SlideShare a Scribd company logo
1 of 21
THE MASTER PIECE SITE SURVEY
COVERAGE AREA
WIRELESS TOPOLOGY BSS IBSS ESS       In this site survey we are using more than one access points so the topology we are using is the Extended Service Set i.e. ESS.
Available Technologies  802.11 a     IEEE 802.11a-1999 or 802.11a is an amendment to the IEEE 802.11 specification that added a higher data rate of up to 54 Mbit/s using the 5 GHz band. It has seen widespread worldwide implementation, particularly within the corporate workspace.
[object Object],IEEE 802.11b-1999 or 802.11b, is an amendment to the IEEE 802.11 specification that extended throughput up to 11 Mbit/s using the same 2.4 GHz band. This specification under the marketing name of Wi-Fi has been implemented all over the world. 802.11b has a maximum raw data rate of 11 Mbit/s and uses the same CSMA/CA media access method defined in the original standard.
[object Object],802.11g is the third modulation standard for wireless LANs. It works in the 2.4 GHz band (like 802.11b) but operates at a maximum raw data rate of 54 Mbit/s, or about 19 Mbit/s net throughput (identical to 802.11a core, except for some additional legacy overhead for backward compatibility). 802.11g hardware is fully backwards compatible with 802.11b hardware. 
Technology Used Technology for this layout &  as per the requirements of the University I am using is 802.11 a.
Why 802.11 a? Why not 802.11 b ? ,[object Object],      devices like the Bluetooth's work. ,[object Object],     which is not suited for big crowd &       also not separated by much distance.
Why not 802.11 g? ,[object Object],     interferences caused by the devices       at that band. ,[object Object],      no. of   channels that can b used is only 3.
Advantages of 802.11a ,[object Object]
 As the band is larger the no. of channels are      up to 23. ,[object Object],     the crowded places where the crowd is not sparse.
Layout
Access Points In computer networking, a wireless access point (WAP) is a device which allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router (via a wired network), and can relay data between the wireless devices (such as computers or printers) and wired devices on the network.
Why three A.P’s? The technology we are using i.e. 802.11 a has a disadvantage which is this technology has short range. So to have good speed & also better connectivity we need three access points. 1- LABS. 2- Horizontal Corridor. 3- Vertical Corridor.
Security The Wireless security  standard we are using is       802.11i or WPA 2. WPA stands for WIFI Protected Access.Which is the latest protocol for wireless & has many      good features like AES,TKIP etc.
Features of WPA 2 AES (Advance Encryption). Authentication. Dynamic Key Management. Successor of WPA.
Advanced Encryption System The new 802.11i standard, or WPA2, supports the  128-bit Advanced Encryption Standard (AES) . AES supports 128-bit, 192-bit and 256-bit keys.
Authentication This new standard specifies use of Temporal Key Integrity Protocol (TKIP) and 802.1x/EAP with mutual authentication . 802.1x authentication and key-management      features for the various 802.11 Wi-Fi flavors.
Control Accessing WLAN SSID       A service set identifier (SSID) is a name that identifies a particular 802.11 wireless LAN. A client device receives broadcast messages from all access points within range advertising their SSIDs. The client device can then either manually or automatically—based on configuration—select the network with which to associate. The SSID can be up to 32 characters long. As the SSID displays to users, it normally consists of human-readable characters.
Mac Address Filtering ,[object Object]
   MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and white lists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a white list entry for each device that he or she would use to access the network.,[object Object]

More Related Content

What's hot

Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiDeceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiNETSCOUT
 
EnGenius' End to End Solution (E2ES)
EnGenius' End to End Solution (E2ES)EnGenius' End to End Solution (E2ES)
EnGenius' End to End Solution (E2ES)Bryan Slayman
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksJim Gilsinn
 
Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)NetBeez, Inc.
 
Acma Computers : Company Profile ( IT Services & Solutions Provider )
Acma Computers : Company Profile ( IT Services & Solutions Provider ) Acma Computers : Company Profile ( IT Services & Solutions Provider )
Acma Computers : Company Profile ( IT Services & Solutions Provider ) Acma Computers Ltd
 
Daniel Cross, Electronics Engineer
Daniel Cross, Electronics EngineerDaniel Cross, Electronics Engineer
Daniel Cross, Electronics EngineerDaniel Cross
 
Sinefa - It's about time
Sinefa - It's about timeSinefa - It's about time
Sinefa - It's about timeChris Siakos
 
NetBeez - AngelBeat presentation
NetBeez - AngelBeat presentationNetBeez - AngelBeat presentation
NetBeez - AngelBeat presentationNetBeez, Inc.
 
LoRaWAN in Depth
LoRaWAN in DepthLoRaWAN in Depth
LoRaWAN in DepthAPNIC
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance LabJim Gilsinn
 
80211 the end of wireles or is it
80211 the end of wireles or is it80211 the end of wireles or is it
80211 the end of wireles or is itInterop
 
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...EIT Digital Alumni
 
pola samy cv 24 10 2016
pola samy cv 24 10 2016pola samy cv 24 10 2016
pola samy cv 24 10 2016pola samy
 
Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Denny K
 
Asset tracking solution for construction
Asset tracking solution for constructionAsset tracking solution for construction
Asset tracking solution for constructionUmesh Raghavan
 
Spirent: The Internet of Things: The Expanded Security Perimeter
Spirent: The Internet of Things:  The Expanded Security Perimeter Spirent: The Internet of Things:  The Expanded Security Perimeter
Spirent: The Internet of Things: The Expanded Security Perimeter Sailaja Tennati
 
LoRa application for detecting the harmful gases
LoRa application for detecting the harmful gasesLoRa application for detecting the harmful gases
LoRa application for detecting the harmful gasesPARNIKA GUPTA
 
ThousandEyes at Network Field Day 12
ThousandEyes at Network Field Day 12ThousandEyes at Network Field Day 12
ThousandEyes at Network Field Day 12ThousandEyes
 
Spirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSpirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSailaja Tennati
 

What's hot (20)

Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiDeceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
 
EnGenius' End to End Solution (E2ES)
EnGenius' End to End Solution (E2ES)EnGenius' End to End Solution (E2ES)
EnGenius' End to End Solution (E2ES)
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
 
Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)
 
Acma Computers : Company Profile ( IT Services & Solutions Provider )
Acma Computers : Company Profile ( IT Services & Solutions Provider ) Acma Computers : Company Profile ( IT Services & Solutions Provider )
Acma Computers : Company Profile ( IT Services & Solutions Provider )
 
Daniel Cross, Electronics Engineer
Daniel Cross, Electronics EngineerDaniel Cross, Electronics Engineer
Daniel Cross, Electronics Engineer
 
Sinefa - It's about time
Sinefa - It's about timeSinefa - It's about time
Sinefa - It's about time
 
NetBeez - AngelBeat presentation
NetBeez - AngelBeat presentationNetBeez - AngelBeat presentation
NetBeez - AngelBeat presentation
 
LoRaWAN in Depth
LoRaWAN in DepthLoRaWAN in Depth
LoRaWAN in Depth
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance Lab
 
80211 the end of wireles or is it
80211 the end of wireles or is it80211 the end of wireles or is it
80211 the end of wireles or is it
 
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
 
pola samy cv 24 10 2016
pola samy cv 24 10 2016pola samy cv 24 10 2016
pola samy cv 24 10 2016
 
Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008
 
Asset tracking solution for construction
Asset tracking solution for constructionAsset tracking solution for construction
Asset tracking solution for construction
 
Spirent: The Internet of Things: The Expanded Security Perimeter
Spirent: The Internet of Things:  The Expanded Security Perimeter Spirent: The Internet of Things:  The Expanded Security Perimeter
Spirent: The Internet of Things: The Expanded Security Perimeter
 
Wireless Accuracy for 9-1-1
Wireless Accuracy for 9-1-1Wireless Accuracy for 9-1-1
Wireless Accuracy for 9-1-1
 
LoRa application for detecting the harmful gases
LoRa application for detecting the harmful gasesLoRa application for detecting the harmful gases
LoRa application for detecting the harmful gases
 
ThousandEyes at Network Field Day 12
ThousandEyes at Network Field Day 12ThousandEyes at Network Field Day 12
ThousandEyes at Network Field Day 12
 
Spirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSpirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV Deployments
 

Viewers also liked

Wi-Fi Planning - The 7 Secrets
Wi-Fi Planning - The 7 Secrets Wi-Fi Planning - The 7 Secrets
Wi-Fi Planning - The 7 Secrets Ekahau_WiFi_Tools
 
Ekahau Site Survey on Fusion / Windows
Ekahau Site Survey on Fusion / WindowsEkahau Site Survey on Fusion / Windows
Ekahau Site Survey on Fusion / WindowsJussi Kiviniemi
 
Ekahau SIte Survey, 3D Planner & Other Wi-Fi Tools Presentation
Ekahau SIte Survey, 3D Planner & Other Wi-Fi Tools PresentationEkahau SIte Survey, 3D Planner & Other Wi-Fi Tools Presentation
Ekahau SIte Survey, 3D Planner & Other Wi-Fi Tools PresentationEkahau_WiFi_Tools
 
Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)
Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)
Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)Jussi Kiviniemi
 
Ekahau Site Survey on Mac (VMware Fusion with Win 7)
Ekahau Site Survey on Mac (VMware Fusion with Win 7)Ekahau Site Survey on Mac (VMware Fusion with Win 7)
Ekahau Site Survey on Mac (VMware Fusion with Win 7)Ekahau_WiFi_Tools
 
Ekahau Wi-Fi Tools general overview
Ekahau Wi-Fi Tools general overviewEkahau Wi-Fi Tools general overview
Ekahau Wi-Fi Tools general overviewJussi Kiviniemi
 
Bad Wi-Fi - Ekahau Webinar - July 2014
Bad Wi-Fi - Ekahau Webinar - July 2014Bad Wi-Fi - Ekahau Webinar - July 2014
Bad Wi-Fi - Ekahau Webinar - July 2014Ekahau_WiFi_Tools
 
Linux and its fundamentals
Linux and its fundamentalsLinux and its fundamentals
Linux and its fundamentalsAgreeta Sharma
 
Reporting With A Cellphone October 2009
Reporting With A Cellphone October 2009Reporting With A Cellphone October 2009
Reporting With A Cellphone October 2009Steve Garfield
 
Moxy station map
Moxy station mapMoxy station map
Moxy station mapMOXYMEDIA
 
Mobile Moodle and mLearning project for mLearncon in San Diego
Mobile Moodle and mLearning project for mLearncon in San DiegoMobile Moodle and mLearning project for mLearncon in San Diego
Mobile Moodle and mLearning project for mLearncon in San DiegoInge de Waard
 
AS Solar Charging Station Design Report
AS Solar Charging Station Design ReportAS Solar Charging Station Design Report
AS Solar Charging Station Design ReportSalam Ali
 
Forgiveness leads to anger management
Forgiveness leads to anger managementForgiveness leads to anger management
Forgiveness leads to anger managementAgreeta Sharma
 
Idiom overview
Idiom overview Idiom overview
Idiom overview idiomlive
 
Site Visit Report
Site Visit ReportSite Visit Report
Site Visit ReportZIyeeTan
 
5 Hotel Technology Trends to Watch
5 Hotel Technology Trends to Watch5 Hotel Technology Trends to Watch
5 Hotel Technology Trends to WatchVoxer App
 
Basic FM Radio Station RF Design Good Practices
Basic FM Radio Station RF Design Good PracticesBasic FM Radio Station RF Design Good Practices
Basic FM Radio Station RF Design Good PracticesFrank Massa
 

Viewers also liked (20)

Wi-Fi Planning - The 7 Secrets
Wi-Fi Planning - The 7 Secrets Wi-Fi Planning - The 7 Secrets
Wi-Fi Planning - The 7 Secrets
 
Ekahau Site Survey on Fusion / Windows
Ekahau Site Survey on Fusion / WindowsEkahau Site Survey on Fusion / Windows
Ekahau Site Survey on Fusion / Windows
 
Ekahau SIte Survey, 3D Planner & Other Wi-Fi Tools Presentation
Ekahau SIte Survey, 3D Planner & Other Wi-Fi Tools PresentationEkahau SIte Survey, 3D Planner & Other Wi-Fi Tools Presentation
Ekahau SIte Survey, 3D Planner & Other Wi-Fi Tools Presentation
 
Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)
Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)
Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)
 
Ekahau Site Survey on Mac (VMware Fusion with Win 7)
Ekahau Site Survey on Mac (VMware Fusion with Win 7)Ekahau Site Survey on Mac (VMware Fusion with Win 7)
Ekahau Site Survey on Mac (VMware Fusion with Win 7)
 
Ekahau Wi-Fi Tools general overview
Ekahau Wi-Fi Tools general overviewEkahau Wi-Fi Tools general overview
Ekahau Wi-Fi Tools general overview
 
Bad Wi-Fi - Ekahau Webinar - July 2014
Bad Wi-Fi - Ekahau Webinar - July 2014Bad Wi-Fi - Ekahau Webinar - July 2014
Bad Wi-Fi - Ekahau Webinar - July 2014
 
Linux and its fundamentals
Linux and its fundamentalsLinux and its fundamentals
Linux and its fundamentals
 
Reporting With A Cellphone October 2009
Reporting With A Cellphone October 2009Reporting With A Cellphone October 2009
Reporting With A Cellphone October 2009
 
Moxy station map
Moxy station mapMoxy station map
Moxy station map
 
Mobile Moodle and mLearning project for mLearncon in San Diego
Mobile Moodle and mLearning project for mLearncon in San DiegoMobile Moodle and mLearning project for mLearncon in San Diego
Mobile Moodle and mLearning project for mLearncon in San Diego
 
AS Solar Charging Station Design Report
AS Solar Charging Station Design ReportAS Solar Charging Station Design Report
AS Solar Charging Station Design Report
 
Forgiveness leads to anger management
Forgiveness leads to anger managementForgiveness leads to anger management
Forgiveness leads to anger management
 
Idiom overview
Idiom overview Idiom overview
Idiom overview
 
802.11ac Wave 2 technology deep dive and deployment recommendations
802.11ac Wave 2 technology deep dive and deployment recommendations802.11ac Wave 2 technology deep dive and deployment recommendations
802.11ac Wave 2 technology deep dive and deployment recommendations
 
Rf basics
Rf basicsRf basics
Rf basics
 
Site Visit Report
Site Visit ReportSite Visit Report
Site Visit Report
 
Rf mems basic
Rf mems basicRf mems basic
Rf mems basic
 
5 Hotel Technology Trends to Watch
5 Hotel Technology Trends to Watch5 Hotel Technology Trends to Watch
5 Hotel Technology Trends to Watch
 
Basic FM Radio Station RF Design Good Practices
Basic FM Radio Station RF Design Good PracticesBasic FM Radio Station RF Design Good Practices
Basic FM Radio Station RF Design Good Practices
 

Similar to Site survey- Deployement of Wi Fi

Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comphanleson
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Wail Hassan
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEric Vanderburg
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptxstephen972973
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...IJCSIS Research Publications
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignmentBijay Bista
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.pptSagarBedarkar3
 

Similar to Site survey- Deployement of Wi Fi (20)

Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Darsh
DarshDarsh
Darsh
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Wi fi
Wi fiWi fi
Wi fi
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
802 standerd
802 standerd802 standerd
802 standerd
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.ppt
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Site survey- Deployement of Wi Fi

  • 1. THE MASTER PIECE SITE SURVEY
  • 3. WIRELESS TOPOLOGY BSS IBSS ESS In this site survey we are using more than one access points so the topology we are using is the Extended Service Set i.e. ESS.
  • 4. Available Technologies 802.11 a IEEE 802.11a-1999 or 802.11a is an amendment to the IEEE 802.11 specification that added a higher data rate of up to 54 Mbit/s using the 5 GHz band. It has seen widespread worldwide implementation, particularly within the corporate workspace.
  • 5.
  • 6.
  • 7. Technology Used Technology for this layout & as per the requirements of the University I am using is 802.11 a.
  • 8.
  • 9.
  • 10.
  • 11.
  • 13. Access Points In computer networking, a wireless access point (WAP) is a device which allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router (via a wired network), and can relay data between the wireless devices (such as computers or printers) and wired devices on the network.
  • 14. Why three A.P’s? The technology we are using i.e. 802.11 a has a disadvantage which is this technology has short range. So to have good speed & also better connectivity we need three access points. 1- LABS. 2- Horizontal Corridor. 3- Vertical Corridor.
  • 15. Security The Wireless security standard we are using is 802.11i or WPA 2. WPA stands for WIFI Protected Access.Which is the latest protocol for wireless & has many good features like AES,TKIP etc.
  • 16. Features of WPA 2 AES (Advance Encryption). Authentication. Dynamic Key Management. Successor of WPA.
  • 17. Advanced Encryption System The new 802.11i standard, or WPA2, supports the 128-bit Advanced Encryption Standard (AES) . AES supports 128-bit, 192-bit and 256-bit keys.
  • 18. Authentication This new standard specifies use of Temporal Key Integrity Protocol (TKIP) and 802.1x/EAP with mutual authentication . 802.1x authentication and key-management features for the various 802.11 Wi-Fi flavors.
  • 19. Control Accessing WLAN SSID A service set identifier (SSID) is a name that identifies a particular 802.11 wireless LAN. A client device receives broadcast messages from all access points within range advertising their SSIDs. The client device can then either manually or automatically—based on configuration—select the network with which to associate. The SSID can be up to 32 characters long. As the SSID displays to users, it normally consists of human-readable characters.
  • 20.
  • 21.
  • 22. Thank You Agreeta Sharma M.Sc Networking Management’12 Amity University