Site survey- Deployement of Wi FiPresentation Transcript
THE MASTER PIECE SITE SURVEY
WIRELESS TOPOLOGY BSS IBSS ESS In this site survey we are using more than one access points so the topology we are using is the Extended Service Set i.e. ESS.
Available Technologies 802.11 a IEEE 802.11a-1999 or 802.11a is an amendment to the IEEE 802.11 specification that added a higher data rate of up to 54 Mbit/s using the 5 GHz band. It has seen widespread worldwide implementation, particularly within the corporate workspace.
IEEE 802.11b-1999 or 802.11b, is an amendment to the IEEE 802.11 specification that extended throughput up to 11 Mbit/s using the same 2.4 GHz band. This specification under the marketing name of Wi-Fi has been implemented all over the world. 802.11b has a maximum raw data rate of 11 Mbit/s and uses the same CSMA/CA media access method defined in the original standard.
802.11g is the third modulation standard for wireless LANs. It works in the 2.4 GHz band (like 802.11b) but operates at a maximum raw data rate of 54 Mbit/s, or about 19 Mbit/s net throughput (identical to 802.11a core, except for some additional legacy overhead for backward compatibility). 802.11g hardware is fully backwards compatible with 802.11b hardware.
Technology Used Technology for this layout & as per the requirements of the University I am using is 802.11 a.
Why 802.11 a? Why not 802.11 b ?
It works on 2.4 GHz at this band many
devices like the Bluetooth's work.
Secondly, the speed is of 11 Mbps only
which is not suited for big crowd & also not separated by much distance.
Why not 802.11 g?
It also uses the 2.4 GHz band so there are
interferences caused by the devices at that band.
Secondly, as it uses a smaller band the
no. of channels that can b used is only 3.
Advantages of 802.11a
Uses a band of 5.7 GHz so the issue of interference are very less.
As the band is larger the no. of channels are
up to 23.
The speed is of 54 Mbps & it also suits
the crowded places where the crowd is not sparse.
Access Points In computer networking, a wireless access point (WAP) is a device which allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router (via a wired network), and can relay data between the wireless devices (such as computers or printers) and wired devices on the network.
Why three A.P’s? The technology we are using i.e. 802.11 a has a disadvantage which is this technology has short range. So to have good speed & also better connectivity we need three access points. 1- LABS. 2- Horizontal Corridor. 3- Vertical Corridor.
Security The Wireless security standard we are using is 802.11i or WPA 2. WPA stands for WIFI Protected Access.Which is the latest protocol for wireless & has many good features like AES,TKIP etc.
Features of WPA 2 AES (Advance Encryption). Authentication. Dynamic Key Management. Successor of WPA.
Advanced Encryption System The new 802.11i standard, or WPA2, supports the 128-bit Advanced Encryption Standard (AES) . AES supports 128-bit, 192-bit and 256-bit keys.
Authentication This new standard specifies use of Temporal Key Integrity Protocol (TKIP) and 802.1x/EAP with mutual authentication . 802.1x authentication and key-management features for the various 802.11 Wi-Fi flavors.
Control Accessing WLAN SSID A service set identifier (SSID) is a name that identifies a particular 802.11 wireless LAN. A client device receives broadcast messages from all access points within range advertising their SSIDs. The client device can then either manually or automatically—based on configuration—select the network with which to associate. The SSID can be up to 32 characters long. As the SSID displays to users, it normally consists of human-readable characters.
Mac Address Filtering
In computer networking, MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control methodology whereby the 48-bit address assigned to each network card is used to determine access to the network.
MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and white lists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a white list entry for each device that he or she would use to access the network.
By these Security implementations we can have better security including authentication, encryption, Mac filtering & controlling access. By the good placing of access points I have covered all the considered area.
Thank You Agreeta Sharma M.Sc Networking Management’12 Amity University