• Tidak ada hasil yang ditemukan

Jaringan Nirkabel (Wireless LAN)

N/A
N/A
Protected

Academic year: 2018

Membagikan "Jaringan Nirkabel (Wireless LAN)"

Copied!
41
0
0

Teks penuh

(1)

Jaringan Komputer Lanjut

Jaringan Nirkabel (Wireless LAN)

(2)

Rahmadian-Why have Wireless LANs Become

so Popular?

Business networks today are evolving to

support people who are on the move.

Employees and employers, students and

faculty, government agents and those they

serve, sports fans and shoppers, all are mobile

and many of them are "connected." Perhaps

you have a mobile phone that you route

instant messages to when you are away from

your computer.

This is the vision of mobility-an environment

(3)

Why Use Wireless?

Productivity is no longer

restricted to a fxed work location

or a defned time period.

People now expect to be

connected at any time and place.

Employees can check e-mail,

voice mail, and the status of

products on personal digital

(4)

Advantages

Flexibility

Reduced cost; on average, the IT

(5)

People Change The Way They

Live

The method of accessing the Internet

has quickly moved from temporary

modem dialup service to dedicated DSL

or cable service.

Home users are seeking many of the

same fexible wireless solutions as

ofce workers.

For the frst time, in 2005, more

(6)
(7)
(8)

Radio Frequency (RF)

 RF does not have boundaries, such as the limits of a wire in a

sheath. The lack of such a boundary allows data frames traveling over the RF media to be available to anyone that can receive the RF signal.

RF is unprotected from outside signals, whereas cable is in an

insulating sheath. Radios operating independently in the same geographic area but using the same or a similar RF can interfere with each other.

 RF transmission is subject to the same challenges inherent in any

wave-based technology, such as consumer radio. For example, as you get further away from the source, you may hear stations

playing over each other or hear static in the transmission.

Eventually you may lose the signal all together. Wired LANs have cables that are of an appropriate length to maintain signal

strength.

 RF bands are regulated diferently in various countries. The use of

(9)

Other Things About WLAN

 WLANs connect clients to the network through a wireless

access point (AP) instead of an Ethernet switch.

 WLANs connect mobile devices that are often battery

powered, as opposed to plugged-in LAN devices. Wireless network interface cards (NICs) tend to reduce the battery life of a mobile device.

 WLANs support hosts that contend for access on the RF

media (frequency bands). 802.11 prescribes

collision-avoidance instead of collision-detection for media access to proactively avoid collisions within the media.

 WLANs use a diferent frame format than wired Ethernet

LANs. WLANs require additional information in the Layer 2 header of the frame.

 WLANs raise more privacy issues because radio

(10)
(11)

History

When 802.11 was frst released, it

prescribed 1 - 2 Mb/s data rates in

the 2.4 GHz band. At that time, wired

LANs were operating at 10 Mb/s so

the new wireless technology was not

enthusiastically adopted.

Since then, wireless LAN standards

have continuously improved with the

release of IEEE 802.11a, IEEE

(12)
(13)
(14)

Wireless LAN Standards

Internationally, the three key organizations

infuencing WLAN standards are:

◦ ITU-R

Regulates the allocation of the RF spectrum and satellite orbits.

◦ IEEE

Developed and maintains the standards for local and metropolitan area networks with the IEEE 802 LAN/MAN family of standards. Specifed standards for RF

modulation devices.

◦ Wi-Fi Alliance

Association of vendors whose objective is to improve the interoperability of products that are based on the 802.11 standard by certifying vendors for conformance to

(15)

Wireless LAN Standards

The roles of these three

organizations can be summarized

as follows:

ITU-R regulates allocation of RF

bands.

IEEE specifes how RF is modulated

to carry information.

(16)
(17)

Wireless AP

An access point is a Layer 2 device that functions

like an 802.3 Ethernet hub. RF is a shared medium

and access points hear all radio trafc. Just as with

802.3 Ethernet, the devices that want to use the

medium contend for it. Unlike Ethernet NICs,

though, it is expensive to make wireless NICs that

can transmit and receive at the same time, so

radio devices do not detect collisions. Instead,

WLAN devices are designed to avoid them.

RF signals attenuate. That means that they lose

(18)

CSMA/CA

Access points oversee a distributed coordination

function (DCF) called Carrier Sense Multiple Access

with Collision Avoidance (CSMA/CA). This simply

means that devices on a WLAN must sense the

medium for energy (RF stimulation above a certain

threshold) and wait until the medium is free before

sending. Because all devices are required to do

this, the function of coordinating access to the

medium is distributed. If an access point receives

data from a client station, it sends an

(19)

Wireless Router

Wireless routers perform the role of access

point, Ethernet switch, and router. For

example, the Linksys WRT300N used is really

three devices in one box. First, there is the

wireless access point, which performs the

typical functions of an access point. A

built-in four-port, full-duplex switch provides

connectivity to wired devices. Finally, the

router function provides a gateway for

(20)

Wireless Operation

 The wireless network mode refers to the WLAN

protocols: 802.11a, b, g, or n.

 Because 802.11g is backward compatible with 802.11b,

access points support both standards. Remember that if all the clients connect to an access point with 802.11g, they all enjoy the better data rates provided. When

802.11b clients associate with the access point all the faster clients contending for the channel have to wait on 802.11b clients to clear the channel before transmitting.

 When a Linksys access point is confgured to allow both

802.11b and 802.11g clients, it is operating in mixed mode.

 For an access point to support 802.11a as well as

(21)

Wireless Operation

 SSID

◦ A shared service set identifer (SSID) is a unique identifer that client devices use to distinguish between multiple wireless networks in the same vicinity. Can be any alphanumeric, case-sensitive entry from 2 to 32 characters long.

 Channel

◦ The 2.4 GHz band is broken down into 11 channels for North America and 13 channels for Europe. These channels have a center frequency separation of only 5 MHz and an overall channel bandwidth (or frequency occupation) of 22 MHz. The 22 MHz channel bandwidth combined with the 5 MHz

separation between center frequencies means there is an overlap between successive channels.

(22)
(23)
(24)
(25)
(26)
(27)
(28)

WLAN Terms

Beacons - Frames used by the WLAN

network to advertise its presence.

Probes - Frames used by WLAN clients to

fnd their networks.

Authentication - A process which is an

artifact from the original 802.11

standard, but still required by the

standard.

Association - The process for

(29)
(30)
(31)
(32)
(33)
(34)

Threat to Wireless

Security

Unauthorized Access

There are three major categories

of threat that lead to

unauthorized access:

War drivers

Hackers (Crackers)

(35)

Threat to Wireless

Security

"War driving" originally referred

to using a scanning device to fnd

cellular phone numbers to

exploit. War driving now also

means driving around a

neighborhood with a laptop and

an 802.11b/g client card looking

for an unsecured 802.11b/g

(36)

Threat to Wireless

Security

The term hacker originally meant

someone who delved deeply into

computer systems to understand, and

perhaps exploit for creative reasons, the

structure and complexity of a system.

Today, the terms hacker and cracker have

come to mean malicious intruders who

enter systems as criminals and steal data

or deliberately harm systems.Hackers

(37)

Threat to Wireless

Security

 A rogue access point is an access point placed on a

WLAN that is used to interfere with normal network

operation. If a rogue access point is confgured with the correct security settings, client data could be captured. A rogue access point also could be confgured to provide unauthorized users with information such as the MAC addresses of clients (both wireless and wired), or to capture and disguise data packets or, at worst, to gain access to servers and fles.

 A simple and common version of a rogue access point is

one installed by employees without authorization.

(38)

Threat to Wireless

Security

(39)

Threat to Wireless

Security

Denial of Service

802.11b and g WLANs use the

unlicensed 2.4 GHz ISM band. This is

the same band used by most wireless

consumer products, including baby

monitors, cordless phones, and

(40)
(41)

Other Things to Secure

WLAN

SSID Cloacking

Referensi

Dokumen terkait

Sebagai kesimpulan dapat dinyatakan bahwa, struktur rangka ruang bangunan petak adalah komposisi dari batang-batang yang masing-masing berdiri sendiri, memikul gaya tekan atau

Berdasarkan hasil pengujian serta analisis yang telah dilakukan pada penelitian ini membuktikan bahwa Store Atmosphere yang terdiri dari Exterior, General Interior, Store

rosin dari campuran minyak yang dikenal dengan turpentine dilakukan pada

kurikulum hidup dan kehidupan di TMI Al - Amien Prenduan tidak hanya terbatas pada aktivitas sekolah formal pada kegiatan belajar mengajar di dalam kelas dari jam 07.00 pagi-

Ia berpikir bahwa masyarakat yang ingin memasukkan putra-putrinya ke sekolah-sekolah umum tidak perlu harus memasukkannya ke sekolah-sekolah yang didirikan pemerintah kolonial,

In the event that a PAWS instance is requested to insert an invalid (i.e. a not XACML schema conformant) XACML policy element of type xacml:PolicySet, xacml:Policy or

Mengenai kedaulatan atas ruang daratan telah mendapat undang-undang yang mengatur tentang batas wilayah negara RI, sedangkan batas wilayah laut sesuai dengan hukum

Sebagai tindak lanjut dari evaluasi ini Saudara dimohon untuk membawa dokumen asli atau salinan dokumen yang sudah dilegalisir oleh pejabat yang berwenang, untuk diadakan