SlideShare una empresa de Scribd logo
1 de 21
THE MASTER PIECE SITE SURVEY
COVERAGE AREA
WIRELESS TOPOLOGY BSS IBSS ESS       In this site survey we are using more than one access points so the topology we are using is the Extended Service Set i.e. ESS.
Available Technologies  802.11 a     IEEE 802.11a-1999 or 802.11a is an amendment to the IEEE 802.11 specification that added a higher data rate of up to 54 Mbit/s using the 5 GHz band. It has seen widespread worldwide implementation, particularly within the corporate workspace.
[object Object],IEEE 802.11b-1999 or 802.11b, is an amendment to the IEEE 802.11 specification that extended throughput up to 11 Mbit/s using the same 2.4 GHz band. This specification under the marketing name of Wi-Fi has been implemented all over the world. 802.11b has a maximum raw data rate of 11 Mbit/s and uses the same CSMA/CA media access method defined in the original standard.
[object Object],802.11g is the third modulation standard for wireless LANs. It works in the 2.4 GHz band (like 802.11b) but operates at a maximum raw data rate of 54 Mbit/s, or about 19 Mbit/s net throughput (identical to 802.11a core, except for some additional legacy overhead for backward compatibility). 802.11g hardware is fully backwards compatible with 802.11b hardware. 
Technology Used Technology for this layout &  as per the requirements of the University I am using is 802.11 a.
Why 802.11 a? Why not 802.11 b ? ,[object Object],      devices like the Bluetooth's work. ,[object Object],     which is not suited for big crowd &       also not separated by much distance.
Why not 802.11 g? ,[object Object],     interferences caused by the devices       at that band. ,[object Object],      no. of   channels that can b used is only 3.
Advantages of 802.11a ,[object Object]
 As the band is larger the no. of channels are      up to 23. ,[object Object],     the crowded places where the crowd is not sparse.
Layout
Access Points In computer networking, a wireless access point (WAP) is a device which allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router (via a wired network), and can relay data between the wireless devices (such as computers or printers) and wired devices on the network.
Why three A.P’s? The technology we are using i.e. 802.11 a has a disadvantage which is this technology has short range. So to have good speed & also better connectivity we need three access points. 1- LABS. 2- Horizontal Corridor. 3- Vertical Corridor.
Security The Wireless security  standard we are using is       802.11i or WPA 2. WPA stands for WIFI Protected Access.Which is the latest protocol for wireless & has many      good features like AES,TKIP etc.
Features of WPA 2 AES (Advance Encryption). Authentication. Dynamic Key Management. Successor of WPA.
Advanced Encryption System The new 802.11i standard, or WPA2, supports the  128-bit Advanced Encryption Standard (AES) . AES supports 128-bit, 192-bit and 256-bit keys.
Authentication This new standard specifies use of Temporal Key Integrity Protocol (TKIP) and 802.1x/EAP with mutual authentication . 802.1x authentication and key-management      features for the various 802.11 Wi-Fi flavors.
Control Accessing WLAN SSID       A service set identifier (SSID) is a name that identifies a particular 802.11 wireless LAN. A client device receives broadcast messages from all access points within range advertising their SSIDs. The client device can then either manually or automatically—based on configuration—select the network with which to associate. The SSID can be up to 32 characters long. As the SSID displays to users, it normally consists of human-readable characters.
Mac Address Filtering ,[object Object]
   MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and white lists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a white list entry for each device that he or she would use to access the network.,[object Object]

Más contenido relacionado

La actualidad más candente

Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiDeceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiNETSCOUT
 
EnGenius' End to End Solution (E2ES)
EnGenius' End to End Solution (E2ES)EnGenius' End to End Solution (E2ES)
EnGenius' End to End Solution (E2ES)Bryan Slayman
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksJim Gilsinn
 
Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)NetBeez, Inc.
 
Acma Computers : Company Profile ( IT Services & Solutions Provider )
Acma Computers : Company Profile ( IT Services & Solutions Provider ) Acma Computers : Company Profile ( IT Services & Solutions Provider )
Acma Computers : Company Profile ( IT Services & Solutions Provider ) Acma Computers Ltd
 
Daniel Cross, Electronics Engineer
Daniel Cross, Electronics EngineerDaniel Cross, Electronics Engineer
Daniel Cross, Electronics EngineerDaniel Cross
 
Sinefa - It's about time
Sinefa - It's about timeSinefa - It's about time
Sinefa - It's about timeChris Siakos
 
NetBeez - AngelBeat presentation
NetBeez - AngelBeat presentationNetBeez - AngelBeat presentation
NetBeez - AngelBeat presentationNetBeez, Inc.
 
LoRaWAN in Depth
LoRaWAN in DepthLoRaWAN in Depth
LoRaWAN in DepthAPNIC
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance LabJim Gilsinn
 
80211 the end of wireles or is it
80211 the end of wireles or is it80211 the end of wireles or is it
80211 the end of wireles or is itInterop
 
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...EIT Digital Alumni
 
pola samy cv 24 10 2016
pola samy cv 24 10 2016pola samy cv 24 10 2016
pola samy cv 24 10 2016pola samy
 
Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Denny K
 
Asset tracking solution for construction
Asset tracking solution for constructionAsset tracking solution for construction
Asset tracking solution for constructionUmesh Raghavan
 
Spirent: The Internet of Things: The Expanded Security Perimeter
Spirent: The Internet of Things:  The Expanded Security Perimeter Spirent: The Internet of Things:  The Expanded Security Perimeter
Spirent: The Internet of Things: The Expanded Security Perimeter Sailaja Tennati
 
LoRa application for detecting the harmful gases
LoRa application for detecting the harmful gasesLoRa application for detecting the harmful gases
LoRa application for detecting the harmful gasesPARNIKA GUPTA
 
ThousandEyes at Network Field Day 12
ThousandEyes at Network Field Day 12ThousandEyes at Network Field Day 12
ThousandEyes at Network Field Day 12ThousandEyes
 
Spirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSpirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSailaja Tennati
 

La actualidad más candente (20)

Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiDeceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
 
EnGenius' End to End Solution (E2ES)
EnGenius' End to End Solution (E2ES)EnGenius' End to End Solution (E2ES)
EnGenius' End to End Solution (E2ES)
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
 
Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)
 
Acma Computers : Company Profile ( IT Services & Solutions Provider )
Acma Computers : Company Profile ( IT Services & Solutions Provider ) Acma Computers : Company Profile ( IT Services & Solutions Provider )
Acma Computers : Company Profile ( IT Services & Solutions Provider )
 
Daniel Cross, Electronics Engineer
Daniel Cross, Electronics EngineerDaniel Cross, Electronics Engineer
Daniel Cross, Electronics Engineer
 
Sinefa - It's about time
Sinefa - It's about timeSinefa - It's about time
Sinefa - It's about time
 
NetBeez - AngelBeat presentation
NetBeez - AngelBeat presentationNetBeez - AngelBeat presentation
NetBeez - AngelBeat presentation
 
LoRaWAN in Depth
LoRaWAN in DepthLoRaWAN in Depth
LoRaWAN in Depth
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance Lab
 
80211 the end of wireles or is it
80211 the end of wireles or is it80211 the end of wireles or is it
80211 the end of wireles or is it
 
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
 
pola samy cv 24 10 2016
pola samy cv 24 10 2016pola samy cv 24 10 2016
pola samy cv 24 10 2016
 
Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008
 
Asset tracking solution for construction
Asset tracking solution for constructionAsset tracking solution for construction
Asset tracking solution for construction
 
Spirent: The Internet of Things: The Expanded Security Perimeter
Spirent: The Internet of Things:  The Expanded Security Perimeter Spirent: The Internet of Things:  The Expanded Security Perimeter
Spirent: The Internet of Things: The Expanded Security Perimeter
 
Wireless Accuracy for 9-1-1
Wireless Accuracy for 9-1-1Wireless Accuracy for 9-1-1
Wireless Accuracy for 9-1-1
 
LoRa application for detecting the harmful gases
LoRa application for detecting the harmful gasesLoRa application for detecting the harmful gases
LoRa application for detecting the harmful gases
 
ThousandEyes at Network Field Day 12
ThousandEyes at Network Field Day 12ThousandEyes at Network Field Day 12
ThousandEyes at Network Field Day 12
 
Spirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSpirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV Deployments
 

Destacado

Wi-Fi Planning - The 7 Secrets
Wi-Fi Planning - The 7 Secrets Wi-Fi Planning - The 7 Secrets
Wi-Fi Planning - The 7 Secrets Ekahau_WiFi_Tools
 
Ekahau Site Survey on Fusion / Windows
Ekahau Site Survey on Fusion / WindowsEkahau Site Survey on Fusion / Windows
Ekahau Site Survey on Fusion / WindowsJussi Kiviniemi
 
Ekahau SIte Survey, 3D Planner & Other Wi-Fi Tools Presentation
Ekahau SIte Survey, 3D Planner & Other Wi-Fi Tools PresentationEkahau SIte Survey, 3D Planner & Other Wi-Fi Tools Presentation
Ekahau SIte Survey, 3D Planner & Other Wi-Fi Tools PresentationEkahau_WiFi_Tools
 
Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)
Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)
Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)Jussi Kiviniemi
 
Ekahau Site Survey on Mac (VMware Fusion with Win 7)
Ekahau Site Survey on Mac (VMware Fusion with Win 7)Ekahau Site Survey on Mac (VMware Fusion with Win 7)
Ekahau Site Survey on Mac (VMware Fusion with Win 7)Ekahau_WiFi_Tools
 
Ekahau Wi-Fi Tools general overview
Ekahau Wi-Fi Tools general overviewEkahau Wi-Fi Tools general overview
Ekahau Wi-Fi Tools general overviewJussi Kiviniemi
 
Bad Wi-Fi - Ekahau Webinar - July 2014
Bad Wi-Fi - Ekahau Webinar - July 2014Bad Wi-Fi - Ekahau Webinar - July 2014
Bad Wi-Fi - Ekahau Webinar - July 2014Ekahau_WiFi_Tools
 
Linux and its fundamentals
Linux and its fundamentalsLinux and its fundamentals
Linux and its fundamentalsAgreeta Sharma
 
Reporting With A Cellphone October 2009
Reporting With A Cellphone October 2009Reporting With A Cellphone October 2009
Reporting With A Cellphone October 2009Steve Garfield
 
Moxy station map
Moxy station mapMoxy station map
Moxy station mapMOXYMEDIA
 
Mobile Moodle and mLearning project for mLearncon in San Diego
Mobile Moodle and mLearning project for mLearncon in San DiegoMobile Moodle and mLearning project for mLearncon in San Diego
Mobile Moodle and mLearning project for mLearncon in San DiegoInge de Waard
 
AS Solar Charging Station Design Report
AS Solar Charging Station Design ReportAS Solar Charging Station Design Report
AS Solar Charging Station Design ReportSalam Ali
 
Forgiveness leads to anger management
Forgiveness leads to anger managementForgiveness leads to anger management
Forgiveness leads to anger managementAgreeta Sharma
 
Idiom overview
Idiom overview Idiom overview
Idiom overview idiomlive
 
Site Visit Report
Site Visit ReportSite Visit Report
Site Visit ReportZIyeeTan
 
5 Hotel Technology Trends to Watch
5 Hotel Technology Trends to Watch5 Hotel Technology Trends to Watch
5 Hotel Technology Trends to WatchVoxer App
 
Basic FM Radio Station RF Design Good Practices
Basic FM Radio Station RF Design Good PracticesBasic FM Radio Station RF Design Good Practices
Basic FM Radio Station RF Design Good PracticesFrank Massa
 

Destacado (20)

Wi-Fi Planning - The 7 Secrets
Wi-Fi Planning - The 7 Secrets Wi-Fi Planning - The 7 Secrets
Wi-Fi Planning - The 7 Secrets
 
Ekahau Site Survey on Fusion / Windows
Ekahau Site Survey on Fusion / WindowsEkahau Site Survey on Fusion / Windows
Ekahau Site Survey on Fusion / Windows
 
Ekahau SIte Survey, 3D Planner & Other Wi-Fi Tools Presentation
Ekahau SIte Survey, 3D Planner & Other Wi-Fi Tools PresentationEkahau SIte Survey, 3D Planner & Other Wi-Fi Tools Presentation
Ekahau SIte Survey, 3D Planner & Other Wi-Fi Tools Presentation
 
Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)
Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)
Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)
 
Ekahau Site Survey on Mac (VMware Fusion with Win 7)
Ekahau Site Survey on Mac (VMware Fusion with Win 7)Ekahau Site Survey on Mac (VMware Fusion with Win 7)
Ekahau Site Survey on Mac (VMware Fusion with Win 7)
 
Ekahau Wi-Fi Tools general overview
Ekahau Wi-Fi Tools general overviewEkahau Wi-Fi Tools general overview
Ekahau Wi-Fi Tools general overview
 
Bad Wi-Fi - Ekahau Webinar - July 2014
Bad Wi-Fi - Ekahau Webinar - July 2014Bad Wi-Fi - Ekahau Webinar - July 2014
Bad Wi-Fi - Ekahau Webinar - July 2014
 
Linux and its fundamentals
Linux and its fundamentalsLinux and its fundamentals
Linux and its fundamentals
 
Reporting With A Cellphone October 2009
Reporting With A Cellphone October 2009Reporting With A Cellphone October 2009
Reporting With A Cellphone October 2009
 
Moxy station map
Moxy station mapMoxy station map
Moxy station map
 
Mobile Moodle and mLearning project for mLearncon in San Diego
Mobile Moodle and mLearning project for mLearncon in San DiegoMobile Moodle and mLearning project for mLearncon in San Diego
Mobile Moodle and mLearning project for mLearncon in San Diego
 
AS Solar Charging Station Design Report
AS Solar Charging Station Design ReportAS Solar Charging Station Design Report
AS Solar Charging Station Design Report
 
Forgiveness leads to anger management
Forgiveness leads to anger managementForgiveness leads to anger management
Forgiveness leads to anger management
 
Idiom overview
Idiom overview Idiom overview
Idiom overview
 
802.11ac Wave 2 technology deep dive and deployment recommendations
802.11ac Wave 2 technology deep dive and deployment recommendations802.11ac Wave 2 technology deep dive and deployment recommendations
802.11ac Wave 2 technology deep dive and deployment recommendations
 
Rf basics
Rf basicsRf basics
Rf basics
 
Site Visit Report
Site Visit ReportSite Visit Report
Site Visit Report
 
Rf mems basic
Rf mems basicRf mems basic
Rf mems basic
 
5 Hotel Technology Trends to Watch
5 Hotel Technology Trends to Watch5 Hotel Technology Trends to Watch
5 Hotel Technology Trends to Watch
 
Basic FM Radio Station RF Design Good Practices
Basic FM Radio Station RF Design Good PracticesBasic FM Radio Station RF Design Good Practices
Basic FM Radio Station RF Design Good Practices
 

Similar a Site survey- Deployement of Wi Fi

Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comphanleson
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Wail Hassan
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEric Vanderburg
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptxstephen972973
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...IJCSIS Research Publications
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignmentBijay Bista
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.pptSagarBedarkar3
 

Similar a Site survey- Deployement of Wi Fi (20)

Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Darsh
DarshDarsh
Darsh
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Wi fi
Wi fiWi fi
Wi fi
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
802 standerd
802 standerd802 standerd
802 standerd
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.ppt
 

Último

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 

Último (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 

Site survey- Deployement of Wi Fi

  • 1. THE MASTER PIECE SITE SURVEY
  • 3. WIRELESS TOPOLOGY BSS IBSS ESS In this site survey we are using more than one access points so the topology we are using is the Extended Service Set i.e. ESS.
  • 4. Available Technologies 802.11 a IEEE 802.11a-1999 or 802.11a is an amendment to the IEEE 802.11 specification that added a higher data rate of up to 54 Mbit/s using the 5 GHz band. It has seen widespread worldwide implementation, particularly within the corporate workspace.
  • 5.
  • 6.
  • 7. Technology Used Technology for this layout & as per the requirements of the University I am using is 802.11 a.
  • 8.
  • 9.
  • 10.
  • 11.
  • 13. Access Points In computer networking, a wireless access point (WAP) is a device which allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router (via a wired network), and can relay data between the wireless devices (such as computers or printers) and wired devices on the network.
  • 14. Why three A.P’s? The technology we are using i.e. 802.11 a has a disadvantage which is this technology has short range. So to have good speed & also better connectivity we need three access points. 1- LABS. 2- Horizontal Corridor. 3- Vertical Corridor.
  • 15. Security The Wireless security standard we are using is 802.11i or WPA 2. WPA stands for WIFI Protected Access.Which is the latest protocol for wireless & has many good features like AES,TKIP etc.
  • 16. Features of WPA 2 AES (Advance Encryption). Authentication. Dynamic Key Management. Successor of WPA.
  • 17. Advanced Encryption System The new 802.11i standard, or WPA2, supports the 128-bit Advanced Encryption Standard (AES) . AES supports 128-bit, 192-bit and 256-bit keys.
  • 18. Authentication This new standard specifies use of Temporal Key Integrity Protocol (TKIP) and 802.1x/EAP with mutual authentication . 802.1x authentication and key-management features for the various 802.11 Wi-Fi flavors.
  • 19. Control Accessing WLAN SSID A service set identifier (SSID) is a name that identifies a particular 802.11 wireless LAN. A client device receives broadcast messages from all access points within range advertising their SSIDs. The client device can then either manually or automatically—based on configuration—select the network with which to associate. The SSID can be up to 32 characters long. As the SSID displays to users, it normally consists of human-readable characters.
  • 20.
  • 21.
  • 22. Thank You Agreeta Sharma M.Sc Networking Management’12 Amity University