Professional Documents
Culture Documents
Topic 4.0 Wireless Technology
Topic 4.0 Wireless Technology
NETWORK
TOPIC 4: WIRELESS
TECHNOLOGY
hafizah@jtmk.ptss.edu.my
Learning Outcomes
1. Understand wireless technologies.
2. Build wireless LANs.
3. Implement wireless LAN security.
4.1
UNDERSTAND WIRELESS
TECHNOLOGIES
Wireless Computer Networking
• Wireless technologies use electromagnetic
waves to carry information between devices.
Popular wireless
local area
networking (WLAN)
products conform to
the 802.11 "Wi-Fi"
standards
Advantages of WiFi
• Mobility – allows for easy connection of both
stationary and mobile clients
WWAN
WLAN
WPAN
WPAN, WLAN & WWAN
Example:
Sending
message
from H1 to
H2 thru
wireless
channel
CSMA/CA
Steps to sending message/data thru channel
by CSMA/CA:
• H1 must ask permission from the AP. Known as a
Request to Send (RTS)
• AP replied known as Clear to Send (CTS). If no one
use the channel.
• H1 sending Data to H2.
• When conversation is complete, H1 requested the
channel sends another message to the AP. Known
as Acknowledgement (ACK). ACK is to release the
channel, so someone else can use the channel.
4.3
IMPLEMENT WIRELESS
LAN SECURITY
WLAN Attacks
EAP software is installed on the client, the client communicates with a backend authentication server:
Remote Authentication Dial-in User Service (RADIUS)
Encryption on a WLAN
• Authentication and MAC filtering ONLY stop an
attacker from connecting to a wireless network.
• Encryption is the process of transforming data so
that even if it is intercepted it is unusable.
Encryption
1
2
Encryption on a WLAN (cont…)
• Types of Encryption: