Wireless Connection to Broadband

advertisement
Wireless Connection to Broadband
Wireless Connection to Broadband
To Do: Need to work on the design for the opening page
The Training Foundry – May 2009
1
Wireless Connection to Broadband
Contents
Wireless Connection to Broadband .............................................................................. 1
Contents ......................................................................................................................... 2
About the course............................................................................................................ 3
About this Booklet ......................................................................................................... 4
1. Introduction............................................................................................................... 5
2. Wireless and Broadband Technologies .................................................................... 7
3. Infrastructure Wireless Networks and Internet Gateways .................................... 11
4. Other Wireless Technologies: Bluetooth, Infrared, GSM, GPRS, 3G .................. 13
5. Security: Threats, vulnerabilities and Countermeasures ...................................... 16
6. Bands, channels and interference .......................................................................... 19
7. Conclusion............................................................................................................... 23
Bibliography ................................................................................................................ 24
The Training Foundry – May 2009
2
Wireless Connection to Broadband
About the course (need to copy this
from final Syllabus)
This course is aimed at home small and medium enterprises who would like to
implement wireless wireless access to Broadband Internet. No previous
experience of networks or wireless technology is required. The course will
cover the available technologies, hardware and configuration security and
connectivity options.
By the end of the course, using practical hands on tuition, you will have an
understanding of the following features and techniques:
 Wireless
Technologies and
Standards
Describe the features and
benefits of WiFi, IrDA
Bluetooth, GPRS and
GSM technologies.
 Internet Access
Understand the options
for connecting one or
more devices to the
Internet. Implement
wireless Internet access
on a range of devices.
 802.11 Wireless LANs
Describe how 802.11
WiFi LANs work.
Implement a WiFi
network with Internet
access.
 Bluetooth and Mobile
Phones
Connect mobile phones,
PDAs and Laptops using
Bluetooth or IrDA
(Infrared) technologies.
 Wide Area
Networking
Use mobile phone
networks for Internet
access. Make sense of
GSM, GPRS, UMTS and
3G.
 Security and
Troubleshooting
Identify security threats
and implement
countermeasures. Find
out what can interfere
with wireless signals, and
how to deal with it.
The Training Foundry – May 2009
3
Wireless Connection to Broadband
About this Booklet
This booklet is intended to be used as a guide to learning, not as a reference manual.
Material in this booklet should be supplemented with information from the Internet
and elsewhere. Useful sources of information are given in the Bibliography section.
Practical exercises described in the Lab Manual are given as guidelines only.
Delegates will be expected to use the manuals or CDs associated with the hardware,
and to refer to other sources of information such as the Internet to complete the
exercises. The exercises are not intended to be prescriptive – delegates should feel
free to experiment and to learn by doing.
An exercise which fails to work first time, and requires some troubleshooting is likely
to provide a more valuable experience than one in which the result is achieved by
simply carrying out detailed instructions.
The Training Foundry – May 2009
4
Wireless Connection to Broadband
1. Introduction
Factors Driving Uptake of Wireless Technology
There are a number of factors that have contributed to the increase in the use of
wireless technology. These include:
Cost: the cost of the technology has steadily decreased over the past few
years

Standardisation: International standards have been published for some time,
and devices are now generally interoperable. Current IEEE 802.11 standards
for wireless LANs. are well established. New standards enhancing
performance are under development.

Availability and Use of Technologies: Most laptops now come with wireless
hardware, and many other devices such as iPhones include wireless
components.
Characteristics of Wireless Networking
Obviously wireless networks have no wires, but there are consequences:
 Connection characteristics may change with time
 Connection endpoints may move while connected
 Signals are not enclosed – anyone can listen in
Benefits of Wireless networking





Mobility: If users can move with their devices and remain connected, we
have an advantage over fixed LANs. Some wireless technologies allow highspeed mobility (car, train, aeroplane). Others allow only walking-pace
mobility.
Flexibility: Wireless networks allow us to connect in different ways hotdesking is easier, outside working is possible, devices and people can
easily be relocated.
Deployment: Wireless LANs can be deployed quickly, and removed just as
quickly.
Interconnectivity: Many devices such as iPhones, PDA's and Laptops come
with wireless hardware, and are designed to be connected using wirless
networks
Standards: The adoption of the IEEE 802.11 standards means that
equipment from different manufacturers will interoperate. Competition has
also driven prices down.
Drawbacks of Wireless networking: Are there any?



Speed: 54Mbps is available right now with 802.11a and g standards. Some
vendors are implementing proprietary standards which, gives speeds of
108Mbps or more. 802.11n should be available sometime in 2010 giving
standard speeds of up to 540Mbps under certain conditions.
Cost: Prices for wireless hardware are dropping fast. Costs of adapters are
now just marginally higher than wired Ethernet.
Security: There were security problems with the early standards. New
standards have been developed, but are often poorly implemented, or not
implemented at all.
The Training Foundry – May 2009
5
Wireless Connection to Broadband


Reliability & Coverage: Coverage can be a problem in some buildings.
Reliability can also be an issue because of environmental conditions and
interference.
Wireless is not always the answer: This course should help towards
successful implementations
The Training Foundry – May 2009
6
Wireless Connection to Broadband
2. Wireless and Broadband
Technologies






Broadband Options
Wireless Technologies
Wireless LAN usage
Bands, Channels and SSID
Ad-Hoc and Infrastructure WLAN
WLAN Clients
 NICs
 Drivers
 Settings
 Practical 1: Create an Ad Hoc Network
Wireless Broadband and Mobile Broadband
In many cases, organizations or individuals already have broadband access, and
would like to make this available to wireless devices at their location. This is called
"Wireless Broadband". Many Broadband providers include free wireless devices with
their service. It is the proper setup and use of these devices which is the main focus
of this course. The implementation of wireless connectivity to broadband in this way
does not normally incur usage costs for the wireless part. The coverage range is
limited to a small area, and security is normally under the control of the end user.
Mobile Broadband is normally provided by mobile phone companies, and involves
the use of a plug-in device (usually USB) which provides broadband services to a
single computer, over any geographical region where there is a signal from the
service provider. Speeds are normally slower than fixed broadband speeds. Current
3G rate is around 0.3Mbps There is usually a monthly charge for the service, and
ther may be additional charges for the amount of data transferred.
Fixed Broadband services are normally provided by the following means:
 Cable: using the same coax cable system which delivers cable TV. Speeds
range from 2-10MBps
 Satellite: using the same systems which provide satellite TV. Speeds range
from 2-16Mbps
 ADSL: using telephone wiring to provide digital services. Speeds range from
2-16Mbps
 Optical Fibre: using newly installed optical fibre to provide digital services.
Speeds range from 2-50mbps
 Fixed Wireless: using a point to point wireless system. Speeds range from 280Mbps depending on the wireless technology and distance required.
Wireless Technologies: Speed and Range
Wireless technologies differ mainly in their range and data rate or speed. The table
below shows a comparison betwen short and long range wireless technologies.
However, their is continuous technological innovation, which is likely to lead to much
higher speeds and longer ranges in the future.
The Training Foundry – May 2009
7
Wireless Connection to Broadband
Technology
Range
Speed
Wireless USB
3m
480Mbps
WiFi (802.11) 100m
54Mbps
WiMax
50km
80Mbps
3G
100km
0.3Mbps
100km
1000Mbps
but...
Future 4G?
Use of WiFi
WiFi is a common name used for 802.11 Wireless LANs. The main uses of WiFi are:
1. Home or small business: WiFi is used to connect multiple computers and
printers in a home network, and is often used to provide common access to
Broadband Internet
2. In larger workplaces, WiFi is often used as an extension to an existing wired
LAN, and to incorporate additional devices such as Laptops or PDAs.
3. Public Hotspots: In many public areas such as cafes trains or hotels, WiFi is
used to allow internet access. Services may be included with the service (eg
First Class train journey), or paid for as an extra, or even free.
Bands and Channels
A Band is the frequency range on which a WiFi device transmits. There are two
bands commonly in use 2.4GHz and 5GHz. The band is determined by the hardware.
Many devices include the hardware to work on multiple bands.
A channel is a smaller section of the band which is used for communication.
Channels are normally set in software. Some channels overlap and interfere. Devices
must use the same band to communicate.
SSID: The Network Name
Wireless Networks require and SSID. This is the Name of the network and is a 32character case-sensitiev string eg "SHU-GUEST". It is used to identify the devices in
the network. Devices must use the same SSID to communicate.
Ad Hoc and Infrastructure WLANs
The Training Foundry – May 2009
8
Wireless Connection to Broadband
An Ad Hoc WLAN (Windows calls this a "computer to computer" network) is one in
which each device communicates with any other device in the WLAN. Such networks
are often temporary, and there are fewer security options available.
An Ad Hoc Wireless LAN
An Infrastructure WLAN is one in which a wireless Access Point (AP) provides a
connection to a wired LAN or Distribution System (DS). All devices in the
Infrastructure WLAN communicate through the AP. Such networks are often more
permanent, and there are more security options available.
An Infrastructure Wireless LAN
Wireless LAN Clients
In order to participate in a WLAN, a client needs a wireless Network Interface Card or
NIC. Wireless NICs may be built-in to many devices, or may be installed as USB,
Cardbus, PCMCIA or PCI devices.
Windows requires a device driver to use a wireless NIC. Some drivers are included in
the Windows distribution software, others need to be installed from a CD or
downloaded before the device will work.
The wireless settings can be managed by Windows in XP SP3 and later versions.
Settings can also be managed by the NIC manufacturer's sofware. In many cases,
windows will manage the basic settings, but advanced features are only available
The Training Foundry – May 2009
9
Wireless Connection to Broadband
using the manufacturer's software. Administrators can choose whether to use the
Windows software or the manufacturer's software. Determining which software is in
control of the NIC is a key issue in troubleshooting failed connections.
Both Windows and other software allow users to save combinations of settings.
These are sometimes called Profiles. Windows settings can also be determined by
Group Policy in a Domain.
IP Addressing
In order to communicate, devices must have appropriate IP addresses. The IP
address used in not normally part of the settings given to the Wireless NIC. IP
addresses can be determined in the following ways:
1. Manually set
2. Automatically set by DHCP
3. Automatically set by APIPA (Automatic Private IP Addressing)
APIPA is not a good choice for lab exercises, because every time the NIC is reset,
there is a 5-minute delay while Windows waits for a DHCP address, before the
APIPA address is used.
The Training Foundry – May 2009
10
Wireless Connection to Broadband
3. Infrastructure Wireless Networks
and Internet Gateways
Infrastructure Network Components
With an infrastructure network, computers are connected wirelessly to a central
device called an Access Point. An Access Point is essentially a bridge between wired
and wireless ports. The wired system to which an AP connects is called the
Distribution System (DS) and wireless clients are called Stations.
AP Installation and Management
To install an access point, you require a power supply. It is usually supplied with a
default configuration. This configuration can be changed and usually a number of
ways of managing the router is supplied e.g. via a browser/HTTP connection, va a
console port.
Configuring an AP
There are some basic parameters required to configure the wireless aspects of the
Access Point:
SSID – the Service Set Identifier (SSID) needs to be set. It usually has a
default value e.g. tsunami for Cisco Access Points, NETGEAR for Netgear
Access Point.

Channels. Wireless 802.11 networks can operate using a number of different
channels. The AP needs to be set to use a certain channel. Again there is
usually a default value e.g. Channel 1 for 802.11b/g networks.
Clients connect to the AP by listening for Beacon Frames (contain the SSID) and
using this to ‘associate’ with the AP. Security will be covered later.
Access Point Roles
An AP can operate in a number of different roles
1. Normal: AP connects to Internet. Clients connect to AP
2. Roaming: more than 1 AP. Usually aim for an overlap of 15% between APs.
3. Standby: this can be used in case the wired system fails, another AP fails.
4. Repeater APs: AP is not connected to the Internet but acts as a relay,
relaying frames to the AP. It requires ‘double’ airtime!
DSL (Digital Subscriber Line) Gateway or Router
Most networks require Internet access. An Access Point can provide a connection to
the Internet. In a home or small business setting, this is often achieved through a
cable or phone line using DSL (often referred to as a broadband connection). IThis
connection is provided by an Internet Service Provider (ISP) such as British Telecom,
Plusnet, Wanadoo. There is usually a monthly tariff from around £5 upwards. The
greater the cost, the more bandwidth you get, plus other services e.g. free web
space, multiple emails, 24 hour helpline. ISP provides connection details for
configuring AP. Telephone DSL (ADSL) is a shared connection to the home from the
local exchange so the more users, the less bandwidth each gets
The Training Foundry – May 2009
11
Wireless Connection to Broadband
Some gateways have an Ethernet port instead of an ADSL port. These are usually
used in conjunction with an ADSL/Ethernet modem or Cable Modem.
Wireless Gateways or Routers normally provide additional services such as DHCP,
NAT and Firewall.
These devices normall also provide a number of wired ethernet ports. These ports
are effectively on the wireless (internal) side of the Router, and are on the same
subnet as the wireless clients.
Cable Modems
Cable Modems provide digital access to the cable system. In many cases the modem
is built-in to the Wireless router.
Wireless Broadband Routers
Wireless Broadband Routers provide wireless connections to Broadband Internet
services. These routers normally have the appropriate hardware for the particular
broadband technology used, such as ADSL, Cable or Ethernet. The ISP will normally
provide the broadband connection settings, such as protocols and authentication.
These devices normally provide a range of other services such as DHCP, NAT and
Firewall.
They are configured similarly to APs, usually by using a Web Browser.
Access Points and Wired Ethernet
An Access Point is different from a Wireless Router. An AP usually also has only one
port to enable connection to an Ethernet network. APs do not normally provide
DHCP, NAT or Firewall services, and simply bridge between the wired and wireless
ports. A wired connection can also be used to provide the power supply for some
APs using Power over Ethernet (PoE) This is useful if an AP is required in an area
with no electrical power supply.
Clients on a Wireless Infrastructure Network
The clients on a wireless infrastructure network require a wireless card. This should
be set to Infrastructure mode. The card should automatically find the Access Point.
Users can either use Windows or proprietary client software to control the
connection, and change settings such as SSID, and security options.
The Training Foundry – May 2009
12
Wireless Connection to Broadband
4. Other Wireless Technologies:
Bluetooth, Infrared, GSM, GPRS, 3G
Your instructor will lead a session on other wireless technologies including Bluetooth,
infrared and the mobile phone network.
Other Wireless Technologies
There are a number of other wireless technologies. Some are concerned with
Persona Area Networks (PANs). PANs are short range (<10m), low power (1mW)
systems. They can be used for:Mobile phone to handset
MP3 player to stereo headphones
PDA to printer/laptop
Control and measurement (ZigBee)
... and many more
PAN technologies include IrDA, Bluetooth, Ultra WideBand (UWB) and ZigBee.
Other wireless technologies are longer range and allow connection over much longer
distances from several kilometres upwards. These technologies include the existing
cellular telephone network, 3G and satellite technologies. Methods of accessing them
include GPRS and 3G datacards and Blackberry devices. In the future WiMAX is
likely to be an emerging technology briding the gap between Local Area Networks
and Wide Area Networks.
IrDA, InfraRed Data Association
This uses infrared, similar to the TV remote. It requires line of sight and
communication can be interrupted by bright ambient light. It is a low speed
communication (115.2kbps) although newer standards allow up to 16Mbps. It is
being replaced by the other PAN technologies.
Bluetooth
Bluetooth is an IEEE 802.15 Wireless Personal Area Network (WPAN). The
communication is based on Frequency Hopping Spread Spectrum (FHSS) with a
master-slave relationship. It operates in the same frequency range as Wifi 802.11b/g
but does not suffer much from interference due to the frequency hopping principle.
Applications vary and are not standardised so each device may have different
Bluetooth profiles available. This can cause problems.
GSM, Global Systems for Mobile Communications
This is the current cellular mobile phone system. It provides a throughput of about
34kbps (similar to an analogue modem) and is OK for voice but not so good for data.
GPRS, General Packet Radio System
GPRS (sometimes known as 2.5G) provides a data packet service on top of GSM.
Therefore the underlying technology is the same but it can achieve greater data
rates, typically 115.2kbps. This is still not very fast for data transfer. GPRS can also
be quite expensive for large amounts of data – pay as you go £1/Mb or more. We
can access GRPS via a mobile phone or PDA and via a GPRS datacard from a
laptop. Alternatively we can use a short range technology such as Bluetooth to
connect our PC/laptop to our mobile phone/PDA and then use the mobile phone/PDA
The Training Foundry – May 2009
13
Wireless Connection to Broadband
essentially as an access device into the GPRS system. Specific devices such as
Blackberry have been developed. Blackberry is always ‘connected’ – needs a server
at the destination. Cost is the handset cost (sometimes free) plus a monthly tariff.
3G (3rd Generation)
3G is the latest mobile telecommunications service and can achieve throughput of
300kbps or more. There are a number of services including conversational,
streaming, interactive and email/ftp. Many mobile phone operators supply 3G
Datacards to connect laptops but pricing is still quite expensive – need to recoup the
licence fees (£200 million paid by one contractor!). Coverage is also an issue in
some areas particularly more remote areas.
Convergence is likely to increase over the next few years. Devices will connect via
3G, Wimax and WiFi enabling them to take advantage of hot spots and Wimax when
available with 3G as the backup. Charging, costs and addressing are issues that
need to be resolved. British Telecom (BT) already provides a “Fusion” telephone that
connects via Bluetooth using Voice over IP on Broadband when you are at home,
and uses GSM when you are out of range of the Bluetooth / Broadband Gateway.
Satellite Mobile Communications
Satellite is a good alternative to GPRS and 3G particularly in remote areas. There
are a number of satellite services e.g. GAN, Global Area Network, a worldwide
service of 64 kbps which is good for voice, RBGAN, Regional Broadband Global
Area Network which is designed for data as well as voice.
Satellite is quite costly. For example a device that connects to the RBGAN service
can cost from £450 - £10000 but then ongoing costs linked to amount of data
transferred. For example a typical prepay option is £400 for 68Mb. This is around £5
per Mb, more expensive than 3G.
The following table provides an overview of satellite services:SATELLITE Iridium
GlobalStar Thuraya
Inmarsat Inmarsat
Fleet
RBGAN
Inmarsat
M4
Europe,
N. Africa,
Middle
East
Indian
Sub
Continent.
Global
except
polar
regions
Europe, N
Africa,
Middle East
& Indian
region. Will
be global,
late 2005.
Global –
excluding
polar
region
Yes
Americas,
America,
Europe, N.
Africa
coast,,
Middle
East,
Australasi
a
Yes
Yes
Yes
No
Yes
Yes
Yes
Yes
Yes
Yes
Yes
2.4k (9.6k
compressed)
Yes
9.6k
9.6k
64k
Yes
Yes
N/A
144k
64k
(contended)
N/A
N/A
Yes
No
No
N/A
N/A
Coverage
Global
Voice
service
Data
service
Max data
rate
Txt msg
receive
Txt msg
send
The Training Foundry – May 2009
N/A
14
Wireless Connection to Broadband
Prepay
Yes
No
Yes
Yes
No
Yes
Postpay
Yes
Yes
Yes
Yes
Yes
Yes
The Training Foundry – May 2009
15
Wireless Connection to Broadband
5. Security: Threats, vulnerabilities
and Countermeasures
Key Topics








Threats
Vulnerabilities
Countermeasures
Encryption
Certificates
Elementary Security Measures
o Turning off SSID Broadcasts
o MAC Address Filtering
Advanced Security Measures
o WEP
o WPA
o 802.11i and WPA2
o Wired Security from ISP: PPPoA
Threats







Damage
Denial of Service
Espionage
Use of facilities
Theft
Classes of Hackers
Viruses, Trojans, Worms
Need to elaborate more here- see slides
Vulnerabilities






Operating System
Social Engineering
Application vulnerabilities
Physical security
Protocols
Data Pathways
Need to elaborate more here- see slides
Countermeasures






O/S Hardening
Anti-Virus Software
Firewalls
Encryption
Authentication
Authorization
The Training Foundry – May 2009
16
Wireless Connection to Broadband


Accounting (auditing)
Education
Need to elaborate more here- see slides
Encryption





Algorithms, Plain Text, Cipher Text
Symmetric
o DES, 3DES, RC4, AES
Asymmetric
o Diffie Hellman, RSA, Elliptic Curve
Digital Signatures
Certificates
Need to elaborate more here- see slides
Wireless Tricks




Hacking:
o monitor and capture packets, use to enter network. S/W includes
Airsnort, NetStumbler
Jamming
o Send a signal which disrupts the WLAN
WLAN Jack
o Sends Fake Disassociation packets
Rogue Access Points
o Allows later hacking inside firewall
o Can trap usernames and passwords if clients are unaware
Countermeasures
SSID Broadcast control: Turning off SSID Broadcasts at the AP will mean that
clients do not automatically find the network. Does that make it secure from hackers?
MAC Address filtering: Adding a MAC address filter will allow only authorised
clients to access the wireless AP. Is this a sufficient deterrent? Note that the Cisco
NIC allows you to set the MAC address. Can you pretend to be a valid station on
someone else’s network?
In a home or small business, maintaining a list of MAC addresses for all clients may
be feasible. In larger organisations it is not a feasible method of security.
Advanced Security Measures
Authentication & encryption are viewed as the two main mechanisms for securing a
wireless network. There are a number of mechanisms including
 WEP: this was the first security measure for wireless LANs. All data was
encrypted before transmission however the encryption mechanism was
weak and a crack for WEP was widely reported
 802.1x and EAP: these provide authentication for your network.
The Training Foundry – May 2009
17
Wireless Connection to Broadband

WPA, WPA2, 802.11i: WPA = Wifi Protected Access and is a security
measure based on 802.11i for Wifi networks. WPA2 is the latest version.
VPNs (Virtual Private Network): this is a method of providing a secure ‘tunnel’
and can be implemented over both wired and wireless networks.
Many ‘home’ wireless Access Points provide a form of firewall and the wired link
between the ISP and the Access Point is secured using PPPoA or a similar protocol.
How to set up a secure WLAN
Need more input here - see slides
The Training Foundry – May 2009
18
Wireless Connection to Broadband
6. Bands, channels and interference
Your instructor will lead a session on frequency bands, channels and interference for
wireless networks.
Picture from http://www.lbl.gov/MicroWorlds/ALSTool/EMSpec/EMSpec2.html
Key points to understand:




Radio Waves are part of the Electromagnetic Spectrum
All Radio transmissions are regulated
Most Radio transmissions require a license
ISM and UNII bands are exceptions: They are Unlicensed, but still regulated.
Important organizations for standardization and regulation






IEEE – Institute for Electrical and Electronic Engineers. The IEEE promotes
the engineering process of creating, developing, integrating, sharing, and
applying knowledge about electro and information technologies and sciences
for the benefit of humanity and the profession. http://www.ieee.org.
WLANA – Wireless LAN Association. Voluntary group of affilicated
organizations in the Wireless LAN industry. http://www.wlana.org.
Wi-Fi Alliance - The Wi-Fi Alliance is a global, non-profit industry trade
association with more than 200 member companies devoted to promoting the
growth of wireless Local Area Networks (WLAN). http://www.wi-fi.org.
OfCom – Ofcom is the independent regulator and competition authority for
the UK communications industries, with responsibilities across television,
radio, telecommunications and wireless communications services.
http://www.ofcom.org.uk.
ETSI – The European Telecommunications Standards Institute (ETSI) is an
independent, non-profit organization, whose mission is to produce
telecommunications standards for today and for the future.
http://www.etsi.org.
FCC – The Federal Communications Commission (FCC) is an independent
United States government agency, directly responsible to Congress. The FCC
was established by the Communications Act of 1934 and is charged with
The Training Foundry – May 2009
19
Wireless Connection to Broadband
regulating interstate and international communications by radio, television,
wire, satellite and cable. The FCC's jurisdiction covers the 50 states, the
District of Columbia, and U.S. possessions. http://www.fcc.gov.
The IEEE LAN Standards family
Table of IEEE 802 LAN standards including 802.1x
802 – Local Area Networks
802.1 – Link Management (802.1x Link Authentication)
802.2 – Framing
802.3 – Ethernet
802.4 – Token Bus
802.5 – Token Ring
802.6 – MAN
802.7 – Broadband
802.8 – Fibre Optics
802.9 – Integrated Services LAN
802.10 – Stds. for Interoperable LAN Security
802.11 – Wireless LANs
802.12 – Demand Priority
802.14 – Cable TV Broadband
802.15 – Wireless PAN (similar to Bluetooth)
802.16 – Broadband Wireless
The 802.11 Wireless Family
802.11 802.11a
2.4GHz 5GHz
1,2
5,9,12,18,24,36,48,54
802.11b
802.11g
2.4GHz
2.4GHz
1,2,5.5,11 6,9,12,15,24,36,48,54
FHSS,
DSSS
1.2
OFDM
DSSS
OFDM
32
5
32
300
40-bit
RC4
Authentication No
225
40/104bit RC4
300
40/104bit RC4
Distribution
System
Network
802.3
300
40/104bit
RC4
Shared
Key
802.3
Frequency
Data Rates
(Mbps)
Modulation/
Transmission
Effective Data
Throughput
Mbps
Range (feet)
Encryption
802.3
Shared Key
Shared Key
802.3
Table of 802.11 wireless standards a, b, g
CHANNEL Frequency
ID
(MHz)
1
2
3
2412
2417
2422
The Training Foundry – May 2009
FCC
(USA)
X
X
X
ETSI
France Japan
(Europe)
X
X
X
-
X
X
X
20
Wireless Connection to Broadband
4
5
6
7
8
9
10
11
12
13
14
2427
2432
2437
2442
2447
2452
2457
2462
2467
2472
2484
X
X
X
X
X
X
X
X
-
X
X
X
X
X
X
X
X
X
X
-
X
X
X
X
-
X
X
X
X
X
X
X
X
X
X
X
Table of 802.11b/g Channels and Frequencies
The above table shows that different countries have different regulations over
frequency transmission. For example France only allows the use of Channels 10 - 13
for Wireless 802.11b/g networks, whereas the UK (ETSI) allows Channels 1-13
The Training Foundry – May 2009
21
Wireless Connection to Broadband
802.11b/g Channels (Showing Overlap)
2.4GHz Industrial Scientific and Medical (ISM) Band
2.400GHz-2.4835GHz
802.11a Channels (Non-overlapping)
5 GHz Unlicensed National Information Infrastructure
(U-NII) Bands
5.150GHz-5.250GHz
5.250GHz-5.350GHz
5.725GHz-5.825GHz
The Training Foundry – May 2009
22
Wireless Connection to Broadband
7. Conclusion
Wireless networks are becoming more widespread and more widely used, and
implemented in more and more devices.



Wireless LANs will continue to improve in speed and range
Longer range wireless (eg. WiMAX) will develop
More devices will be able to use wireless connections (iPods, Camera)
Some Wireless Projects currently available or in development:




Wireless USB (Ultra Wide Band) Short range (PAN) wireless connection of
devices to computers instead of USB.
Mesh Networks: Wireless devices “find” each other and configure themselves
automatically in a mesh. Extending range simply involves adding devices.
Zigbee – wireless control and monitoring of lights temperature, central heating
etc.
RFID – Wireless “Bar Codes”
The Training Foundry – May 2009
23
Wireless Connection to Broadband
Bibliography
Davies, J (2003), Deploying Secure 802.11 Wireless Networks with Windows,
Microsoft Press International, ISBN 0735619395
Duntemann, Jeff (2003), Jeff Duntemann’s Drive-By WiFi Guide, Paraglyph Press,
ISBN 1-932111-74-3
Flickenger, Rob (2003), Wireless Hacks: 100 Industrial Strength Tips and Tools,
O'Reilly, ISBN 0596005598
Gast, Matthew S (2003), 802.11 Wireless Networks: The Definitive Guide, O’Reilly,
ISBN 0596001835
Planet 3 Wireless (2005), CWNA Certified Wireless Network Administrator Official
Study Guide (Exam PW0-100) Third Edition, Mc Graw Hill/Osborne,
ISBN 0072255382
Planet 3 Wireless (2003), CWSP Certified Wireless Security Professional Official
Study Guide (Exam PW0-200), Mc Graw Hill/Osborne, ISBN 0-07-223012-6
Tanenbaum, Andrew (2002), Computer Networks, Fourth Edition Prentice Hall PTR,
ISBN 0130384887
The Training Foundry – May 2009
24
Download