Wireless Communications

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
9 hours 49 minutes
Difficulty
Beginner
Video Transcription
00:00
Let's continue moving forward.
00:02
Our next section is on wireless communications
00:06
when we talk about wireless, one of the first things to mention is the frequency in which our wireless devices operate.
00:13
Originally, there was five G H C, then 2.4 GHz.
00:18
Then there was a combination of both choices.
00:22
A couple of things about each of these, with 2.4 GHz. This gives us a much better range. Inside,
00:29
the signal is more capable of permeating through walls and some of the other obstacles. That's why 2.4 was preferred for a long time
00:37
because it is such a preferred frequency. A lot of other devices like I P cameras and mobile phones, baby monitors and things like that also use this frequency. So it's the chance of interference.
00:50
A lot of times you can move to a different channel. There are only three channels that can be used in the 2.4 range. 16 and 11.
00:59
This is definitely something that may come up on the test, so make sure you know it.
01:03
In the 2.4 arrange, all you can use is 16 and 11. You have more flexibility and more channels supported with five GHz range. But you can't get as great of a distance.
01:15
You don't get the capability to wander, but you're more likely to have less interference. So pros and cons to each
01:22
now 802.11 is a standard specified by the I triple E for carrier sense multiple access with collision avoidance. And that's what wireless communication uses for media access
01:34
for wireless devices. Unlike Ethernet, instead of putting their signal out, they send an intent to signal.
01:41
So it's carrier sense multiple access, but with collision avoidance.
01:45
We went into that idea earlier in the network infrastructure information so you can go back and take another look at collisions.
01:53
Throughout the years we've seen these different standards evolve. We had ratification back in 1997 and from 99 we got 802.11 A and B 802 11. A started out with good speech, gave speed of 54 megabits per second. But it operated in that five GHz range,
02:12
which meant that we were not going to see the same distance or capability of roaming
02:15
eight oh 2.11 b came out, operated in the 2.4 range but dropped speeds down to 11 megabits per second. Eight oh 2.11 g really became the de facto standard because it operated in the 2.4 range at 54 megabits per second. So we got the speed in the right range.
02:35
Then we went over to 802.11 n much faster data rates, good capability of roaming and a wide support for the different channel types.
02:44
I will mention that eight oh 2.11, even though it's not really on. This chart never really made it to market, because by that time it was ready eight oh, 2.11 and was ready to be ratified.
02:54
It was actually the first wireless standard that required W P A. To to be used for security.
03:00
Everything prior to that just had to support Wet
03:04
obviously eight oh, 2.11 n and eight oh, 2.11 a C. Both support W P. A. Two and WP A three is here, so we continue to evolve
03:15
to review some of the highlights. Here we have eight oh, 2.11 a five GHz range
03:21
Then in the 2.4 range, we had eight oh, 2.11 B, and that made it to market, whereas a really didn't. But when we went to 802.11 b, it had widespread usage at 11 megabits per second and was very popular.
03:35
That is, until the real answer we were looking for came along, and that was eight. Oh, 2.11 G because it provided good speed of 54 megabits per second, gave us operation in the 2.4 range, and it was backwards compatible with eight oh 2.11 b, which is very helpful as we have varying devices.
03:53
You don't want to go out and spend a lot of money on a router and then in two months have to change that.
03:58
Here's what I was mentioning about 802.11 I I never made it to market, but it was the first standard to require W P. A two
04:06
mhm
04:08
eight oh 2.11 and what we just talked about can have a great distance to transmit, supports eight antennas and can use multiple channels through something called bonding. It's almost like multiplexing
04:18
There are few other types of wireless technology we should talk about Z Wave and a N T plus or two that are becoming very, very, very popular today.
04:30
Z Wave. Think about your home automation like your doorbell, your lights and your thermostat and all those things in our homes now that can be connected to the Internet if you ever configured them the challenges they need to join my home network. But how do I configure them to join my home network before they're set on my network?
04:46
They used the wave technology, which allows a very quick, basic low end network protocol could take an act.
04:53
Yeah,
04:53
you can configure the device like an Alexa or something like that, and then you're able to have it joined the network, and that's how you access it. From that point forward,
05:01
the Z wave is a technology usually used for setting up these automated devices.
05:06
A and T Plus is being used more and more for health devices. If you've got a Fitbit that tracks your pulse rate or steps that you walk that's using the anti technology,
05:16
we're seeing more health care taken care of through the use of wireless technologies.
05:21
I have a friend who's diabetic, and she has to tap the monitors. Her blood sugar if her blood sugar gets elevated, sends a message to her cell phone.
05:30
We're getting to a point in time where we're really taking advantage of some of this technology for health and home automation.
05:35
Mhm
05:36
Bluetooth. Here's a quiz. What's the best way to secure a Bluetooth device?
05:42
Wait for it. Turn off. Bluetooth security is really an oxymoron. Bluetooth isn't something that's designed to be secure. It's designed for ease of use.
05:51
It's set up with the auto Discover auto pair and a pen.
05:56
Yeah,
05:56
certainly you can configure the pen, but for the longest time, the default pin for all Bluetooth devices was 0000 Obviously not a real big challenge for an attacker, and they're very vulnerable to attacks. There's blue snarfing and blue jacking blue jacking the spamming, a Bluetooth device going back.
06:15
There's blue snarfing and blue jacking.
06:18
Blue jacking is spamming, a Bluetooth device. Blue snarfing is stealing information through a Bluetooth connection with Bluetooth data transmits about 10 m. But I'll tell you, you'd be surprised with the right tools. How far away you can actually be and still siphon information off of Bluetooth device.
06:38
If you want some fun reading, look up cantina like antenna. Um, but with a C, and you can see the work that people have done with Pringles cans and Bluetooth. It's kind of cool.
06:47
Other wireless technology R F I d
06:51
with R F I D. More and more devices are being fitted, whether it's these devices that you have in your EZ Pass as you go through toll booths or the chips in the back of the dog's neck in case they get lost. Credit cards, passports, R F I. D. S are everywhere. They're designed so that there are very passive chip until they get carried by a transponder.
07:11
When that Kerry happens, then the chip sort of comes to life and transmits its information.
07:15
For that reason, this could be a security vulnerability. So we have to make sure our devices that do come with these R F I D chips are kept somewhere that's secure.
07:24
A lot of laws today come with mesh, so that signal doesn't leak.
07:28
It's certainly something to keep track of or something to think about.
07:31
Mhm
07:32
a type of R F. I. D chip is called NFC Near field communication,
07:38
your NFC devices or devices that have to be very, very close to the reader.
07:42
If you have some of the newer hotel keys rather than having to swipe the key, you just have to hold it up to the lock. That's an NFC chip.
07:49
Those have all sorts of uses. They're easy to scan components. I think the Net Plus Exam might put forth that this would be a good idea to keep inventories of systems.
08:00
When I come to the shop and I check out a laptop, I just have to scan it with the reader, and that's good for inventory management. There are all sorts of uses for NFC,
08:09
of course, there's infrared communication. Infrared is used for remote controls and other sorts of devices used to see them with the personal data assistant, but not so much anymore,
08:20
certainly in for airports can also be used to sync information. We have all types of different wireless technology, and this is just a field that's going to continue to evolve, especially with the Internet of things evolving the way that it is this is going to explode over the next few years.
08:35
Yeah,
08:37
antennas when we're talking about signals and antenna, of course, is going to be used to transmit and boost the signal. Some antennas are omnidirectional.
08:46
In many cases, if you look at your home device or your home wireless router, you have an Omni directional antenna going back.
08:54
Yeah,
08:54
in many cases, if you look at your home device or your home wireless router, you have an Omni directional antenna. You've got radiation and the signal going equally in all directions.
09:05
There are certain antennas, like the one on the right, a Yagi antenna that's used for single direction from building to building. You might have a Yagi antenna. It's very focused on one specific direction.
09:16
They like to ask about antenna types on the exam, So take note.
09:20
Wrapping up wireless connection. We talked about the 802.11 standards, the different frequencies in which these devices can operate the pros and cons of operating at five GHz versus 2.4 GHz. We talked a little bit about the various channels that we can use, and then we wrapped up by talking about types of antennas,
09:39
multidirectional or uni directional,
09:43
mhm
Up Next