Friday, December 11, 2009

Signals and noise on a WLAN / Wireless security


Signals and noise on a WLAN
3.3.6 This page discusses how signals and noise can affect a WLAN.


On a wired Ethernet network, it is usually a simple process to diagnose the cause of interference. When using RF technology many kinds of interference must be taken into consideration.

Narrowband is the opposite of spread spectrum technology. As the name implies narrowband does not affect the entire frequency spectrum of the wireless signal. One solution to a narrowband interference problem could be simply changing the channel that the AP is using. Actually diagnosing the cause of narrowband interference can be a costly and time-consuming experience. To identify the source requires a spectrum analyzer and even a low cost model is relatively expensive.

All band interference affects the entire spectrum range. Bluetooth™ technologies hops across the entire 2.4 GHz many times per second and can cause significant interference on an 802.11b network. It is not uncommon to see signs in facilities that use wireless networks requesting that all Bluetooth™ devices be shut down before entering. In homes and offices, a device that is often overlooked as causing interference is the standard microwave oven. Leakage from a microwave of as little as one watt into the RF spectrum can cause major network disruption. Wireless phones operating in the 2.4GHZ spectrum can also cause network disorder.

Generally the RF signal will not be affected by even the most extreme weather conditions. However, fog or very high moisture conditions can and do affect wireless networks. Lightning can also charge the atmosphere and alter the path of a transmitted signal.

The first and most obvious source of a signal problem is the transmitting station and antenna type. A higher output station will transmit the signal further and a parabolic dish antenna that concentrates the signal will increase the transmission range.

In a SOHO environment most access points will utilize twin omnidirectional antennae that transmit the signal in all directions thereby reducing the range of communication.

The next page describes WLANs security.


Wireless security
3.3.7 This page will explain how wireless security can be achieved.


Where wireless networks exist there is little security. This has been a problem from the earliest days of WLANs. Currently, many administrators are weak in implementing effective security practices.

A number of new security solutions and protocols, such as Virtual Private Networking (VPN) and Extensible Authentication Protocol (EAP) are emerging. With EAP, the access point does not provide authentication to the client, but passes the duties to a more sophisticated device, possibly a dedicated server, designed for that purpose. Using an integrated server VPN technology creates a tunnel on top of an existing protocol such as IP. This is a Layer 3 connection as opposed to the Layer 2 connection between the AP and the sending node.

• EAP-MD5 Challenge – Extensible Authentication Protocol is the earliest authentication type, which is very similar to CHAP password protection on a wired network.

• LEAP (Cisco) – Lightweight Extensible Authentication Protocol is the type primarily used on Cisco WLAN access points. LEAP provides security during credential exchange, encrypts using dynamic WEP keys, and supports mutual authentication.

• User authentication – Allows only authorized users to connect, send and receive data over the wireless network.

• Encryption – Provides encryption services further protecting the data from intruders.

• Data authentication – Ensures the integrity of the data, authenticating source and destination devices.

VPN technology effectively closes the wireless network since an unrestricted WLAN will automatically forward traffic between nodes that appear to be on the same wireless network. WLANs often extend outside the perimeter of the home or office in which they are installed and without security intruders may infiltrate the network with little effort. Conversely it takes minimal effort on the part of the network administrator to provide low-level security to the WLAN.

This page concludes the lesson. The next page will summarize the main points from the module.

No comments:

Post a Comment