Professional Documents
Culture Documents
Configure A Wireless Router: LAN Switching and Wireless - Chapter 7
Configure A Wireless Router: LAN Switching and Wireless - Chapter 7
ITE I Chapter 6
Cisco Public
Objectives
Describe the components and operations of basic wireless LAN topologies. Describe the components and operations of basic wireless LAN security. Configure and verify basic wireless LAN access. Configure and troubleshoot wireless client access.
ITE 1 Chapter 6
Cisco Public
ITE 1 Chapter 6
Cisco Public
Wireless vs Ethernet
ITE 1 Chapter 6
Cisco Public
More on CSMA/CA
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)
The wireless 802.11 standard uses CSMA/CA or "collision avoidance." The method is used because the wireless stations have no way to detect collisions WHILE sending. Attempts to avoid collisions rather than detect them
How it works:
Transmitting device listens to the network (senses the carrier) and waits for it to be free Device then waits a random period of time and transmits. If the receiver gets the frame intact, it sends back an ACK to the sender. If no ACK is received, the message is re-transmitted. If the channel is not clear, the node waits for a randomly chosen period of time (backoff factor), and then checks again to see if the channel is clear.
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public
ITE 1 Chapter 6
Cisco Public
ITE 1 Chapter 6
Cisco Public
ITE 1 Chapter 6
Cisco Public
10
Access Points An access point (AP) is a WLAN device that can act as the center point of a stand-alone wireless network. An AP can also be used as the connection point between wireless and wired networks. In large installations, the roaming functionality provided by multiple APs allows wireless users to move freely throughout the facility, while maintaining seamless, uninterrupted access to the network.
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public
11
ITE 1 Chapter 6
Cisco Public
12
ITE 1 Chapter 6
Cisco Public
13
ITE 1 Chapter 6
Cisco Public
14
ITE 1 Chapter 6
Cisco Public
15
Channel Setup
ITE 1 Chapter 6
Cisco Public
16
ITE 1 Chapter 6
Cisco Public
17
Rate Shifting
ITE 1 Chapter 6
Cisco Public
18
ITE 1 Chapter 6
Cisco Public
20
ITE 1 Chapter 6
Cisco Public
21
802.11b
ITE 1 Chapter 6
Cisco Public
22
802.11b Standard
Standard was ratified in September 1999 Operates in the 2.4-GHz band Specifies Direct Sequence Spread Spectrum (DSSS) Specifies four data rates up to 11 Mbps 1, 2, 5.5, 11 Mbps Provides specifications for vendor interoperability (over the air) Defines basic security, encryption, and authentication for the wireless link Is the most commonly deployed wireless LAN standard
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public
23
2.4-GHz Channels
Channel Channel Center Channel Frequency Identifier Frequency Range [MHz] Regulatory Domain Americas Europe, Middle East, and Asia X X X X X X X X X X X X X Japan
1 2 3 4 5 6 7 8 9 10 11 12 13
ITE 1 Chapter 6
2412 MHz 2417 MHz 2422 MHz 2427 MHz 2432 MHz 2437 MHz 2442 MHz 2447 MHz 2452 MHz 2457 MHz 2462 MHz 2467 MHz 2472 MHz
2401 2423 2406 2428 2411 2433 2416 2438 2421 2443 2426 2448 2431 2453 2436 2458 2441 2463 2446 2468 2451 2473 2466 2478 2471 2483 2473 2495 Cisco Public
X X X X X X X X X X X
X X X X X X X X X X X X X X
24
Each channel is 22 MHz wide. North America: 11 channels Europe: 13 channels There are three nonoverlapping channels: 1, 6, 11. Using any other channels will cause interference. Three access points can occupy the same area.
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public
25
ITE 1 Chapter 6
Cisco Public
26
ITE 1 Chapter 6
Cisco Public
27
802.11a
ITE 1 Chapter 6
Cisco Public
28
802.11a Standard
Standard was ratified September 1999 Operates in the 5-GHz band Uses orthogonal frequency-division multiplexing (OFDM) Uses eight data rates of up to 54 Mbps 6, 9, 12, 18, 24, 36, 48, 54 Mbps Has from 12 to 23 nonoverlapping channels (FCC) Has up to 19 nonoverlapping channels (ETSI) Regulations different across countries Transmit (Tx) power control and dynamic frequency selection required (802.11h)
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public
29
ITE 1 Chapter 6
Cisco Public
30
ITE 1 Chapter 6
Cisco Public
31
802.11g
ITE 1 Chapter 6
Cisco Public
32
802.11g Standard
Standard was ratified June 2003 Operates in the 2.4-GHz band as 802.11b Same three nonoverlapping channels: 1, 6, 11 DSSS (CCK) and OFDM transmission 12 data rates of up to 54 Mbps 1, 2, 5.5, 11 Mbps (DSSS / 802.11b) 6, 9, 12, 18, 24, 36, 48, 54 Mbps (OFDM)
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public
33
ITE 1 Chapter 6
Cisco Public
34
Self Check
1. What are the 3 non-overlapping channels available in 802.11b/g? 2. Which standards operate in the 2.4-GHz band? 3. What frequency band does 802.11a operate in? 4. Which standards offer data rates of up to 54Mbps? 5. What is data rate shifting?
ITE 1 Chapter 6
Cisco Public
35
ITE 1 Chapter 6
Cisco Public
36
802.11 RF Comparison
802.11b 2.4 GHz
Most commonly deployed WLAN standard
802.11a 5 GHz
Highest throughput OFDM technology reduces multipath issues Provides up to 23 nonoverlapping channels
ITE 1 Chapter 6
Pro Con
Interference and noise Lower market from other services in penetration the 2.4GHz band
Only 3 nonoverlapping Only 3 nonoverlapping channels channels Distance limited by multipath issues Throughput degraded in the presence of 802.11b clients
Cisco Public
37
DSSS
DSSS
OFDM
OFDM
1, 2, 5.5, 11 1, 2, 5.5, 11 6, 9, 12, 18, 24, 6, 9, 12, 18, 24, 36, 48, 54 36, 48, 54 Up to 6 Up to 22 Up to 28
38
ITE 1 Chapter 6
Cisco Public
39
ITE 1 Chapter 6
Cisco Public
40
Public Hotspots
Remote Access
ITE 1 Chapter 6
Cisco Public
41
WEP
WEP is a key. WEP scrambles communications between AP and client. AP and client must use same WEP keys. WEP keys encrypt unicast and multicast. WEP is easily attacked
ITE 1 Chapter 6
Cisco Public
42
WPA
43
ITE 1 Chapter 6
Cisco Public
44
Extensible Authentication Protocol (802.1x authentication) Provides dynamic WEP keys to user devices. Dynamic is more secure, since it changes. Harder for intruders to hackby the time they have performed the calculation to learn the key, they key has changed!
EAP
ITE 1 Chapter 6
Cisco Public
45
Wireless Encryption
Two primary functions: It encrypts the Layer 2 payload It carries out a message integrity check (MIC) in the encrypted packet. This helps ensure against a message being tampered with.
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public
46
ITE 1 Chapter 6
Cisco Public
47
ITE 1 Chapter 6
Cisco Public
48
ITE 1 Chapter 6
Cisco Public
49
50
ITE 1 Chapter 6
Cisco Public
51
ITE 1 Chapter 6
Cisco Public
52
ITE 1 Chapter 6
Cisco Public
53
Authentication problems
ITE 1 Chapter 6
Cisco Public
54
Summary
Wireless LANs use standards such as IEEE 802.11a IEEE 802.11b IEEE 802.11g IEEE 802.11n Basic Service set
Mobile clients use a single access point for connectivity
ITE 1 Chapter 6
Cisco Public
55
Summary
WLAN security practices/methods include
MAC address filtering SSID making Implementing WPA2
ITE 1 Chapter 6
Cisco Public
56
Resources
For fee 802 standards http://standards.ieee.org (for fee) Free 802 standards http://standards.ieee.org/getieee802/ (Standards are available six months after release for free) LWAPP http://www.ietf.org/html.charters/capwap-charter.html Mobile Ad-Hoc Networks (MANET) http://www.ietf.org/html.charters/manet-charter.html Wireless LAN Compatibility Association http://www.wi-fi.org
ITE 1 Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public
57
ITE 1 Chapter 6
Cisco Public
58