Wireless Networking 169 Signals and Noise on a WLAN On a wired Ethernet network, it is usually a fairly simple process to diagnose the cause of interference. When using RF technology, you must take into account many kinds of interference: ■ Narrowband—This is the opposite of spread spectrum technology. As the name implies, narrowband does not affect the entire frequency spectrum of the wireless signal. One solution to a narrowband interference problem is simply changing the channel that the AP is using. Actually, diagnosing the cause of narrowband interference can be a costly and time-consuming experience. To identify the source requires a spectrum analyzer and even a low cost model can cost $3000 to $4000 in the U.S. Examples of narrowband interference include CB radios and ham radios. ■ All band—All band interference affects the entire spectrum range. Bluetooth technologies hop across the entire 2.4 GHz many times per second and can cause significant interference on an 802.11b network. It is not uncommon to see signs in facilities that use wireless networks requesting that all Bluetooth devices be shut down before entering. In homes and offices, a device that is often overlooked as causing interference is the standard microwave oven. Leakage from a micro- wave of as little as 1 watt into the RF spectrum can cause major network disrup- tion. Wireless phones operating in the 2.4-GHz spectrum can also cause network degradation. ■ Weather—Generally, the RF signal is not affected by even the most extreme weather conditions. However, fog or very high moisture conditions can and do affect wireless networks. Lightning can also charge the atmosphere and alter the path of a transmitted signal. Signal Range Concerns The first and most obvious source of a signal problem is the transmitting station and antenna type. A higher output station transmits the signal further, and a parabolic dish antenna that concentrates the signal increases the transmission range. In a small office, home office (SOHO) environment, most access points utilize twin omnidirectional antennae that transmit the signal in all directions, thereby reducing the range of communication. Figure 3-50 illustrates an omnidirectional antenna. 1102.book Page 169 Tuesday, May 20, 2003 2:53 PM 170 Chapter 3: Networking Media Figure 3-50 Omnidirectional Antenna Wireless Security The exponential growth of networking, including wireless technologies, has led to increased security risks. Increasing the security means increasing the time spent manag- ing the system. The first level of security in a wireless LAN consists of protecting the radio frequency waveform itself. Wireless access points radiate radio waves over a large area that is not contained in a physical building, which makes the radio waves accessible to eaves- droppers and thus increases vulnerability. The radio waves of wireless bridges are con- centrated in a beam. An eavesdropper must get into the beam path to intercept the communication. Therefore, wireless access points usually require better security than wireless bridges. WEP Wired equivalent privacy (WEP) is a security mechanism, defined within the 802.11 standard, that is designed to protect the over-the-air transmission between wireless LAN access points and NICs. The IEEE 802.11b requires 40-bit encryption keys. However, many vendors, such as Cisco, support the optional 128-bit standard. The main goals with WEP follow: ■ Deny access to the network by unauthorized users who do not possess the appro- priate WEP key ■ Prevent the decoding of captured WLAN traffic that is WEP-encrypted without the possession of the WEP key 1102.book Page 170 Tuesday, May 20, 2003 2:53 PM Wireless Networking 171 WEP uses the RC4 stream cipher that was invented by Ron Rivest of RSA Data Secu- rity, Inc., (RSADSI) for encryption. The RC4 encryption algorithm is a symmetric-stream cipher that supports a variable-length key. A symmetric cipher uses the same key for both encryption and decryption. The key is the one piece of information that must be shared by both the encrypting and decrypting endpoints. Recently, encryption analysts have reported weaknesses in the authentication and WEP encryption schemes in the IEEE 802.11 WLAN standard. Improvements on WEP have been developed to address the weaknesses found by encryption analysts. However, it is not recommended to use WEP as a sole security mechanism for a WLAN. WEP should be supplemented with additional higher-level security mechanisms, such as a VPN or firewalls. VPN, EAP, and LEAP A number of new security solutions and protocols, such as Virtual Private Network (VPN) and Extensible Authentication Protocol (EAP) are evolving. Using EAP, the access point does not provide authentication to the client but passes the duties to a more sophisticated server designed for that purpose. Using an integrated VPN server, VPN technology creates a tunnel on top of an existing protocol such as IP. This tunnel is a Layer 3 connection as opposed to the Layer 2 connection between the AP and the sending node. The following list briefly describes EAP and LEAP: ■ EAP-MD5 Challenge—EAP is the earliest authentication type, which is very similar to Challenge Handshake Authentication Protocol (CHAP) password protection on a wired network. EAP allows wireless client adapters that can support differ- ent authentication types to communicate with different back end servers, such as Remote Authentication Dial-In User Service (RADIUS). ■ Lightweight Extensible Authentication Protocol (LEAP)—Cisco has developed a derivation of EAP based on mutual authentication called LEAP. Mutual authenti- cation means that both the user and the access point to which the user is attempt- ing to connect must be authenticated before access onto the corporate network is allowed. Mutual authentication protects enterprises from unauthorized APs serving as a potential entrance into the network. LEAP is the type of authentication pri- marily used on Cisco WLAN access points. LEAP provides security during credential exchange, encrypts using dynamic WEP keys, and supports mutual authentication. VPN security levels include the following: ■ User authentication—Allows only authorized users to connect, send, and receive data over the wireless network. 1102.book Page 171 Tuesday, May 20, 2003 2:53 PM 172 Chapter 3: Networking Media ■ Encryption—Provides encryption services, further protecting the data from intruders. ■ Data authentication—Ensures the integrity of the data, authenticating source, and destination devices. VPN technology effectively closes the wireless network because an unrestricted WLAN automatically forwards traffic between nodes that appear to be on the same wireless network. WLANS often extend outside the perimeter of the home or office in which they are installed, and without security, intruders can infiltrate the network with little effort. Conversely, it takes minimal effort on the part of the network administrator to provide low-level security to the WLAN. Summary In this chapter, you learned the following key points: ■ Electricity is based on the ability of electrons of certain types of atoms to separate, or flow, from the confines of their atoms. ■ Opposite charges attract and like charges repel. Electricity flows from negative to positive within electrical circuits. ■ Materials can be classified as insulators, conductors, or semiconductors, depending on their ability to allow electrons to flow. ■ The concepts of voltage, current, resistance, and impedance provide a means of measuring electricity, which is required to be able to design and manufacture electronic devices. ■ Alternating current and direct current are the two types of current. AC provides power to our homes, schools, and work places. DC is used with electrical devices that depend on a battery to function. ■ STP cable combines the techniques of shielding, cancellation, and twisting of wires. ScTP cable is essentially a twisted pair wrapped in a metallic foil shield. ■ UTP cable is a four-pair wire medium used in a variety of networks. ■ Coaxial cable consists of four main parts: copper conductor, plastic insulation, braided copper shielding, and outer jacket. ■ Specifications or standards are sets of rules or procedures that are widely used and serve as the accepted method of performing a task. ■ Optical fiber is a good transmission medium when it is properly installed, tested, and maintained. 1102.book Page 172 Tuesday, May 20, 2003 2:53 PM Summary 173 ■ Light energy, a type of electromagnetic energy wave, is used to transmit large amounts of data securely over relatively long distances. ■ Light rays obey the laws of reflection and refraction as they travel through a glass fiber, which allows fibers with the property of total internal reflection to be man- ufactured. Total internal reflection makes light signals stay inside the fiber, even if the fiber is not straight. ■ Attenuation of a light signal becomes a problem over long cables, especially if sections of cable are connected at patch panels or spliced. Therefore, cable and connectors must be properly installed and thoroughly tested with high-quality optical test equipment before their use. ■ In wireless data communication, the radio spectrum is the part of the electromag- netic spectrum used to transmit voice, video, and data. ■ Modulation is the process by which the amplitude, frequency, or phase of a radio frequency or lightwave is changed to transmit data. ■ To take advantage of unlicensed radio bands, you have to use spread-spectrum techniques. Two important modulation technologies are frequency-hopping spread spectrum (FHSS) and direct-sequence spread spectrum (DSSS). DSSS offers greater reliability and more throughput than FHSS. ■ The wireless signal deteriorates with distance. A wireless device connects at a slower speed if it is moved out of optimal range. ■ Noise can be caused through structures (walls with metal) or by electrical equip- ment. Both adversely affect the range of wireless communications. ■ Wireless standards include IEEE 802.11, IEEE 802.11a, IEEE 802.11b, and IEEE 802.11g. ■ Wired equivalent privacy (WEP) is a security mechanism, defined within the 802.11 standard, that is designed to protect the over-the-air transmission between wireless LAN APs and NICs. ■ A number of new security solutions and protocols, such as VPN, EAP, and LEAP, are emerging. To supplement all that you’ve learned in this chapter, refer to the chapter-specific Videos, PhotoZooms, and e-Lab Activities on the CD-ROM accompanying this book. 1102.book Page 173 Tuesday, May 20, 2003 2:53 PM 174 Chapter 3: Networking Media Key Terms AM (amplitude modulation) Modulates the height of the carrier wave. angle of incidence The angle at which the ray hits the glass surface. angle of reflection The angle between the reflected ray and the normal. attenuation Loss of communication signal energy. backbone The part of a network that acts as the primary path for traffic that is most often sourced from, and destined for, other networks. coaxial cable A cable consisting of a hollow outer cylindrical conductor that surrounds a single inner wire conductor. crosstalk The unwanted reception of electromagnetic signals on a wire from a nearby wire. dispersion The broadening of light signals along the length of the fiber. DSSS (direct-sequence spread spectrum) A technology in which transmissions are more reliable because each bit (1 or 0) is represented by a string of 1s and 0s, called a chipping sequence. EIA (Electronic Industries Association) A group that specifies electrical transmission standards. The EIA and TIA have developed numerous well-know communication standards. EMI (electromagnetic interference) An electromagnetic field that has the potential to disrupt the operation of electronic components, devices, and systems in its vicinity. FHSS (frequency-hopping spread spectrum) A technology in which transmissions hop from one frequency to another in random patterns. This feature enables the transmissions to hop around narrowband interference, resulting in a clearer signal and higher reliability of the transmission. fiber-optic cable A physical medium capable of conducting modulated light trans- mission. Compared with other transmission media, fiber-optic cable is more expensive but is not susceptible to electromagnetic interference. Sometimes called optical fiber. FM (frequency modulation) Modulates the frequency of the wave. IEEE (Institute of Electrical and Electronic Engineers) A professional organization whose activities include the development of communications and network standards. IEEE LAN standards are the predominant LAN standards. impedance The resistance to the movement of electrons in an AC circuit. 1102.book Page 174 Tuesday, May 20, 2003 2:53 PM Key Terms 175 media The plural of medium. Media refers to various physical environments through which transmission signals pass. Common network media include twisted-pair, coaxial, fiber-optic cable, and the atmosphere (through which microwave, laser, and infrared transmission occurs). modal dispersion When multiple modes of light propagating through fiber travel different distances, depending on their entry angles, which causes them to arrive at the destination (receiving end of the cable) at slightly different times. multimode A type of fiber-optic cable that transmits more than one light path. noise An unwanted electrical signal on a wire that interferes with the quality of the signal by altering its shape. patch panel An assembly of pin locations and ports that can be mounted on a rack or wall bracket in the wiring closet. Patch panels act like switchboards that connect workstations’ cables to each other and to the outside. PM (phase modulation) Modulates the polarity (phase) of the wave. reflection The photons of light striking a surface and leaving that surface in an equal but opposite direction. refraction The change in direction of a beam of light when it enters another medium. resistance The property of a material that resists electron movement. RFI (radio frequency interference) The noise on wires caused by radio signals. single-mode An optical fiber that has only one mode of light transmission. Contrast with multimode. SS (spread spectrum) A modulation technique developed in the 1940s that spreads a transmission signal over a broad band of radio frequencies. The term spread spectrum describes a modulation technique that sacrifices bandwidth to gain signal-to-noise performance. standard A set of rules or procedures that are either widely used or officially specified. STP (shielded twisted-pair) A two-pair wiring medium used in a variety of network implementations. STP cabling has a layer of shielded insulation to reduce EMI. thicknet An early form of coaxial cable using 10BASE5 for networking. Thicknet was once desirable because it could carry signals up to 500 meters. thinnet A simple, thin, coaxial network cable for the 10BASE2 system. Thinnet can carry a signal only 185 meters, but was much easier to work with than thicknet. 1102.book Page 175 Tuesday, May 20, 2003 2:53 PM 176 Chapter 3: Networking Media TIA (Telecommunications Industry Association) A standards association that pub- lishes standards for telecommunications. UTP (unshielded twisted-pair) A four-pair wire medium used in a variety of networks. wavelength The length of a wave measured from any point on one wave to the corre- sponding point on the next wave. The wavelength of light is usually measured in nanometers (nm). WEP (wired equivalent privacy) A security mechanism, defined within the 802.11 standard, that is designed to protect the over-the-air transmission between wireless LAN APs and NICs. Check Your Understanding Complete all the review questions to test your understanding of the topics and con- cepts in this chapter. Answers are listed in Appendix C, “Check Your Understanding Answer Key.” 1. Match the columns: 1) Neutrons A) Particles that have a negative charge 2) Protons B) Particles that have no charge (neutral) 3) Electrons C) Particles that have a positive charge A. 1-C, 2-B, 3-A B. 1-A, 2-C, 3-B C. 1-B, 2-C, 3-A D. 1-B, 2-A, 3-C 2. Which of the following regarding electricity is untrue? A. Opposite charges react to each other with a force that causes them to be attracted to each other. B. Like charges react to each other with a force that causes them to repel each other. C. In the case of opposite and like charges, the force increases as the charges move closer to each other. D. None of the above. 1102.book Page 176 Tuesday, May 20, 2003 2:53 PM Check Your Understanding 177 3. Match the following to their respective units of measurement: 1) Voltage A) Ohm 2) Current B) Ampere 3) Resistance C) Volt A. 1-C, 2-B, 3-A B. 1-B, 2-C, 3-A C. 1-A, 2-C, 3-B D. 1-C, 2-B, 3-A 4. Electrons flow in loops called . A. Open; voltage B. Closed; voltage C. Open; circuits D. Closed, circuits 5. What is the maximum cable length for STP? A. 100 feet B. 150 feet C. 100 meters D. 1000 meters 6. How many pairs of wires make up a UTP cable? A. 2 B. 4 C. 6 D. 8 7. Which connector does UTP use? A. STP B. BNC C. RJ-45 D. RJ-69 1102.book Page 177 Tuesday, May 20, 2003 2:53 PM 178 Chapter 3: Networking Media 8. What is an advantage that coaxial cable has over STP or UTP? A. It is capable of achieving 10 Mbps to 100 Mbps. B. It is inexpensive. C. It can run for a longer distance unboosted. D. None of the above. 9. What does the twisting of the wires do in a twisted-pair cable? A. It makes it thinner. B. It makes it less expensive. C. It reduces noise problems. D. It allows six pairs to fit in the space of four pairs. 10. What is the importance of the EIA/TIA standards? Select all that apply. A. They provide a framework for the implementation of the OSI reference model. B. They provide guidelines for manufacturers to follow to ensure compatibility. C. They provide the minimum media requirements for multiproduct and multi- vendor environment. D. None of the above. 11. A fiber-optic cable transmits multiple streams of LED-generated light. A. Multimode B. Multichannel C. Multiphase D. None of the above 12. What is one advantage of using fiber-optic cable in networks? A. It is inexpensive. B. It is easy to install. C. It is an industry standard and is available at any electronics store. D. It is capable of higher data rates than either coaxial or twisted-pair cable. 1102.book Page 178 Tuesday, May 20, 2003 2:53 PM . communications. ■ Wireless standards include IEEE 8 02 .11 , IEEE 8 02 .11 a, IEEE 8 02 .11 b, and IEEE 8 02 .11 g. ■ Wired equivalent privacy (WEP) is a security mechanism, defined within the 8 02 .11 standard, that is. to connect, send, and receive data over the wireless network. 11 02. book Page 17 1 Tuesday, May 20 , 20 03 2: 53 PM 17 2 Chapter 3: Networking Media ■ Encryption—Provides encryption services, further. charge 2) Protons B) Particles that have no charge (neutral) 3) Electrons C) Particles that have a positive charge A. 1- C, 2- B, 3-A B. 1- A, 2- C, 3-B C. 1- B, 2- C, 3-A D. 1- B, 2- A, 3-C 2. Which of the