...LAN SECURITY Contents: I. Introduction…………………………………………………………………1 II. Wireless LAN Deployment……………………………………………7 III. Wireless LAN Security Overview…………………………………10 IV. Protecting Wireless LANs…………………………………………...13 V. Wireless LAN Security Summary……………………………………18 I. Introduction a. The 802.11 Wireless LAN Standard In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart. Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio frequency for high-speed data communications As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11 specification affects the lower layers of the OSI reference model, the Physical and Data Link layers. The Physical Layer defines how data is transmitted over the physical medium. The IEEE assigned 802.11 two transmission methods for radio frequency (RF) and one for Infrared. The two RF methods are frequency hopping spread-spectrum (FHSS) and direct sequence spread-spectrum (DSSS). These transmission methods operate within the ISM (Industrial, Scientific, and Medical) 2.4 GHz band for unlicensed use. Other devices that operate on this...
Words: 4933 - Pages: 20
...Recognized as an American National Standard (ANSI) IEEE Std 1284-1994 IEEE Standard Signaling Method for a Bidirectional Parallel Peripheral Interface for Personal Computers IEEE Computer Society .- Sponsored by the Microprocessor and Microcomputer Standards Committee h Published by the Institute of Electrical and Electronics Engineers, Inc., 345East 4Tth Street, New York, N y lwlz USA. lEEE December 2, 1994 SH 1 7335 Authorized licensed use limited to: UNIVERSITY OF VICTORIA. Downloaded on July 29,2010 at 20:21:17 UTC from IEEE Xplore. Restrictions apply. THIS PAGE WAS BLANK IN THE ORIGINAL Authorized licensed use limited to: UNIVERSITY OF VICTORIA. Downloaded on July 29,2010 at 20:21:17 UTC from IEEE Xplore. Restrictions apply. Recognized as an American National Standard (ANSI) IEEE Std 1284-1994 IEEE Standard Signaling Method for a Bidirectional Parallel Peripheral Interface for Personal Computers Sponsor Microprocessor and Microcomputer Standards Committee of the IEEE Computer Society Approved March 30, 1994 IEEE Standards Board Approved September 2, 1994 American National Standards Institute Abstract: A signaling method for asynchronous, fully interlocked, bidirectional parallel communications between hosts and printers or other peripherals is defined. A format for a peripheral identification string and a method of returning this string to the host outside of the bidirectionaldata stream is also specified...
Words: 34986 - Pages: 140
...IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 3, MARCH 2000 535 Performance Analysis of the IEEE 802.11 Distributed Coordination Function Giuseppe Bianchi Abstract—Recently, the IEEE has standardized the 802.11 protocol for Wireless Local Area Networks. The primary medium access control (MAC) technique of 802.11 is called distributed coordination function (DCF). DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary slotted exponential backoff. This paper provides a simple, but nevertheless extremely accurate, analytical model to compute the 802.11 DCF throughput, in the assumption of finite number of terminals and ideal channel conditions. The proposed analysis applies to both the packet transmission schemes employed by DCF, namely, the basic access and the RTS/CTS access mechanisms. In addition, it also applies to a combination of the two schemes, in which packets longer than a given threshold are transmitted according to the RTS/CTS mechanism. By means of the proposed model, in this paper we provide an extensive throughput performance evaluation of both access mechanisms of the 802.11 protocol. Index Terms—802.11, collision avoidance, CSMA, performance evaluation. I. INTRODUCTION N recent years, much interest has been involved in the design of wireless networks for local area communication [1], [2]. Study group 802.11 was formed under IEEE Project 802 to recommend an international standard for Wireless Local...
Words: 8526 - Pages: 35
...The Athletes Shack Wireless Upgrade Proposal | | | Proposal with recommendations for installing a wireless network to the existing wire LAN. | | | 6/17/2012 | | Executive Summary 3 Site Survey 4 WLAN Security 5 Beta Testing 7 Equipment 8 Budget 12 Conclusion 12 Bibliography 14 Appendix A: TECHNICAL TERMS 15 Executive Summary The Athletes Shack (TAS) is a chain of sporting goods stores that is looking into adding a wireless network (WLAN) to their current network. TAS has 10 retail distribution stores in the area and would like all the stores to be able to see live inventory suing mobile devices. The management team at Athletes Shack has realized that their success depends on exceptional customer service and efficiency on the floors of the store. To take the next step the company is looking to go wireless and use that technology to separate themselves from other sporting good chains. To continue to have an edge over Foot Locker, Champs Sports and other Athletes Shack feel this is a necessary step. Once the WLAN is installed in each of the 10 locations this will allow remote log in via the internet and VPN connection. The expectation is to have a major improvement on customer service. Added technological benefits to sales associates while on the floor will include real time sales pricing quotes, inventory product availability and to check the company website. In store operations will see additional business value through addition of...
Words: 2939 - Pages: 12
...Networking Questions 1. How many bytes are in a kb? 1,000 2. Zero 3. Convert 00101011 = 43 4. On graphic what part of drive? Track 5. A single Hexadecimal digit is equivalent to ______ binary positions? = 4 6. How voice communications are converting to digital signals? They are broken into very small samples and then binary values are assigned to them. 7. What does compression to video files? It takes a standard video and stores it as a smaller video file. 8. Protocol – http 9. What does the internet core comprise of? Many separate networks, some small and some large. 10. Which of the following design to specifically manage computer peripheral devices? Device drives. 11. Which of the following physical network topologies? Star 12. What is the networking standard? The details of what a networking technology does and how it works. 13. What standards settings body sets de facto standard. None 14. Why is the TCP/IP model divided into larger segments? All of these are correct. 15. Why the TCP/IP model is considered an “open” networking model? It is not owned by a specific organization. 16. What do routers do in a network? Routers move data between different LANs, often by linking them to WAN lines. 17. What is meant by “encapsulation”? It is a way to address data to cross over any type of network link. 18. In TCP/IP networks, every device must have ______ to be able to transmit or receive data. An IP Address...
Words: 969 - Pages: 4
...Introduction Working Groups were created to work and write standards and are open to anyone to participate. They strive for broad representation of all interested parties and encourage global participation. IEEE standards have a comprehensive listing of working groups but not all have public viewable websites. I will focus on the Information Technology working group with the sub-directory of Software and Systems Engineering. The IEEE Computer Society is the largest association for computer professionals in the world and was founded more than 50 years ago. The Software and Systems Engineering Group/Committee mission is to develop and maintain a family of software and systems engineering standards that are relevant, coherent, comprehensive and effective in use. These standards are developed for use by practitioners, organizations, and educators to improve the effectiveness and efficiency of their software engineering processes, and also to improve communications between acquirers and suppliers and the quality of delivered software and systems containing software. They also work to support and promote a Software Engineering Body of Knowledge, certification mechanisms for software engineering professionals, and other products contributing to the profession of software engineering. Justification of IEEE 802 standard used in networking Looking from the outside it looks simple to connect computers through networks. But with everything in life, there should be rules and...
Words: 1514 - Pages: 7
...(1) of the working groups in the IETF or IEEE and briefly summarize what this group is working on. “Working groups chartered by the IETF carry out the actual development of new standards and protocols for the Internet. Membership in a working group is voluntary; any interested party may participate. During the development of a specification, a working group will make a draft version of the document available as an Internet Draft, which is placed in the IETF's "Internet Drafts" online directory. The document may remain as an Internet Draft for up to six months, and interested parties may review and comment on the draft. During that time, the IESG may approve publication of the draft as an RFC (Request for Comment). If the draft has not progressed to the status of an RFC during the six month period, it is withdrawn from the directory. The working group may subsequently publish a revised version of the draft.” (Stallings, p. B-5, 2009). “The IETF is responsible for publishing the RFCs, with approval of the IESG. The RFCs are the working notes of the Internet research and development community. A document in this series may be on essentially any topic related to computer communications and may be anything from a meeting report to the specification of a standard. The work of the IETF is divided into eight areas, each with an area director and each composed of numerous working groups.” (Stallings, p. B-5, 2009). Justify the need of the IEEE 802 standard used in...
Words: 1636 - Pages: 7
...Working groups of IEEE The institute of electrical and electronics engineers is a body responsible for setting standards. There is the numbering of the standards, and the subset is the actual standard. One working group in the IEEE is the 802.11 wireless network standards. 802.11 is standards collections for wireless networking. Some of the popular standards include 802.11a, 802.11n, 802.11g, and 802.11b. They all use the standard to connect to the network and has a limit for data transfer speeds. The first wireless standard was the 802.11a. It operates in a 5 GHz radio band and can attain a maximum of 54Mbps. This standard was not popular as compared to its counterpart 802.11b due to its low range and higher pricing (Patel, 2015). The 802.11b...
Words: 991 - Pages: 4
... . . . . . . . . . . . . . . . . . . 4 Reduced Total Cost of Ownership and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Risks and Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 “Leaky” Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Unapproved Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Exposure of Wireless Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Signal Interference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Evolving IEEE Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....
Words: 2559 - Pages: 11
...interoperable security protocol known as WiFi Protected Access (WPA), based on draft 3 of the IEEE 802.11i amendment. WPA was designed to be a replacement for WEP networks without requiring hardware replacements, using a subset IEEE 802.11i amendment. Organizations who adopt WPA can take advantage of the following features: * Strong cryptography support from the Temporal Key Integrity Protocol (TKIP), based on the RC4 cipher; * WPA-Enterprise, a mechanism for network authentication using IEEE 802.1x and a supported EAP type, one of EAP/TLS, TTLS or PEAP; * WPA-Personal, a mechanism for using TKIP without IEEE 802.1x authentication by using a shared passphrase, intended for consumer networks. In July 2004, the IEEE approved the full IEEE 802.11i specification, which was quickly followed by a new interoperability testing certification from the WiFi Alliance known as WPA2. WPA2 is based on the Robust Security Network (RSN) mechanism, which provided support for all of the mechanisms available in WPA, as well as: * Strong encryption and authentication support for infrastructure and ad-hoc networks (WPA is limited to infrastructure networks); * Reduced overhead in key derivation during the wireless LAN authentication exchange; * Support for opportunistic key caching to reduce the overhead in roaming between access points; * Support for pre-authentication, where a station completes the IEEE 802.1X authentication exchange before roaming; * Support for the CCMP (Counter...
Words: 407 - Pages: 2
...public health. Standards form the fundamental building blocks for product development by establishing consistent protocols that can be universally understood and adopted. Standards also make it easier to understand and compare competing products. As standards are globally adopted and applied in many markets, they also fuel international trade. (IEEE, 2013). Working Groups develop and write standards per PAR approval. They strive for broad representation of all interested parties and encourage global participation. (IEEE, 2013). IEEE 1703-2012 is the standard for LAN/WAN node communication protocol to complement the utility industry end device data tables. This standard was developed and formed with ANSI (published as ANSI C12.22) and Measurement Canada (published as MC12.22) to improve the cost efficiency and flexibility of advanced metering infrastructure (AMI) deployments. According to Yu (2012), it is being developed to define uniform, managed, adaptive and secure network data and message delivery for plug-and-play, multi-source utility meters, home appliances, communication technology and other ancillary devices. The IEEE (Institute of Electrical and Electronics...
Words: 1072 - Pages: 5
...communications, from fast Ethernet to 1terabit Ethernet standard. IEEE, the world's largest professional organization advancing technology for humanity, celebrated Ethernet's 40th anniversary on May 22 2013. IEEE 802.3 "Standard for Ethernet" and the varied technologies, applications and networks that the family of standards helps enable have changed the world as we knew it, and multi-dimensional innovation never stops. Frontiers of IEEE 802.3 Ethernet innovation include ever-increasing speeds and new applications for the technology. For example, in April 2013, IEEE announced the launch of an IEEE 802.3 study group to explore development of a 400 Gb/s Ethernet standard to efficiently support ever-increasing, exponential network bandwidth growth. Fast-growing IEEE 802.3 Ethernet application areas include energy efficiency, the globally emerging smart grid, data centers and supercomputing, access networks, mobile-communications infrastructure, healthcare and medical-device communications, entertainment and networking for automotive and other industries. Furthermore, in both developed and developing areas of the world, IEEE 802.3 Ethernet is being deployed with infrastructure build outs to support the exploding array of applications that users rely on in their every-day lives. Initially developed in order to standardize connectivity among computers, printers, servers and other devices inside a local area network (LAN), IEEE 802.3—first published as a draft in 1983 and as a standard in...
Words: 420 - Pages: 2
...RECOMMENDATIONS FOR WIRELESS NETWORK SECURITY POLICY Introduction One of the newer technologies being increasingly used in today's business is that of wireless networks. While this technology has the advantages of providing greater user mobility and temporary access, it does have the disadvantage of an intrinsic lack of security. SECURITY THREATS There are a number of types of attack that wireless LANs are vulnerable to, based on different aspects of their operation and configuration. These include. i. Broadcast medium Wireless is a broadcast medium, where there is no way to control where the information is sent and who therefore has access to it. If an access point is set up and used in its default Configuration, then the user of such a system is vulnerable to attack, because anyone running sniffer software can see and capture everything that a user does across that network... ii. WEP Vulnerabilities. There were two problems with the original WEP encryption system. Firstly, the shared key system requires the use of the WEP key to verify a user attempting to connect to the wireless network. The second was the actual implementation of the encryption system itself. iii. Denial of Service This type of attack can be perpetrated by a jamming attack which can be either intentional attack which is one in which the attacker broadcasts a very high-power signal at the same frequency that the wireless network is operating on, causing interference to the network...
Words: 906 - Pages: 4
...reasons. They provide mobile access to the Internet and to enterprise networks so users can remain connected away from their desks. These networks can be up and running quickly when there is no available wired Ethernet infrastructure. They are reported to reduce setting up costs by 15%. But, with these benefits come the security concerns. WLANs have very little security. An attacker can listen to you, take control of your laptops/desktops and forge him to be you. He can cancel your orders, make changes into your databases, or empty your credit cards. a. The 802.11 Wireless LAN Standard: In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio frequency for high-speed data communications. As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11 specification affects the lower layers of the OSI reference model, the Physical and Data Link layers. The Physical Layer defines how data is transmitted over the physical medium. The...
Words: 2926 - Pages: 12
...Working Group in the IEFT The Internet Engineering Task Force (IETF) has an overall mission to make the internet work better and to run faster. The way that they accomplish this is by creating high quality and technical documents that are relevant to influence the way that people use, design and manage through the internet (Working Groups). Within the IETF, there are many different working groups. Working groups in the IETF have primary mechanisms so that the development of IETF and the specifications and guidelines have certain recommendations and standards (Working Groups). Working groups were created so that it can address and fix certain problems. Working groups usually do not last long because once it completes what it was out to do then they no longer are generally needed. There are many active working groups in the IETF. One of the working groups is called Applications Area Working Group (APPSAWG). This group was started in October of 2010. This group focuses on many different topics which might be the reason to why there group has been around for a few years. Some of the main points in which APPSAWG works on include Well-defined security issues that are relevant to multiple application technologies (APPSAWG). Another of the main points that APPSAWG focuses on according to Applications Area Working Group is “small-scale additions to the protocol stack for HTTP and other application technologies, mostly related to service discovery and meta-data”. Then...
Words: 1228 - Pages: 5