SlideShare una empresa de Scribd logo
1 de 26
PRESENTATION ON WI-
    FI TECHNOLOGY




By
MD MONIRUZZAMAN
   DEPT:-ECE 3RD YEAR
 WBUT ROLL NO: 09148003059
                             1
-:ACKNOWLEDGEMENT
        :-
    My respected
       teacher:
  Prof. Tarun Kumar
         Das

                      2
   # Introduction
   # Wi-Fi Technologies
   # Wi-Fi Architecture
   # Wi-Fi Network Elements
   # How a Wi-Fi Network Works
   # Wi-Fi Network Topologies
   # Wi-Fi Configurations
   # Applications of Wi-Fi
   # Wi-Fi Security
   # Conclusions
   # Reference
   # Bibliography
                                  3
Introduction
#   Wireless Technology is an
 alternative         to           Wired
 Technology, which is commonly
 used, for connecting devices in
 wireless mode.
# Wi-Fi (Wireless Fidelity) is a generic
 term that refers to the IEEE 802.11
 communications       standard       for
 Wireless Local Area Networks         4
The Wi-Fi Technology
Wi-Fi Networks use Radio
Technologies to transmit &
receive data at high speed:

# IEEE 802.11b(1999)
# IEEE 802.11a(2001)
# IEEE 802.11g(2003)          5
802.11 Physical Layer
# There are three sub layers in
 physical layer:      1. Direct
 Sequence      Spread     Spectrum
 (DSSS)
  2.Frequency Hoping Spread
 Spectrum (FHSS)
  3.Diffused Infrared (DFIR) - Wide
 angle                           6
DSSS
# Direct sequence signaling technique
 divides the 2.4 GHz band into 11 22-
 MHz channels. Adjacent channels
 overlap one another partially, with
 three of the 11 being completely non-
 overlapping. Data is sent across one
 of these 22 MHz channels without
 hopping to other channels.
                                     7
IEEE 802.11 Data Link
Layer
The data link layer consists of two
sub-layers :
  * Logical Link Control (LLC)
    *       Media Access Control
 (MAC).
  802.11 uses the same 802.2 LLC
 and 48-bit addressing as other 802
 LANs, allowing for very simple
                                  8

 bridging from wireless to IEEE
802.11 Media Access Control
# Carrier Sense Medium Access with collision avoidance
  protocol (CSMA/CA)
   ** Listen before talking
   ** Avoid collision by explicit Acknowledgement (ACK)
   ** Problem: additional overhead of ACK packets, so slow
     performance
# Request to Send/Clear to Send (RTS/CTS)
 protocol
  • Solution for “hidden node” problem
  • Problem:     Adds additional overhead by
    temporarily reserving the medium, so used for
    large size packets only retransmission would be
    expensive
# Power Management
                                                       9
Elements of a WI-FI Network
# Access Point (AP) -            The AP is a
 wireless LAN transceiver or “base station” that
 can connect one or many wireless devices
 simultaneously to the Internet.


# Wi-Fi cards -      They accept the wireless
 signal and relay information.They can be
 internal and external.(e.g PCMCIA Card for
 Laptop and PCI Card for Desktop PC)

                                               10


# Safeguards -         Firewalls and anti-virus
How a Wi-Fi Network Works
# Basic concept is same as Walkie talkies.
# A Wi-Fi hotspot is created by installing an
 access point to an internet connection.
# An access point acts as a base station.
# When Wi-Fi enabled device encounters a
 hotspot the device can then connect to that
 network wirelessly.
# A single access point can support up to 30
 users and can function within a range of 100 –
 150 feet indoors and up to 300 feet outdoors.
# Many access points can be connected to each
                                              11
Wi-Fi Network Topologies
# AP-based topology (Infrastructure
 Mode)

# Peer-to-peer    topology   (Ad-hoc
 Mode)

# Point-to-multipoint bridge topology
                                    12
AP-based topology
# The client communicate through Access
 Point.
# BSA-RF coverage provided by an AP.
# ESA-It consists of 2 or more BSA.
# ESA cell includes 10-15% overlap to
 allow roaming.




                                      13
Peer-to-peer topology
# AP is not required.
# Client devices within a
  cell can communicate
  directly with each
  other.
# It is useful for setting
  up of a wireless
  network quickly and
  easily.
                             14
Point-to-multipoint bridge topology
This is used to connect a LAN in one building to
a LANs in other buildings even if the buildings
are miles apart . These conditions receive a
clear line of sight between buildings. The line-of-
sight range varies based on the type of wireless
bridge and antenna used as well as the
environmental conditions.




                                                  15
Wi-Fi Configurations



                       16
Wi-Fi Applications
# Home
# Small Businesses or SOHO
# Large Corporations & Campuses
# Health Care
# Wireless ISP (WISP)
#Travellers
                                  17
Wi-Fi Security Techniques
Service   Set Identifier
 (SSID)
Wired Equivalent Privacy
 (WEP)
802.1X Access Control
Wireless Protected Access
 (WPA)
IEEE 802.11i               18
Service Set Identifier (SSID)
•   SSID is used to identify an
    802.11 network
•   It can be pre-configured or
    advertised in beacon
    broadcast
•   It is transmitted in clear text
    •   Provide very little security   19
Wired Equivalent Privacy
 Or i g i n a l
                  (WEP) t y s o l u t i
                 s e c u r i                            o n
    o f   f  e r e d     b y     t h e     I EEE      802.11
    s t   a  n d a r d
   Us    e  s     RC4       e n c r y p t i o n     wi t h
    p r   e  -s h a r e d k e y s         a n d 24 b i t
    i n   i  t i a l i z a t i o n v e c t o r s (I V )
   k e   y     s c h e d u l e     i s    g e n e r a t e d
    b y     c o n c a t e n a t i n g t h e s h a r e d
    s e   c r e t      k e y     wi t h     a    r a n d o m
    g e   n e r a t e d 24-b i t I V
   32     b i t     I C V (I n t e g r i t y      c h e c k
    v a   l u e )
   No    . o f b i t s i n k e y s c h e d u l e i s
    e q   u a l     t o    s u m o f      l e n g t h    o 20
                                                           f
    t h   e p l a i n t e x t a n d I CV
802.1x Access
•   Designed as aControl network access
                  general purpose
    control mechanism
•   Authenticate each client connected to AP (for
    WLAN) or switch port (for Ethernet)
•   Authentication is done with the RADIUS
    server, which ”tells” the access point whether
    access to controlled ports should be allowed
    or not
    •   AP forces the user into an unauthorized state
    •   user send an EAP start message
    •   AP return an EAP message requesting the user’s
        identity
    •   Identity send by user is then forwared to the
        authentication server by AP                   21
Wireless Protected Access
                       (WPA)
# WPA is a specification of standard based, interoperable
security enhancements that strongly increase the level of data
protection and access control for existing and future wireless
LAN system.
•   User Authentication
    •   802.1x
    •   EAP
# TKIP (Temporal Key Integrity Protocol) encryption
    •   RC4, dynamic encryption keys (session based)
         •   48 bit IV
         •   per packet key mixing function
    •   Fixes all issues found from WEP
•   Uses Message Integrity Code (MIC) Michael
    •   Ensures data integrity
• Old hardware should be upgradeable to WPA
# WPA comes in two flavors
        WPA-PSK
                                                                 22
    •
   Wi-Fi technology is the non-
    cable connection between the
                                     # Limitation:
    access point or router and       •   Degradation in
    the PC. The PC remotely
    connects to the internet             performance
    without any wires or cables.     •   High power
    In some cases, Wi-Fi tech.
    requires you to have the WEP     •   consumption
    or WPA key to access.
    WEP/WPA is like the              •   Interference
    password to secure your          •   Limited range
    wireless router/ access
    point.
# Advantages:
•   Mobility, Ease of Installation
•   Flexibility, Cost
•   Reliability,Security                                  23
#
http://in.search.yahoo.com/search;_ylt=A8pWB_u3zVFPxVYAqUv
uPXRG?ei=UTF-8&rd=r1&fr=yfp-t-704-s&p=wi-
fi+technologies&SpellState=&fr2=sp-qrw-corr-top

    http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf
   "Wi-Fi (wireless networking technology)". Encyclopedia
   Britannica.
www.wikipedia.com
www.yahoo.com
www.Google.com
   www.bing.com/image




                                                                  24
BIBLIOGRA
  PHY
“Wi-Fi: What's next", Paul
 S.Henry
Wireless       Networking
 Handbook, Jim Geier.
Wi-Fi             (wireless
 networking technology)".
 Encyclopedia Britannica
Seoul Moves to Provide
 Free    City-Wide     Wi-Fi
 Service". Retrieved 1 April   25
26

Más contenido relacionado

La actualidad más candente

Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
h_marvin
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
akki_hearts
 
Wireless security
Wireless securityWireless security
Wireless security
paripec
 

La actualidad más candente (20)

Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITY
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
 
Wi fi
Wi fiWi fi
Wi fi
 
Wireless standards
Wireless standards Wireless standards
Wireless standards
 
Zigbee
ZigbeeZigbee
Zigbee
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Wireless security
Wireless securityWireless security
Wireless security
 
LoRa Alliance
LoRa AllianceLoRa Alliance
LoRa Alliance
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
Teknologi Bluetooth
Teknologi BluetoothTeknologi Bluetooth
Teknologi Bluetooth
 
Wi-Fi For Beginners - Module 1- What is WiFi?
Wi-Fi For Beginners - Module 1- What is WiFi?Wi-Fi For Beginners - Module 1- What is WiFi?
Wi-Fi For Beginners - Module 1- What is WiFi?
 

Destacado

Wi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessWi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification Process
GopiNath Rko
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
Shital Kat
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
tardeep
 
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
Chanho Lee
 

Destacado (16)

wifi technology
wifi technologywifi technology
wifi technology
 
wifi
wifiwifi
wifi
 
Wi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessWi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification Process
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 
Wifi technology ppt
Wifi technology pptWifi technology ppt
Wifi technology ppt
 
WIFI Technology
WIFI TechnologyWIFI Technology
WIFI Technology
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
 
WiFi Technology & IEEE
WiFi Technology & IEEEWiFi Technology & IEEE
WiFi Technology & IEEE
 
LI-FI
LI-FILI-FI
LI-FI
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 
WiFi; It's Not Just Connectivity
WiFi; It's Not Just ConnectivityWiFi; It's Not Just Connectivity
WiFi; It's Not Just Connectivity
 

Similar a Wifi- technology_moni

Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
JigsAshley
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
tardeep
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
eceb9198
 

Similar a Wifi- technology_moni (20)

Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Wi fi technology & wap
Wi fi technology & wap Wi fi technology & wap
Wi fi technology & wap
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
Wifi
WifiWifi
Wifi
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
Wi fi
Wi fiWi fi
Wi fi
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Último (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Wifi- technology_moni

  • 1. PRESENTATION ON WI- FI TECHNOLOGY By MD MONIRUZZAMAN DEPT:-ECE 3RD YEAR WBUT ROLL NO: 09148003059 1
  • 2. -:ACKNOWLEDGEMENT :- My respected teacher: Prof. Tarun Kumar Das 2
  • 3. # Introduction  # Wi-Fi Technologies  # Wi-Fi Architecture  # Wi-Fi Network Elements  # How a Wi-Fi Network Works  # Wi-Fi Network Topologies  # Wi-Fi Configurations  # Applications of Wi-Fi  # Wi-Fi Security  # Conclusions  # Reference  # Bibliography 3
  • 4. Introduction # Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. # Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks 4
  • 5. The Wi-Fi Technology Wi-Fi Networks use Radio Technologies to transmit & receive data at high speed: # IEEE 802.11b(1999) # IEEE 802.11a(2001) # IEEE 802.11g(2003) 5
  • 6. 802.11 Physical Layer # There are three sub layers in physical layer: 1. Direct Sequence Spread Spectrum (DSSS) 2.Frequency Hoping Spread Spectrum (FHSS) 3.Diffused Infrared (DFIR) - Wide angle 6
  • 7. DSSS # Direct sequence signaling technique divides the 2.4 GHz band into 11 22- MHz channels. Adjacent channels overlap one another partially, with three of the 11 being completely non- overlapping. Data is sent across one of these 22 MHz channels without hopping to other channels. 7
  • 8. IEEE 802.11 Data Link Layer The data link layer consists of two sub-layers : * Logical Link Control (LLC) * Media Access Control (MAC). 802.11 uses the same 802.2 LLC and 48-bit addressing as other 802 LANs, allowing for very simple 8 bridging from wireless to IEEE
  • 9. 802.11 Media Access Control # Carrier Sense Medium Access with collision avoidance protocol (CSMA/CA) ** Listen before talking ** Avoid collision by explicit Acknowledgement (ACK) ** Problem: additional overhead of ACK packets, so slow performance # Request to Send/Clear to Send (RTS/CTS) protocol • Solution for “hidden node” problem • Problem: Adds additional overhead by temporarily reserving the medium, so used for large size packets only retransmission would be expensive # Power Management 9
  • 10. Elements of a WI-FI Network # Access Point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices simultaneously to the Internet. # Wi-Fi cards - They accept the wireless signal and relay information.They can be internal and external.(e.g PCMCIA Card for Laptop and PCI Card for Desktop PC) 10 # Safeguards - Firewalls and anti-virus
  • 11. How a Wi-Fi Network Works # Basic concept is same as Walkie talkies. # A Wi-Fi hotspot is created by installing an access point to an internet connection. # An access point acts as a base station. # When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly. # A single access point can support up to 30 users and can function within a range of 100 – 150 feet indoors and up to 300 feet outdoors. # Many access points can be connected to each 11
  • 12. Wi-Fi Network Topologies # AP-based topology (Infrastructure Mode) # Peer-to-peer topology (Ad-hoc Mode) # Point-to-multipoint bridge topology 12
  • 13. AP-based topology # The client communicate through Access Point. # BSA-RF coverage provided by an AP. # ESA-It consists of 2 or more BSA. # ESA cell includes 10-15% overlap to allow roaming. 13
  • 14. Peer-to-peer topology # AP is not required. # Client devices within a cell can communicate directly with each other. # It is useful for setting up of a wireless network quickly and easily. 14
  • 15. Point-to-multipoint bridge topology This is used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart . These conditions receive a clear line of sight between buildings. The line-of- sight range varies based on the type of wireless bridge and antenna used as well as the environmental conditions. 15
  • 17. Wi-Fi Applications # Home # Small Businesses or SOHO # Large Corporations & Campuses # Health Care # Wireless ISP (WISP) #Travellers 17
  • 18. Wi-Fi Security Techniques Service Set Identifier (SSID) Wired Equivalent Privacy (WEP) 802.1X Access Control Wireless Protected Access (WPA) IEEE 802.11i 18
  • 19. Service Set Identifier (SSID) • SSID is used to identify an 802.11 network • It can be pre-configured or advertised in beacon broadcast • It is transmitted in clear text • Provide very little security 19
  • 20. Wired Equivalent Privacy  Or i g i n a l (WEP) t y s o l u t i s e c u r i o n o f f e r e d b y t h e I EEE 802.11 s t a n d a r d  Us e s RC4 e n c r y p t i o n wi t h p r e -s h a r e d k e y s a n d 24 b i t i n i t i a l i z a t i o n v e c t o r s (I V )  k e y s c h e d u l e i s g e n e r a t e d b y c o n c a t e n a t i n g t h e s h a r e d s e c r e t k e y wi t h a r a n d o m g e n e r a t e d 24-b i t I V  32 b i t I C V (I n t e g r i t y c h e c k v a l u e )  No . o f b i t s i n k e y s c h e d u l e i s e q u a l t o s u m o f l e n g t h o 20 f t h e p l a i n t e x t a n d I CV
  • 21. 802.1x Access • Designed as aControl network access general purpose control mechanism • Authenticate each client connected to AP (for WLAN) or switch port (for Ethernet) • Authentication is done with the RADIUS server, which ”tells” the access point whether access to controlled ports should be allowed or not • AP forces the user into an unauthorized state • user send an EAP start message • AP return an EAP message requesting the user’s identity • Identity send by user is then forwared to the authentication server by AP 21
  • 22. Wireless Protected Access (WPA) # WPA is a specification of standard based, interoperable security enhancements that strongly increase the level of data protection and access control for existing and future wireless LAN system. • User Authentication • 802.1x • EAP # TKIP (Temporal Key Integrity Protocol) encryption • RC4, dynamic encryption keys (session based) • 48 bit IV • per packet key mixing function • Fixes all issues found from WEP • Uses Message Integrity Code (MIC) Michael • Ensures data integrity • Old hardware should be upgradeable to WPA # WPA comes in two flavors WPA-PSK 22 •
  • 23. Wi-Fi technology is the non- cable connection between the # Limitation: access point or router and • Degradation in the PC. The PC remotely connects to the internet performance without any wires or cables. • High power In some cases, Wi-Fi tech. requires you to have the WEP • consumption or WPA key to access. WEP/WPA is like the • Interference password to secure your • Limited range wireless router/ access point. # Advantages: • Mobility, Ease of Installation • Flexibility, Cost • Reliability,Security 23
  • 24. # http://in.search.yahoo.com/search;_ylt=A8pWB_u3zVFPxVYAqUv uPXRG?ei=UTF-8&rd=r1&fr=yfp-t-704-s&p=wi- fi+technologies&SpellState=&fr2=sp-qrw-corr-top http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf "Wi-Fi (wireless networking technology)". Encyclopedia Britannica. www.wikipedia.com www.yahoo.com www.Google.com www.bing.com/image 24
  • 25. BIBLIOGRA PHY “Wi-Fi: What's next", Paul S.Henry Wireless Networking Handbook, Jim Geier. Wi-Fi (wireless networking technology)". Encyclopedia Britannica Seoul Moves to Provide Free City-Wide Wi-Fi Service". Retrieved 1 April 25
  • 26. 26