SlideShare a Scribd company logo
1 of 38
Wi-Fi
Wireless Communications
Sheldon Lou
What is Wi-Fi?
The standard for wireless local area networks
(WLANs). It’s like a common language that all
the devices use to communicate to each other.
If you have a standard, people can make all
sorts of devices that can work with each other.
It’s actually IEEE 802.11, a family of standards.
The IEEE (Eye-triple-E, Institute of Electrical and Electronics
Engineers Inc.) is a non-profit, technical professional association of
more than 360,000 individual members in approximately 175
countries. The Wireless Ethernet Compatibility Alliance started the
Wi-Fi--wireless fidelity--certification program to ensure that
equipment claiming 802.11 compliance was genuinely
interoperable.
US Frequency Bands
Band Frequency range
UHF ISM 902-928 MHz
S-Band 2-4 GHz
S-Band ISM 2.4-2.5 GHz
C-Band 4-8 GHz
C-Band satellite downlink 3.7-4.2 GHz
C-Band Radar (weather) 5.25-5.925 GHz
C-Band ISM 5.725-5.875 GHz
C-Band satellite uplink 5.925-6.425 GHz
X-Band 8-12 GHz
X-Band Radar (police/weather) 8.5-10.55 GHz
Wi-Fi Standards
Standard Speed Freq band Notes
802.11 2 Mbps 2.4 GHz (1997)
802.11a 54 Mbps 5 GHz (1999)
802.11b 11 Mbps 2.4 GHz
802.11g 54 Mbps 2.4 GHz
802.11n 600 Mbps 2.4/5 GHz
ISM Band
ISM stands for industrial, scientific, and medical.
ISM bands are set aside for equipment that is
related to industrial or scientific processes or is
used by medical equipment. Perhaps the most
familiar ISM-band device is the microwave oven,
which operates in the 2.4-GHz ISM band. The
ISM bands are license-free, provided that
devices are low-power. You don't need a license
to set up and operate a wireless network.
U-NII (Unlicensed National
Information Infrastructure) Bands
802.11n can operate at the 5G U-NII bands:
U-NII Low (U-NII-1): 5.15-5.25 GHz.
U-NII Mid (U-NII-2): 5.25-5.35 GHz.
U-NII Worldwide: 5.47-5.725 GHz.
U-NII Upper (U-NII-3): 5.725 to 5.825
GHz.
U-NII bands
Wireless LAN Networks
WLAN Architecture—Ad Hoc Mode
 Ad-Hoc mode: Peer-to-peer setup where
clients can connect to each other directly.
Generally not used for business networks.
Ad Hoc Structure
Mobile stations communicate to each
other directly.
It’s set up for a special purpose and for a
short period of time. For example, the
participants of a meeting in a conference
room may create an ad hoc network at the
beginning of the meeting and dissolve it
when the meeting ends.
WLAN Architecture--Mesh
 Mesh: Every client in
the network also acts
as an access or relay
point, creating a “self-
healing” and (in
theory) infinitely
extensible network.
 Not yet in widespread
use, unlikely to be in
homes.
WLAN Architecture—Infrastructure Mode
To Wired Network
Infrastructure network
There is an Access Point (AP), which becomes the
hub of a “star topology.”
Any communication has to go through AP. If a
Mobile Station (MS), like a computer, a PDA, or a
phone, wants to communicate with another MS, it
needs to send the information to AP first, then AP
sends it to the destination MS
Multiple APs can be connected together and handle
a large number of clients.
Used by the majority of WLANs in homes and
businesses.
Comparison of Two Structures
Infrastructure Ad hoc
Expansion X
Flexibility X
Control X
Routing X
Coverage X
Reliability X
Extended Service Area
Roaming
In an extended service area, a mobile station (MS) can
roam from one BSS (Basic Service Set) to another.
Roughly speaking, the MS keeps checking the beacon
signal sent by each AP and select the strongest one and
connect to that AP.
If the BSSs overlap, the connection will not be
interrupted when an MS moves from one set to another.
If not, the service will be interrupted.
Two BSSs coverage areas can largely overlap to
increase the capacity for a particular area. If so, the two
access points will use different channels, as we will
explain later.
Antennas
All WLAN equipment comes with a built-in
omni-directional antenna, but some select
products will let you attach secondary
antennas that will significantly boost
range.
Antennas, continued
Antennas come in all
shapes and styles:
Omni-directional:
Vertical Whip
Ceiling mount
Directional:
Yagi (“Pringles can”)
Wall mounted panel
Parabolic dish
How Can Several Users Communicate
Simultaneously?
As we have discussed, there is a difference
between a network designed for voice
conversation and one for data exchange.
For voice conversations, like telephone and cell phone
calls, each person has a dedicated channel during the
entire conversation. (3G and 4G cell phones are
somewhat different, as we will explain later.)
For data exchange, many users can share one channel.
A user sends information when no one else is sending.
New technologies try to accommodate both voice and
data transmissions, as we will discuss in this course.
Share one channel in data
communication
 In data communication, data are grouped into packets/frames.
Each packet/frame contains a number of bits of information.
 Devices (phones, computers, etc.) don’t communicate
simultaneously. It’s like they are sharing one single cable (the air in
this case), only one person can use it at one time.
 Before an MS (mobile station) sends its packets, it checks to see if
someone else is sending information. Only when the medium is free
can an MS sends packets.
 If some station is sending or receiving signal, the MS that intends to
send will generate a random waiting time and wait for its turn. If
several MSs are all waiting for their turns, since their waiting times
are randomly generated and thus not equal, they will not start
sending simultaneously. Thus collision (two or more MSs sending
signals simultaneously) is avoided.
 It’s called Carrier Sensing Multiple Access with Collision Avoidance
(CSMA/CA).
How does CSMA/CA (Carrier Sensing
Multiple Access with Collision Avoidance)
Work?
RTS/CTS (Request-to-send/clear-to-
send)
Use Request-to-send/clear-to-send (RTS/CTS)
mechanism to avoid collision when two MSs cannot hear
each other (blocked by a wall …).
A terminal ready for transmission sends an RTS packet
identifying the source address, destination address, and
the length of the data to be sent.
The destination station responds with CTS packet.
The source terminal receives the CTS and sends the
data.
Other terminals go to the virtual carrier-sensing mode
(NAV signal on), therefore the source terminal sends its
packet with no contention.
After completion of the transmission, the destination
station sends an ACK, opening contention for other
users.
Spread spectrum in 802.11
It is a requirement imposed by the
regulatory authorities for devices in ISM
band in order to reduce interference.
There is also limitations on transmitted
power.
We discuss two methods specified in
802.11, FHSS and DSSS.
DSSS in 802.11
Used by 802.11b
Symbol transmission rate = 1Mbps
Multipath spread of up to 1/1 Mbps = 1 µs does
not cause ISI. For indoor applications this
ensures that the system does not suffer from ISI.
Chip rate = 11 Mcps
Resolution is on the order of 1/11 Mcps = 90 ns.
Use Barker code.
Frequency Hopping in 802.11
The frequency can hop over 78 hopping channels each
separated by 1 MHz. The first channel, Channel 0,
starts at 2.402 GHz. Channel 1 is at 2.403 GHz,
Channel 2, 2.404 GHz, and so on up to Channel 77 at
2.479 GHz (US, Canada, and Europe standards).
These frequencies are divided into three patterns of 26
hops each corresponding channel numbers (0, 3, 6, 9,
…, 75), (1, 4, 7, 10, …, 76), (2, 5, 8, 11, …, 77), see p.
454, Fig. 11.5.
Three APs can coexist without any hop collision, that
results in a threefold increase in the capacity of the cell.
Hop rate = 2.5 hops per second.
Frequency bands for DSSS
FHSS uses 1 MHz bandwidth (narrowband), but the
center frequency hops over 76 MHz. DSSS uses a chip
rate of 11 Mcps which occupies around 26 MHz of
bandwidth (wideband).
The ISM band at 2.4 GHz is divided into 11 overlapping
channels spaced by 5 MHz (see Fig. 11.6, P. 455).
APs located close to each other can choose different
channels to mitigate interference.
The coverage areas of two access points (Basic Service
Sets, BSS) may overlap to increase capacity. For
example, up to 8 users can use VoIP simultaneously
through one access point. With two overlapping APs, 16
users can talk simultaneously. But the two APs have to
use non-overlapping channels.
Modulation
Gaussian frequency shift keying (GFSK)
is used.
Wi-Fi network services
Distribution and integration
Association, re-association, and
disassociation
Authentication and deauthentication
Providing privacy
Distribution
This service is used by mobile stations in an
infrastructure network every time they send data.
Once a frame has been accepted by an access
point, it uses the distribution service to deliver
the frame to its destination. Any communication
that uses an access point travels through the
distribution service, including communications
between two mobile stations associated with the
same access point.
Integration
Integration is a service provided by the
distribution system; it allows the
connection of the distribution system to a
non-IEEE 802.11 network. The integration
function is specific to the distribution
system used and therefore is not specified
by 802.11, except in terms of the services
it must offer.
Association
Delivery of frames to mobile stations is
made possible because mobile stations
register, or associate, with access points.
The distribution system can then use the
registration information to determine which
access point to use for any mobile station.
Reassociation
When a mobile station moves between basic
service areas within a single extended service
area, it must evaluate signal strength and
perhaps switch the access point with which it is
associated. Reassociations are initiated by
mobile stations when signal conditions indicate
that a different association would be beneficial;
they are never initiated by the access point. After
the reassociation is complete, the distribution
system updates its location records to reflect the
reachability of the mobile station through a
different access point.
Disassociation
To terminate an existing association, stations
may use the disassociation service. When
stations invoke the disassociation service, any
mobility data stored in the distribution system is
removed. Once disassociation is complete, it is
as if the station is no longer attached to the
network. Disassociation is a polite task to do
during the station shutdown process. The MAC
is, however, designed to accommodate stations
that leave the network without formally
disassociating.
Authetication/deauthentication
Physical security is a major component of a wired LAN
security solution. Wired network’s equipment can be
locked inside offices. Wireless networks cannot offer the
same level of physical security, however, and therefore
must depend on additional authentication routines to
ensure that users accessing the network are authorized
to do so. Authentication is a necessary prerequisite to
association because only authenticated users are
authorized to use the network. (In practice, though, many
access points are configured for "open-system" mode
and will authenticate any station.)
Deauthentication terminates an authenticated
relationship. Because authentication is needed before
network use is authorized, a side effect of
deauthentication is termination of any current
association.

More Related Content

What's hot

Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802Abhishek G
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11Adeel Mirza
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Raj vardhan
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.pptUmme habiba
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDilum Bandara
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingNoorNawaz12
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingAditya Raj
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologiesbalasubramani p
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingRzvinay
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1AIRTEL
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lanMohd Arif
 

What's hot (20)

Iuwne10 S06 L02
Iuwne10 S06 L02Iuwne10 S06 L02
Iuwne10 S06 L02
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802
 
07 wireless LAN
07 wireless LAN07 wireless LAN
07 wireless LAN
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
Lect3
Lect3Lect3
Lect3
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 

Viewers also liked

हिंदी परियोजना कार्य
हिंदी परियोजना कार्यहिंदी परियोजना कार्य
हिंदी परियोजना कार्यkaran saini
 
3Ds Max presentation
3Ds Max presentation3Ds Max presentation
3Ds Max presentationNader Soubra
 
final_presentation2
final_presentation2final_presentation2
final_presentation2Changdae Lee
 
SKK Customer Success Stories PL
SKK Customer Success Stories PLSKK Customer Success Stories PL
SKK Customer Success Stories PLMarcin Dybus
 
Devops & Standards - Why standards matter
Devops & Standards - Why standards matterDevops & Standards - Why standards matter
Devops & Standards - Why standards matterAngad Singh
 
SKK Customer Success Stories ENG
SKK Customer Success Stories ENGSKK Customer Success Stories ENG
SKK Customer Success Stories ENGMarcin Dybus
 
Презентация 1.11 - Система водоснабжения
Презентация 1.11 - Система водоснабженияПрезентация 1.11 - Система водоснабжения
Презентация 1.11 - Система водоснабженияIgor Golovin
 
3 Actions to Enhance Your Social Media Presence - Susanne Petersson
3 Actions to Enhance Your Social Media Presence - Susanne Petersson3 Actions to Enhance Your Social Media Presence - Susanne Petersson
3 Actions to Enhance Your Social Media Presence - Susanne PeterssonSusanne Petersson
 
6 Dr Nevin presentation Townsville Health Forum March 2016
6 Dr Nevin presentation Townsville Health Forum March 20166 Dr Nevin presentation Townsville Health Forum March 2016
6 Dr Nevin presentation Townsville Health Forum March 2016Wendy.J. Seymour
 

Viewers also liked (12)

हिंदी परियोजना कार्य
हिंदी परियोजना कार्यहिंदी परियोजना कार्य
हिंदी परियोजना कार्य
 
3Ds Max presentation
3Ds Max presentation3Ds Max presentation
3Ds Max presentation
 
B2B_Brochure_240316_15.51
B2B_Brochure_240316_15.51B2B_Brochure_240316_15.51
B2B_Brochure_240316_15.51
 
final_presentation2
final_presentation2final_presentation2
final_presentation2
 
SKK Customer Success Stories PL
SKK Customer Success Stories PLSKK Customer Success Stories PL
SKK Customer Success Stories PL
 
Ala Cab
Ala CabAla Cab
Ala Cab
 
Devops & Standards - Why standards matter
Devops & Standards - Why standards matterDevops & Standards - Why standards matter
Devops & Standards - Why standards matter
 
SKK Customer Success Stories ENG
SKK Customer Success Stories ENGSKK Customer Success Stories ENG
SKK Customer Success Stories ENG
 
Презентация 1.11 - Система водоснабжения
Презентация 1.11 - Система водоснабженияПрезентация 1.11 - Система водоснабжения
Презентация 1.11 - Система водоснабжения
 
Appliances catalauge
Appliances  catalaugeAppliances  catalauge
Appliances catalauge
 
3 Actions to Enhance Your Social Media Presence - Susanne Petersson
3 Actions to Enhance Your Social Media Presence - Susanne Petersson3 Actions to Enhance Your Social Media Presence - Susanne Petersson
3 Actions to Enhance Your Social Media Presence - Susanne Petersson
 
6 Dr Nevin presentation Townsville Health Forum March 2016
6 Dr Nevin presentation Townsville Health Forum March 20166 Dr Nevin presentation Townsville Health Forum March 2016
6 Dr Nevin presentation Townsville Health Forum March 2016
 

Similar to What is a Wifi?

wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wirelessAble George
 
Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationDrAdeelAkram2
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxssuser86699a
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareokelloerick
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Darpan Patel
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routingr123027
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study GuideCCNAResources
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Networksheenammiddha
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 

Similar to What is a Wifi? (20)

Wi fi[1]
Wi fi[1]Wi fi[1]
Wi fi[1]
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wireless
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless Communication
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)
 
Unit 3
Unit 3Unit 3
Unit 3
 
Wi fi
Wi fiWi fi
Wi fi
 
802.11
802.11802.11
802.11
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study Guide
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Network
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 

More from karan saini

Thestoryofmylife 140221061604-phpapp01
Thestoryofmylife 140221061604-phpapp01Thestoryofmylife 140221061604-phpapp01
Thestoryofmylife 140221061604-phpapp01karan saini
 
Thestoryofmylife 140221061604-phpapp01 (1)
Thestoryofmylife 140221061604-phpapp01 (1)Thestoryofmylife 140221061604-phpapp01 (1)
Thestoryofmylife 140221061604-phpapp01 (1)karan saini
 
Snrg2011 6.15.2.sta canney_suranofsky
Snrg2011 6.15.2.sta canney_suranofskySnrg2011 6.15.2.sta canney_suranofsky
Snrg2011 6.15.2.sta canney_suranofskykaran saini
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlowkaran saini
 
Py4inf 05-iterations
Py4inf 05-iterationsPy4inf 05-iterations
Py4inf 05-iterationskaran saini
 
Py4inf 05-iterations (1)
Py4inf 05-iterations (1)Py4inf 05-iterations (1)
Py4inf 05-iterations (1)karan saini
 
Helen keller-1226880485154369-8
Helen keller-1226880485154369-8Helen keller-1226880485154369-8
Helen keller-1226880485154369-8karan saini
 
Final 121114041321-phpapp01
Final 121114041321-phpapp01Final 121114041321-phpapp01
Final 121114041321-phpapp01karan saini
 

More from karan saini (20)

Topology ppt
Topology pptTopology ppt
Topology ppt
 
Tibor
TiborTibor
Tibor
 
Thestoryofmylife 140221061604-phpapp01
Thestoryofmylife 140221061604-phpapp01Thestoryofmylife 140221061604-phpapp01
Thestoryofmylife 140221061604-phpapp01
 
Thestoryofmylife 140221061604-phpapp01 (1)
Thestoryofmylife 140221061604-phpapp01 (1)Thestoryofmylife 140221061604-phpapp01 (1)
Thestoryofmylife 140221061604-phpapp01 (1)
 
Snrg2011 6.15.2.sta canney_suranofsky
Snrg2011 6.15.2.sta canney_suranofskySnrg2011 6.15.2.sta canney_suranofsky
Snrg2011 6.15.2.sta canney_suranofsky
 
Science
ScienceScience
Science
 
Risc and cisc eugene clewlow
Risc and cisc   eugene clewlowRisc and cisc   eugene clewlow
Risc and cisc eugene clewlow
 
Py4inf 05-iterations
Py4inf 05-iterationsPy4inf 05-iterations
Py4inf 05-iterations
 
Py4inf 05-iterations (1)
Py4inf 05-iterations (1)Py4inf 05-iterations (1)
Py4inf 05-iterations (1)
 
Periodic table1
Periodic table1Periodic table1
Periodic table1
 
Maths project
Maths projectMaths project
Maths project
 
Lecturespecial
LecturespecialLecturespecial
Lecturespecial
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Lcd monitors
Lcd monitorsLcd monitors
Lcd monitors
 
Lab3
Lab3Lab3
Lab3
 
L11cs2110sp13
L11cs2110sp13L11cs2110sp13
L11cs2110sp13
 
Helen keller-1226880485154369-8
Helen keller-1226880485154369-8Helen keller-1226880485154369-8
Helen keller-1226880485154369-8
 
Hardware
HardwareHardware
Hardware
 
Gsm cdma1
Gsm cdma1Gsm cdma1
Gsm cdma1
 
Final 121114041321-phpapp01
Final 121114041321-phpapp01Final 121114041321-phpapp01
Final 121114041321-phpapp01
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Recently uploaded (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

What is a Wifi?

  • 2. What is Wi-Fi? The standard for wireless local area networks (WLANs). It’s like a common language that all the devices use to communicate to each other. If you have a standard, people can make all sorts of devices that can work with each other. It’s actually IEEE 802.11, a family of standards. The IEEE (Eye-triple-E, Institute of Electrical and Electronics Engineers Inc.) is a non-profit, technical professional association of more than 360,000 individual members in approximately 175 countries. The Wireless Ethernet Compatibility Alliance started the Wi-Fi--wireless fidelity--certification program to ensure that equipment claiming 802.11 compliance was genuinely interoperable.
  • 3. US Frequency Bands Band Frequency range UHF ISM 902-928 MHz S-Band 2-4 GHz S-Band ISM 2.4-2.5 GHz C-Band 4-8 GHz C-Band satellite downlink 3.7-4.2 GHz C-Band Radar (weather) 5.25-5.925 GHz C-Band ISM 5.725-5.875 GHz C-Band satellite uplink 5.925-6.425 GHz X-Band 8-12 GHz X-Band Radar (police/weather) 8.5-10.55 GHz
  • 4. Wi-Fi Standards Standard Speed Freq band Notes 802.11 2 Mbps 2.4 GHz (1997) 802.11a 54 Mbps 5 GHz (1999) 802.11b 11 Mbps 2.4 GHz 802.11g 54 Mbps 2.4 GHz 802.11n 600 Mbps 2.4/5 GHz
  • 5. ISM Band ISM stands for industrial, scientific, and medical. ISM bands are set aside for equipment that is related to industrial or scientific processes or is used by medical equipment. Perhaps the most familiar ISM-band device is the microwave oven, which operates in the 2.4-GHz ISM band. The ISM bands are license-free, provided that devices are low-power. You don't need a license to set up and operate a wireless network.
  • 6. U-NII (Unlicensed National Information Infrastructure) Bands 802.11n can operate at the 5G U-NII bands: U-NII Low (U-NII-1): 5.15-5.25 GHz. U-NII Mid (U-NII-2): 5.25-5.35 GHz. U-NII Worldwide: 5.47-5.725 GHz. U-NII Upper (U-NII-3): 5.725 to 5.825 GHz.
  • 9. WLAN Architecture—Ad Hoc Mode  Ad-Hoc mode: Peer-to-peer setup where clients can connect to each other directly. Generally not used for business networks.
  • 10. Ad Hoc Structure Mobile stations communicate to each other directly. It’s set up for a special purpose and for a short period of time. For example, the participants of a meeting in a conference room may create an ad hoc network at the beginning of the meeting and dissolve it when the meeting ends.
  • 11. WLAN Architecture--Mesh  Mesh: Every client in the network also acts as an access or relay point, creating a “self- healing” and (in theory) infinitely extensible network.  Not yet in widespread use, unlikely to be in homes.
  • 13. Infrastructure network There is an Access Point (AP), which becomes the hub of a “star topology.” Any communication has to go through AP. If a Mobile Station (MS), like a computer, a PDA, or a phone, wants to communicate with another MS, it needs to send the information to AP first, then AP sends it to the destination MS Multiple APs can be connected together and handle a large number of clients. Used by the majority of WLANs in homes and businesses.
  • 14. Comparison of Two Structures Infrastructure Ad hoc Expansion X Flexibility X Control X Routing X Coverage X Reliability X
  • 16. Roaming In an extended service area, a mobile station (MS) can roam from one BSS (Basic Service Set) to another. Roughly speaking, the MS keeps checking the beacon signal sent by each AP and select the strongest one and connect to that AP. If the BSSs overlap, the connection will not be interrupted when an MS moves from one set to another. If not, the service will be interrupted. Two BSSs coverage areas can largely overlap to increase the capacity for a particular area. If so, the two access points will use different channels, as we will explain later.
  • 17. Antennas All WLAN equipment comes with a built-in omni-directional antenna, but some select products will let you attach secondary antennas that will significantly boost range.
  • 18. Antennas, continued Antennas come in all shapes and styles: Omni-directional: Vertical Whip Ceiling mount Directional: Yagi (“Pringles can”) Wall mounted panel Parabolic dish
  • 19. How Can Several Users Communicate Simultaneously? As we have discussed, there is a difference between a network designed for voice conversation and one for data exchange. For voice conversations, like telephone and cell phone calls, each person has a dedicated channel during the entire conversation. (3G and 4G cell phones are somewhat different, as we will explain later.) For data exchange, many users can share one channel. A user sends information when no one else is sending. New technologies try to accommodate both voice and data transmissions, as we will discuss in this course.
  • 20. Share one channel in data communication  In data communication, data are grouped into packets/frames. Each packet/frame contains a number of bits of information.  Devices (phones, computers, etc.) don’t communicate simultaneously. It’s like they are sharing one single cable (the air in this case), only one person can use it at one time.  Before an MS (mobile station) sends its packets, it checks to see if someone else is sending information. Only when the medium is free can an MS sends packets.  If some station is sending or receiving signal, the MS that intends to send will generate a random waiting time and wait for its turn. If several MSs are all waiting for their turns, since their waiting times are randomly generated and thus not equal, they will not start sending simultaneously. Thus collision (two or more MSs sending signals simultaneously) is avoided.  It’s called Carrier Sensing Multiple Access with Collision Avoidance (CSMA/CA).
  • 21. How does CSMA/CA (Carrier Sensing Multiple Access with Collision Avoidance) Work?
  • 22. RTS/CTS (Request-to-send/clear-to- send) Use Request-to-send/clear-to-send (RTS/CTS) mechanism to avoid collision when two MSs cannot hear each other (blocked by a wall …). A terminal ready for transmission sends an RTS packet identifying the source address, destination address, and the length of the data to be sent. The destination station responds with CTS packet. The source terminal receives the CTS and sends the data. Other terminals go to the virtual carrier-sensing mode (NAV signal on), therefore the source terminal sends its packet with no contention. After completion of the transmission, the destination station sends an ACK, opening contention for other users.
  • 23. Spread spectrum in 802.11 It is a requirement imposed by the regulatory authorities for devices in ISM band in order to reduce interference. There is also limitations on transmitted power. We discuss two methods specified in 802.11, FHSS and DSSS.
  • 24. DSSS in 802.11 Used by 802.11b Symbol transmission rate = 1Mbps Multipath spread of up to 1/1 Mbps = 1 µs does not cause ISI. For indoor applications this ensures that the system does not suffer from ISI. Chip rate = 11 Mcps Resolution is on the order of 1/11 Mcps = 90 ns. Use Barker code.
  • 25. Frequency Hopping in 802.11 The frequency can hop over 78 hopping channels each separated by 1 MHz. The first channel, Channel 0, starts at 2.402 GHz. Channel 1 is at 2.403 GHz, Channel 2, 2.404 GHz, and so on up to Channel 77 at 2.479 GHz (US, Canada, and Europe standards). These frequencies are divided into three patterns of 26 hops each corresponding channel numbers (0, 3, 6, 9, …, 75), (1, 4, 7, 10, …, 76), (2, 5, 8, 11, …, 77), see p. 454, Fig. 11.5. Three APs can coexist without any hop collision, that results in a threefold increase in the capacity of the cell. Hop rate = 2.5 hops per second.
  • 26. Frequency bands for DSSS FHSS uses 1 MHz bandwidth (narrowband), but the center frequency hops over 76 MHz. DSSS uses a chip rate of 11 Mcps which occupies around 26 MHz of bandwidth (wideband). The ISM band at 2.4 GHz is divided into 11 overlapping channels spaced by 5 MHz (see Fig. 11.6, P. 455). APs located close to each other can choose different channels to mitigate interference. The coverage areas of two access points (Basic Service Sets, BSS) may overlap to increase capacity. For example, up to 8 users can use VoIP simultaneously through one access point. With two overlapping APs, 16 users can talk simultaneously. But the two APs have to use non-overlapping channels.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Modulation Gaussian frequency shift keying (GFSK) is used.
  • 32. Wi-Fi network services Distribution and integration Association, re-association, and disassociation Authentication and deauthentication Providing privacy
  • 33. Distribution This service is used by mobile stations in an infrastructure network every time they send data. Once a frame has been accepted by an access point, it uses the distribution service to deliver the frame to its destination. Any communication that uses an access point travels through the distribution service, including communications between two mobile stations associated with the same access point.
  • 34. Integration Integration is a service provided by the distribution system; it allows the connection of the distribution system to a non-IEEE 802.11 network. The integration function is specific to the distribution system used and therefore is not specified by 802.11, except in terms of the services it must offer.
  • 35. Association Delivery of frames to mobile stations is made possible because mobile stations register, or associate, with access points. The distribution system can then use the registration information to determine which access point to use for any mobile station.
  • 36. Reassociation When a mobile station moves between basic service areas within a single extended service area, it must evaluate signal strength and perhaps switch the access point with which it is associated. Reassociations are initiated by mobile stations when signal conditions indicate that a different association would be beneficial; they are never initiated by the access point. After the reassociation is complete, the distribution system updates its location records to reflect the reachability of the mobile station through a different access point.
  • 37. Disassociation To terminate an existing association, stations may use the disassociation service. When stations invoke the disassociation service, any mobility data stored in the distribution system is removed. Once disassociation is complete, it is as if the station is no longer attached to the network. Disassociation is a polite task to do during the station shutdown process. The MAC is, however, designed to accommodate stations that leave the network without formally disassociating.
  • 38. Authetication/deauthentication Physical security is a major component of a wired LAN security solution. Wired network’s equipment can be locked inside offices. Wireless networks cannot offer the same level of physical security, however, and therefore must depend on additional authentication routines to ensure that users accessing the network are authorized to do so. Authentication is a necessary prerequisite to association because only authenticated users are authorized to use the network. (In practice, though, many access points are configured for "open-system" mode and will authenticate any station.) Deauthentication terminates an authenticated relationship. Because authentication is needed before network use is authorized, a side effect of deauthentication is termination of any current association.