SlideShare a Scribd company logo
Tutorial 7 Wireless Networking and Security
Objectives Explore the history of wireless communication Learn about Wi-Fi and wireless mesh networks Investigate technologies used in personal area networks Learn about wireless wide area networks and WiMAX Investigate wireless devices and wireless business plans that let you access the Internet New Perspectives on The Internet, Seventh Edition
Objectives Investigate security concerns of wireless networks Evaluate different wireless encryption methods Investigate security concerns of wireless devices Learn how to protect the data stored on a wireless device Learn about the different types of attacks on wireless devices Learn about the different types of attacks on Bluetooth devices New Perspectives on The Internet, Seventh Edition
Evolution of Wireless Networks When you connect to your Internet service provider, you’re creating a  wired connection A  wireless   connection  occurs when data is transferred to another location without the use of any wires In 1994, carriers created digital networks, or  Personal   Communication   Service   (PCS ), where data was carried in bits at a rate of up to 144 Kbps New Perspectives on The Internet, Seventh Edition
Evolution of Wireless Networks 1999 saw the introduction of the first  “wireless”  connections to the Internet Personal   digital   assistant   (PDA):  handheld computer that can send and receive wireless telephone and fax calls, act as a personal organizer, perform calculations, store notes, and download Web pages formatted for handheld devices The  wireless   Internet  has expanded to include different hardware devices, networks, and other options  New Perspectives on The Internet, Seventh Edition
Evolution of Wireless Networks Cell phones were one of the first wireless connections to transfer a person’s voice  Text messaging occurs over  second-generation   wireless   systems , or  2G   wireless Short   Message   Service   (SMS)  lets you send text messages of up to 160 characters over a 2G wireless network to a wireless phone New Perspectives on The Internet, Seventh Edition
Evolution of Wireless Networks Some handheld computers use Infrared technology to “beam” information from one source to another without the use of wired connections Over 60 major US markets have new  3G   wireless   systems   (third-generation wireless)  in places. Some European countries are building and licensing 3G wireless systems 3G   wireless   systems  offer data transfer rates of up to 2 Mbps and constant connections Bandwidth and cost are two obstacles for getting 3G wireless systems going in the United States New Perspectives on The Internet, Seventh Edition
Evolution of Wireless Networks The conversion from  2G  to  3G  wireless requires the carriers to invest in technology to make the change Many carriers have transformed and upgraded their existing networks by creating  25G  wireless systems There isn’t a single network standard  A wireless device is usually manufactured to work only on a  single  type of network, because different networks use different frequencies in the radio spectrum  If you choose a wireless carrier with a 25G network, for example, you will not be able to receive a signal in an area with only a 2G or a 3G network because your device operates on a different frequency New Perspectives on The Internet, Seventh Edition
Evolution of Wireless Networks 35G wireless networks  use a new network protocol called Universal Mobile Telephone Service (UMTS), which is an extension of the existing 3G network, to provide network connections of up to 10 Mbps Fourth-generation wireless networks  ( 4G wireless ) Also called  3G wireless and beyond networks 4G technology is expected to bring network connection speeds of up to 100 Mbps and deliver high quality audio and video to connected devices New Perspectives on The Internet, Seventh Edition
Wireless Local Area Networking Wireless fidelity  ( Wi-Fi ):  trademarked name of the Wi-Fi Alliance (WFA) that specifies the interface between a wireless client and a base station or between two wireless clients Wireless local area network (WLAN): network in which devices use high frequency radio waves instead of wires to communicate Wi-Fi operates in the 24 GHz radio spectrum, which is the same spectrum used by cordless phones, garage door openers, microwave ovens, and other devices Because this spectrum is unlicensed, it is free  3G wireless spectrum needs to be licensed New Perspectives on The Internet, Seventh Edition
Wireless Local Area Networking New Perspectives on The Internet, Seventh Edition
Wireless Local Area Networking Three of the most widely used standards for WLANs are 802.11a, 802.11b, 802.11g, and 802.11n Transfer rate:  speed at which data is transmitted from an access point (or base station) to the wireless device Access   point:  hardware device with one or more antennae that permits communication between wired and wireless networks so wireless clients can send and receive data Range:  physical distance between the access point and the wireless device New Perspectives on The Internet, Seventh Edition
Wireless Local Area Networking Wi-Fi usually refers to the 802.11b standard which is the specification on which most Wi-Fi devices operate Dual   band access   point:  makes it possible to connect devices configured for two different Wi-Fi standards to the same access point Multiple band access point:  makes it possible to connect any wireless device to the same access point Wi-Fi is often used as an alternative in an office building or other area in which you might find a traditional wired local area network. It can be used where wiring cannot be installed New Perspectives on The Internet, Seventh Edition
Wireless Local Area Networking Notebook computers and other wireless devices must have Wi-Fi compatible hardware installed in them to send and receive data with the network Once you have a network interface card or other Wi-Fi compatible device, you can connect to the WLAN via that device, provided that it is physically within the area covered by the network If you position enough access points within the appropriate range of each other, the WLAN can grow to cover an entire office complex or geographic area New Perspectives on The Internet, Seventh Edition
Wireless Mesh Networks Wireless mesh network:  commonly used to extend the reach of Wi-Fi hotspots to an enterprise, such as a university campus, hotel, airport terminal, convention center, sports arena, or a large office building A wireless mesh network is a series of wireless nodes More effective and efficient at covering large areas with wireless connections because each node is wirelessly connected to the network New Perspectives on The Internet, Seventh Edition
Wireless Mesh Networks New Perspectives on The Internet, Seventh Edition
Personal Area Networking Personal area networking : refers to the wireless network that you use to connect personal devices to each other  There are two major types of personal area networks:  Infrared Bluetooth New Perspectives on The Internet, Seventh Edition
Infrared Technology Infrared Data Association  ( IrDA ): group dedicated to developing low-cost, high-speed wireless connectivity solutions Using  infrared  technology, you can wirelessly beam information from one device to another compatible device using Infrared light waves This technology is used with PDAs, notebook computers, printers, phones, and other peripheral devices A disadvantage is the lack of software products that can handle the transfer The devices and the software that runs them must be compatible with each other New Perspectives on The Internet, Seventh Edition
Bluetooth Bluetooth : technology that provides short-range radio links between personal computers, handheld devices, wireless phones, headsets, printers, and other electronic devices For devices without chipsets that enable them to receive Bluetooth radio waves, you can purchase an adapter to enable use with other Bluetooth devices Bluetooth doesn’t need an access point for communication; devices communicate with each other automatically  Bluetooth isn’t really “owned” by any specific manufacturer or group New Perspectives on The Internet, Seventh Edition
Bluetooth New Perspectives on The Internet, Seventh Edition
Bluetooth Using Bluetooth technology, you can synchronize and share data between as many as eight Bluetooth compatible devices within the specified range at a rate of up to 3 Mbps A collection of devices connected via Bluetooth technology is called a  piconet.   A piconet can connect two to eight devices at a time You can use Bluetooth-enabled devices to transfer files, listen to music playing on a computer through a headset, print documents, or connect your notebook computer to the Internet using a wireless phone that is in your desk drawer or briefcase New Perspectives on The Internet, Seventh Edition
Comparing Wi-Fi Standards  with Bluetooth New Perspectives on The Internet, Seventh Edition
Wireless Wide Area Networking Wireless device connections let you access the Internet on a PDA, wireless phone, or notebook computer from anywhere in the world without a wired connection WLAN provides a wireless connection to a network, but devices must be within the stated boundary of the WLAN In 25G and 3G wireless systems,  wireless wide area networking  ( WWAN ) makes it possible to access the Internet from anywhere within the boundaries of the wireless network to which you are connected New Perspectives on The Internet, Seventh Edition
Metropolitan Area Networking: WiMAX WiMAX  ( Worldwide Interoperability for Microwave Access ): uses 802.16 wireless network standard being developed for use in metropolitan areas Metropolitan area network  ( MAN ): provides wireless broadband Internet access via radio signals in the 2 to 11 GHz and 10 to 66 GHz radio spectrum, with a range of up to 31 miles and speeds of up to 70 Mbps When multiple WiMAX towers are connected to each other, WiMAX has the potential to solve some of the geographical and speed limitations of wired networks and other wireless networks, including Wi-Fi New Perspectives on The Internet, Seventh Edition
Metropolitan Area Networking: WiMAX WiMAX provides broadband Internet connections at the same speed as DSL and cable, through wireless radio connections WiMAX works by connecting a WiMAX tower to an ISP that provides the Internet service The WiMAX towers are connected to each other via radio signals  WiMAX transmitters send the signal to homes and businesses that have WiMAX receivers  Transmitters can be located up to 31 miles from the towers Businesses can plug the WiMAX receiver into their existing local area networks to provide high-speed Internet access to all of their connected devices New Perspectives on The Internet, Seventh Edition
Metropolitan Area Networking: WiMAX New Perspectives on The Internet, Seventh Edition
Metropolitan Area Networking: WiMAX VoIP  ( Voice over Internet Protocol ): converts audio signals to digital packets so that you can use a broadband wired or wireless Internet connection to make local and long distance telephone calls Because WiMAX can support many types of data transmissions, it is also used for VoIP Most experts predict that all new desktop and notebook computers and wireless devices will eventually have built-in 802.16 cards New Perspectives on The Internet, Seventh Edition
Using Wireless Devices to Access the Internet The technology and standards that dictate what you can accomplish with a wireless device change on a daily basis New standards emerge, new hardware is created, and new ways of connectivity arrive Select a wireless solution that has the locations in which the technology will be used in its network coverage area and that supports the features you plan to use New Perspectives on The Internet, Seventh Edition
Security Concerns for Wireless Networks The following list of threats are common to all wireless networks: Attacks that prevent the use of a device or decrease the network’s bandwidth Intercepting information sent over a wireless network Hacking into a wireless device to gain entry to its data or functions Stealing the identity of an access point to gain access to its connected users’ devices Viruses, spyware, and other security threats sent in the form of files Using information entered by the user into a wireless device to steal logins and other sensitive information New Perspectives on The Internet, Seventh Edition
Wireless Encryption Methods Encryption : process of coding information so that it is not readable by devices or people who do not have the secret key used to return the information back to its original, readable state By default, most wireless networks are unsecured Many home and small business networks are never secured and are vulnerable to various kinds of attacks There are many wireless encryption methods that provide different levels of protection for wireless networks New Perspectives on The Internet, Seventh Edition
Wired Equivalent Privacy Wired Equivalent Privacy (WEP) : security protocol for wireless LANs (using Wi-Fi) that works by encrypting data sent over the network When WEP is enabled, it encrypts the data sent over the network with a 64-bit or 128-bit key, that is entered by the user Network key also called a  passphrase The encryption slows down the network somewhat because of the time it takes to encrypt and decrypt the messages New Perspectives on The Internet, Seventh Edition
Wired Equivalent Privacy New Perspectives on The Internet, Seventh Edition
Wired Equivalent Privacy Depending on the equipment used and how much time and money a hacker has, it can take a very long time to decipher an intercepted message encrypted with a 64-bit key, and even longer to decipher an intercepted message encrypted with a 128-bit key Another vulnerability of WEP encryption is the fact that the key used to encrypt the data you are sending is sent over the network prior to the actual data being encrypted, and this same key is used to encrypt every data packet New Perspectives on The Internet, Seventh Edition
Wi-Fi Protected Access Wi-Fi Protected Access (WPA) : standard developed by the Wi-Fi Alliance in 2003 to address some of the inherent weaknesses in WEP WPA uses a preshared key to encrypt data Individual packets are encrypted with different keys One drawback is that all devices in the network need to use WPA New Perspectives on The Internet, Seventh Edition
MAC Address Filtering Each manufacturer of network interface cards adds a unique number, called a  Media Access Control address (MAC Address) Usually printed on the card Designate the devices that you want to allow to connect to the network If you enable MAC address filtering for a wireless router or access point, then it will only accept connections from the devices with the MAC addresses that you entered New Perspectives on The Internet, Seventh Edition
Disabling SSID Broadcast When a wireless router or access point sends out its signal, it also broadcasts its  service set identifier (SSID)  as a way of identifying the network’s name Most manufacturers of wireless routers and access points use the manufacturer name or the word “default” as the default SSID For public wireless networks, sending out the SSID is necessary New Perspectives on The Internet, Seventh Edition
Disabling SSID Broadcast For home networks, sending out the SSID is not necessary, because you already know the network’s name Disabling the SSID broadcast of the network makes the network invisible to roaming devices If you change the default name of the wireless router or access point, you also prevent unknown users from detecting  Wardriving:  driving through a neighborhood with a wireless-enabled notebook computer with the goal of locating houses and businesses that have wireless networks in order to gain access to them your network New Perspectives on The Internet, Seventh Edition
Changing the Default Login When you install a wireless router or access point for the first time, the device is configured with a default user name and password Use your computer to access the device’s settings and configure it to work as desired One of the most serious mistakes that home users make when installing a wireless network is the failure to change the default login for the device If you haven’t implemented any other security, your wireless network is visible and easy to access New Perspectives on The Internet, Seventh Edition
Security Checklist for Installing a Wireless Router or Access Point New Perspectives on The Internet, Seventh Edition
Security Concerns for Wireless Devices The most basic security concern for the owner of a wireless device is theft or loss If you have a PDA or other device that also stores data such as passwords that you use to connect to online banking or your Internet connection, you might be losing much more than the device itself New Perspectives on The Internet, Seventh Edition
Protecting the Data on a Wireless Device A wireless device is vulnerable to certain kinds of attacks to the data it stores Over-the-shoulder attacks:  unauthorized person uses his or her physical proximity to your device to attempt to get your login information, passwords, or other sensitive data while you are working Most security experts advise against activities such as online banking, checking email, and online shopping in public places New Perspectives on The Internet, Seventh Edition
Protecting the Data on a Wireless Device Opt for a wired Ethernet connection whenever possible Connecting to the Internet with a wired connection eliminates the wireless threats to your device Setting a password on your device is another way to protect it New Perspectives on The Internet, Seventh Edition
Evil Twin Attacks In an  evil twin attack , also sometimes called a  café latte attack  because the attack often occurs at coffeehouses, a hacker gathers information about an access point and then uses that information to set up his own computer to use the real access point’s signal to impersonate the access point As customers use their devices to pick up and connect to the access point, they are unaware that they are actually connecting to the hacker’s computer New Perspectives on The Internet, Seventh Edition
Evil Twin Attacks When you use one of the many free public hotspots for wireless computing, the data you send over the network is not usually encrypted or secure This data is subject to hackers using  sniffer programs  to illegally monitor activity on the wireless network New Perspectives on The Internet, Seventh Edition
Security Concerns for Bluetooth Devices The usual range of a Bluetooth device is about 10 to 30 feet, and up to 300 feet This range makes it possible for you to use a wireless headset with a cell phone or to print documents without the need for a cable Three security problems common to Bluetooth devices are bluejacking, bluesnarfing, and bluebugging New Perspectives on The Internet, Seventh Edition
Security Concerns for Bluetooth Devices Bluejacking : bluejacker sends an anonymous message displayed as a text message to a Bluetooth device in an attempt to surprise the owner, express a comment or opinion, or contact the owner to make a social connection Mostly harmless because the victim’s device is not breached; it is only sent a message To protect a Bluetooth device from a bluejacking attack, you can disable the device’s Bluetooth feature so that its signal is invisible (also called  undiscoverable mode)  to other users New Perspectives on The Internet, Seventh Edition
Security Concerns for Bluetooth Devices Bluesnarfing : hacker with special software is able to detect the signal from a Bluetooth device and gain access to its data without the owner’s knowledge More serious security problem After gaining access, the hacker is able to access data stored on the device, such as the contact list or calendar, connect to the Internet, listen in on phone calls, and send email messages from the victim’s device To protect a Bluetooth device from a bluesnarfing attack, you can set the device to undiscoverable mode Newer Bluetooth devices are not subject to bluesnarfing attacks because this vulnerability has been fixed New Perspectives on The Internet, Seventh Edition
Security Concerns for Bluetooth Devices Bluebugging : hacker gains access to the device and all of its functions without the owner’s consent Worst of the security threats to Bluetooth devices Bluebugging attack lets the hacker use the device to make phone calls, access data, and use the Internet Some hackers set up phone numbers with per-minute charges to the caller and use bluebugging to dial those numbers while the device is in range New Perspectives on The Internet, Seventh Edition
Security Concerns for Bluetooth Devices Most manufacturers of Bluetooth devices have released patches to fix the security flaw that makes bluebugging possible Bluesnarfing and bluebugging can only occur within the range of the Bluetooth device and on older devices and those not updated with the latest security patches Both of these attacks are less likely when the Bluetooth device is undiscoverable to other users New Perspectives on The Internet, Seventh Edition
Summary Different types if wireless networks, wireless network standards, and wireless devices Different types of security threats and solutions for wireless networks and wireless devices Wireless network and wireless device protection from security threats New Perspectives on The Internet, Seventh Edition
Ad

More Related Content

What's hot (20)

Lifi (presentation)
Lifi (presentation)Lifi (presentation)
Lifi (presentation)
Aman Durrani
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
SABIR ALI MOLLAH
 
Wi fi
Wi fiWi fi
Wi fi
Mayank Saxena
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
HasanMaster
 
hotspot(wi-fi)
hotspot(wi-fi)hotspot(wi-fi)
hotspot(wi-fi)
ConfụƧxd VąmÞįrē
 
Li fi technology paper presentation, Li- Fi, VLC, Visible light communication...
Li fi technology paper presentation, Li- Fi, VLC, Visible light communication...Li fi technology paper presentation, Li- Fi, VLC, Visible light communication...
Li fi technology paper presentation, Li- Fi, VLC, Visible light communication...
Sirod Deo
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
Biju Patnaik University
 
5G applications
5G applications5G applications
5G applications
Udara Sandaruwan
 
Li fi
Li fi Li fi
Li fi
Shantosh Raj
 
lifi report file
lifi report filelifi report file
lifi report file
VINEETH M
 
Li Fi Technology PPT
Li Fi  Technology PPTLi Fi  Technology PPT
Li Fi Technology PPT
Revanth Sai
 
Li fi Technology
Li fi TechnologyLi fi Technology
Li fi Technology
ErVKEC
 
Li fi (light fidelity)-the future technology in wireless communication
Li fi (light fidelity)-the future technology in wireless communicationLi fi (light fidelity)-the future technology in wireless communication
Li fi (light fidelity)-the future technology in wireless communication
Laxman Mewari
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
Hitesh Mohapatra
 
Unguided media
Unguided mediaUnguided media
Unguided media
mrzahidfaiz.blogspot.com
 
Li fi ppt
Li fi pptLi fi ppt
Li fi ppt
vishalhasnani
 
Free Space Optics (FSO)
Free Space Optics (FSO)Free Space Optics (FSO)
Free Space Optics (FSO)
Naveed Qurban
 
LIFI
LIFILIFI
LIFI
Manje Gowda
 
Lifi Technology
Lifi TechnologyLifi Technology
Lifi Technology
Subhrajit Sadhukhan
 
Wireless communaction
Wireless communactionWireless communaction
Wireless communaction
অজানা মন
 

Viewers also liked (20)

Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
Online
 
Tutorial 8 - Creating Effective Web Pages
Tutorial 8 - Creating Effective Web PagesTutorial 8 - Creating Effective Web Pages
Tutorial 8 - Creating Effective Web Pages
dpd
 
Tutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the InternetTutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the Internet
dpd
 
Tutorial 10 - Electronic Commerce
Tutorial 10 - Electronic CommerceTutorial 10 - Electronic Commerce
Tutorial 10 - Electronic Commerce
dpd
 
test
testtest
test
dpd
 
CSCI 16 ~ Tutorial 01
CSCI 16 ~ Tutorial 01CSCI 16 ~ Tutorial 01
CSCI 16 ~ Tutorial 01
dpd
 
Lan configuration in windows Server 2008 R2 part 01
Lan configuration in windows Server 2008 R2 part 01Lan configuration in windows Server 2008 R2 part 01
Lan configuration in windows Server 2008 R2 part 01
naveenmcitp.india.nk
 
Internet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam ShahInternet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam Shah
Soham
 
Internet communication
Internet communicationInternet communication
Internet communication
Karwan Jacksi
 
Advantages of an Integrated Billing Platform
Advantages of an Integrated Billing PlatformAdvantages of an Integrated Billing Platform
Advantages of an Integrated Billing Platform
Jeff Sobers
 
Web security
Web securityWeb security
Web security
Subhash Basistha
 
CCC PT Faculty Unemployment Benefits
CCC PT Faculty Unemployment BenefitsCCC PT Faculty Unemployment Benefits
CCC PT Faculty Unemployment Benefits
dpd
 
History of Networking and Security
History of Networking and SecurityHistory of Networking and Security
History of Networking and Security
Darwin Gosal
 
S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12
RAJAN ST
 
3 d tv deals
3 d tv deals3 d tv deals
3 d tv deals
Telecom
 
presentasi softskill akutansi internasional
presentasi softskill akutansi internasionalpresentasi softskill akutansi internasional
presentasi softskill akutansi internasional
yemijelsen
 
S dutta
S duttaS dutta
S dutta
tarunpatil
 
03 (IDNOG01) NGN Next Generation Networks by Himawan Nugroho
03 (IDNOG01) NGN Next Generation Networks by Himawan Nugroho03 (IDNOG01) NGN Next Generation Networks by Himawan Nugroho
03 (IDNOG01) NGN Next Generation Networks by Himawan Nugroho
Indonesia Network Operators Group
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
Publicis Sapient
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
Online
 
Tutorial 8 - Creating Effective Web Pages
Tutorial 8 - Creating Effective Web PagesTutorial 8 - Creating Effective Web Pages
Tutorial 8 - Creating Effective Web Pages
dpd
 
Tutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the InternetTutorial 6 - User-Generated Content on the Internet
Tutorial 6 - User-Generated Content on the Internet
dpd
 
Tutorial 10 - Electronic Commerce
Tutorial 10 - Electronic CommerceTutorial 10 - Electronic Commerce
Tutorial 10 - Electronic Commerce
dpd
 
test
testtest
test
dpd
 
CSCI 16 ~ Tutorial 01
CSCI 16 ~ Tutorial 01CSCI 16 ~ Tutorial 01
CSCI 16 ~ Tutorial 01
dpd
 
Lan configuration in windows Server 2008 R2 part 01
Lan configuration in windows Server 2008 R2 part 01Lan configuration in windows Server 2008 R2 part 01
Lan configuration in windows Server 2008 R2 part 01
naveenmcitp.india.nk
 
Internet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam ShahInternet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam Shah
Soham
 
Internet communication
Internet communicationInternet communication
Internet communication
Karwan Jacksi
 
Advantages of an Integrated Billing Platform
Advantages of an Integrated Billing PlatformAdvantages of an Integrated Billing Platform
Advantages of an Integrated Billing Platform
Jeff Sobers
 
CCC PT Faculty Unemployment Benefits
CCC PT Faculty Unemployment BenefitsCCC PT Faculty Unemployment Benefits
CCC PT Faculty Unemployment Benefits
dpd
 
History of Networking and Security
History of Networking and SecurityHistory of Networking and Security
History of Networking and Security
Darwin Gosal
 
S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12
RAJAN ST
 
3 d tv deals
3 d tv deals3 d tv deals
3 d tv deals
Telecom
 
presentasi softskill akutansi internasional
presentasi softskill akutansi internasionalpresentasi softskill akutansi internasional
presentasi softskill akutansi internasional
yemijelsen
 
03 (IDNOG01) NGN Next Generation Networks by Himawan Nugroho
03 (IDNOG01) NGN Next Generation Networks by Himawan Nugroho03 (IDNOG01) NGN Next Generation Networks by Himawan Nugroho
03 (IDNOG01) NGN Next Generation Networks by Himawan Nugroho
Indonesia Network Operators Group
 
Ad

Similar to Tutorial 7 - Wireless Networking and Security (20)

WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
Ryma Chohan
 
Wireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptxWireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptx
JosephCristian8
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technology
Rashmi Joaa
 
Tutorial.07(1)
Tutorial.07(1)Tutorial.07(1)
Tutorial.07(1)
Kristina Bergey
 
Chap 01 introduction to wirelless
Chap 01 introduction to wirelless Chap 01 introduction to wirelless
Chap 01 introduction to wirelless
EngkaderAMuse
 
wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Library
sanjay thakur
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Jeha Ryhan
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
SrijanKumar18
 
Wireless communications
 Wireless communications  Wireless communications
Wireless communications
Lakshay Khandelwal
 
Wireless and intranet
Wireless and intranetWireless and intranet
Wireless and intranet
Nasrunnissa Aziz
 
ROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptxROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptx
AbhradipChatterjee2
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12
Rishabh-Rawat
 
Work exp ( wireless netwrk)
Work exp ( wireless netwrk)Work exp ( wireless netwrk)
Work exp ( wireless netwrk)
vishalmotwani
 
WIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptxWIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptx
MohanVeerabomala
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
CSnatic
 
INTRODUCTION TO WIRELESS NETWORK AND ITS EXPLANATION
INTRODUCTION  TO WIRELESS NETWORK AND ITS EXPLANATIONINTRODUCTION  TO WIRELESS NETWORK AND ITS EXPLANATION
INTRODUCTION TO WIRELESS NETWORK AND ITS EXPLANATION
khushboosingh930077
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)
Biplob Orton
 
Wireless Personal Area Networks(Wpan)
Wireless Personal Area Networks(Wpan)Wireless Personal Area Networks(Wpan)
Wireless Personal Area Networks(Wpan)
Biplob Orton
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
Zul Fikri
 
Wireless technology movie
Wireless technology  movieWireless technology  movie
Wireless technology movie
Radhika Gupta
 
Wireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptxWireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptx
JosephCristian8
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technology
Rashmi Joaa
 
Chap 01 introduction to wirelless
Chap 01 introduction to wirelless Chap 01 introduction to wirelless
Chap 01 introduction to wirelless
EngkaderAMuse
 
wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Library
sanjay thakur
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Jeha Ryhan
 
ROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptxROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptx
AbhradipChatterjee2
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12
Rishabh-Rawat
 
Work exp ( wireless netwrk)
Work exp ( wireless netwrk)Work exp ( wireless netwrk)
Work exp ( wireless netwrk)
vishalmotwani
 
WIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptxWIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptx
MohanVeerabomala
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
CSnatic
 
INTRODUCTION TO WIRELESS NETWORK AND ITS EXPLANATION
INTRODUCTION  TO WIRELESS NETWORK AND ITS EXPLANATIONINTRODUCTION  TO WIRELESS NETWORK AND ITS EXPLANATION
INTRODUCTION TO WIRELESS NETWORK AND ITS EXPLANATION
khushboosingh930077
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)
Biplob Orton
 
Wireless Personal Area Networks(Wpan)
Wireless Personal Area Networks(Wpan)Wireless Personal Area Networks(Wpan)
Wireless Personal Area Networks(Wpan)
Biplob Orton
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
Zul Fikri
 
Wireless technology movie
Wireless technology  movieWireless technology  movie
Wireless technology movie
Radhika Gupta
 
Ad

More from dpd (20)

BA 65 Hour 6 ~ Business Operations and Practice
BA 65 Hour 6 ~ Business Operations and PracticeBA 65 Hour 6 ~ Business Operations and Practice
BA 65 Hour 6 ~ Business Operations and Practice
dpd
 
BA 65 Hour 5 ~ Creating an Ecommerce Site
BA 65 Hour 5 ~ Creating an Ecommerce SiteBA 65 Hour 5 ~ Creating an Ecommerce Site
BA 65 Hour 5 ~ Creating an Ecommerce Site
dpd
 
BA 65 Hour 4 ~ Promoting Your Site
BA 65 Hour 4 ~ Promoting Your SiteBA 65 Hour 4 ~ Promoting Your Site
BA 65 Hour 4 ~ Promoting Your Site
dpd
 
Chapter 14 - Operations, Quality, and Productivity
Chapter 14 - Operations, Quality, and ProductivityChapter 14 - Operations, Quality, and Productivity
Chapter 14 - Operations, Quality, and Productivity
dpd
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
dpd
 
Chapter 13 - Control Systems: Financial and Human
Chapter 13 - Control Systems: Financial and HumanChapter 13 - Control Systems: Financial and Human
Chapter 13 - Control Systems: Financial and Human
dpd
 
Chapter 12 - Team Leadership
Chapter 12 - Team LeadershipChapter 12 - Team Leadership
Chapter 12 - Team Leadership
dpd
 
Chapter 11 - Motivating for High Performance
Chapter 11 - Motivating for High PerformanceChapter 11 - Motivating for High Performance
Chapter 11 - Motivating for High Performance
dpd
 
Chapter 10 - Communicating and Informatiion Technology
Chapter 10 - Communicating and Informatiion TechnologyChapter 10 - Communicating and Informatiion Technology
Chapter 10 - Communicating and Informatiion Technology
dpd
 
Chapter 9 - Leading with Influence
Chapter 9 - Leading with InfluenceChapter 9 - Leading with Influence
Chapter 9 - Leading with Influence
dpd
 
Chapter 8 - Organizational Behavior: Power, Politics, Conflict, and Stress
Chapter 8 - Organizational Behavior: Power, Politics, Conflict, and StressChapter 8 - Organizational Behavior: Power, Politics, Conflict, and Stress
Chapter 8 - Organizational Behavior: Power, Politics, Conflict, and Stress
dpd
 
Chapter 7 - Human Resource Management
Chapter 7 - Human Resource ManagementChapter 7 - Human Resource Management
Chapter 7 - Human Resource Management
dpd
 
Hour 7
Hour 7Hour 7
Hour 7
dpd
 
Hour 6
Hour 6Hour 6
Hour 6
dpd
 
Tutorial 4 - Information Resources on the Web
Tutorial 4 - Information Resources on the WebTutorial 4 - Information Resources on the Web
Tutorial 4 - Information Resources on the Web
dpd
 
Hour 5
Hour 5Hour 5
Hour 5
dpd
 
Tutorial 3 - Searcing the Web
Tutorial 3 - Searcing the WebTutorial 3 - Searcing the Web
Tutorial 3 - Searcing the Web
dpd
 
Hour 4
Hour 4Hour 4
Hour 4
dpd
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Email
dpd
 
Hour 3
Hour 3Hour 3
Hour 3
dpd
 
BA 65 Hour 6 ~ Business Operations and Practice
BA 65 Hour 6 ~ Business Operations and PracticeBA 65 Hour 6 ~ Business Operations and Practice
BA 65 Hour 6 ~ Business Operations and Practice
dpd
 
BA 65 Hour 5 ~ Creating an Ecommerce Site
BA 65 Hour 5 ~ Creating an Ecommerce SiteBA 65 Hour 5 ~ Creating an Ecommerce Site
BA 65 Hour 5 ~ Creating an Ecommerce Site
dpd
 
BA 65 Hour 4 ~ Promoting Your Site
BA 65 Hour 4 ~ Promoting Your SiteBA 65 Hour 4 ~ Promoting Your Site
BA 65 Hour 4 ~ Promoting Your Site
dpd
 
Chapter 14 - Operations, Quality, and Productivity
Chapter 14 - Operations, Quality, and ProductivityChapter 14 - Operations, Quality, and Productivity
Chapter 14 - Operations, Quality, and Productivity
dpd
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
dpd
 
Chapter 13 - Control Systems: Financial and Human
Chapter 13 - Control Systems: Financial and HumanChapter 13 - Control Systems: Financial and Human
Chapter 13 - Control Systems: Financial and Human
dpd
 
Chapter 12 - Team Leadership
Chapter 12 - Team LeadershipChapter 12 - Team Leadership
Chapter 12 - Team Leadership
dpd
 
Chapter 11 - Motivating for High Performance
Chapter 11 - Motivating for High PerformanceChapter 11 - Motivating for High Performance
Chapter 11 - Motivating for High Performance
dpd
 
Chapter 10 - Communicating and Informatiion Technology
Chapter 10 - Communicating and Informatiion TechnologyChapter 10 - Communicating and Informatiion Technology
Chapter 10 - Communicating and Informatiion Technology
dpd
 
Chapter 9 - Leading with Influence
Chapter 9 - Leading with InfluenceChapter 9 - Leading with Influence
Chapter 9 - Leading with Influence
dpd
 
Chapter 8 - Organizational Behavior: Power, Politics, Conflict, and Stress
Chapter 8 - Organizational Behavior: Power, Politics, Conflict, and StressChapter 8 - Organizational Behavior: Power, Politics, Conflict, and Stress
Chapter 8 - Organizational Behavior: Power, Politics, Conflict, and Stress
dpd
 
Chapter 7 - Human Resource Management
Chapter 7 - Human Resource ManagementChapter 7 - Human Resource Management
Chapter 7 - Human Resource Management
dpd
 
Hour 7
Hour 7Hour 7
Hour 7
dpd
 
Hour 6
Hour 6Hour 6
Hour 6
dpd
 
Tutorial 4 - Information Resources on the Web
Tutorial 4 - Information Resources on the WebTutorial 4 - Information Resources on the Web
Tutorial 4 - Information Resources on the Web
dpd
 
Hour 5
Hour 5Hour 5
Hour 5
dpd
 
Tutorial 3 - Searcing the Web
Tutorial 3 - Searcing the WebTutorial 3 - Searcing the Web
Tutorial 3 - Searcing the Web
dpd
 
Hour 4
Hour 4Hour 4
Hour 4
dpd
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Email
dpd
 
Hour 3
Hour 3Hour 3
Hour 3
dpd
 

Recently uploaded (20)

Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
To study the nervous system of insect.pptx
To study the nervous system of insect.pptxTo study the nervous system of insect.pptx
To study the nervous system of insect.pptx
Arshad Shaikh
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
Unit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdfUnit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdf
KanchanPatil34
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
SPRING FESTIVITIES - UK AND USA -
SPRING FESTIVITIES - UK AND USA            -SPRING FESTIVITIES - UK AND USA            -
SPRING FESTIVITIES - UK AND USA -
Colégio Santa Teresinha
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
To study the nervous system of insect.pptx
To study the nervous system of insect.pptxTo study the nervous system of insect.pptx
To study the nervous system of insect.pptx
Arshad Shaikh
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
Unit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdfUnit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdf
KanchanPatil34
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 

Tutorial 7 - Wireless Networking and Security

  • 1. Tutorial 7 Wireless Networking and Security
  • 2. Objectives Explore the history of wireless communication Learn about Wi-Fi and wireless mesh networks Investigate technologies used in personal area networks Learn about wireless wide area networks and WiMAX Investigate wireless devices and wireless business plans that let you access the Internet New Perspectives on The Internet, Seventh Edition
  • 3. Objectives Investigate security concerns of wireless networks Evaluate different wireless encryption methods Investigate security concerns of wireless devices Learn how to protect the data stored on a wireless device Learn about the different types of attacks on wireless devices Learn about the different types of attacks on Bluetooth devices New Perspectives on The Internet, Seventh Edition
  • 4. Evolution of Wireless Networks When you connect to your Internet service provider, you’re creating a wired connection A wireless connection occurs when data is transferred to another location without the use of any wires In 1994, carriers created digital networks, or Personal Communication Service (PCS ), where data was carried in bits at a rate of up to 144 Kbps New Perspectives on The Internet, Seventh Edition
  • 5. Evolution of Wireless Networks 1999 saw the introduction of the first “wireless” connections to the Internet Personal digital assistant (PDA): handheld computer that can send and receive wireless telephone and fax calls, act as a personal organizer, perform calculations, store notes, and download Web pages formatted for handheld devices The wireless Internet has expanded to include different hardware devices, networks, and other options New Perspectives on The Internet, Seventh Edition
  • 6. Evolution of Wireless Networks Cell phones were one of the first wireless connections to transfer a person’s voice Text messaging occurs over second-generation wireless systems , or 2G wireless Short Message Service (SMS) lets you send text messages of up to 160 characters over a 2G wireless network to a wireless phone New Perspectives on The Internet, Seventh Edition
  • 7. Evolution of Wireless Networks Some handheld computers use Infrared technology to “beam” information from one source to another without the use of wired connections Over 60 major US markets have new 3G wireless systems (third-generation wireless) in places. Some European countries are building and licensing 3G wireless systems 3G wireless systems offer data transfer rates of up to 2 Mbps and constant connections Bandwidth and cost are two obstacles for getting 3G wireless systems going in the United States New Perspectives on The Internet, Seventh Edition
  • 8. Evolution of Wireless Networks The conversion from 2G to 3G wireless requires the carriers to invest in technology to make the change Many carriers have transformed and upgraded their existing networks by creating 25G wireless systems There isn’t a single network standard A wireless device is usually manufactured to work only on a single type of network, because different networks use different frequencies in the radio spectrum If you choose a wireless carrier with a 25G network, for example, you will not be able to receive a signal in an area with only a 2G or a 3G network because your device operates on a different frequency New Perspectives on The Internet, Seventh Edition
  • 9. Evolution of Wireless Networks 35G wireless networks use a new network protocol called Universal Mobile Telephone Service (UMTS), which is an extension of the existing 3G network, to provide network connections of up to 10 Mbps Fourth-generation wireless networks ( 4G wireless ) Also called 3G wireless and beyond networks 4G technology is expected to bring network connection speeds of up to 100 Mbps and deliver high quality audio and video to connected devices New Perspectives on The Internet, Seventh Edition
  • 10. Wireless Local Area Networking Wireless fidelity ( Wi-Fi ): trademarked name of the Wi-Fi Alliance (WFA) that specifies the interface between a wireless client and a base station or between two wireless clients Wireless local area network (WLAN): network in which devices use high frequency radio waves instead of wires to communicate Wi-Fi operates in the 24 GHz radio spectrum, which is the same spectrum used by cordless phones, garage door openers, microwave ovens, and other devices Because this spectrum is unlicensed, it is free 3G wireless spectrum needs to be licensed New Perspectives on The Internet, Seventh Edition
  • 11. Wireless Local Area Networking New Perspectives on The Internet, Seventh Edition
  • 12. Wireless Local Area Networking Three of the most widely used standards for WLANs are 802.11a, 802.11b, 802.11g, and 802.11n Transfer rate: speed at which data is transmitted from an access point (or base station) to the wireless device Access point: hardware device with one or more antennae that permits communication between wired and wireless networks so wireless clients can send and receive data Range: physical distance between the access point and the wireless device New Perspectives on The Internet, Seventh Edition
  • 13. Wireless Local Area Networking Wi-Fi usually refers to the 802.11b standard which is the specification on which most Wi-Fi devices operate Dual band access point: makes it possible to connect devices configured for two different Wi-Fi standards to the same access point Multiple band access point: makes it possible to connect any wireless device to the same access point Wi-Fi is often used as an alternative in an office building or other area in which you might find a traditional wired local area network. It can be used where wiring cannot be installed New Perspectives on The Internet, Seventh Edition
  • 14. Wireless Local Area Networking Notebook computers and other wireless devices must have Wi-Fi compatible hardware installed in them to send and receive data with the network Once you have a network interface card or other Wi-Fi compatible device, you can connect to the WLAN via that device, provided that it is physically within the area covered by the network If you position enough access points within the appropriate range of each other, the WLAN can grow to cover an entire office complex or geographic area New Perspectives on The Internet, Seventh Edition
  • 15. Wireless Mesh Networks Wireless mesh network: commonly used to extend the reach of Wi-Fi hotspots to an enterprise, such as a university campus, hotel, airport terminal, convention center, sports arena, or a large office building A wireless mesh network is a series of wireless nodes More effective and efficient at covering large areas with wireless connections because each node is wirelessly connected to the network New Perspectives on The Internet, Seventh Edition
  • 16. Wireless Mesh Networks New Perspectives on The Internet, Seventh Edition
  • 17. Personal Area Networking Personal area networking : refers to the wireless network that you use to connect personal devices to each other There are two major types of personal area networks: Infrared Bluetooth New Perspectives on The Internet, Seventh Edition
  • 18. Infrared Technology Infrared Data Association ( IrDA ): group dedicated to developing low-cost, high-speed wireless connectivity solutions Using infrared technology, you can wirelessly beam information from one device to another compatible device using Infrared light waves This technology is used with PDAs, notebook computers, printers, phones, and other peripheral devices A disadvantage is the lack of software products that can handle the transfer The devices and the software that runs them must be compatible with each other New Perspectives on The Internet, Seventh Edition
  • 19. Bluetooth Bluetooth : technology that provides short-range radio links between personal computers, handheld devices, wireless phones, headsets, printers, and other electronic devices For devices without chipsets that enable them to receive Bluetooth radio waves, you can purchase an adapter to enable use with other Bluetooth devices Bluetooth doesn’t need an access point for communication; devices communicate with each other automatically Bluetooth isn’t really “owned” by any specific manufacturer or group New Perspectives on The Internet, Seventh Edition
  • 20. Bluetooth New Perspectives on The Internet, Seventh Edition
  • 21. Bluetooth Using Bluetooth technology, you can synchronize and share data between as many as eight Bluetooth compatible devices within the specified range at a rate of up to 3 Mbps A collection of devices connected via Bluetooth technology is called a piconet. A piconet can connect two to eight devices at a time You can use Bluetooth-enabled devices to transfer files, listen to music playing on a computer through a headset, print documents, or connect your notebook computer to the Internet using a wireless phone that is in your desk drawer or briefcase New Perspectives on The Internet, Seventh Edition
  • 22. Comparing Wi-Fi Standards with Bluetooth New Perspectives on The Internet, Seventh Edition
  • 23. Wireless Wide Area Networking Wireless device connections let you access the Internet on a PDA, wireless phone, or notebook computer from anywhere in the world without a wired connection WLAN provides a wireless connection to a network, but devices must be within the stated boundary of the WLAN In 25G and 3G wireless systems, wireless wide area networking ( WWAN ) makes it possible to access the Internet from anywhere within the boundaries of the wireless network to which you are connected New Perspectives on The Internet, Seventh Edition
  • 24. Metropolitan Area Networking: WiMAX WiMAX ( Worldwide Interoperability for Microwave Access ): uses 802.16 wireless network standard being developed for use in metropolitan areas Metropolitan area network ( MAN ): provides wireless broadband Internet access via radio signals in the 2 to 11 GHz and 10 to 66 GHz radio spectrum, with a range of up to 31 miles and speeds of up to 70 Mbps When multiple WiMAX towers are connected to each other, WiMAX has the potential to solve some of the geographical and speed limitations of wired networks and other wireless networks, including Wi-Fi New Perspectives on The Internet, Seventh Edition
  • 25. Metropolitan Area Networking: WiMAX WiMAX provides broadband Internet connections at the same speed as DSL and cable, through wireless radio connections WiMAX works by connecting a WiMAX tower to an ISP that provides the Internet service The WiMAX towers are connected to each other via radio signals WiMAX transmitters send the signal to homes and businesses that have WiMAX receivers Transmitters can be located up to 31 miles from the towers Businesses can plug the WiMAX receiver into their existing local area networks to provide high-speed Internet access to all of their connected devices New Perspectives on The Internet, Seventh Edition
  • 26. Metropolitan Area Networking: WiMAX New Perspectives on The Internet, Seventh Edition
  • 27. Metropolitan Area Networking: WiMAX VoIP ( Voice over Internet Protocol ): converts audio signals to digital packets so that you can use a broadband wired or wireless Internet connection to make local and long distance telephone calls Because WiMAX can support many types of data transmissions, it is also used for VoIP Most experts predict that all new desktop and notebook computers and wireless devices will eventually have built-in 802.16 cards New Perspectives on The Internet, Seventh Edition
  • 28. Using Wireless Devices to Access the Internet The technology and standards that dictate what you can accomplish with a wireless device change on a daily basis New standards emerge, new hardware is created, and new ways of connectivity arrive Select a wireless solution that has the locations in which the technology will be used in its network coverage area and that supports the features you plan to use New Perspectives on The Internet, Seventh Edition
  • 29. Security Concerns for Wireless Networks The following list of threats are common to all wireless networks: Attacks that prevent the use of a device or decrease the network’s bandwidth Intercepting information sent over a wireless network Hacking into a wireless device to gain entry to its data or functions Stealing the identity of an access point to gain access to its connected users’ devices Viruses, spyware, and other security threats sent in the form of files Using information entered by the user into a wireless device to steal logins and other sensitive information New Perspectives on The Internet, Seventh Edition
  • 30. Wireless Encryption Methods Encryption : process of coding information so that it is not readable by devices or people who do not have the secret key used to return the information back to its original, readable state By default, most wireless networks are unsecured Many home and small business networks are never secured and are vulnerable to various kinds of attacks There are many wireless encryption methods that provide different levels of protection for wireless networks New Perspectives on The Internet, Seventh Edition
  • 31. Wired Equivalent Privacy Wired Equivalent Privacy (WEP) : security protocol for wireless LANs (using Wi-Fi) that works by encrypting data sent over the network When WEP is enabled, it encrypts the data sent over the network with a 64-bit or 128-bit key, that is entered by the user Network key also called a passphrase The encryption slows down the network somewhat because of the time it takes to encrypt and decrypt the messages New Perspectives on The Internet, Seventh Edition
  • 32. Wired Equivalent Privacy New Perspectives on The Internet, Seventh Edition
  • 33. Wired Equivalent Privacy Depending on the equipment used and how much time and money a hacker has, it can take a very long time to decipher an intercepted message encrypted with a 64-bit key, and even longer to decipher an intercepted message encrypted with a 128-bit key Another vulnerability of WEP encryption is the fact that the key used to encrypt the data you are sending is sent over the network prior to the actual data being encrypted, and this same key is used to encrypt every data packet New Perspectives on The Internet, Seventh Edition
  • 34. Wi-Fi Protected Access Wi-Fi Protected Access (WPA) : standard developed by the Wi-Fi Alliance in 2003 to address some of the inherent weaknesses in WEP WPA uses a preshared key to encrypt data Individual packets are encrypted with different keys One drawback is that all devices in the network need to use WPA New Perspectives on The Internet, Seventh Edition
  • 35. MAC Address Filtering Each manufacturer of network interface cards adds a unique number, called a Media Access Control address (MAC Address) Usually printed on the card Designate the devices that you want to allow to connect to the network If you enable MAC address filtering for a wireless router or access point, then it will only accept connections from the devices with the MAC addresses that you entered New Perspectives on The Internet, Seventh Edition
  • 36. Disabling SSID Broadcast When a wireless router or access point sends out its signal, it also broadcasts its service set identifier (SSID) as a way of identifying the network’s name Most manufacturers of wireless routers and access points use the manufacturer name or the word “default” as the default SSID For public wireless networks, sending out the SSID is necessary New Perspectives on The Internet, Seventh Edition
  • 37. Disabling SSID Broadcast For home networks, sending out the SSID is not necessary, because you already know the network’s name Disabling the SSID broadcast of the network makes the network invisible to roaming devices If you change the default name of the wireless router or access point, you also prevent unknown users from detecting Wardriving: driving through a neighborhood with a wireless-enabled notebook computer with the goal of locating houses and businesses that have wireless networks in order to gain access to them your network New Perspectives on The Internet, Seventh Edition
  • 38. Changing the Default Login When you install a wireless router or access point for the first time, the device is configured with a default user name and password Use your computer to access the device’s settings and configure it to work as desired One of the most serious mistakes that home users make when installing a wireless network is the failure to change the default login for the device If you haven’t implemented any other security, your wireless network is visible and easy to access New Perspectives on The Internet, Seventh Edition
  • 39. Security Checklist for Installing a Wireless Router or Access Point New Perspectives on The Internet, Seventh Edition
  • 40. Security Concerns for Wireless Devices The most basic security concern for the owner of a wireless device is theft or loss If you have a PDA or other device that also stores data such as passwords that you use to connect to online banking or your Internet connection, you might be losing much more than the device itself New Perspectives on The Internet, Seventh Edition
  • 41. Protecting the Data on a Wireless Device A wireless device is vulnerable to certain kinds of attacks to the data it stores Over-the-shoulder attacks: unauthorized person uses his or her physical proximity to your device to attempt to get your login information, passwords, or other sensitive data while you are working Most security experts advise against activities such as online banking, checking email, and online shopping in public places New Perspectives on The Internet, Seventh Edition
  • 42. Protecting the Data on a Wireless Device Opt for a wired Ethernet connection whenever possible Connecting to the Internet with a wired connection eliminates the wireless threats to your device Setting a password on your device is another way to protect it New Perspectives on The Internet, Seventh Edition
  • 43. Evil Twin Attacks In an evil twin attack , also sometimes called a café latte attack because the attack often occurs at coffeehouses, a hacker gathers information about an access point and then uses that information to set up his own computer to use the real access point’s signal to impersonate the access point As customers use their devices to pick up and connect to the access point, they are unaware that they are actually connecting to the hacker’s computer New Perspectives on The Internet, Seventh Edition
  • 44. Evil Twin Attacks When you use one of the many free public hotspots for wireless computing, the data you send over the network is not usually encrypted or secure This data is subject to hackers using sniffer programs to illegally monitor activity on the wireless network New Perspectives on The Internet, Seventh Edition
  • 45. Security Concerns for Bluetooth Devices The usual range of a Bluetooth device is about 10 to 30 feet, and up to 300 feet This range makes it possible for you to use a wireless headset with a cell phone or to print documents without the need for a cable Three security problems common to Bluetooth devices are bluejacking, bluesnarfing, and bluebugging New Perspectives on The Internet, Seventh Edition
  • 46. Security Concerns for Bluetooth Devices Bluejacking : bluejacker sends an anonymous message displayed as a text message to a Bluetooth device in an attempt to surprise the owner, express a comment or opinion, or contact the owner to make a social connection Mostly harmless because the victim’s device is not breached; it is only sent a message To protect a Bluetooth device from a bluejacking attack, you can disable the device’s Bluetooth feature so that its signal is invisible (also called undiscoverable mode) to other users New Perspectives on The Internet, Seventh Edition
  • 47. Security Concerns for Bluetooth Devices Bluesnarfing : hacker with special software is able to detect the signal from a Bluetooth device and gain access to its data without the owner’s knowledge More serious security problem After gaining access, the hacker is able to access data stored on the device, such as the contact list or calendar, connect to the Internet, listen in on phone calls, and send email messages from the victim’s device To protect a Bluetooth device from a bluesnarfing attack, you can set the device to undiscoverable mode Newer Bluetooth devices are not subject to bluesnarfing attacks because this vulnerability has been fixed New Perspectives on The Internet, Seventh Edition
  • 48. Security Concerns for Bluetooth Devices Bluebugging : hacker gains access to the device and all of its functions without the owner’s consent Worst of the security threats to Bluetooth devices Bluebugging attack lets the hacker use the device to make phone calls, access data, and use the Internet Some hackers set up phone numbers with per-minute charges to the caller and use bluebugging to dial those numbers while the device is in range New Perspectives on The Internet, Seventh Edition
  • 49. Security Concerns for Bluetooth Devices Most manufacturers of Bluetooth devices have released patches to fix the security flaw that makes bluebugging possible Bluesnarfing and bluebugging can only occur within the range of the Bluetooth device and on older devices and those not updated with the latest security patches Both of these attacks are less likely when the Bluetooth device is undiscoverable to other users New Perspectives on The Internet, Seventh Edition
  • 50. Summary Different types if wireless networks, wireless network standards, and wireless devices Different types of security threats and solutions for wireless networks and wireless devices Wireless network and wireless device protection from security threats New Perspectives on The Internet, Seventh Edition