• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Site survey- Deployement of Wi Fi
 

Site survey- Deployement of Wi Fi

on

  • 405 views

 

Statistics

Views

Total Views
405
Views on SlideShare
405
Embed Views
0

Actions

Likes
0
Downloads
4
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Site survey- Deployement of Wi Fi Site survey- Deployement of Wi Fi Presentation Transcript

    • THE MASTER PIECE
      SITE SURVEY
    • COVERAGE AREA
    • WIRELESS TOPOLOGY
      BSS
      IBSS
      ESS
      In this site survey we are using more than one access points so the topology we are using is the Extended Service Set i.e. ESS.
    • Available Technologies
      802.11 a
      IEEE 802.11a-1999 or 802.11a is an amendment to the IEEE 802.11 specification that added a higher data rate of up to 54 Mbit/s using the 5 GHz band. It has seen widespread worldwide implementation, particularly within the corporate workspace.
      • 802.11 b
      IEEE 802.11b-1999 or 802.11b, is an amendment to the IEEE 802.11 specification that extended throughput up to 11 Mbit/s using the same 2.4 GHz band. This specification under the marketing name of Wi-Fi has been implemented all over the world. 802.11b has a maximum raw data rate of 11 Mbit/s and uses the same CSMA/CA media access method defined in the original standard.
      • 802.11g
      802.11g is the third modulation standard for wireless LANs. It works in the 2.4 GHz band (like 802.11b) but operates at a maximum raw data rate of 54 Mbit/s, or about 19 Mbit/s net throughput (identical to 802.11a core, except for some additional legacy overhead for backward compatibility). 802.11g hardware is fully backwards compatible with 802.11b hardware. 
    • Technology Used
      Technology for this layout & as per the requirements of the University I am using is 802.11 a.
    • Why 802.11 a?
      Why not 802.11 b ?
      • It works on 2.4 GHz at this band many
      devices like the Bluetooth's work.
      • Secondly, the speed is of 11 Mbps only
      which is not suited for big crowd &
      also not separated by much distance.
    • Why not 802.11 g?
      • It also uses the 2.4 GHz band so there are
      interferences caused by the devices
      at that band.
      • Secondly, as it uses a smaller band the
      no. of channels that can b used is only 3.
    • Advantages of 802.11a
      • Uses a band of 5.7 GHz so the issue of interference are very less.
      • As the band is larger the no. of channels are
      up to 23.
      • The speed is of 54 Mbps & it also suits
      the crowded places where the crowd is not sparse.
    • Layout
    • Access Points
      In computer networking, a wireless access point (WAP) is a device which allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router (via a wired network), and can relay data between the wireless devices (such as computers or printers) and wired devices on the network.
    • Why three A.P’s?
      The technology we are using i.e. 802.11 a has a disadvantage which is this technology has short range.
      So to have good speed & also better connectivity we need three access points.
      1- LABS.
      2- Horizontal Corridor.
      3- Vertical Corridor.
    • Security
      The Wireless security standard we are using is
      802.11i or WPA 2.
      WPA stands for WIFI Protected Access.Which is the latest protocol for wireless & has many
      good features like AES,TKIP etc.
    • Features of WPA 2
      AES (Advance Encryption).
      Authentication.
      Dynamic Key Management.
      Successor of WPA.
    • Advanced Encryption System
      The new 802.11i standard, or WPA2, supports the 128-bit Advanced Encryption Standard (AES) .
      AES supports 128-bit, 192-bit and 256-bit keys.
    • Authentication
      This new standard specifies use of Temporal Key Integrity Protocol (TKIP) and 802.1x/EAP with mutual authentication .
      802.1x authentication and key-management
      features for the various 802.11 Wi-Fi flavors.
    • Control Accessing WLAN
      SSID
      A service set identifier (SSID) is a name that identifies a particular 802.11 wireless LAN. A client device receives broadcast messages from all access points within range advertising their SSIDs. The client device can then either manually or automatically—based on configuration—select the network with which to associate. The SSID can be up to 32 characters long. As the SSID displays to users, it normally consists of human-readable characters.
    • Mac Address Filtering
      • In computer networking, MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control methodology whereby the 48-bit address assigned to each network card is used to determine access to the network.
      • MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and white lists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a white list entry for each device that he or she would use to access the network.
    • By these Security implementations we can have better security including authentication,
      encryption, Mac filtering & controlling access.
      By the good placing of access points I have covered all the considered area.
    • Thank You
      Agreeta Sharma
      M.Sc Networking Management’12
      Amity University