SlideShare a Scribd company logo
THE MASTER PIECE SITE SURVEY
COVERAGE AREA
WIRELESS TOPOLOGY BSS IBSS ESS       In this site survey we are using more than one access points so the topology we are using is the Extended Service Set i.e. ESS.
Available Technologies  802.11 a     IEEE 802.11a-1999 or 802.11a is an amendment to the IEEE 802.11 specification that added a higher data rate of up to 54 Mbit/s using the 5 GHz band. It has seen widespread worldwide implementation, particularly within the corporate workspace.
[object Object],IEEE 802.11b-1999 or 802.11b, is an amendment to the IEEE 802.11 specification that extended throughput up to 11 Mbit/s using the same 2.4 GHz band. This specification under the marketing name of Wi-Fi has been implemented all over the world. 802.11b has a maximum raw data rate of 11 Mbit/s and uses the same CSMA/CA media access method defined in the original standard.
[object Object],802.11g is the third modulation standard for wireless LANs. It works in the 2.4 GHz band (like 802.11b) but operates at a maximum raw data rate of 54 Mbit/s, or about 19 Mbit/s net throughput (identical to 802.11a core, except for some additional legacy overhead for backward compatibility). 802.11g hardware is fully backwards compatible with 802.11b hardware. 
Technology Used Technology for this layout &  as per the requirements of the University I am using is 802.11 a.
Why 802.11 a? Why not 802.11 b ? ,[object Object],      devices like the Bluetooth's work. ,[object Object],     which is not suited for big crowd &       also not separated by much distance.
Why not 802.11 g? ,[object Object],     interferences caused by the devices       at that band. ,[object Object],      no. of   channels that can b used is only 3.
Advantages of 802.11a ,[object Object]
 As the band is larger the no. of channels are      up to 23. ,[object Object],     the crowded places where the crowd is not sparse.
Layout
Access Points In computer networking, a wireless access point (WAP) is a device which allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router (via a wired network), and can relay data between the wireless devices (such as computers or printers) and wired devices on the network.
Why three A.P’s? The technology we are using i.e. 802.11 a has a disadvantage which is this technology has short range. So to have good speed & also better connectivity we need three access points. 1- LABS. 2- Horizontal Corridor. 3- Vertical Corridor.
Security The Wireless security  standard we are using is       802.11i or WPA 2. WPA stands for WIFI Protected Access.Which is the latest protocol for wireless & has many      good features like AES,TKIP etc.
Features of WPA 2 AES (Advance Encryption). Authentication. Dynamic Key Management. Successor of WPA.
Advanced Encryption System The new 802.11i standard, or WPA2, supports the  128-bit Advanced Encryption Standard (AES) . AES supports 128-bit, 192-bit and 256-bit keys.
Authentication This new standard specifies use of Temporal Key Integrity Protocol (TKIP) and 802.1x/EAP with mutual authentication . 802.1x authentication and key-management      features for the various 802.11 Wi-Fi flavors.
Control Accessing WLAN SSID       A service set identifier (SSID) is a name that identifies a particular 802.11 wireless LAN. A client device receives broadcast messages from all access points within range advertising their SSIDs. The client device can then either manually or automatically—based on configuration—select the network with which to associate. The SSID can be up to 32 characters long. As the SSID displays to users, it normally consists of human-readable characters.
Mac Address Filtering ,[object Object]
   MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and white lists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a white list entry for each device that he or she would use to access the network.,[object Object]

More Related Content

What's hot

80211 the end of wireles or is it
80211 the end of wireles or is it80211 the end of wireles or is it
80211 the end of wireles or is it
Interop
 
pola samy cv 24 10 2016
pola samy cv 24 10 2016pola samy cv 24 10 2016
pola samy cv 24 10 2016
pola samy
 

What's hot (20)

Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiDeceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
 
EnGenius' End to End Solution (E2ES)
EnGenius' End to End Solution (E2ES)EnGenius' End to End Solution (E2ES)
EnGenius' End to End Solution (E2ES)
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
 
Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)Distributed network monitoring of wireless networks (Mobility Field Day 1)
Distributed network monitoring of wireless networks (Mobility Field Day 1)
 
Acma Computers : Company Profile ( IT Services & Solutions Provider )
Acma Computers : Company Profile ( IT Services & Solutions Provider ) Acma Computers : Company Profile ( IT Services & Solutions Provider )
Acma Computers : Company Profile ( IT Services & Solutions Provider )
 
Daniel Cross, Electronics Engineer
Daniel Cross, Electronics EngineerDaniel Cross, Electronics Engineer
Daniel Cross, Electronics Engineer
 
Sinefa - It's about time
Sinefa - It's about timeSinefa - It's about time
Sinefa - It's about time
 
NetBeez - AngelBeat presentation
NetBeez - AngelBeat presentationNetBeez - AngelBeat presentation
NetBeez - AngelBeat presentation
 
LoRaWAN in Depth
LoRaWAN in DepthLoRaWAN in Depth
LoRaWAN in Depth
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance Lab
 
80211 the end of wireles or is it
80211 the end of wireles or is it80211 the end of wireles or is it
80211 the end of wireles or is it
 
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...
 
pola samy cv 24 10 2016
pola samy cv 24 10 2016pola samy cv 24 10 2016
pola samy cv 24 10 2016
 
Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008
 
Asset tracking solution for construction
Asset tracking solution for constructionAsset tracking solution for construction
Asset tracking solution for construction
 
Spirent: The Internet of Things: The Expanded Security Perimeter
Spirent: The Internet of Things:  The Expanded Security Perimeter Spirent: The Internet of Things:  The Expanded Security Perimeter
Spirent: The Internet of Things: The Expanded Security Perimeter
 
Wireless Accuracy for 9-1-1
Wireless Accuracy for 9-1-1Wireless Accuracy for 9-1-1
Wireless Accuracy for 9-1-1
 
LoRa application for detecting the harmful gases
LoRa application for detecting the harmful gasesLoRa application for detecting the harmful gases
LoRa application for detecting the harmful gases
 
ThousandEyes at Network Field Day 12
ThousandEyes at Network Field Day 12ThousandEyes at Network Field Day 12
ThousandEyes at Network Field Day 12
 
Spirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSpirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV Deployments
 

Viewers also liked

Wi-Fi Planning - The 7 Secrets
Wi-Fi Planning - The 7 Secrets Wi-Fi Planning - The 7 Secrets
Wi-Fi Planning - The 7 Secrets
Ekahau_WiFi_Tools
 
Ekahau Wi-Fi Tools general overview
Ekahau Wi-Fi Tools general overviewEkahau Wi-Fi Tools general overview
Ekahau Wi-Fi Tools general overview
Jussi Kiviniemi
 
Linux and its fundamentals
Linux and its fundamentalsLinux and its fundamentals
Linux and its fundamentals
Agreeta Sharma
 
Moxy station map
Moxy station mapMoxy station map
Moxy station map
MOXYMEDIA
 
AS Solar Charging Station Design Report
AS Solar Charging Station Design ReportAS Solar Charging Station Design Report
AS Solar Charging Station Design Report
Salam Ali
 
Forgiveness leads to anger management
Forgiveness leads to anger managementForgiveness leads to anger management
Forgiveness leads to anger management
Agreeta Sharma
 
Site Visit Report
Site Visit ReportSite Visit Report
Site Visit Report
ZIyeeTan
 

Viewers also liked (20)

Wi-Fi Planning - The 7 Secrets
Wi-Fi Planning - The 7 Secrets Wi-Fi Planning - The 7 Secrets
Wi-Fi Planning - The 7 Secrets
 
Ekahau Site Survey on Fusion / Windows
Ekahau Site Survey on Fusion / WindowsEkahau Site Survey on Fusion / Windows
Ekahau Site Survey on Fusion / Windows
 
Ekahau SIte Survey, 3D Planner & Other Wi-Fi Tools Presentation
Ekahau SIte Survey, 3D Planner & Other Wi-Fi Tools PresentationEkahau SIte Survey, 3D Planner & Other Wi-Fi Tools Presentation
Ekahau SIte Survey, 3D Planner & Other Wi-Fi Tools Presentation
 
Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)
Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)
Ekahau Wi-Fi Tools (Site Survey, Planning, Spectrum Analysis)
 
Ekahau Site Survey on Mac (VMware Fusion with Win 7)
Ekahau Site Survey on Mac (VMware Fusion with Win 7)Ekahau Site Survey on Mac (VMware Fusion with Win 7)
Ekahau Site Survey on Mac (VMware Fusion with Win 7)
 
Ekahau Wi-Fi Tools general overview
Ekahau Wi-Fi Tools general overviewEkahau Wi-Fi Tools general overview
Ekahau Wi-Fi Tools general overview
 
Bad Wi-Fi - Ekahau Webinar - July 2014
Bad Wi-Fi - Ekahau Webinar - July 2014Bad Wi-Fi - Ekahau Webinar - July 2014
Bad Wi-Fi - Ekahau Webinar - July 2014
 
Linux and its fundamentals
Linux and its fundamentalsLinux and its fundamentals
Linux and its fundamentals
 
Reporting With A Cellphone October 2009
Reporting With A Cellphone October 2009Reporting With A Cellphone October 2009
Reporting With A Cellphone October 2009
 
Moxy station map
Moxy station mapMoxy station map
Moxy station map
 
Mobile Moodle and mLearning project for mLearncon in San Diego
Mobile Moodle and mLearning project for mLearncon in San DiegoMobile Moodle and mLearning project for mLearncon in San Diego
Mobile Moodle and mLearning project for mLearncon in San Diego
 
AS Solar Charging Station Design Report
AS Solar Charging Station Design ReportAS Solar Charging Station Design Report
AS Solar Charging Station Design Report
 
Forgiveness leads to anger management
Forgiveness leads to anger managementForgiveness leads to anger management
Forgiveness leads to anger management
 
Idiom overview
Idiom overview Idiom overview
Idiom overview
 
802.11ac Wave 2 technology deep dive and deployment recommendations
802.11ac Wave 2 technology deep dive and deployment recommendations802.11ac Wave 2 technology deep dive and deployment recommendations
802.11ac Wave 2 technology deep dive and deployment recommendations
 
Rf basics
Rf basicsRf basics
Rf basics
 
Site Visit Report
Site Visit ReportSite Visit Report
Site Visit Report
 
Rf mems basic
Rf mems basicRf mems basic
Rf mems basic
 
5 Hotel Technology Trends to Watch
5 Hotel Technology Trends to Watch5 Hotel Technology Trends to Watch
5 Hotel Technology Trends to Watch
 
Basic FM Radio Station RF Design Good Practices
Basic FM Radio Station RF Design Good PracticesBasic FM Radio Station RF Design Good Practices
Basic FM Radio Station RF Design Good Practices
 

Similar to Site survey- Deployement of Wi Fi

Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
pmuthumca51
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
Yogesh Kumar
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
Sujee Antony
 

Similar to Site survey- Deployement of Wi Fi (20)

Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Darsh
DarshDarsh
Darsh
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Wi fi
Wi fiWi fi
Wi fi
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
802 standerd
802 standerd802 standerd
802 standerd
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.ppt
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Site survey- Deployement of Wi Fi

  • 1. THE MASTER PIECE SITE SURVEY
  • 3. WIRELESS TOPOLOGY BSS IBSS ESS In this site survey we are using more than one access points so the topology we are using is the Extended Service Set i.e. ESS.
  • 4. Available Technologies 802.11 a IEEE 802.11a-1999 or 802.11a is an amendment to the IEEE 802.11 specification that added a higher data rate of up to 54 Mbit/s using the 5 GHz band. It has seen widespread worldwide implementation, particularly within the corporate workspace.
  • 5.
  • 6.
  • 7. Technology Used Technology for this layout & as per the requirements of the University I am using is 802.11 a.
  • 8.
  • 9.
  • 10.
  • 11.
  • 13. Access Points In computer networking, a wireless access point (WAP) is a device which allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router (via a wired network), and can relay data between the wireless devices (such as computers or printers) and wired devices on the network.
  • 14. Why three A.P’s? The technology we are using i.e. 802.11 a has a disadvantage which is this technology has short range. So to have good speed & also better connectivity we need three access points. 1- LABS. 2- Horizontal Corridor. 3- Vertical Corridor.
  • 15. Security The Wireless security standard we are using is 802.11i or WPA 2. WPA stands for WIFI Protected Access.Which is the latest protocol for wireless & has many good features like AES,TKIP etc.
  • 16. Features of WPA 2 AES (Advance Encryption). Authentication. Dynamic Key Management. Successor of WPA.
  • 17. Advanced Encryption System The new 802.11i standard, or WPA2, supports the 128-bit Advanced Encryption Standard (AES) . AES supports 128-bit, 192-bit and 256-bit keys.
  • 18. Authentication This new standard specifies use of Temporal Key Integrity Protocol (TKIP) and 802.1x/EAP with mutual authentication . 802.1x authentication and key-management features for the various 802.11 Wi-Fi flavors.
  • 19. Control Accessing WLAN SSID A service set identifier (SSID) is a name that identifies a particular 802.11 wireless LAN. A client device receives broadcast messages from all access points within range advertising their SSIDs. The client device can then either manually or automatically—based on configuration—select the network with which to associate. The SSID can be up to 32 characters long. As the SSID displays to users, it normally consists of human-readable characters.
  • 20.
  • 21.
  • 22. Thank You Agreeta Sharma M.Sc Networking Management’12 Amity University