Wireless Networking

Presented by:

Jeffrey D. Bombell, American Computer Technologies

Agenda
Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable Technologies Q&A

Introduction to Wireless /802.11b

What is Wi-Fi
Wi-Fi is an abbreviation for Wireless Fidelity and a catch all phrase for the several different standards and recommendations that comprise wireless networking. Wi-Fi enables the user to deploy a computer network without needing to run cable throughout the facility.

b –2.4GHz – 11Mbps International standard for wireless networking that operates in the 2. This is a very commonly used frequency.4835 GHz) and provides a throughput of up to 11 Mbps with a range of just over 300 feet indoors.11. all work within the 2. Microwave ovens. . medical and scientific equipment.4 GHz to 2.Introduction to Wireless /802.4 GHz frequency band. cordless phones. as well as Bluetooth devices.4 GHz frequency range (2.11b Standards IEEE 802.

In comparison T1 speeds are 1.Introduction to Wireless /802. 802.54Mbps and DSL is normally in the 640Kbps range.11b .11.11b is the most common wireless standard deployed today.4GHz – 11Mbps 802.11b Standards IEEE 802.b –2.11b enables transfers of up to 11 Mbps. Most deployments of Wireless utilize 802. Comparable to 10BaseT in speeds.

725 GHz to 5.a –5GHz – 11Mbps International standard for wireless networking that operates in the 5 GHz frequency range (5.11a specification offers more radio channels than the 802.850 GHz) with a maximum 54 Mbps data transfer rate.11b.11b and current deployment is limited. because the 802.Introduction to Wireless /802. . Cost of 802. The 5 GHz frequency band is not as crowded as the 2. These additional channels can help avoid radio and microwave interference.11a equipment is approximately twice that of 802.4 GHz frequency.11.11b Standards IEEE 802.

.11.4GHz – 11Mbps IEEE 802. The current draft (V5.b –2. 2003.4Ghz – Hybrid 11/54Mbps 802.Introduction to Wireless /802.11g – 2.a – 5GHz – 54 Mbps IEEE 802.11b Standards IEEE 802.11.11g is in the final stages of development.0) is open for comments until January 8.

.Introduction to Wireless /802.11b Limitations 300 ft. effective range from access point  1400 ft maximum range Structural interference Interference from other devices such as cordless phones.

Wired Equivalent Privacy 40 bit vs.Introduction to Wireless /802.11b Security Overview WEP . 128 bit Is Encryption Necessary? Open access vs. Secured Other Security Measures Content Filtering Network Partitioning .

11b Applications Any application currently used on a traditional wired network can be used on a wireless network. . New applications may be available or can be developed to take advantage of wireless.Introduction to Wireless /802. such as Wireless PDA access to a card catalog.

Agenda Introduction to Wireless Technologies Wireless Networking Overview .

Wireless Networking Overview Wireless Network Components Access Points NICs – Network Interface Cards     PCMCIA USB PCI CompactFlash Other Wireless Devices   Bridges and Routers Print Servers PCs. PDAs . Laptops.

.Wireless Networking Overview Connecting To a Legacy Network Access Points connect the wireless network to the legacy network.

etc. .Wireless Networking Overview Security  (Encryption. A private network for day to day business and a network for public access. Privacy. Content Filtering. These networks can talk to one another through a proxy server that will protect the private network from malicious attacks via the public network. Both can be wireless.) Partition The Network A safe practice is to create two separate networks.

Encryption keys would have to be changed regularly and anyone using their own laptop would have to be given the key.) Encryption Encryption on the pubic network can be used but would create administrative overhead. but can be thwarted. Content Filtering. .Wireless Networking Overview Security (Encryption. Encryption increases privacy. Privacy. etc. or by gaining access to a PC configured with wireless and writing down the key. Encryption works best in a network that does not allow people to use their own laptops. either by software.

. This is a good practice anyway. Proxy servers allow you to control what information people have access to. It also allows you to track usage.) Content Filtering & Proxy Servers Web content filtering that has generally been software on the desktop would have to be handled by a server if people are allowed to use their own laptops. Content Filtering. allowing you to control at a global level what information travels over your network. etc.Wireless Networking Overview Security (Encryption. Privacy.

Wireless does not increase that chance. Privacy. anywhere can attack a network that is connected to the Internet. etc. Anyone.) Viruses and Hacker Wireless does not add any additional threat in the way of viruses.  .Wireless Networking Overview Security  (Encryption. can reduce the risk. Content Filtering. Security measures such as firewalls.

Concrete.   Steel. Stone.4 GHz cordless phone? Does it work throughout your environment? Current technologies used  .Wireless Networking Overview Environment Assessment Look at the structure of your building. Glass Open w/ few walls or many separate rooms? Do you use a 2.

Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations .

. Can not run wire to locations needed. To be on the leading edge. therefore reducing the cost of owning many PCs. To enable patrons to bring their own laptop. To enable you to easily move PCs.Non-Technical Considerations Why Deploy Wireless? Cost savings over wireline.

. 802.11b Wireless Access Points start around $130.11b Network Interface Cards (NICs) cost between $50-$100 and come in USB.00 for basic connectivity and run up to $500. PCI.00 for more management features.Non-Technical Considerations Cost 802. PCMCIA and CompactFlash versions.

4GHz Low Cost 802.11.11b .b 11 Mbps @2.Available late 2003 Compatible with 802.g New technology .Non-Technical Considerations The A-B-Gs of Wireless 54 Mbps @ 5MHz Not widely adopted Which standard is right for you? 802.a 802.11.11.

It should include: What are your special security needs? What known vulnerabilities exist? How to safe guard against the risks? How do you recover from a security breech? .Non-Technical Considerations Security Planning Develop a Security Plan.

Non-Technical Considerations Virtual Hours Your wireless network may not stop at your door. This means anyone can access your network after hours by sitting outside with a laptop. .

Choose a standard. . Assess the environment.Non-Technical Considerations Where to Start Evaluate the need. Assess current security and future needs. Ask for help.

Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable Technologies .

wireline is what you. If it serves some. but not all of your needs.Other Comparable Technologies Wireline If you have a network installed today. Does it satisfy your needs? There is not reason to abandon your current infrastructure for wireless if wireline currently serves all your needs. . Wireless may be a good supplement.

0 runs at 10Mbps over a standard phone line.Other Comparable Technologies HPNA HPNA is Phone Line Networking.0 is coming soon and delivers 100Mbps. If you currently have a lot of phone lines running through your facility this may be an option to consider. HPNA allows you to transmit data over normal phone lines at the same time you use that phone for voice calls and DSL. V3. HPNA v2. .

. Bluetooth is normally used for transferring data between laptops. It allows high speed transmission of data over very short distances.15 Bluetooth is the standard for wireless personal area networks or WPAN. or in Internet Kiosk type applications where roaming is not needed.Other Comparable Technologies Bluetooth – 802.

Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable Technologies Q&A .

Sign up to vote on this title
UsefulNot useful