SlideShare una empresa de Scribd logo
1 de 26
PRESENTATION ON WI-
    FI TECHNOLOGY




By
MD MONIRUZZAMAN
   DEPT:-ECE 3RD YEAR
 WBUT ROLL NO: 09148003059
                             1
-:ACKNOWLEDGEMENT
        :-
    My respected
       teacher:
  Prof. Tarun Kumar
         Das

                      2
   # Introduction
   # Wi-Fi Technologies
   # Wi-Fi Architecture
   # Wi-Fi Network Elements
   # How a Wi-Fi Network Works
   # Wi-Fi Network Topologies
   # Wi-Fi Configurations
   # Applications of Wi-Fi
   # Wi-Fi Security
   # Conclusions
   # Reference
   # Bibliography
                                  3
Introduction
#   Wireless Technology is an
 alternative         to           Wired
 Technology, which is commonly
 used, for connecting devices in
 wireless mode.
# Wi-Fi (Wireless Fidelity) is a generic
 term that refers to the IEEE 802.11
 communications       standard       for
 Wireless Local Area Networks         4
The Wi-Fi Technology
Wi-Fi Networks use Radio
Technologies to transmit &
receive data at high speed:

# IEEE 802.11b(1999)
# IEEE 802.11a(2001)
# IEEE 802.11g(2003)          5
802.11 Physical Layer
# There are three sub layers in
 physical layer:      1. Direct
 Sequence      Spread     Spectrum
 (DSSS)
  2.Frequency Hoping Spread
 Spectrum (FHSS)
  3.Diffused Infrared (DFIR) - Wide
 angle                           6
DSSS
# Direct sequence signaling technique
 divides the 2.4 GHz band into 11 22-
 MHz channels. Adjacent channels
 overlap one another partially, with
 three of the 11 being completely non-
 overlapping. Data is sent across one
 of these 22 MHz channels without
 hopping to other channels.
                                     7
IEEE 802.11 Data Link
Layer
The data link layer consists of two
sub-layers :
  * Logical Link Control (LLC)
    *       Media Access Control
 (MAC).
  802.11 uses the same 802.2 LLC
 and 48-bit addressing as other 802
 LANs, allowing for very simple
                                  8

 bridging from wireless to IEEE
802.11 Media Access Control
# Carrier Sense Medium Access with collision avoidance
  protocol (CSMA/CA)
   ** Listen before talking
   ** Avoid collision by explicit Acknowledgement (ACK)
   ** Problem: additional overhead of ACK packets, so slow
     performance
# Request to Send/Clear to Send (RTS/CTS)
 protocol
  • Solution for “hidden node” problem
  • Problem:     Adds additional overhead by
    temporarily reserving the medium, so used for
    large size packets only retransmission would be
    expensive
# Power Management
                                                       9
Elements of a WI-FI Network
# Access Point (AP) -            The AP is a
 wireless LAN transceiver or “base station” that
 can connect one or many wireless devices
 simultaneously to the Internet.


# Wi-Fi cards -      They accept the wireless
 signal and relay information.They can be
 internal and external.(e.g PCMCIA Card for
 Laptop and PCI Card for Desktop PC)

                                               10


# Safeguards -         Firewalls and anti-virus
How a Wi-Fi Network Works
# Basic concept is same as Walkie talkies.
# A Wi-Fi hotspot is created by installing an
 access point to an internet connection.
# An access point acts as a base station.
# When Wi-Fi enabled device encounters a
 hotspot the device can then connect to that
 network wirelessly.
# A single access point can support up to 30
 users and can function within a range of 100 –
 150 feet indoors and up to 300 feet outdoors.
# Many access points can be connected to each
                                              11
Wi-Fi Network Topologies
# AP-based topology (Infrastructure
 Mode)

# Peer-to-peer    topology   (Ad-hoc
 Mode)

# Point-to-multipoint bridge topology
                                    12
AP-based topology
# The client communicate through Access
 Point.
# BSA-RF coverage provided by an AP.
# ESA-It consists of 2 or more BSA.
# ESA cell includes 10-15% overlap to
 allow roaming.




                                      13
Peer-to-peer topology
# AP is not required.
# Client devices within a
  cell can communicate
  directly with each
  other.
# It is useful for setting
  up of a wireless
  network quickly and
  easily.
                             14
Point-to-multipoint bridge topology
This is used to connect a LAN in one building to
a LANs in other buildings even if the buildings
are miles apart . These conditions receive a
clear line of sight between buildings. The line-of-
sight range varies based on the type of wireless
bridge and antenna used as well as the
environmental conditions.




                                                  15
Wi-Fi Configurations



                       16
Wi-Fi Applications
# Home
# Small Businesses or SOHO
# Large Corporations & Campuses
# Health Care
# Wireless ISP (WISP)
#Travellers
                                  17
Wi-Fi Security Techniques
Service   Set Identifier
 (SSID)
Wired Equivalent Privacy
 (WEP)
802.1X Access Control
Wireless Protected Access
 (WPA)
IEEE 802.11i               18
Service Set Identifier (SSID)
•   SSID is used to identify an
    802.11 network
•   It can be pre-configured or
    advertised in beacon
    broadcast
•   It is transmitted in clear text
    •   Provide very little security   19
Wired Equivalent Privacy
 Or i g i n a l
                  (WEP) t y s o l u t i
                 s e c u r i                            o n
    o f   f  e r e d     b y     t h e     I EEE      802.11
    s t   a  n d a r d
   Us    e  s     RC4       e n c r y p t i o n     wi t h
    p r   e  -s h a r e d k e y s         a n d 24 b i t
    i n   i  t i a l i z a t i o n v e c t o r s (I V )
   k e   y     s c h e d u l e     i s    g e n e r a t e d
    b y     c o n c a t e n a t i n g t h e s h a r e d
    s e   c r e t      k e y     wi t h     a    r a n d o m
    g e   n e r a t e d 24-b i t I V
   32     b i t     I C V (I n t e g r i t y      c h e c k
    v a   l u e )
   No    . o f b i t s i n k e y s c h e d u l e i s
    e q   u a l     t o    s u m o f      l e n g t h    o 20
                                                           f
    t h   e p l a i n t e x t a n d I CV
802.1x Access
•   Designed as aControl network access
                  general purpose
    control mechanism
•   Authenticate each client connected to AP (for
    WLAN) or switch port (for Ethernet)
•   Authentication is done with the RADIUS
    server, which ”tells” the access point whether
    access to controlled ports should be allowed
    or not
    •   AP forces the user into an unauthorized state
    •   user send an EAP start message
    •   AP return an EAP message requesting the user’s
        identity
    •   Identity send by user is then forwared to the
        authentication server by AP                   21
Wireless Protected Access
                       (WPA)
# WPA is a specification of standard based, interoperable
security enhancements that strongly increase the level of data
protection and access control for existing and future wireless
LAN system.
•   User Authentication
    •   802.1x
    •   EAP
# TKIP (Temporal Key Integrity Protocol) encryption
    •   RC4, dynamic encryption keys (session based)
         •   48 bit IV
         •   per packet key mixing function
    •   Fixes all issues found from WEP
•   Uses Message Integrity Code (MIC) Michael
    •   Ensures data integrity
• Old hardware should be upgradeable to WPA
# WPA comes in two flavors
        WPA-PSK
                                                                 22
    •
   Wi-Fi technology is the non-
    cable connection between the
                                     # Limitation:
    access point or router and       •   Degradation in
    the PC. The PC remotely
    connects to the internet             performance
    without any wires or cables.     •   High power
    In some cases, Wi-Fi tech.
    requires you to have the WEP     •   consumption
    or WPA key to access.
    WEP/WPA is like the              •   Interference
    password to secure your          •   Limited range
    wireless router/ access
    point.
# Advantages:
•   Mobility, Ease of Installation
•   Flexibility, Cost
•   Reliability,Security                                  23
#
http://in.search.yahoo.com/search;_ylt=A8pWB_u3zVFPxVYAqUv
uPXRG?ei=UTF-8&rd=r1&fr=yfp-t-704-s&p=wi-
fi+technologies&SpellState=&fr2=sp-qrw-corr-top

    http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf
   "Wi-Fi (wireless networking technology)". Encyclopedia
   Britannica.
www.wikipedia.com
www.yahoo.com
www.Google.com
   www.bing.com/image




                                                                  24
BIBLIOGRA
  PHY
“Wi-Fi: What's next", Paul
 S.Henry
Wireless       Networking
 Handbook, Jim Geier.
Wi-Fi             (wireless
 networking technology)".
 Encyclopedia Britannica
Seoul Moves to Provide
 Free    City-Wide     Wi-Fi
 Service". Retrieved 1 April   25
26

Más contenido relacionado

La actualidad más candente

Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITYJay Nagar
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Securityh_marvin
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and securityakki_hearts
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs BluetoothArun ACE
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaArpit Bhatia
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?Stephen Kho
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiMostafa Ali
 
Wireless standards
Wireless standards Wireless standards
Wireless standards Ajay Suresh
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-securityAnand Dhana
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth securityRamasubbu .P
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Mohammad Fareed
 
Wi-Fi For Beginners - Module 1- What is WiFi?
Wi-Fi For Beginners - Module 1- What is WiFi?Wi-Fi For Beginners - Module 1- What is WiFi?
Wi-Fi For Beginners - Module 1- What is WiFi?Nigel Bowden
 

La actualidad más candente (20)

Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITY
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
 
Wi fi
Wi fiWi fi
Wi fi
 
Wireless standards
Wireless standards Wireless standards
Wireless standards
 
Zigbee
ZigbeeZigbee
Zigbee
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Wireless security
Wireless securityWireless security
Wireless security
 
LoRa Alliance
LoRa AllianceLoRa Alliance
LoRa Alliance
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
Teknologi Bluetooth
Teknologi BluetoothTeknologi Bluetooth
Teknologi Bluetooth
 
Wi-Fi For Beginners - Module 1- What is WiFi?
Wi-Fi For Beginners - Module 1- What is WiFi?Wi-Fi For Beginners - Module 1- What is WiFi?
Wi-Fi For Beginners - Module 1- What is WiFi?
 

Destacado

Wi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessWi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessGopiNath Rko
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Hem Pokhrel
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology WriteupShital Kat
 
wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016Chanho Lee
 
WiFi; It's Not Just Connectivity
WiFi; It's Not Just ConnectivityWiFi; It's Not Just Connectivity
WiFi; It's Not Just ConnectivityWestbase.io
 

Destacado (16)

wifi technology
wifi technologywifi technology
wifi technology
 
wifi
wifiwifi
wifi
 
Wi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessWi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification Process
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 
Wifi technology ppt
Wifi technology pptWifi technology ppt
Wifi technology ppt
 
WIFI Technology
WIFI TechnologyWIFI Technology
WIFI Technology
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
 
WiFi Technology & IEEE
WiFi Technology & IEEEWiFi Technology & IEEE
WiFi Technology & IEEE
 
LI-FI
LI-FILI-FI
LI-FI
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 
WiFi; It's Not Just Connectivity
WiFi; It's Not Just ConnectivityWiFi; It's Not Just Connectivity
WiFi; It's Not Just Connectivity
 

Similar a Wifi- technology_moni

Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communicationJigsAshley
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan finalPREMKUMAR
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005Bill Drew
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technologyRavi Rajput
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Wail Hassan
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringeceb9198
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityGurpreet Singh
 

Similar a Wifi- technology_moni (20)

Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Wi fi technology & wap
Wi fi technology & wap Wi fi technology & wap
Wi fi technology & wap
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
Wifi
WifiWifi
Wifi
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
Wi fi
Wi fiWi fi
Wi fi
 

Último

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Último (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Wifi- technology_moni

  • 1. PRESENTATION ON WI- FI TECHNOLOGY By MD MONIRUZZAMAN DEPT:-ECE 3RD YEAR WBUT ROLL NO: 09148003059 1
  • 2. -:ACKNOWLEDGEMENT :- My respected teacher: Prof. Tarun Kumar Das 2
  • 3. # Introduction  # Wi-Fi Technologies  # Wi-Fi Architecture  # Wi-Fi Network Elements  # How a Wi-Fi Network Works  # Wi-Fi Network Topologies  # Wi-Fi Configurations  # Applications of Wi-Fi  # Wi-Fi Security  # Conclusions  # Reference  # Bibliography 3
  • 4. Introduction # Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. # Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks 4
  • 5. The Wi-Fi Technology Wi-Fi Networks use Radio Technologies to transmit & receive data at high speed: # IEEE 802.11b(1999) # IEEE 802.11a(2001) # IEEE 802.11g(2003) 5
  • 6. 802.11 Physical Layer # There are three sub layers in physical layer: 1. Direct Sequence Spread Spectrum (DSSS) 2.Frequency Hoping Spread Spectrum (FHSS) 3.Diffused Infrared (DFIR) - Wide angle 6
  • 7. DSSS # Direct sequence signaling technique divides the 2.4 GHz band into 11 22- MHz channels. Adjacent channels overlap one another partially, with three of the 11 being completely non- overlapping. Data is sent across one of these 22 MHz channels without hopping to other channels. 7
  • 8. IEEE 802.11 Data Link Layer The data link layer consists of two sub-layers : * Logical Link Control (LLC) * Media Access Control (MAC). 802.11 uses the same 802.2 LLC and 48-bit addressing as other 802 LANs, allowing for very simple 8 bridging from wireless to IEEE
  • 9. 802.11 Media Access Control # Carrier Sense Medium Access with collision avoidance protocol (CSMA/CA) ** Listen before talking ** Avoid collision by explicit Acknowledgement (ACK) ** Problem: additional overhead of ACK packets, so slow performance # Request to Send/Clear to Send (RTS/CTS) protocol • Solution for “hidden node” problem • Problem: Adds additional overhead by temporarily reserving the medium, so used for large size packets only retransmission would be expensive # Power Management 9
  • 10. Elements of a WI-FI Network # Access Point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices simultaneously to the Internet. # Wi-Fi cards - They accept the wireless signal and relay information.They can be internal and external.(e.g PCMCIA Card for Laptop and PCI Card for Desktop PC) 10 # Safeguards - Firewalls and anti-virus
  • 11. How a Wi-Fi Network Works # Basic concept is same as Walkie talkies. # A Wi-Fi hotspot is created by installing an access point to an internet connection. # An access point acts as a base station. # When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly. # A single access point can support up to 30 users and can function within a range of 100 – 150 feet indoors and up to 300 feet outdoors. # Many access points can be connected to each 11
  • 12. Wi-Fi Network Topologies # AP-based topology (Infrastructure Mode) # Peer-to-peer topology (Ad-hoc Mode) # Point-to-multipoint bridge topology 12
  • 13. AP-based topology # The client communicate through Access Point. # BSA-RF coverage provided by an AP. # ESA-It consists of 2 or more BSA. # ESA cell includes 10-15% overlap to allow roaming. 13
  • 14. Peer-to-peer topology # AP is not required. # Client devices within a cell can communicate directly with each other. # It is useful for setting up of a wireless network quickly and easily. 14
  • 15. Point-to-multipoint bridge topology This is used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart . These conditions receive a clear line of sight between buildings. The line-of- sight range varies based on the type of wireless bridge and antenna used as well as the environmental conditions. 15
  • 17. Wi-Fi Applications # Home # Small Businesses or SOHO # Large Corporations & Campuses # Health Care # Wireless ISP (WISP) #Travellers 17
  • 18. Wi-Fi Security Techniques Service Set Identifier (SSID) Wired Equivalent Privacy (WEP) 802.1X Access Control Wireless Protected Access (WPA) IEEE 802.11i 18
  • 19. Service Set Identifier (SSID) • SSID is used to identify an 802.11 network • It can be pre-configured or advertised in beacon broadcast • It is transmitted in clear text • Provide very little security 19
  • 20. Wired Equivalent Privacy  Or i g i n a l (WEP) t y s o l u t i s e c u r i o n o f f e r e d b y t h e I EEE 802.11 s t a n d a r d  Us e s RC4 e n c r y p t i o n wi t h p r e -s h a r e d k e y s a n d 24 b i t i n i t i a l i z a t i o n v e c t o r s (I V )  k e y s c h e d u l e i s g e n e r a t e d b y c o n c a t e n a t i n g t h e s h a r e d s e c r e t k e y wi t h a r a n d o m g e n e r a t e d 24-b i t I V  32 b i t I C V (I n t e g r i t y c h e c k v a l u e )  No . o f b i t s i n k e y s c h e d u l e i s e q u a l t o s u m o f l e n g t h o 20 f t h e p l a i n t e x t a n d I CV
  • 21. 802.1x Access • Designed as aControl network access general purpose control mechanism • Authenticate each client connected to AP (for WLAN) or switch port (for Ethernet) • Authentication is done with the RADIUS server, which ”tells” the access point whether access to controlled ports should be allowed or not • AP forces the user into an unauthorized state • user send an EAP start message • AP return an EAP message requesting the user’s identity • Identity send by user is then forwared to the authentication server by AP 21
  • 22. Wireless Protected Access (WPA) # WPA is a specification of standard based, interoperable security enhancements that strongly increase the level of data protection and access control for existing and future wireless LAN system. • User Authentication • 802.1x • EAP # TKIP (Temporal Key Integrity Protocol) encryption • RC4, dynamic encryption keys (session based) • 48 bit IV • per packet key mixing function • Fixes all issues found from WEP • Uses Message Integrity Code (MIC) Michael • Ensures data integrity • Old hardware should be upgradeable to WPA # WPA comes in two flavors WPA-PSK 22 •
  • 23. Wi-Fi technology is the non- cable connection between the # Limitation: access point or router and • Degradation in the PC. The PC remotely connects to the internet performance without any wires or cables. • High power In some cases, Wi-Fi tech. requires you to have the WEP • consumption or WPA key to access. WEP/WPA is like the • Interference password to secure your • Limited range wireless router/ access point. # Advantages: • Mobility, Ease of Installation • Flexibility, Cost • Reliability,Security 23
  • 24. # http://in.search.yahoo.com/search;_ylt=A8pWB_u3zVFPxVYAqUv uPXRG?ei=UTF-8&rd=r1&fr=yfp-t-704-s&p=wi- fi+technologies&SpellState=&fr2=sp-qrw-corr-top http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf "Wi-Fi (wireless networking technology)". Encyclopedia Britannica. www.wikipedia.com www.yahoo.com www.Google.com www.bing.com/image 24
  • 25. BIBLIOGRA PHY “Wi-Fi: What's next", Paul S.Henry Wireless Networking Handbook, Jim Geier. Wi-Fi (wireless networking technology)". Encyclopedia Britannica Seoul Moves to Provide Free City-Wide Wi-Fi Service". Retrieved 1 April 25
  • 26. 26