Networking 20 PDF
Document Details
Uploaded by SeasonedJoy1900
Kennesaw State University
Tags
Summary
This document provides an overview of networking concepts, including wireless networking components, security considerations, and the use of Power over Ethernet (PoE). It covers topics such as LAN vs WLAN security, wireless access points (WAPs), and how PoE injectors work. The document is suitable for undergraduate students studying computer networks or related disciplines.
Full Transcript
Networking 20 **Wireless N**etworking Components: - **LAN vs. WLAN Security:** - **Contrast in Security Mechanisms:** Unlike traditional LANs where physical access constraints enhance security, WLANs inherently broadcast data over radio waves, necessitating distinc...
Networking 20 **Wireless N**etworking Components: - **LAN vs. WLAN Security:** - **Contrast in Security Mechanisms:** Unlike traditional LANs where physical access constraints enhance security, WLANs inherently broadcast data over radio waves, necessitating distinct security strategies. In LANs, disabling ports and physical controls limit access; in WLANs, encryption and authentication become vital to prevent eavesdropping. **Wireless Access Points (WAPs):** A Wireless Access Point (WAP) is a networking hardware device that allows wireless devices to connect to a wired network using Wi-Fi. It acts as a bridge between the wired network (like a local area network, or LAN) and wireless devices such as laptops, smartphones, tablets, and IoT devices. **Key Features of WAP:** 1. **Connectivity:** WAPs enable wireless devices to connect to a wired network, providing internet access and facilitating communication among connected devices. 2. **Range Extension:** They help extend the coverage area of a wireless network, allowing devices to connect from greater distances than would be possible with a standalone router alone. 3. **Multiple Connections:** WAPs can support multiple simultaneous connections from various devices, making them ideal for environments with many users, such as offices or public spaces. 4. **Management and Configuration:** Many WAPs come with built-in management interfaces that allow administrators to configure settings, manage user access, and monitor network traffic. 5. **Security Features:** WAPs often include security protocols such as WPA3, WPA2, and MAC address filtering to protect against unauthorized access. **How a WAP Works:** 1. **Connection to Network:** A WAP is typically connected to a router or switch via an Ethernet cable, forming part of the wired network. 2. **Wireless Communication:** It converts data into radio signals for transmission and receives radio signals from wireless devices, translating them back into data for the wired network. 3. **Channel Management:** WAPs operate on specific frequency channels (like 2.4 GHz and 5 GHz) and can manage bandwidth and traffic to optimize network performance. **Advantages of Using a WAP:** - **Enhanced Coverage:** WAPs can significantly increase the coverage area of a wireless network, allowing for connectivity in larger areas. - **Scalability:** Adding multiple WAPs in a network can accommodate more devices and expand coverage seamlessly. - **Centralized Management:** Many modern WAPs can be managed centrally, allowing for easier administration of network settings and security policies. **Considerations:** - Interference: WAP performance can be affected by interference from other wireless devices, physical obstructions, or overlapping channels, necessitating careful placement. **Power Over Ethernet (PoE):** A Power over Ethernet (PoE) Injector is a device that adds power to an Ethernet cable, enabling a single cable to provide both data connectivity and electrical power to network devices. This is particularly useful for powering devices such as wireless access points, IP cameras, and VoIP phones that are installed in locations where it might be difficult or costly to run electrical wiring. **Key Features of PoE Injectors:** 1. **Power and Data Combination:** PoE injectors add power to the Ethernet cable, allowing it to deliver both data and power, eliminating the need for an additional power source for the end device. 2. **Cost-Effective Deployment:** They simplify installation by reducing the need for electrical wiring and outlets near network devices, making deployments more flexible and cost-effective. 3. **Compatibility:** PoE injectors support various PoE standards, such as IEEE 802.3af, 802.3at (PoE+), and 802.3bt, which define the amount of power that can be delivered over Ethernet. 4. **Plug-and-Play:** Most PoE injectors are simple to install and use, as they do not require any configuration. Users only need to plug them between the switch and the powered device. **How a PoE Injector Works:** 1. **Connection to Network:** The injector has two Ethernet ports. The \"Data In\" port connects to a non-PoE switch or router, and the \"Data & Power Out\" port connects to the powered device, such as a WAP or IP camera. 2. **Power Injection:** The injector draws power from an external power source and adds it to the Ethernet cable that connects to the powered device. 3. **Device Operation:** The powered device receives both power and data over the same Ethernet cable, allowing it to operate without a separate power cable. **Advantages of Using a PoE Injector:** - **Flexibility in Placement:** Enables installation of network devices in optimal locations without the need for nearby power outlets. - **Simplified Installation:** Reduces cabling requirements, lowering installation and maintenance costs and complexity. - **Increased Reliability:** PoE injectors can provide UPS (Uninterrupted Power Supply) support, increasing network device uptime during power outages. **Considerations:** - **Power Budget:** Ensure the PoE injector can deliver sufficient power for the intended device, especially if using high-power devices that require standards like PoE+ or PoE++. - **Network Performance:** While PoE injectors handle power injection, ensuring the Ethernet cables are of good quality and appropriate length (typically up to 100 meters) is crucial for maintaining network performance. - **Scalability:** For larger networks, using PoE switches, which integrate power into the switch itself, might be more efficient than individual injectors for each device. - **Management Complexity:** In larger setups, managing multiple WAPs can become complex, which is why many businesses opt for centralized wireless management systems. **Wireless Networking Protocols:** - **CSMA/CA and RTS/CTS:** - **Network Protocols:** Wireless networks operate using CSMA/CA to manage devices trying to communicate over the same medium. Unlike Ethernet\'s collision detection (CSMA/CD), CSMA/CA preemptively avoids collisions. - **RTS/CTS Mechanism:** This optional protocol enhances the visibility of wireless devices during data transmission by using RTS and CTS frames to reserve the channel, reducing collisions but introducing overhead that can impact performance. **Wireless Infrastructure:** - **Service Sets:** - **BSS and EBSS:** A Basic Service Set (BSS) consists of a single WAP servicing an area. For broader coverage, multiple WAPs form an Extended Basic Service Set (EBSS), providing seamless connectivity across larger premises. - **Mesh Networks:** Mesh networks use interconnected Wi-Fi nodes that automatically route traffic between them, improving coverage and reliability over traditional setups by effectively extending the network\'s reach without additional WAP configuration complexity. **Wireless Networking Security:** - **Security Concerns:** - **Inherent Vulnerabilities:** Wireless transmissions\' openness to interception necessitates robust security measures, including MAC filtering, authentication, and encryption. Initial network security begins with proper configuration rather than relying solely on default settings. - **SSID Management:** Change the default SSID to something unique to reduce easy identification by attackers since default SSIDs can reveal hardware details. While disabling SSID broadcast might deter casual users, it doesn\'t prevent determined attackers from finding your network. - **Best Practices:** - **SSID Configuration:** Avoid broadcasting the SSID publicly unless necessary, but recognize that this alone won\'t secure the network. Choose SSID names that don\'t divulge sensitive information or attract undue attention. - **Channel Management:** Although channel selection concerns performance more than security, ensuring optimal channel selection can prevent interference. Modern systems usually auto-select channels intelligently. **Access Point Placement and Radio Power** **Setting Up a Wireless Network:** **Space Considerations:** **Antenna Placement:** Position omni-directional antennas centrally within the home or office space. The closer a WAP is to an external wall, the more likely it is that the signal can be accessed from outside. Adjusting the power levels of the WAP can help control the range of the signal to cover only the intended area. **Physical Security:** **Secure Positioning:** Ensure that WAPs are located in physically secure areas, out of reach of unauthorized individuals. This is important because the physical Ethernet ports on WAPs are not encrypted or password-protected. **Guest Networks:** **Usage and Security:** C**onfiguration**: Some WAPs come with a guest network feature that allows the creation of a separate network with its own SSID and password for guests. This feature should be disabled unless needed for untrusted users, to limit access to the main network. **MAC Address Filtering:** **Configuration and Limitations:** **Implementation:** MAC address filtering enables control over which devices can join the network by specifying allowed MAC addresses. However, it is not foolproof, as attackers can spoof MAC addresses to gain unauthorized access. **Wireless Security Protocols and Authentication Methods:** **Recent Protocols:** **WPA2 (Wi-Fi Protected Access 2) and WPA3 (Wi-Fi Protected Access 3)** are security protocols designed to secure wireless networks. They are designed to provide better protection against unauthorized access and attacks compared to previous standards. WPA2 **Key Features:** 1. **Encryption:** - WPA2 uses **Advanced Encryption Standard (AES)** for encryption, which is more secure than the older **TKIP (Temporal Key Integrity Protocol)** used in WPA. 2. **Authentication:** - It supports both Personal (using a pre-shared key, PSK) and Enterprise (using RADIUS servers) authentication methods. 3. **Improved Security:** - Provides stronger protection against unauthorized access, replay attacks, and eavesdropping compared to WEP and WPA. 4. **Mandatory AES Support:** - Unlike WPA, which allowed TKIP, WPA2 mandates the use of AES, making it more secure by design. **Advantages:** - Highly effective for securing home and enterprise wireless networks. - Widely supported by most devices and Wi-Fi hardware. **Limitations:** - Vulnerable to certain attacks, such as the **KRACK (Key Reinstallation Attacks)** discovered in 2017, which exploited vulnerabilities in the four-way handshake process. **WPA3** **Key Features:** 1. **Enhanced Security:** - WPA3 introduces **Simultaneous Authentication of Equals (SAE)**, providing better protection against brute force attacks by making password guessing significantly more difficult. 2. **Forward Secrecy:** - Even if a password is compromised, past session keys remain secure, meaning that attackers cannot decrypt previously recorded traffic. 3. **Enhanced Protection for Public Networks:** - WPA3 includes a feature called **Opportunistic Wireless Encryption (OWE)** for open networks, which encrypts connections even without requiring passwords. 4. **Simplified Connectivity:** - The Wi-Fi Easy Connect feature allows users to easily connect devices with **limited interfaces (like IoT devices**) using a QR code. **Advantages:** - Provides a more robust defense against modern security threats. - Improved user experience with easier connections and stronger security mechanisms. **Limitations:** - Newer than WPA2, meaning some older devices may not support it. - Gradual adoption, which may lead to mixed environments with both WPA2 and WPA3 networks. **Deprecated Protocols:** **WEP and WPA:** Both are outdated and insecure, with WEP being particularly weak. WPS, though still found on some devices for ease of setting up connections, is also deprecated due to its vulnerabilities. These should not be used when securing a wireless network. **Wi-Fi Standards** **Wi-Fi (Wireless Fidelity)** is a technology that allows electronic devices to connect to a wireless local area network (WLAN), enabling them to communicate with each other and access the internet. Wi-Fi technology utilizes radio waves to transmit data, making it essential for mobile devices, laptops, smart home devices, and more. Key Features of Wi-Fi: 1. **Wireless Communication:** Wi-Fi enables devices to connect to the network without physical cables, providing flexibility and convenience for users. 2. **Network Standards:** Wi-Fi standards are defined by the IEEE 802.11 family, with various versions that offer different speeds, ranges, and frequencies. Each version builds upon the capabilities of its predecessors: - **802.11a:** Provides speeds up to 54 Mbps and operates in the 5 GHz band, offering less interference but a limited range of approximately 35 meters indoors. - **802.11b:** Offers speeds up to 11 Mbps and operates in the 2.4 GHz band, providing a good range of approximately 38 meters indoors and 140 meters outdoors ^\[[](https://www.lifewire.com/wireless-standards-802-11a-802-11b-g-n-and-802-11ac-816553)\]^. - **802.11g:** Delivers speeds up to 54 Mbps, operating in the 2.4 GHz band with a similar range to 802.11b. - **802.11n (Wi-Fi 4):** Provides speeds up to 600 Mbps, using both 2.4 GHz and 5 GHz bands, with an improved range compared to previous versions. - **802.11ac (Wi-Fi 5):** Achieves speeds up to 3.5 Gbps operating primarily in the 5 GHz band and supports MU-MIMO (multi-user MIMO) for multiple devices ^\[[](https://www.lifewire.com/wireless-standards-802-11a-802-11b-g-n-and-802-11ac-816553)\]^. The range is similar to 802.11n. - **802.11ax (Wi-Fi 6):** Reaches speeds up to 9.6 Gbps, enhancing efficiency and capacity in dense environments, using both 2.4 GHz and 5 GHz bands ^\[[](https://www.lifewire.com/wireless-standards-802-11a-802-11b-g-n-and-802-11ac-816553)\]^. Its range is similar to or slightly better than 802.11ac. - **Wi-Fi 6E:** Extends Wi-Fi 6 into the 6 GHz band, further improving speed and reducing congestion, with comparable range to Wi-Fi 6. - **Wi-Fi 7 (802.11be):** Expected to offer speeds up to 40 Gbps and will utilize 2.4 GHz, 5 GHz, and 6 GHz bands, with anticipated improved range capabilities. 3. **Frequencies: Wi-Fi operates primarily on three frequency bands:** - **2.4 GHz:** Offers longer range but lower speeds and is more susceptible to interference. - **5 GHz:** Provides faster speeds and less interference but has a shorter range compared to 2.4 GHz. - **6 GHz (Wi-Fi 6E and Wi-Fi 7):** Offers additional spectrum with wider channels, enabling faster speeds and less congestion. 4. **Security Protocols:** Wi-Fi networks use various security protocols to protect data: - WEP (Wired Equivalent Privacy): An older, less secure protocol. - **WPA (Wi-Fi Protected Access) and WPA2:** Improved security protocols with robust encryption standards. - **WPA3:** The latest, most secure protocol, offering enhanced protection against unauthorized access. 5. **Access Points and Routers:** Wi-Fi networks are commonly set up using routers or access points that connect to a wired internet source and provide wireless connectivity to devices within their range. **Advantages of Wi-Fi:** - **Convenience:** Wireless connectivity allows users to move freely within the coverage area without being tethered by cables. - **Easy Setup and Expansion:** Wi-Fi networks can be quickly established and expanded without the need for extensive cabling. - **Multiple Device Support:** Wi-Fi allows numerous devices to connect concurrently, facilitating connectivity for smartphones, tablets, laptops, and smart home devices. - **Accessibility:** Wi-Fi networks can be set up in various environments, from homes to cafes and public spaces, providing widespread internet access. **Challenges and Considerations:** - **Interference:** Wi-Fi signals can be affected by physical obstructions (walls, furniture) and interference from other wireless devices. - **Security Risks:** If not properly secured, Wi-Fi networks can be vulnerable to unauthorized access and attacks. Proper security protocols and practices are essential. - **Limited Range:** While Wi-Fi covers a decent range, distance from the access point and physical barriers can weaken the signal and reduce speed. - **Network Congestion:** High numbers of devices connected to a Wi-Fi network can lead to congestion, potentially slowing down internet speeds for all users. **Bluetooth Technology** Bluetooth is a wireless communication technology used to exchange data over short distances between electronic devices. It enables devices like smartphones, laptops, headphones, speakers, and many more to connect and communicate without the need for physical cables. **Key Features:** 1. **Short-Range Communication:** - Bluetooth typically operates within a range of about 10 meters (33 feet), although newer versions can extend this range significantly. 2. **Low Power Consumption:** - Designed for efficiency, Bluetooth technology consumes low power, making it suitable for portable and battery-operated devices. 3. **Frequency Band:** - Bluetooth operates in the 2.4 GHz ISM (Industrial, Scientific, and Medical) band, which is available for public use globally. 4. **Profiles and Standards:** - **Various Bluetooth profiles define how devices communicate for specific applications (e.g., audio streaming, file transfer). Common profiles include:** - **A2DP (Advanced Audio Distribution Profile):** For high-quality audio streaming. - **HFP (Hands-Free Profile):** For hands-free usage in devices like car systems. - **FTP (File Transfer Profile):** For sending files between devices. 5. **Pairing and Security:** - Bluetooth devices must be paired to communicate, requiring a secure connection process that often involves PIN codes or confirmation messages. - Features include encryption and frequency hopping to enhance security and reduce interference. **Versions:** - **Bluetooth Classic:** The original Bluetooth standard, primarily for transmitting data and audio. - **Bluetooth Low Energy (BLE):** Introduced in Bluetooth 4.0, BLE is designed for applications that require low power consumption and may operate in a standby mode for longer periods, perfect for fitness trackers, smartwatches, and IoT devices. **Advantages:** - **Convenience:** Eliminates the need for cables, allowing for greater mobility and flexibility. - **Interoperability:** Compatible with a wide range of devices across different manufacturers. - **Cost-Effective:** Bluetooth technology is relatively inexpensive to implement and adopt. **Limitations:** - **Range:** While effective for short distances, Bluetooth is not suitable for long-range communications. - Speed: Typically slower than Wi-Fi for large data transfers; hence, not ideal for high-bandwidth applications. - Interference: Operating in the crowded 2.4 GHz band can lead to interference from other wireless devices. **Future Developments:** **With advancements like Bluetooth 5.0 and beyond, the technology continues to evolve, offering:** - Increased range and speed. - Enhanced data broadcasting capabilities. - Support for larger networks with multiple devices communicating simultaneously. **Setting Up Bluetooth:** 1. **Enable Bluetooth on Your Device:** - On Windows, **go to Settings \> Bluetooth & Devices and turn on Bluetooth ^\[(https://support.microsoft.com/en-us/windows/pair-a-bluetooth-device-in-windows-2be7b51f-6ae9-b757-a3b9-95ee40c3e242)\]\[(https://www.howtogeek.com/367539/how-to-turn-on-and-use-bluetooth-in-windows-10/)\]^.** - **MacOS users can open System Preferences \> Bluetooth and enable it.** - On mobile devices, access Bluetooth settings from the settings menu or quick access panel. 2. **Put the Device in Pairing Mode:** - Check the user manual of the device you want to connect (e.g., headphones, keyboard) and follow instructions to enable pairing mode. 3. **Pair Devices:** - Once Bluetooth is enabled and your device is in pairing mode, select it from the list of available devices on your computer or mobile device to pair. 4. **Confirm Connection:** - A notification or prompt may appear asking for a PIN or confirmation to finalize the pairing process. 5. **Test the Connection:** - Use the connected device to ensure functionality, such as playing audio on Bluetooth speakers or typing with a Bluetooth keyboard. **RADIUS, or Remote Authentication** Dial-In User Service, is a networking protocol used for user authentication, authorization, and accounting (AAA). It primarily serves to provide centralized authentication for users attempting to access a network service, making it widely utilized in various applications, especially in wireless and virtual private network (VPN) access. **Key Features of RADIUS:** 1. **Centralized Authentication:** - RADIUS centralizes the management of user credentials, allowing organizations to control access to their networks from a single source. 2. **Authorization and Accounting:** - Beyond authentication, RADIUS also manages user authorizations (what users can access) and accounting (tracking user activities). 3. **Protocol Agnostic:** - RADIUS can be used with various network access technologies, including Ethernet, Wi-Fi, and dial-up connections. 4. **UDP-Based:** - RADIUS operates over the User Datagram Protocol (UDP) for low-latency, real-time communication, which is suitable for authentication processes. 5. **Encryption of Credentials:** - While RADIUS encrypts the password in the access-request message, the rest of the data (like usernames and attributes) is sent in plaintext. However, it offers some level of security suitable for most applications. **Advantages of RADIUS:** - **Scalability:** - RADIUS can handle large numbers of user authentications, making it suitable for enterprises and ISPs. - **Interoperability:** - It is widely supported across various network devices, including routers, switches, and wireless access points, allowing for diverse implementations. - **Integration with LDAP and Active Directory:** - RADIUS can integrate with directory services like LDAP or Microsoft Active Directory for enhanced user management. **Security Considerations:** - **Password Security:** - Although RADIUS encrypts passwords, other data is not fully protected. Using RADIUS over secure channels like IPsec or HTTPS is recommended to enhance overall security. - **Brute Force Attacks:** - RADIUS is susceptible to brute force attacks if password policies are weak. Implementing strong password policies and account lockout mechanisms is essential. - **Redundancy and High Availability:** - Ensuring that RADIUS servers are redundant and properly backed up is crucial to maintain access to the network, as outages can prevent user authentication.