wireless. wireless hosts: end system devices; may or may not be mobile wireless links: a host...

19
Wireless

Upload: david-bryan

Post on 17-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

Wireless

Page 2: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

Wireless

• Wireless hosts: end system devices; may or may not be mobile

• Wireless links: A host connects to a base station or host through a communication link

• Base station: Responsible for sending and receiving data (access point)

Page 3: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

Standards

Letter Speed Range Frequency

No letter 2 Mbps 150 ft 2.4 GHz

A 54 Mbps 150 ft 5 GHz

B 11 Mbps 300 ft 2.4 GHz

G 54 Mbps 300 ft 2.4 GHz

N 108 Mbps 300 ft 2.4 GHz

Page 4: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

Range Limiters

• Cordless telephones

• Large electrical appliances such as refrigerators

• Fuse boxes, metal plumbing, metal studing and air conditioning units

• Sun spots

Page 5: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

Not wired is…

• Decreasing signal strength

• Interference from other sources

• Multipath propagation (bounce)

Page 6: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

BasicServiceSet

Page 7: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

MAC Protocol

• CSMA with collision avoidance: sense first, then send

• Collision avoidance (can’t send/receive at same time)

• Link-layer ACKs and retransmissions due to high bit-error rates

Page 8: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication
Page 9: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

802.11 frames

• 3 address fields– Address 2 is MAC address of sending station

(host or AP)– Address 1 is MAC address of destination– Address 3 is MAC address of router interface

• CRC value

Page 10: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

We are still working on this questionAnswer is easy if hub is involvedSwitch has “learned” that H1 is in BSS1 and has to be “taught” to use BSS2

Page 11: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

Wireless Security

• Configure a unique SSID then block transmission of it– Unique name is cute, but so what?– If you block transmission, network does not show up

and no way to specify name

• Use MAC filtering. This one makes total sense• Change administrator account name and

password• Why go the extra distance to use WPA2 if you

have done the above?

Page 12: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

Secure Communication

• Confidentiality: only the sender and intended receiver should be able to understand the contents of transmitted message

• Authentication: Both the sender and receiver shoul be able to confirm the identity of the other party

• Message integrity and nonrepudiation: Make sure message is not altered in transit

• Availability and access control: communication can occur in the first place – only lock out the “bad guys”

Page 13: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

Cryptography

• Dates back to Julius Caesar• Allow sender to disguise data so that an intruder

can gain no information from the data intercepted

• Send ciphertext (not cleartext or plaintext)• Symmetric key systems both keys are identical

and are secret • Public key systems use two keys. One is known

(public); the other is known only by Alice or Bob

Page 14: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

Symmetric Key

• Caesar cipher: substitute letter that is k letters removed (alphabet wraps)

• Monoalphabetic cipher: substitute random letter for letter (fixed chart)

• Polyalphabetic encryption: two or more mono’s with a random C1,C2,C2,C1 pick pattern

Page 15: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

DES

• Data Encryption Standard• Encodes plaintext in 64-bit chunks using a

64-bit key (8 bits are odd parity bits; 56 bits long)

• Two (first and last steps) permutation steps; 16 identical steps in the middle

• How well does it work? No one knows for sure. First crack was 4-months, then 22 hours

Page 16: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication
Page 17: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

3DES

• Encrypt with one key; decrypt with second key; encrypts with third key

• Advanced Encryption Standard (AES): processes data in 128-bit blocks using keys that are 128, 192 and 256 bits long

Page 18: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

A core problem

• Both sides have to know secret key

• How is this key communicated? Verified?

• Alternative is the idea of a public key

Page 19: Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication

Public Key Cryptography

• Bob has two keys: one public and one private to him

• Alice gets Bob’s public key; encrypts message

• Bob then decrypts message using private key

• Does this make sense?