SlideShare a Scribd company logo
1 of 37
Wireless LANs
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Wireless?
• A wireless LAN or WLAN is a wireless local
area network that uses radio waves as its
carrier.
• The last link with the users is wireless, to give
a network connection to all users in a building
or campus.
• The backbone network usually uses cables
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Common Topologies
The wireless LAN connects to a wired LAN
• There is a need of an access point that bridges wireless LAN traffic into the wired
LAN.
• The access point (AP) can also act as a repeater for wireless nodes, effectively
doubling the maximum possible distance between nodes.
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Integration With Existing Networks
• Wireless Access Points (APs) - a small device
that bridges wireless traffic to your network.
• Most access points bridge wireless LANs into
Ethernet networks, but Token-Ring options are
available as well
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
How are WLANs Different?
• They use specialized physical and data link protocols
• They integrate into existing networks through access
points which provide a bridging function
• They let you stay connected as you roam from one
coverage area to another
• They have unique security considerations
• They have specific interoperability requirements
• They require different hardware
• They offer performance that differs from wired LANs.
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Physical and Data Link Layers
Physical Layer:
• The wireless NIC takes frames of data from
the link layer, scrambles the data in a
predetermined way, then uses the modified
data stream to modulate a radio carrier
signal.
Data Link Layer:
• Uses Carriers-Sense-Multiple-Access with
Collision Avoidance (CSMA/CA).
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11 WLANs - Outline
• 801.11 bands and layers
• Link layer
• Media access layer
– frames and headers
– CSMA/CD
• Physical layer
– frames
– modulation
• Frequency hopping
• Direct sequence
• Infrared
• Security
• Implementation
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11 WLAN technologies
• IEEE 802.11 standards and rates
– IEEE 802.11 (1997) 1 Mbps and 2 Mbps (2.4 GHz
band )
– IEEE 802.11b (1999) 11 Mbps (2.4 GHz band) = Wi-
Fi
– IEEE 802.11a (1999) 6, 9, 12, 18, 24, 36, 48, 54
Mbps (5 GHz band)
– IEEE 802.11g (2001 ... 2003) up to 54 Mbps (2.4
GHz) backward compatible to 802.11b
• IEEE 802.11 networks work on license free industrial,
science, medicine (ISM) bands
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Other WLAN technologies
• High performance LAN or HiperLAN (ETSI-BRAN EN 300
652) in the 5 GHz ISM
– version 1 up to 24 Mbps
– version 2 up to 54 Mbps
• HiperLAN provides also QoS for data, video, voice and
images
• Bluetooth
– range up to 100 meters only (cable replacement tech.)
– Bluetooth Special Interest Group (SIG)
– Operates at max of 740 kbps at 2.4 GHz ISM band
– Applies fast frequency hopping 1600 hops/second
– Can have serious interference with 802.11 2.4 GHz range
network
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
IEEE 802.11a rates and modulation
formats
Data Rate
(Mbps)
Modulation Coding Rate
Coded bits per
sub-carrier
Code bits per
OFDM symbol
Data bits per
OFDM symbol
6 BPSK 1 / 2 1 48 24
9 BPSK 3 / 4 1 48 36
12 QPSK 1 / 2 2 96 48
18 QPSK 3 / 4 2 96 72
24 16QAM 1 / 2 4 192 96
36 16QAM 3 / 4 4 192 144
48 64QAM 2 / 3 6 288 192
54 64QAM 3 / 4 6 288 216
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
The IEEE 802.11 and
supporting LAN Standards
• See also IEEE LAN/MAN Standards Committee
Web site
www.manta.ieee.org/groups/802/
IEEE 802.3
Carrier
Sense
IEEE 802.4
Token
Bus
IEEE 802.5
Token
Ring
IEEE 802.11
Wireless
IEEE 802.2
Logical Link Control (LLC)
MAC
PHY
OSI Layer 2
(data link)
OSI Layer 1
(physical)
bus star ring
a b g
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Figure 14.1 Basic service sets (BSSs)
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Figure 14.2 Extended service sets (ESSs)
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
PHY
IEEE 802.11 Architecture
• IEEE 802.11 defines the physical (PHY), logical link (LLC) and media access
control (MAC) layers for a wireless local area network
• 802.11 networks can work as
– basic service set (BSS)
– extended service set (ESS)
• BSS can also be used in ad-hoc
networking
LLC: Logical Link Control Layer
MAC: Medium Access Control Layer
PHY: Physical Layer
FHSS: Frequency hopping SS
DSSS: Direct sequence SS
SS: Spread spectrum
IR: Infrared light
BSS: Basic Service Set
ESS: Extended Service Set
AP: Access Point
DS: Distribution System
DS,
ESS
ad-hoc network
LLC
MAC
FHSS DSSS IR
Network
802.11
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Extended service set (ESS)
Basic (independent) service set (BSS)
BSS and ESS
• In ESS multiple access points connected by access points and a distribution
system as Ethernet
– BSSs partially overlap
– Physically disjoint BSSs
– Physically collocated BSSs (several antennas)
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11 Logical architecture
• LLC provides addressing and data link control
• MAC provides
– access to wireless medium
• CSMA/CA
• Priority based access (802.12)
– joining the network
– authentication & privacy
– Services
• Station service: Authentication, privacy, MSDU* delivery
• Distributed system: Association** and participates to data distribution
• Three physical layers (PHY)
– FHSS: Frequency Hopping Spread
Spectrum (SS)
– DSSS: Direct Sequence SS
– IR: Infrared transmission
LLC: Logical Link Control Layer
MAC: Medium Access Control Layer
PHY: Physical Layer
FH: Frequency hopping
DS: Direct sequence
IR: Infrared light
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11 DSSS
• Supports 1 and 2 Mbps data transport, uses BPSK and QPSK modulation
• Uses 11 chips Barker code for spreading - 10.4 dB processing gain
• Defines 14 overlapping channels, each having 22 MHz channel bandwidth, from
2.401 to 2.483 GHz
• Power limits 1000mW in US, 100mW in EU, 200mW in Japan
• Immune to narrow-band interference, cheaper hardware
DS-transmitter
PPDU:baseband data frame
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11 FHSS
• Supports 1 and 2 Mbps data transport and applies two level - GFSK modulation*
(Gaussian Frequency Shift Keying)
• 79 channels from 2.402 to 2.480 GHz ( in U.S. and most of EU countries) with 1
MHz channel space
• 78 hopping sequences with minimum 6 MHz hopping space, each sequence uses
every 79 frequency elements once
• Minimum hopping rate
2.5 hops/second
• Tolerance to multi-path,
narrow band interference,
security
• Low speed, small range
due to FCC TX power
regulation (10mW)
* , 160kHz
c nom
f f f f
     Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11 LAN architecture
 wireless host communicates
with base station
 base station = access point
(AP)
 Basic Service Set (BSS) (aka
“cell”) in infrastructure mode
contains:
 wireless hosts
 access point (AP): base
station
 ad hoc mode: hosts only
BSS
1
BSS 2
Internet
hub, switch
or router
AP
AP
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11: Channels, association
• 802.11b: 2.4GHz-2.485GHz spectrum divided into 11 channels
at different frequencies
– AP admin chooses frequency for AP
– interference possible: channel can be same as that
chosen by neighboring AP!
• host: must associate with an AP
– scans channels, listening for frames containing
AP’s name and MAC address
– selects AP to associate with
– may perform authentication
– will typically run DHCP to get IP address in AP’s
subnet
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
IEEE 802.11 MAC Protocol: CSMA/CA
802.11 sender
1 if sense channel idle for DIFS (DCF InterFrame
Spacing) then
transmit entire frame (no CD)
2 if sense channel busy then
start random backoff time
timer counts down while channel idle
transmit when timer expires
if no ACK, increase random backoff interval,
repeat 2
802.11 receiver
- if frame received OK
return ACK after SIFS (Short InterFrame Spacing)-
(ACK needed due to hidden terminal problem)
sender receiver
DIFS
data
SIFS
ACK
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Avoiding collisions (more)
idea: allow sender to “reserve” channel rather than random access of
data frames: avoid collisions of long data frames
• sender first transmits small request-to-send (RTS) packets to BS using
CSMA
– RTSs may still collide with each other (but they’re short)
• BS broadcasts clear-to-send CTS in response to RTS
• CTS heard by all nodes
– sender transmits data frame
– other stations defer transmissions
avoid data frame collisions completely
using small reservation packets!
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Collision Avoidance: RTS-CTS exchange
AP
A B
time
DATA (A)
reservation
collision
defer
IEEE 802.11 Media
Access Control (MAC)
DIFS: Distributed Inter-Frame Spacing
SIFS: Short Inter-Frame Spacing
ack: Acknowledgement
Carrier-sense multiple access protocol
with collision avoidance (CSMA/CS)
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Table 14.2 Values of subfields in control frames
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Table 14.4 Physical layers
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Security
• In theory, spread spectrum radio signals are
inherently difficult to decipher without knowing the
exact hopping sequences or direct sequence codes
used
• The IEEE 802.11 standard specifies optional security
called "Wired Equivalent Privacy" whose goal is that
a wireless LAN offer privacy equivalent to that
offered by a wired LAN
• The standard also specifies optional authentication
measures
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Authentication and privacy
• Goal: to prevent unauthorized access & eavesdropping
• Realized by authentication service prior access
• Open system authentication
– station wanting to authenticate sends authentication management frame -
receiving station sends back frame for successful authentication
• Shared key authentication (included in WEP*)
– Secret, shared key received by all stations by a separate, 802.11 independent
channel
– Stations authenticate by a shared knowledge of the key properties
• WEP’s privacy (blocking out eavesdropping) is based on ciphering:
*WEP: Wired Equivalent Privacy
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11b Security Features
• Wired Equivalent Privacy (WEP) – A protocol to
protect link-level data during wireless transmission
between clients and access points.
• Services:
– Authentication: provides access control to the network by
denying access to client stations that fail to authenticate
properly.
– Confidentiality: intends to prevent information
compromise from casual eavesdropping
– Integrity: prevents messages from being modified while in
transit between the wireless client and the access point.
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Authentication
Means:
• Based on cryptography
• Non-cryptographic
• Both are identity-based verification
mechanisms (devices request access based on
the SSID – Service Set Identifier of the wireless
network).
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Authentication
• Authentication techniques
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Privacy
• Cryptographic techniques
• WEP Uses RC4 symmetric key, stream cipher algorithm to
generate a pseudo random data sequence. The stream is
XORed with the data to be transmitted
• Key sizes: 40bits to 128bits
• Unfortunately, recent attacks have shown that the WEP
approach for privacy is vulnerable to certain attack regardless
of key size
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Data Integrity
• Data integrity is ensured by a simple encrypted
version of CRC (Cyclic Redundant Check)
• Also vulnerable to some attacks
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Security Problems
• Security features in Wireless products are frequently
not enabled.
• Use of static WEP keys (keys are in use for a very long
time).
• WEP does not provide key management.
• Cryptographic keys are short.
• No user authentication occurs – only devices are
authenticated. A stolen device can access the
network.
• Identity based systems are vulnerable.
• Packet integrity is poor.
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
WLAN Network Planning
• Network planning target
– Maximize system performance with limited resource
– Including
• coverage
• throughput
• capacity
• interference
• roaming
• security, etc.
• Planning process
– Requirements for project management personnel
– Site investigation
– Computer-aided planning practice
– Testing and verifying planning
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
WLAN benefits
• Mobility
– increases working efficiency and productivity
– extends the On-line period
• Installation on difficult-to-wire areas
– inside buildings
– road crossings
• Increased reliability
– Note: Pay attention to security!
• Reduced installation time
– cabling time and convenient to users and difficult-to-
wire cases
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
WLAN benefits (cont.)
• Broadband
– 11 Mbps for 802.11b
– 54 Mbps for 802.11a/g (GSM:9.6Kbps,
HCSCD:~40Kbps, GPRS:~160Kbps, WCDMA:up to
2Mbps)
• Long-term cost savings
– O & M cheaper that for wired nets
– Comes from easy maintenance, cabling cost, working
efficiency and accuracy
– Network can be established in a new location just by
moving the PCs!
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW

More Related Content

What's hot

Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stackstuimrozsm
 
EC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceEC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceGOWTHAMMS6
 
LTE-Advanced Physical Layer
LTE-Advanced Physical LayerLTE-Advanced Physical Layer
LTE-Advanced Physical LayerPraveen Kumar
 
Wavelength division multiplexing
Wavelength division multiplexingWavelength division multiplexing
Wavelength division multiplexingNalin Dubey
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDilum Bandara
 
FTTX with Passive Optical Networks
FTTX with Passive Optical NetworksFTTX with Passive Optical Networks
FTTX with Passive Optical NetworksAnuradha Udunuwara
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
What is Mode Field Diameter?
What is Mode Field Diameter?What is Mode Field Diameter?
What is Mode Field Diameter?Caroline Connolly
 
Fiber optical coupler
Fiber optical couplerFiber optical coupler
Fiber optical couplersaad mahdi
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaMukesh Chinta
 
Optical fiber Communication
Optical fiber Communication Optical fiber Communication
Optical fiber Communication Saurabh Kumar
 

What's hot (20)

Dense wavelength division multiplexing (dwdm) technique
Dense wavelength division multiplexing (dwdm) techniqueDense wavelength division multiplexing (dwdm) technique
Dense wavelength division multiplexing (dwdm) technique
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
 
EC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceEC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv ece
 
NETWORK LAYER.ppt
NETWORK LAYER.pptNETWORK LAYER.ppt
NETWORK LAYER.ppt
 
LTE-Advanced Physical Layer
LTE-Advanced Physical LayerLTE-Advanced Physical Layer
LTE-Advanced Physical Layer
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Wavelength division multiplexing
Wavelength division multiplexingWavelength division multiplexing
Wavelength division multiplexing
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
FTTX with Passive Optical Networks
FTTX with Passive Optical NetworksFTTX with Passive Optical Networks
FTTX with Passive Optical Networks
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
What is Mode Field Diameter?
What is Mode Field Diameter?What is Mode Field Diameter?
What is Mode Field Diameter?
 
Fiber optical coupler
Fiber optical couplerFiber optical coupler
Fiber optical coupler
 
Optical networking
Optical networkingOptical networking
Optical networking
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Optical fiber Communication
Optical fiber Communication Optical fiber Communication
Optical fiber Communication
 

Similar to Wireless LANs PPT.ppt

Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1Mayur Garg
 
Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationDrAdeelAkram2
 
Ieee institute of electrical and electronics engineers
Ieee  institute of electrical and electronics engineersIeee  institute of electrical and electronics engineers
Ieee institute of electrical and electronics engineershimanshu yadav
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.pptSiva Cool
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8SURESHA V
 
EC8004-Wireless Networks-unitwise notes.pdf
EC8004-Wireless Networks-unitwise notes.pdfEC8004-Wireless Networks-unitwise notes.pdf
EC8004-Wireless Networks-unitwise notes.pdfdhananjeyanrece
 
Wireless Networks.pptx
Wireless Networks.pptxWireless Networks.pptx
Wireless Networks.pptxMinecraftJava
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study GuideCCNAResources
 
High performance browser networking ch5,6
High performance browser networking ch5,6High performance browser networking ch5,6
High performance browser networking ch5,6Seung-Bum Lee
 
WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdfwaqas232871
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
It fundamentals wired and wireless troubleshooting
It fundamentals   wired and wireless troubleshootingIt fundamentals   wired and wireless troubleshooting
It fundamentals wired and wireless troubleshootingProf. Dr. AMOL KASTURE
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11Adeel Mirza
 

Similar to Wireless LANs PPT.ppt (20)

awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Wireless-4.pptx
Wireless-4.pptxWireless-4.pptx
Wireless-4.pptx
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1
 
wlans
wlanswlans
wlans
 
Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless Communication
 
Ieee institute of electrical and electronics engineers
Ieee  institute of electrical and electronics engineersIeee  institute of electrical and electronics engineers
Ieee institute of electrical and electronics engineers
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.ppt
 
Wc nots final unit new 8
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8
 
EC8004-Wireless Networks-unitwise notes.pdf
EC8004-Wireless Networks-unitwise notes.pdfEC8004-Wireless Networks-unitwise notes.pdf
EC8004-Wireless Networks-unitwise notes.pdf
 
ieee protocols 802.11
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
 
Wireless Networks.pptx
Wireless Networks.pptxWireless Networks.pptx
Wireless Networks.pptx
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study Guide
 
High performance browser networking ch5,6
High performance browser networking ch5,6High performance browser networking ch5,6
High performance browser networking ch5,6
 
WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdf
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
It fundamentals wired and wireless troubleshooting
It fundamentals   wired and wireless troubleshootingIt fundamentals   wired and wireless troubleshooting
It fundamentals wired and wireless troubleshooting
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11
 

More from DrTThendralCompSci

More from DrTThendralCompSci (17)

Loader and linker.pptx
Loader and linker.pptxLoader and linker.pptx
Loader and linker.pptx
 
The Application Layer.ppt
The Application Layer.pptThe Application Layer.ppt
The Application Layer.ppt
 
Transport Layer.pptx
Transport Layer.pptxTransport Layer.pptx
Transport Layer.pptx
 
SOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.ppt
 
Software Configuration Management.ppt
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.ppt
 
UNIT TESTING.pptx
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptx
 
SOFTWARE TESTING.pptx
SOFTWARE TESTING.pptxSOFTWARE TESTING.pptx
SOFTWARE TESTING.pptx
 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
 
Ethernet.ppt
Ethernet.pptEthernet.ppt
Ethernet.ppt
 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
 
Software prototyping.pptx
Software prototyping.pptxSoftware prototyping.pptx
Software prototyping.pptx
 
Requirement Engineering.ppt
Requirement Engineering.pptRequirement Engineering.ppt
Requirement Engineering.ppt
 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
 
EFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptxEFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptx
 
UNIT I.ppt
UNIT I.pptUNIT I.ppt
UNIT I.ppt
 
PROCESS MODELS.ppt
PROCESS MODELS.pptPROCESS MODELS.ppt
PROCESS MODELS.ppt
 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
 

Recently uploaded

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Wireless LANs PPT.ppt

  • 1. Wireless LANs Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 2. Wireless? • A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. • The last link with the users is wireless, to give a network connection to all users in a building or campus. • The backbone network usually uses cables Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 3. Common Topologies The wireless LAN connects to a wired LAN • There is a need of an access point that bridges wireless LAN traffic into the wired LAN. • The access point (AP) can also act as a repeater for wireless nodes, effectively doubling the maximum possible distance between nodes. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 4. Integration With Existing Networks • Wireless Access Points (APs) - a small device that bridges wireless traffic to your network. • Most access points bridge wireless LANs into Ethernet networks, but Token-Ring options are available as well Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 5. How are WLANs Different? • They use specialized physical and data link protocols • They integrate into existing networks through access points which provide a bridging function • They let you stay connected as you roam from one coverage area to another • They have unique security considerations • They have specific interoperability requirements • They require different hardware • They offer performance that differs from wired LANs. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 6. Physical and Data Link Layers Physical Layer: • The wireless NIC takes frames of data from the link layer, scrambles the data in a predetermined way, then uses the modified data stream to modulate a radio carrier signal. Data Link Layer: • Uses Carriers-Sense-Multiple-Access with Collision Avoidance (CSMA/CA). Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 7. 802.11 WLANs - Outline • 801.11 bands and layers • Link layer • Media access layer – frames and headers – CSMA/CD • Physical layer – frames – modulation • Frequency hopping • Direct sequence • Infrared • Security • Implementation Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 8. 802.11 WLAN technologies • IEEE 802.11 standards and rates – IEEE 802.11 (1997) 1 Mbps and 2 Mbps (2.4 GHz band ) – IEEE 802.11b (1999) 11 Mbps (2.4 GHz band) = Wi- Fi – IEEE 802.11a (1999) 6, 9, 12, 18, 24, 36, 48, 54 Mbps (5 GHz band) – IEEE 802.11g (2001 ... 2003) up to 54 Mbps (2.4 GHz) backward compatible to 802.11b • IEEE 802.11 networks work on license free industrial, science, medicine (ISM) bands Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 9. Other WLAN technologies • High performance LAN or HiperLAN (ETSI-BRAN EN 300 652) in the 5 GHz ISM – version 1 up to 24 Mbps – version 2 up to 54 Mbps • HiperLAN provides also QoS for data, video, voice and images • Bluetooth – range up to 100 meters only (cable replacement tech.) – Bluetooth Special Interest Group (SIG) – Operates at max of 740 kbps at 2.4 GHz ISM band – Applies fast frequency hopping 1600 hops/second – Can have serious interference with 802.11 2.4 GHz range network Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 10. IEEE 802.11a rates and modulation formats Data Rate (Mbps) Modulation Coding Rate Coded bits per sub-carrier Code bits per OFDM symbol Data bits per OFDM symbol 6 BPSK 1 / 2 1 48 24 9 BPSK 3 / 4 1 48 36 12 QPSK 1 / 2 2 96 48 18 QPSK 3 / 4 2 96 72 24 16QAM 1 / 2 4 192 96 36 16QAM 3 / 4 4 192 144 48 64QAM 2 / 3 6 288 192 54 64QAM 3 / 4 6 288 216 Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 11. The IEEE 802.11 and supporting LAN Standards • See also IEEE LAN/MAN Standards Committee Web site www.manta.ieee.org/groups/802/ IEEE 802.3 Carrier Sense IEEE 802.4 Token Bus IEEE 802.5 Token Ring IEEE 802.11 Wireless IEEE 802.2 Logical Link Control (LLC) MAC PHY OSI Layer 2 (data link) OSI Layer 1 (physical) bus star ring a b g Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 12. Figure 14.1 Basic service sets (BSSs) Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 13. Figure 14.2 Extended service sets (ESSs) Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 14. PHY IEEE 802.11 Architecture • IEEE 802.11 defines the physical (PHY), logical link (LLC) and media access control (MAC) layers for a wireless local area network • 802.11 networks can work as – basic service set (BSS) – extended service set (ESS) • BSS can also be used in ad-hoc networking LLC: Logical Link Control Layer MAC: Medium Access Control Layer PHY: Physical Layer FHSS: Frequency hopping SS DSSS: Direct sequence SS SS: Spread spectrum IR: Infrared light BSS: Basic Service Set ESS: Extended Service Set AP: Access Point DS: Distribution System DS, ESS ad-hoc network LLC MAC FHSS DSSS IR Network 802.11 Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 15. Extended service set (ESS) Basic (independent) service set (BSS) BSS and ESS • In ESS multiple access points connected by access points and a distribution system as Ethernet – BSSs partially overlap – Physically disjoint BSSs – Physically collocated BSSs (several antennas) Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 16. 802.11 Logical architecture • LLC provides addressing and data link control • MAC provides – access to wireless medium • CSMA/CA • Priority based access (802.12) – joining the network – authentication & privacy – Services • Station service: Authentication, privacy, MSDU* delivery • Distributed system: Association** and participates to data distribution • Three physical layers (PHY) – FHSS: Frequency Hopping Spread Spectrum (SS) – DSSS: Direct Sequence SS – IR: Infrared transmission LLC: Logical Link Control Layer MAC: Medium Access Control Layer PHY: Physical Layer FH: Frequency hopping DS: Direct sequence IR: Infrared light Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 17. 802.11 DSSS • Supports 1 and 2 Mbps data transport, uses BPSK and QPSK modulation • Uses 11 chips Barker code for spreading - 10.4 dB processing gain • Defines 14 overlapping channels, each having 22 MHz channel bandwidth, from 2.401 to 2.483 GHz • Power limits 1000mW in US, 100mW in EU, 200mW in Japan • Immune to narrow-band interference, cheaper hardware DS-transmitter PPDU:baseband data frame Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 18. 802.11 FHSS • Supports 1 and 2 Mbps data transport and applies two level - GFSK modulation* (Gaussian Frequency Shift Keying) • 79 channels from 2.402 to 2.480 GHz ( in U.S. and most of EU countries) with 1 MHz channel space • 78 hopping sequences with minimum 6 MHz hopping space, each sequence uses every 79 frequency elements once • Minimum hopping rate 2.5 hops/second • Tolerance to multi-path, narrow band interference, security • Low speed, small range due to FCC TX power regulation (10mW) * , 160kHz c nom f f f f      Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 19. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW 802.11 LAN architecture  wireless host communicates with base station  base station = access point (AP)  Basic Service Set (BSS) (aka “cell”) in infrastructure mode contains:  wireless hosts  access point (AP): base station  ad hoc mode: hosts only BSS 1 BSS 2 Internet hub, switch or router AP AP
  • 20. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW 802.11: Channels, association • 802.11b: 2.4GHz-2.485GHz spectrum divided into 11 channels at different frequencies – AP admin chooses frequency for AP – interference possible: channel can be same as that chosen by neighboring AP! • host: must associate with an AP – scans channels, listening for frames containing AP’s name and MAC address – selects AP to associate with – may perform authentication – will typically run DHCP to get IP address in AP’s subnet
  • 21. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW IEEE 802.11 MAC Protocol: CSMA/CA 802.11 sender 1 if sense channel idle for DIFS (DCF InterFrame Spacing) then transmit entire frame (no CD) 2 if sense channel busy then start random backoff time timer counts down while channel idle transmit when timer expires if no ACK, increase random backoff interval, repeat 2 802.11 receiver - if frame received OK return ACK after SIFS (Short InterFrame Spacing)- (ACK needed due to hidden terminal problem) sender receiver DIFS data SIFS ACK
  • 22. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW Avoiding collisions (more) idea: allow sender to “reserve” channel rather than random access of data frames: avoid collisions of long data frames • sender first transmits small request-to-send (RTS) packets to BS using CSMA – RTSs may still collide with each other (but they’re short) • BS broadcasts clear-to-send CTS in response to RTS • CTS heard by all nodes – sender transmits data frame – other stations defer transmissions avoid data frame collisions completely using small reservation packets!
  • 23. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW Collision Avoidance: RTS-CTS exchange AP A B time DATA (A) reservation collision defer
  • 24. IEEE 802.11 Media Access Control (MAC) DIFS: Distributed Inter-Frame Spacing SIFS: Short Inter-Frame Spacing ack: Acknowledgement Carrier-sense multiple access protocol with collision avoidance (CSMA/CS) Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 25. Table 14.2 Values of subfields in control frames Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 26. Table 14.4 Physical layers Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 27. Security • In theory, spread spectrum radio signals are inherently difficult to decipher without knowing the exact hopping sequences or direct sequence codes used • The IEEE 802.11 standard specifies optional security called "Wired Equivalent Privacy" whose goal is that a wireless LAN offer privacy equivalent to that offered by a wired LAN • The standard also specifies optional authentication measures Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 28. Authentication and privacy • Goal: to prevent unauthorized access & eavesdropping • Realized by authentication service prior access • Open system authentication – station wanting to authenticate sends authentication management frame - receiving station sends back frame for successful authentication • Shared key authentication (included in WEP*) – Secret, shared key received by all stations by a separate, 802.11 independent channel – Stations authenticate by a shared knowledge of the key properties • WEP’s privacy (blocking out eavesdropping) is based on ciphering: *WEP: Wired Equivalent Privacy Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 29. 802.11b Security Features • Wired Equivalent Privacy (WEP) – A protocol to protect link-level data during wireless transmission between clients and access points. • Services: – Authentication: provides access control to the network by denying access to client stations that fail to authenticate properly. – Confidentiality: intends to prevent information compromise from casual eavesdropping – Integrity: prevents messages from being modified while in transit between the wireless client and the access point. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 30. Authentication Means: • Based on cryptography • Non-cryptographic • Both are identity-based verification mechanisms (devices request access based on the SSID – Service Set Identifier of the wireless network). Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 31. Authentication • Authentication techniques Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 32. Privacy • Cryptographic techniques • WEP Uses RC4 symmetric key, stream cipher algorithm to generate a pseudo random data sequence. The stream is XORed with the data to be transmitted • Key sizes: 40bits to 128bits • Unfortunately, recent attacks have shown that the WEP approach for privacy is vulnerable to certain attack regardless of key size Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 33. Data Integrity • Data integrity is ensured by a simple encrypted version of CRC (Cyclic Redundant Check) • Also vulnerable to some attacks Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 34. Security Problems • Security features in Wireless products are frequently not enabled. • Use of static WEP keys (keys are in use for a very long time). • WEP does not provide key management. • Cryptographic keys are short. • No user authentication occurs – only devices are authenticated. A stolen device can access the network. • Identity based systems are vulnerable. • Packet integrity is poor. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 35. WLAN Network Planning • Network planning target – Maximize system performance with limited resource – Including • coverage • throughput • capacity • interference • roaming • security, etc. • Planning process – Requirements for project management personnel – Site investigation – Computer-aided planning practice – Testing and verifying planning Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 36. WLAN benefits • Mobility – increases working efficiency and productivity – extends the On-line period • Installation on difficult-to-wire areas – inside buildings – road crossings • Increased reliability – Note: Pay attention to security! • Reduced installation time – cabling time and convenient to users and difficult-to- wire cases Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 37. WLAN benefits (cont.) • Broadband – 11 Mbps for 802.11b – 54 Mbps for 802.11a/g (GSM:9.6Kbps, HCSCD:~40Kbps, GPRS:~160Kbps, WCDMA:up to 2Mbps) • Long-term cost savings – O & M cheaper that for wired nets – Comes from easy maintenance, cabling cost, working efficiency and accuracy – Network can be established in a new location just by moving the PCs! Prepared by, Dr.T.Thendral, Assistant Professor, SRCW