mirror of
https://github.com/jackyzha0/quartz.git
synced 2026-03-25 07:25:42 -05:00
187 lines
6.7 KiB
Markdown
187 lines
6.7 KiB
Markdown
---
|
||
title: "09-wireless-networking"
|
||
tags:
|
||
- lecture
|
||
- cosc301
|
||
---
|
||
|
||
IEEE 802 Standards
|
||
- 802.1: Bridging and Management, e.g. 802.1X
|
||
- 802.3: Ethernet
|
||
- 802.11: Wireless (WiFi)
|
||
- 802.11b, 802.11a, .11d, .11g, …, .11aj, .11ay
|
||
- 802.16 Broadband Wireless MAN (WiMAX)
|
||
- 802.15.4: Zigbee, wireless sensor networks
|
||
- 802.15.1: bluetooth, 802.15.6: WBAN
|
||
- http://standards.ieee.org/getieee802/
|
||
|
||
802.11 Family
|
||
- 802.11b
|
||
- 11Mbps, 2.4GHz, Kick-started Wi-Fi technology, ~30m indoors.
|
||
- 802.11a
|
||
- 54Mbps, 5GHz, technically superior to 11g, gradually common.
|
||
- 802.11g
|
||
- 54Mbps, 2.4GHz, still very common. Compatible with 11b.
|
||
- 802.11n
|
||
- 540Mbps (typ. 200Mbps), 2.4+5GHz, current choice
|
||
- Max speed hard to determine, ~50m indoor, MIMO
|
||
- Supports a/b/g or ‘Greenfield’ (exclusive).
|
||
- Also supports extensions for priority, multimedia
|
||
- 802.11aj -- 15Gbps, mmWave
|
||
- 802.11ay -- 20Gbps, mmWave
|
||
|
||
> [!INFO] millimeter wave still not popular but very fast. might be dangerous to human health. very short range
|
||
> wifi has different frequency band in different countries. same frequency band but different "sub freqs" - channel
|
||
|
||
Operation Modes of 802.11
|
||
- Independent or ad-hoc mode
|
||
- Nodes in an ad-hoc network communicate without any need for network infrastructure such as an AP, or network level services such as DHCP, DNS
|
||
- ZeroConf protocols to manage IP addresses etc.
|
||
- Infrastructure or managed mode
|
||
- Requires an access point (AP) to function
|
||
- Higher network layers such as data link and IP are configured using the same methods as any wired Ethernet. Most commonly DHCP is used
|
||
- Further security measures may be employed to manage security risks associated with wireless
|
||
|
||
> [!INFO] more bandwidth = higher speed but less range
|
||
|
||
Ad Hoc mode
|
||

|
||
> [!INFO] e.g., peer to peer directly between laptops. e.g., airdrop, bluetooth, android wifi direct
|
||
> can set up computer to copmuter network.
|
||
> you can make any host an access point. and set it up as a server to route traffic to the internet. but this would be a slow AP
|
||
> dont need configuration. i.e., no DHCP nor DNS
|
||
|
||
Infrastructure mode
|
||

|
||
> [!INFO] AP includes services like DHCP and DNS
|
||
> eventually connects to wired network
|
||
> [!INFO] Infrasrtucture mode can have multiple APs connected together
|
||
|
||
Basic terminology
|
||
- AP: Access Point
|
||
- STA: Station/devices
|
||
- BSS: Basic Service Set
|
||
- A group of stations that communicate with each other via an access point.
|
||
- ESS: Extended Service Set
|
||
- Multiple BSSs can be linked using a distribution system to create an Extended Service Set
|
||
- SSID: Service Set Identifier
|
||
- The MAC address of an AP
|
||
- ESSID: Extended Service Set Identifier
|
||
- The name of the network
|
||
> [!INFO] if there is only on AP it is BSS
|
||
> if there are more than one AP it is ESS
|
||
> each AP in a ESS can have a different configuration
|
||
|
||
Wireless Distribution System (WDS)
|
||
- Backbone of multiple APs, and the inter-AP communication. Usually Ethernet, may be wireless.
|
||
- 802.11F defines the Inter Access-Point Protocol (IAPP)
|
||
|
||
> [!INFO] used for ESS. connected APs togehter
|
||
> do handover, access control etc
|
||
|
||
Signal Strength
|
||
- Signal Level: Strength of the received signal
|
||
- Noise Level: Strength of the noise
|
||
- Link Quality: Signal to Noise Ratio (SNR) (10:1 is a good ratio) (1:1 is a bad ratio)
|
||
- Transmit Power: How loud we speak
|
||
- Receive Sensitivity: How well we can hear
|
||
- Decibel: 10*log10(P/P0), which shows the ratio of power of one signal over another.
|
||
> [!INFO]
|
||
|
||
Finding a Network
|
||
- Passive scanning listens for AP beacons
|
||
- Listens on each channel for a certain dwell time
|
||
- Won’t detect closed/hidden networks
|
||
- Active scanning sends Probe Requests
|
||
- On each channel
|
||
- Requests a particular ESSID or “any”
|
||
- Produces a scan report with discovered ESSIDs
|
||
> [!INFO] active scanning is most only hacker trying to access other peoples wifi
|
||
> most laptops use passive scanning
|
||
> drive by, tries to scan all wifi networks (including hidden), and identify possible weak ones
|
||
> if you dont become a target no one will try to hack you
|
||
> dont "boast" about what you have
|
||
|
||
Security of WiFi
|
||
- MAC Filter List
|
||
- Not a security protocol
|
||
- Access Control by (changeable) MAC address
|
||
- ACLs can be stored centrally using RADIUS
|
||
- WEP (Wired Equivalent Privacy)
|
||
- Minimal protection
|
||
- Not secure due to short key length
|
||
- Pre-Shared Key (PSK)
|
||
> [!INFO] MAC can be forged. not secure
|
||
> WEP not secure, key is too short
|
||
|
||
WPA
|
||
- Wi-Fi Protected Access
|
||
- Subset of 802.11i that was released when WEP flaws became a barrier to adoption
|
||
- WPA Personal
|
||
- WEP with short-lived changing keys
|
||
- Temporal Key Integrity Protocol (TKIP)
|
||
- Different key per user/session/packet
|
||
- Performance cost if not done in hardware
|
||
> WPA/WPA2 is common
|
||
|
||
WPA Enterprise
|
||
- WPA Enterprise
|
||
- 802.1X for user authentication
|
||
- “Port” based authentication framework
|
||
- Extensible Authentication Protocol (EAP)
|
||
- Requires RADIUS backend
|
||
- 802.11i—WiFi Alliance calls it WPA2
|
||
- Advanced Encryption Standard (AES) cryptography
|
||
>[!INFO] WPA enterprise everyone has their own account. this way you can hold people acountable is their accound is hacked. we know which accound had access
|
||
|
||
> [!QUESTION] what is RADIUS backend
|
||
|
||
Security Issues
|
||
- Bandwidth stealing
|
||
- You are responsible for their actions
|
||
- Access to wired network
|
||
- and other wireless nodes
|
||
- ARP Poisoning
|
||
- Man-in-the-middle attacks
|
||
- AP Spoofing
|
||
|
||
> [!INFO] ARP poisoning, once you connect to the wifi someone else can pretend to be the router. respond to ARP requets before AP, and route request through their own computer
|
||
|
||
Uses of Wireless
|
||
- When cables are a hassle/liability ✔
|
||
- Transient networks ✔
|
||
- Hotspots✔
|
||
- Backup links ✔
|
||
- Reliability ✗
|
||
- Security (can be managed) ✗
|
||
- Speed ✗
|
||
|
||
Channel Layout
|
||
- 13 channels (1, 2, …, 13)
|
||
- Hex-pattern layout for non-overlapping channels
|
||
- But don’t forget that space is 3D
|
||
- Limit number of nodes to about 30 per AP
|
||

|
||
|
||
Antenna Types
|
||
- Omni-directional
|
||
- Diversity antennas
|
||
- High-gain Omni
|
||
 
|
||
|
||
Antenna Types
|
||
- Directional
|
||
- Panel, Yagi, Parabolic
|
||
- Shown is a Wave-Guide “cantenna”
|
||
- Trade off polar coverage for distance
|
||
- dBi is used to measure the gain: 10*log10(PD/PO), PD is the power for directional, PO is the power for standard omnidirectional.
|
||

|
||
|
||
|
||

|
||

|
||

|
||

|
||

|
||
|