrusion Detection


System (IDS)

Ensure that legitimate Protect data as it is Track and mitigate


clients associate with transmitted and unauthorized
trusted APs. received. access and
network attacks.

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Evolution of Wireless LAN Security
Initial Interim Interim Present
(1997) (2001) (2003)

Encryption 802.1x EAP Wi-Fi Protected Wireless IDS


(WEP) Access (WPA)
No strong Dynamic keys Standardized Identification
authentication and protection
Improved Improved against
Static, encryption encryption attacks, DoS
breakable keys
User Strong, user IEEE 802.11i
Not scalable authentication authentication
(e.g., LEAP, WPA2 (2004)
802.1x EAP PEAP, EAP-
(LEAP, PEAP) FAST)
AES strong
RADIUS encryption
Authentication
Dynamic key
management
BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Wireless Client Association
1. Access points send out beacons
announcing SSID, data rates and other
information.
2. Client scans all channels.
3. Client listens for beacons and
responses from access points.
4. Client associates to access point with
strongest signal.
5. Client will repeat scan if signal becomes
low to reassociate to another access
point (roaming).
6. During association SSID, MAC address
and security settings are sent from the
client to the AP and checked by the AP.

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
WPA and WPA2 Authentication

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
WPA and WPA2 Encryption

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Wi-Fi Protected Access
 What are WPA and WPA2? Gold
Authentication and encryption WPA2/802.11i
standards for Wi-Fi clients and • EAP-Fast
APs • AES
802.1x authentication
WPA uses TKIP encryption Silver
WPA
WPA2 uses AES block cipher • EAP-Fast
encryption • TKIP
 Which should I use?
Gold, for supporting NIC/OSs
Lead
Dynamic WEP
Silver, if you have legacy clients • EAP-Fast/LEAP
Lead, if you absolutely have no • VLANs + ACLs
other choice.

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
WLAN Security Summary
Enhanced Security
Basic Security 802.1x, TKIP Encryption,
Open Access 40-bit or 128-bit Static Mutual Authentication,
No Encryption, WEP Encryption, WPA Scalable Key Mgmt., Etc.
Basic Authentication

Public “Hotspots” Home Use Enterprise

Virtual
Business
Private
Remote Access Traveler,
Network
Telecommuter
(VPN)

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Security Evaluation
 Evaluate effectiveness of encrypted WLAN statistics.
 Focus on proper planning and
implementation.
 Estimate potential security threats
and the level of security needed.
 Evaluate amount of WLAN traffic
being sent when selecting security methods.
 Evaluate tools and options applicable
to WLAN design.

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Activity
Packet sniffing programs have become more user friendly in recent
years. NetStumbler is one of the easiest packet sniffers to use.
 Read this short Wikipedia article about NetStumbler and decide for
yourself if you want to download it and explore your wireless
network. http://en.wikipedia.org/wiki/NetStumbler

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Self Check

1. Describe some common threats to WLANs.


2. Where would “open security” be appropriate?
3. What are 2 types of encryption used by WPA or WPA2?
4. What is an IDS and what security features are enabled
by IDS?

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Summary
 The 2.4-GHz and 5-GHz frequency bands are used by
WLAN 802.11 standards.
 The throughput per user depends on the data rate and
the number of users per wireless cell.
 802.11b has data rates of up to 11 Mbps at 2.4 GHz.
 802.11a has data rates of up to 54 Mbps at 5 GHz.
 802.11g has data rates of up to 54 Mbps at 2.4 GHz.
 802.11a has a shorter range than 802.11g.
 For maximum efficiency, limit the number of users per
cell.
 Different WLAN security types with authentication and
encryption satisfy the security requirements of enterprise
and home users.
BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Resources

 For fee 802 standards


http://standards.ieee.org (for fee)
 Free 802 standards
http://standards.ieee.org/getieee802/ (Standards are
available six months after release for free)
 LWAPP
http://www.ietf.org/html.charters/capwap-charter.html
 Mobile Ad-Hoc Networks (MANET)
http://www.ietf.org/html.charters/manet-charter.html
 Wireless LAN Compatibility Association
http://www.wi-fi.org

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Q and A

BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
BCMSN 6 – 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50

You might also like