Wi-Fi Technology
Agenda <ul><li>Introduction </li></ul><ul><li>Wi-Fi Technologies </li></ul><ul><li>Wi-Fi Network Elements </li></ul><ul><l...
Introduction <ul><li>Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting dev...
The Wi-Fi Technology <ul><li>Wi-Fi Networks use Radio Technologies to transmit & receive data at high speed: </li></ul><ul...
IEEE 802.11b <ul><li>Appear in late 1999 </li></ul><ul><li>Operates at 2.4GHz radio spectrum </li></ul><ul><li>11 Mbps (th...
IEEE 802.11a <ul><li>Introduced in 2001 </li></ul><ul><li>Operates at 5 GHz (less popular)  </li></ul><ul><li>54 Mbps (the...
IEEE 802.11g <ul><li>Introduced in 2003 </li></ul><ul><li>Combine the feature of both standards (a,b) </li></ul><ul><li>10...
Elements of a WI-FI Network <ul><li>Access Point (AP) -  The AP is a wireless LAN transceiver or “base station” that can c...
How a Wi-Fi Network Works <ul><li>Basic concept is same as Walkie talkies. </li></ul><ul><li>A Wi-Fi hotspot is created by...
Wi-Fi Network Topologies <ul><li>AP-based topology (Infrastructure Mode) </li></ul><ul><li>Peer-to-peer topology (Ad-hoc M...
AP-based topology <ul><li>The client communicate through Access Point.  </li></ul><ul><li>BSA-RF coverage provided by an A...
Peer-to-peer topology <ul><li>AP is not required. </li></ul><ul><li>Client devices within a cell can communicate directly ...
Point-to-multipoint bridge topology <ul><li>This is used to connect a LAN in one building to a LANs in other buildings eve...
Wi-Fi Configurations
Wi-Fi Configurations
Wi-Fi Configurations
Wi-Fi Applications <ul><li>Home </li></ul><ul><li>Small Businesses or SOHO </li></ul><ul><li>Large Corporations & Campuses...
Wi-Fi Security Threats <ul><li>Wireless technology doesn’t remove any old security issues, but introduces new ones </li></...
Eavesdropping <ul><li>Easy to perform, almost impossible to detect </li></ul><ul><li>By default, everything is transmitted...
MITM Attack <ul><li>Attacker spoofes a disassociate message from the victim </li></ul><ul><li>The victim starts to look fo...
Denial of Service <ul><li>Attack on transmission frequecy used </li></ul><ul><ul><li>Frequency jamming </li></ul></ul><ul>...
Wi-Fi Security  <ul><li>The requirements for Wi-Fi network security can be broken down into two primary components: </li><...
Advantages <ul><li>Mobility </li></ul><ul><li>Ease of Installation </li></ul><ul><li>Flexibility </li></ul><ul><li>Cost </...
Limitations <ul><li>Interference </li></ul><ul><li>Degradation in performance </li></ul><ul><li>High power consumption </l...
QUESTIONS???
Conclusion <ul><li>Thus, the simple to use Wi-Fi technology is finding a wide range of applications in various fields and ...
Upcoming SlideShare
Loading in …5
×

Wi fi technology

8,898 views

Published on

Published in: Technology, Business
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
8,898
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
869
Comments
0
Likes
5
Embeds 0
No embeds

No notes for slide

Wi fi technology

  1. 1. Wi-Fi Technology
  2. 2. Agenda <ul><li>Introduction </li></ul><ul><li>Wi-Fi Technologies </li></ul><ul><li>Wi-Fi Network Elements </li></ul><ul><li>How a Wi-Fi Network Works </li></ul><ul><li>Wi-Fi Network Topologies </li></ul><ul><li>Wi-Fi Configurations </li></ul><ul><li>Applications of Wi-Fi </li></ul><ul><li>Wi-Fi Security Threats </li></ul><ul><li>Wi-Fi Security </li></ul><ul><li>Advantages/ Disadvantages of Wi-Fi </li></ul><ul><li>Questions </li></ul><ul><li>Conclusion </li></ul>
  3. 3. Introduction <ul><li>Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. </li></ul><ul><li>Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs). </li></ul><ul><li>Wi-Fi Network connect computers to each other, to the internet and to the wired network. </li></ul>
  4. 4. The Wi-Fi Technology <ul><li>Wi-Fi Networks use Radio Technologies to transmit & receive data at high speed: </li></ul><ul><ul><li>IEEE 802.11b </li></ul></ul><ul><ul><li>IEEE 802.11a </li></ul></ul><ul><ul><li>IEEE 802.11g </li></ul></ul>
  5. 5. IEEE 802.11b <ul><li>Appear in late 1999 </li></ul><ul><li>Operates at 2.4GHz radio spectrum </li></ul><ul><li>11 Mbps (theoretical speed) - within 30 m Range </li></ul><ul><li>4-6 Mbps (actual speed) </li></ul><ul><li>100 -150 feet range </li></ul><ul><li>Most popular, Least Expensive </li></ul><ul><li>Interference from mobile phones and Bluetooth devices which can reduce the transmission speed. </li></ul>
  6. 6. IEEE 802.11a <ul><li>Introduced in 2001 </li></ul><ul><li>Operates at 5 GHz (less popular) </li></ul><ul><li>54 Mbps (theoretical speed) </li></ul><ul><li>15-20 Mbps (Actual speed) </li></ul><ul><li>50-75 feet range </li></ul><ul><li>More expensive </li></ul><ul><li>Not compatible with 802.11b </li></ul>
  7. 7. IEEE 802.11g <ul><li>Introduced in 2003 </li></ul><ul><li>Combine the feature of both standards (a,b) </li></ul><ul><li>100-150 feet range </li></ul><ul><li>54 Mbps Speed </li></ul><ul><li>2.4 GHz radio frequencies </li></ul><ul><li>Compatible with ‘b’ </li></ul>
  8. 8. Elements of a WI-FI Network <ul><li>Access Point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices simultaneously to the Internet. </li></ul><ul><li>Wi-Fi cards - They accept the wireless signal and relay information. They can be internal and external.(e.g. PCMCIA Card for Laptop and PCI Card for Desktop PC) </li></ul><ul><li>Safeguards - Firewalls and anti-virus software protect networks from uninvited users and keep information secure. </li></ul>
  9. 9. How a Wi-Fi Network Works <ul><li>Basic concept is same as Walkie talkies. </li></ul><ul><li>A Wi-Fi hotspot is created by installing an access point to an internet connection. </li></ul><ul><li>An access point acts as a base station. </li></ul><ul><li>When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly. </li></ul><ul><li>A single access point can support up to 30 users and can function within a range of 100 – 150 feet indoors and up to 300 feet outdoors. </li></ul><ul><li>Many access points can be connected to each other via Ethernet cables to create a single large network. </li></ul>
  10. 10. Wi-Fi Network Topologies <ul><li>AP-based topology (Infrastructure Mode) </li></ul><ul><li>Peer-to-peer topology (Ad-hoc Mode) </li></ul><ul><li>Point-to-multipoint bridge topology </li></ul>
  11. 11. AP-based topology <ul><li>The client communicate through Access Point. </li></ul><ul><li>BSA-RF coverage provided by an AP. </li></ul><ul><li>ESA-It consists of 2 or more BSA. </li></ul><ul><li>ESA cell includes 10-15% overlap to allow roaming. </li></ul>
  12. 12. Peer-to-peer topology <ul><li>AP is not required. </li></ul><ul><li>Client devices within a cell can communicate directly with each other. </li></ul><ul><li>It is useful for setting up of a wireless network quickly and easily. </li></ul>
  13. 13. Point-to-multipoint bridge topology <ul><li>This is used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart. These conditions receive a clear line of sight between buildings. The line-of-sight range varies based on the type of wireless bridge and antenna used as well as the environmental conditions. </li></ul>
  14. 14. Wi-Fi Configurations
  15. 15. Wi-Fi Configurations
  16. 16. Wi-Fi Configurations
  17. 17. Wi-Fi Applications <ul><li>Home </li></ul><ul><li>Small Businesses or SOHO </li></ul><ul><li>Large Corporations & Campuses </li></ul><ul><li>Health Care </li></ul><ul><li>Wireless ISP (WISP) </li></ul><ul><li>Travellers </li></ul>
  18. 18. Wi-Fi Security Threats <ul><li>Wireless technology doesn’t remove any old security issues, but introduces new ones </li></ul><ul><ul><li>Eavesdropping </li></ul></ul><ul><ul><li>Man-in-the-middle attacks </li></ul></ul><ul><ul><li>Denial of Service </li></ul></ul>
  19. 19. Eavesdropping <ul><li>Easy to perform, almost impossible to detect </li></ul><ul><li>By default, everything is transmitted in clear text </li></ul><ul><ul><li>Usernames, passwords, content ... </li></ul></ul><ul><ul><li>No security offered by the transmission medium </li></ul></ul><ul><li>Different tools available on the internet </li></ul><ul><ul><li>Network sniffers, protocol analysers . . . </li></ul></ul><ul><ul><li>Password collectors </li></ul></ul><ul><li>With the right equipment, it’s possible to eavesdrop traffic from few kilometers away </li></ul>
  20. 20. MITM Attack <ul><li>Attacker spoofes a disassociate message from the victim </li></ul><ul><li>The victim starts to look for a new access point, and the attacker advertises his own AP on a different channel, using the real AP’s MAC address </li></ul><ul><li>The attacker connects to the real AP using victim’s MAC address </li></ul>
  21. 21. Denial of Service <ul><li>Attack on transmission frequecy used </li></ul><ul><ul><li>Frequency jamming </li></ul></ul><ul><ul><li>Not very technical, but works </li></ul></ul><ul><li>Attack on MAC layer </li></ul><ul><ul><li>Spoofed deauthentication / disassociation messages </li></ul></ul><ul><ul><li>can target one specific user </li></ul></ul><ul><li>Attacks on higher layer protocol (TCP/IP protocol) </li></ul><ul><ul><li>SYN Flooding </li></ul></ul>
  22. 22. Wi-Fi Security <ul><li>The requirements for Wi-Fi network security can be broken down into two primary components: </li></ul><ul><li>Authentication </li></ul><ul><ul><li>User Authentication </li></ul></ul><ul><ul><li>Server Authentication </li></ul></ul><ul><li>Privacy </li></ul>
  23. 23. Advantages <ul><li>Mobility </li></ul><ul><li>Ease of Installation </li></ul><ul><li>Flexibility </li></ul><ul><li>Cost </li></ul><ul><li>Reliability </li></ul><ul><li>Security </li></ul><ul><li>Use unlicensed part of the radio spectrum </li></ul><ul><li>Roaming </li></ul><ul><li>Speed </li></ul>
  24. 24. Limitations <ul><li>Interference </li></ul><ul><li>Degradation in performance </li></ul><ul><li>High power consumption </li></ul><ul><li>Limited range </li></ul>
  25. 25. QUESTIONS???
  26. 26. Conclusion <ul><li>Thus, the simple to use Wi-Fi technology is finding a wide range of applications in various fields and is revolutionizing wireless communication. Both technology and skills goes hand-in-hand, those who can design better architecture of networks can lead Wi-Fi networks. Wireless fidelity is common now. We are expecting more on this technology in future. Let’s hope for that… </li></ul>

×