A home wireless network allows multiple digital devices in a home, like computers, laptops, tablets, phones, and printers, to connect and communicate with each other over Wi-Fi. A wireless router broadcasts the Wi-Fi signal, which devices can detect and connect to wirelessly using built-in Wi-Fi adapters or external USB adapters. Common wireless network standards are 802.11b providing speeds up to 11 Mbps and 802.11g providing speeds up to 54 Mbps. The router's firewall, network address translation, and ability to share a single internet connection allow multiple devices on the home network to securely access the internet simultaneously.
This document provides a summary of basic wireless networking concepts for new users. It discusses the need for wireless networks and their benefits over wired networks. It then covers fundamental wireless topics like wireless topologies, regulatory bodies, wireless network components, and wireless network types. It also addresses wireless design concepts such as ad-hoc vs infrastructure networks and wireless access point types. The document aims to give new wireless users a high-level understanding of wireless fundamentals and common industry terminology.
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of wireless technology, outlines the 802.11 standards including 802.11a, 802.11b, 802.11g, security features, and challenges. It also summarizes how WLANs integrate with existing networks through access points and allow roaming between coverage areas.
The document discusses wireless local area networks (WLANs), including an overview of common WLAN standards such as 802.11b, 802.11a, and 802.11g. It covers topics such as how WLANs integrate with existing wired networks using access points, security considerations for WLANs, and factors to consider when migrating to a wireless network such as performing a site survey.
The document describes the D-Link Wireless G Router, which allows users to create a wireless network in their home. It connects to a broadband modem to share an internet connection wirelessly. Setup is easy using the Quick Router Setup Wizard. The router provides security features like WPA/WPA2 encryption and a firewall to protect the network from threats. It is compatible with many wireless devices and supports multiple computers and devices on the network through its four Ethernet ports.
The document discusses wireless networks and their use in libraries. It provides definitions of wireless networks and explains how they allow data transfer without cables by using radio waves. It describes the advantages wireless networks provide for users and libraries, such as mobility, easy access to information, and simplified network configuration. The document also discusses common wireless network standards and security measures used. Overall, the document conveys that wireless connectivity in libraries offers convenient access to library resources and services for users regardless of their location.
Telecommunications: Introduction to Wireless NetworksNapier University
This document provides an introduction to wireless networking technologies. It discusses key topics such as:
- Wireless network types including WLAN, WMAN, WPAN and the different standards and protocols associated with each.
- Common wireless technologies like Bluetooth, WiFi, WiMax and cellular networks.
- Technical aspects of wireless communication including radio wave fundamentals, spread spectrum techniques, and issues that can impact wireless networks such as multipath propagation and interference.
- Wireless network security considerations around privacy, authentication and robustness against denial of service attacks.
- IEEE 802.11 wireless LAN standards including 802.11a, 802.11b, and 802.11g operating in
The document describes the D-Link Wireless N 150 Router. It allows users to create a high-speed wireless network at home to share an Internet connection between multiple devices. The router offers security features and is compatible with both Wireless N 150 and older 802.11b/g wireless technologies. It has an easy setup wizard to quickly configure the network.
The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data. Experts estimate that the IoT will consist of almost 50 billion objects by 2020! Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure.
This document provides a summary of basic wireless networking concepts for new users. It discusses the need for wireless networks and their benefits over wired networks. It then covers fundamental wireless topics like wireless topologies, regulatory bodies, wireless network components, and wireless network types. It also addresses wireless design concepts such as ad-hoc vs infrastructure networks and wireless access point types. The document aims to give new wireless users a high-level understanding of wireless fundamentals and common industry terminology.
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of wireless technology, outlines the 802.11 standards including 802.11a, 802.11b, 802.11g, security features, and challenges. It also summarizes how WLANs integrate with existing networks through access points and allow roaming between coverage areas.
The document discusses wireless local area networks (WLANs), including an overview of common WLAN standards such as 802.11b, 802.11a, and 802.11g. It covers topics such as how WLANs integrate with existing wired networks using access points, security considerations for WLANs, and factors to consider when migrating to a wireless network such as performing a site survey.
The document describes the D-Link Wireless G Router, which allows users to create a wireless network in their home. It connects to a broadband modem to share an internet connection wirelessly. Setup is easy using the Quick Router Setup Wizard. The router provides security features like WPA/WPA2 encryption and a firewall to protect the network from threats. It is compatible with many wireless devices and supports multiple computers and devices on the network through its four Ethernet ports.
The document discusses wireless networks and their use in libraries. It provides definitions of wireless networks and explains how they allow data transfer without cables by using radio waves. It describes the advantages wireless networks provide for users and libraries, such as mobility, easy access to information, and simplified network configuration. The document also discusses common wireless network standards and security measures used. Overall, the document conveys that wireless connectivity in libraries offers convenient access to library resources and services for users regardless of their location.
Telecommunications: Introduction to Wireless NetworksNapier University
This document provides an introduction to wireless networking technologies. It discusses key topics such as:
- Wireless network types including WLAN, WMAN, WPAN and the different standards and protocols associated with each.
- Common wireless technologies like Bluetooth, WiFi, WiMax and cellular networks.
- Technical aspects of wireless communication including radio wave fundamentals, spread spectrum techniques, and issues that can impact wireless networks such as multipath propagation and interference.
- Wireless network security considerations around privacy, authentication and robustness against denial of service attacks.
- IEEE 802.11 wireless LAN standards including 802.11a, 802.11b, and 802.11g operating in
The document describes the D-Link Wireless N 150 Router. It allows users to create a high-speed wireless network at home to share an Internet connection between multiple devices. The router offers security features and is compatible with both Wireless N 150 and older 802.11b/g wireless technologies. It has an easy setup wizard to quickly configure the network.
The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data. Experts estimate that the IoT will consist of almost 50 billion objects by 2020! Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure.
A personal area network (PAN) connects devices within an individual's immediate vicinity, such as computers and phones. There are two types of PANs: wired and wireless. Wired PANs connect devices physically using cables, while wireless PANs connect devices through infrared, Bluetooth, or home radio frequency without cables. Wireless PANs are established automatically once devices are within range of each other. PANs provide quick and easy data transfer but have limited range and compatibility between devices. They are used in applications like healthcare, transportation hubs, education, the military, homes, and offices.
The document describes the AirLive N.TOP 802.11n Ceiling Mount Long Range PoE AP. It is a wireless access point disguised as a smoke detector for discreet placement in public areas. It supports data rates up to 300Mbps and uses Power over Ethernet for easy installation. The AP offers long range coverage through its high power output, multiple wireless modes for different uses, and management through a utility software.
The document summarizes the key aspects of ZigBee, a wireless networking standard targeted for low-power devices. It describes ZigBee's technical goals of low data rates, long battery life, and secure networking. It also outlines ZigBee's device types, network formation process, and traffic modes including beacon-enabled and non-beacon modes.
A site survey is important for both pre-deployment planning and post-deployment verification of a wireless network. During pre-deployment, a site survey identifies areas with problematic signal attenuation and determines optimal access point positions and density. After deployment, a site survey audits coverage, roaming performance, and any RF issues. The type of wireless devices and their usage, as well as desired packet performance, influence coverage area size and cell overlap requirements.
The document discusses the history and evolution of wireless networking technologies. It covers early wireless technologies like cellular networks and infrared, as well as modern standards like Wi-Fi, Bluetooth, WiMAX, and 3G/4G cellular networks. It also discusses different types of wireless networks including WLANs, wireless mesh networks, personal area networks, and wireless wide area networks. Security concerns with wireless technologies are also addressed.
The document provides an overview of wireless networking, including:
- Descriptions of common wireless standards such as 802.11b, 802.11a, and 802.11g.
- Considerations for deploying a wireless network such as effective range, interference issues, and security measures.
- Potential applications of wireless networking and how it can connect to existing wired networks.
- Factors to assess for a wireless deployment including building structure and existing technologies.
This document provides an overview of key concepts in wireless networking, including:
1) Modulation techniques like DSSS, OFDM, and MIMO used by various 802.11 standards to encode data onto radio waves.
2) Wireless topologies including WPAN, WLAN, WMAN, and WWAN of different ranges, and components like bridges, repeaters, and outdoor networks.
3) Factors that affect radio frequency (RF) signals like absorption, scattering, reflection and how they can degrade wireless performance.
4) Cisco's unified wireless architecture which uses controllers and lightweight access points to centrally manage networks.
This document discusses basic concepts of wireless networking and wireless LAN configuration. It begins by explaining how wireless networking allows for mobile productivity as users can access the network from any location. It then discusses why wireless networking is used, including flexibility and reduced costs compared to wired networks. Finally, it covers wireless LAN components like wireless access points that connect wireless clients to the wired LAN, and wireless network interface cards that allow devices to connect to the network wirelessly.
Wi-Fi uses radio waves to transmit data through the air according to the IEEE 802.11 standards. It allows computers and other devices to connect to the internet and each other wirelessly. The 802.11 standards include 802.11b, 802.11a, 802.11g, 802.11n, and 802.11ac which provide different speeds and capabilities. Wi-Fi networks use access points, wireless cards, and security protocols like WEP, WPA, and WPA2 to transmit data securely between devices over short ranges.
WiFi or wireless fidelity allows devices to connect to the Internet without wires. It uses wireless technology to send and receive data within the range of a wireless access point. Typical users of WiFi include travelers, businesspeople, students and anyone with a laptop. Common places to install WiFi access points include airports, hotels, coffee shops and malls to provide Internet access to mobile users. Key components of a WiFi network include wireless cards or adapters, access points, routers, and an Internet connection. WiFi standards like 802.11b, 802.11g and 802.11a define specifications for wireless networking.
A router could connect multiple CCTV cameras over a local area network (LAN) and provide access to the camera feeds from outside the LAN. The router would assign IP addresses to the cameras, allow remote access through port forwarding, and provide network address translation (NAT) to share a public IP address. It could also segment the CCTV network from other devices for improved security and prioritize camera traffic to ensure smooth video streaming. Properly configured, a router is key infrastructure to network multiple IP cameras and monitor their feeds remotely over the internet.
This document evaluates the performance of different IEEE 802.11 WiFi standards (b, a, g, n) for Voice over WiFi (VoFi) applications. It simulates these standards using OPNET and analyzes key performance indicators like throughput, delay, and packet drop. The results show that 802.11n has the highest throughput of nearly 2Gbps, lowest delay, and shortest period of packet drops and retransmissions, indicating it is best suited for real-time applications like VoFi that require high bandwidth and reliability. The document concludes 802.11n is the most suitable standard for critical real-time applications based on its superior performance in the simulations.
Ethernet was developed in the 1970s and is now widely used to connect devices over various network cables. Ethernet media converters allow communication between different cable types like fiber optic and copper. They provide advantages like easy installation, cost effectiveness, increased speeds over longer distances, and less electromagnetic interference than direct copper connections. Media converters are useful for expanding existing networks or building new higher speed networks.
The network provides 100Mbps bandwidth with the ability to upgrade to 1000Mbps. Wireless access is provided via 802.11g. Three servers provide Active Directory, file sharing, intranet, email, and more. Switches support 10/100/1000Mbps Ethernet with fiber optic and wireless connectivity. Wireless devices support 108Mbps throughput with high-gain antennas providing coverage up to 2 miles. Dell servers run Windows Server 2003 and include a file/web server with RAID5 storage. Workstations have Core 2 Duo CPUs and run Windows Vista with Office 2003. Point of sale terminals have Celeron CPUs and run Windows with barcode scanners. Installation will take 10 days to set up wiring and systems
eWorld is a nationwide wireless broadband provider that has been operating successfully since 2001. They provide reliable, secure connectivity through a digital network based on standardized technologies and redundant power sources. Their network supports various wireless standards including 802.11, 802.11a, 802.11b, and 802.11g to provide point-to-point and point-to-multipoint broadband solutions in licensed frequency bands. They plan future expansions including DSL, WiMax, and business messaging services.
This document is the user guide for Linksys' Instant Broadband EtherFast Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint. It includes information on installing and configuring the router, as well as appendices that describe troubleshooting, glossary terms, and instructions for setting up a VPN connection between the router and a Windows PC. The router provides firewall protection, up to two IPSec VPN tunnels, URL filtering, and other security features to connect a small network to broadband Internet or an Ethernet backbone.
The document provides an overview of key features of the IEEE 802.11ac wireless networking standard. It discusses improvements over 802.11n including support for wider channel bandwidth up to 160MHz, denser 256QAM modulation, up to 8 spatial streams, and multi-user MIMO. These enhancements enable dramatically higher speeds up to 3.47Gbps and support for more clients. The standard aims to provide gigabit speeds and reliable delivery of high quality video and other bandwidth intensive content to multiple devices simultaneously.
This document provides information about the Belkin SURF N150 Wireless Modem Router.
It has multi-beam technology that provides powerful wireless signal strength and coverage throughout the home. Setup is easy, taking only 3 steps to connect to the internet at speeds up to 150Mbps.
The modem router connects your devices to the internet and each other wirelessly. It supports common wireless standards and has security features like WPA/WPA2 encryption.
Member Name: Alvin Tse
Service Site: Pui Tak Center
Site Location: Chicago, IL
Project Description:
Alvin Tse spent his TechMission Corps service year with the Pui Tak Center in Chicago, IL. At Pui Tak Center, Alvin helped establish various tech based resources with a specific emphasis on online maintenance.
Alvin's final project is a PowerPoint presentation on the various functions of wireless networks. It details various types of networks and illustrates their functions.
The document discusses plans to launch an online marketplace for Latin American sellers. It notes the large potential market size of $73 billion in Latin American e-commerce by 2015. It proposes that the new marketplace could capture 8% of this market. The business model would involve a 5% commission on sales and featuring top sellers. Key milestones in the launch plan include launching with 1000 stores in late 2011, expanding to new countries and teams in 2012-2013, and seeking $500,000 in funding to support growth.
El documento describe cómo alcanzar la excelencia sostenida en las organizaciones mediante el modelo EFQM de excelencia, que incluye nueve criterios divididos en agentes facilitadores y resultados. El modelo proporciona una referencia para gestionar la organización por procesos, lograr resultados equilibrados, responder a las expectativas de los clientes y alcanzar éxito a través de las personas.
A personal area network (PAN) connects devices within an individual's immediate vicinity, such as computers and phones. There are two types of PANs: wired and wireless. Wired PANs connect devices physically using cables, while wireless PANs connect devices through infrared, Bluetooth, or home radio frequency without cables. Wireless PANs are established automatically once devices are within range of each other. PANs provide quick and easy data transfer but have limited range and compatibility between devices. They are used in applications like healthcare, transportation hubs, education, the military, homes, and offices.
The document describes the AirLive N.TOP 802.11n Ceiling Mount Long Range PoE AP. It is a wireless access point disguised as a smoke detector for discreet placement in public areas. It supports data rates up to 300Mbps and uses Power over Ethernet for easy installation. The AP offers long range coverage through its high power output, multiple wireless modes for different uses, and management through a utility software.
The document summarizes the key aspects of ZigBee, a wireless networking standard targeted for low-power devices. It describes ZigBee's technical goals of low data rates, long battery life, and secure networking. It also outlines ZigBee's device types, network formation process, and traffic modes including beacon-enabled and non-beacon modes.
A site survey is important for both pre-deployment planning and post-deployment verification of a wireless network. During pre-deployment, a site survey identifies areas with problematic signal attenuation and determines optimal access point positions and density. After deployment, a site survey audits coverage, roaming performance, and any RF issues. The type of wireless devices and their usage, as well as desired packet performance, influence coverage area size and cell overlap requirements.
The document discusses the history and evolution of wireless networking technologies. It covers early wireless technologies like cellular networks and infrared, as well as modern standards like Wi-Fi, Bluetooth, WiMAX, and 3G/4G cellular networks. It also discusses different types of wireless networks including WLANs, wireless mesh networks, personal area networks, and wireless wide area networks. Security concerns with wireless technologies are also addressed.
The document provides an overview of wireless networking, including:
- Descriptions of common wireless standards such as 802.11b, 802.11a, and 802.11g.
- Considerations for deploying a wireless network such as effective range, interference issues, and security measures.
- Potential applications of wireless networking and how it can connect to existing wired networks.
- Factors to assess for a wireless deployment including building structure and existing technologies.
This document provides an overview of key concepts in wireless networking, including:
1) Modulation techniques like DSSS, OFDM, and MIMO used by various 802.11 standards to encode data onto radio waves.
2) Wireless topologies including WPAN, WLAN, WMAN, and WWAN of different ranges, and components like bridges, repeaters, and outdoor networks.
3) Factors that affect radio frequency (RF) signals like absorption, scattering, reflection and how they can degrade wireless performance.
4) Cisco's unified wireless architecture which uses controllers and lightweight access points to centrally manage networks.
This document discusses basic concepts of wireless networking and wireless LAN configuration. It begins by explaining how wireless networking allows for mobile productivity as users can access the network from any location. It then discusses why wireless networking is used, including flexibility and reduced costs compared to wired networks. Finally, it covers wireless LAN components like wireless access points that connect wireless clients to the wired LAN, and wireless network interface cards that allow devices to connect to the network wirelessly.
Wi-Fi uses radio waves to transmit data through the air according to the IEEE 802.11 standards. It allows computers and other devices to connect to the internet and each other wirelessly. The 802.11 standards include 802.11b, 802.11a, 802.11g, 802.11n, and 802.11ac which provide different speeds and capabilities. Wi-Fi networks use access points, wireless cards, and security protocols like WEP, WPA, and WPA2 to transmit data securely between devices over short ranges.
WiFi or wireless fidelity allows devices to connect to the Internet without wires. It uses wireless technology to send and receive data within the range of a wireless access point. Typical users of WiFi include travelers, businesspeople, students and anyone with a laptop. Common places to install WiFi access points include airports, hotels, coffee shops and malls to provide Internet access to mobile users. Key components of a WiFi network include wireless cards or adapters, access points, routers, and an Internet connection. WiFi standards like 802.11b, 802.11g and 802.11a define specifications for wireless networking.
A router could connect multiple CCTV cameras over a local area network (LAN) and provide access to the camera feeds from outside the LAN. The router would assign IP addresses to the cameras, allow remote access through port forwarding, and provide network address translation (NAT) to share a public IP address. It could also segment the CCTV network from other devices for improved security and prioritize camera traffic to ensure smooth video streaming. Properly configured, a router is key infrastructure to network multiple IP cameras and monitor their feeds remotely over the internet.
This document evaluates the performance of different IEEE 802.11 WiFi standards (b, a, g, n) for Voice over WiFi (VoFi) applications. It simulates these standards using OPNET and analyzes key performance indicators like throughput, delay, and packet drop. The results show that 802.11n has the highest throughput of nearly 2Gbps, lowest delay, and shortest period of packet drops and retransmissions, indicating it is best suited for real-time applications like VoFi that require high bandwidth and reliability. The document concludes 802.11n is the most suitable standard for critical real-time applications based on its superior performance in the simulations.
Ethernet was developed in the 1970s and is now widely used to connect devices over various network cables. Ethernet media converters allow communication between different cable types like fiber optic and copper. They provide advantages like easy installation, cost effectiveness, increased speeds over longer distances, and less electromagnetic interference than direct copper connections. Media converters are useful for expanding existing networks or building new higher speed networks.
The network provides 100Mbps bandwidth with the ability to upgrade to 1000Mbps. Wireless access is provided via 802.11g. Three servers provide Active Directory, file sharing, intranet, email, and more. Switches support 10/100/1000Mbps Ethernet with fiber optic and wireless connectivity. Wireless devices support 108Mbps throughput with high-gain antennas providing coverage up to 2 miles. Dell servers run Windows Server 2003 and include a file/web server with RAID5 storage. Workstations have Core 2 Duo CPUs and run Windows Vista with Office 2003. Point of sale terminals have Celeron CPUs and run Windows with barcode scanners. Installation will take 10 days to set up wiring and systems
eWorld is a nationwide wireless broadband provider that has been operating successfully since 2001. They provide reliable, secure connectivity through a digital network based on standardized technologies and redundant power sources. Their network supports various wireless standards including 802.11, 802.11a, 802.11b, and 802.11g to provide point-to-point and point-to-multipoint broadband solutions in licensed frequency bands. They plan future expansions including DSL, WiMax, and business messaging services.
This document is the user guide for Linksys' Instant Broadband EtherFast Cable/DSL Firewall Router with 4-Port Switch/VPN Endpoint. It includes information on installing and configuring the router, as well as appendices that describe troubleshooting, glossary terms, and instructions for setting up a VPN connection between the router and a Windows PC. The router provides firewall protection, up to two IPSec VPN tunnels, URL filtering, and other security features to connect a small network to broadband Internet or an Ethernet backbone.
The document provides an overview of key features of the IEEE 802.11ac wireless networking standard. It discusses improvements over 802.11n including support for wider channel bandwidth up to 160MHz, denser 256QAM modulation, up to 8 spatial streams, and multi-user MIMO. These enhancements enable dramatically higher speeds up to 3.47Gbps and support for more clients. The standard aims to provide gigabit speeds and reliable delivery of high quality video and other bandwidth intensive content to multiple devices simultaneously.
This document provides information about the Belkin SURF N150 Wireless Modem Router.
It has multi-beam technology that provides powerful wireless signal strength and coverage throughout the home. Setup is easy, taking only 3 steps to connect to the internet at speeds up to 150Mbps.
The modem router connects your devices to the internet and each other wirelessly. It supports common wireless standards and has security features like WPA/WPA2 encryption.
Member Name: Alvin Tse
Service Site: Pui Tak Center
Site Location: Chicago, IL
Project Description:
Alvin Tse spent his TechMission Corps service year with the Pui Tak Center in Chicago, IL. At Pui Tak Center, Alvin helped establish various tech based resources with a specific emphasis on online maintenance.
Alvin's final project is a PowerPoint presentation on the various functions of wireless networks. It details various types of networks and illustrates their functions.
The document discusses plans to launch an online marketplace for Latin American sellers. It notes the large potential market size of $73 billion in Latin American e-commerce by 2015. It proposes that the new marketplace could capture 8% of this market. The business model would involve a 5% commission on sales and featuring top sellers. Key milestones in the launch plan include launching with 1000 stores in late 2011, expanding to new countries and teams in 2012-2013, and seeking $500,000 in funding to support growth.
El documento describe cómo alcanzar la excelencia sostenida en las organizaciones mediante el modelo EFQM de excelencia, que incluye nueve criterios divididos en agentes facilitadores y resultados. El modelo proporciona una referencia para gestionar la organización por procesos, lograr resultados equilibrados, responder a las expectativas de los clientes y alcanzar éxito a través de las personas.
la mia esperienza per far comprendere alle mie creature che non ero io a fare differenze tra loro ma erano loro diversi.
I figli sono come i fiori, differenti. Diverso è il comportamento dei genitori nei loro confronti.
Children are like flowers. Different. Different behavior of parents for a child and for the other. Support, encouragement, braking, control, reward, deny
Matthew Bivens has extensive experience as an emergency physician, paramedic, journalist, and writer. He currently works as an attending physician in emergency medicine at two hospitals, one in Boston and one in southern Massachusetts. He also serves as the medical director for six EMS companies. Bivens has published scholarly work, manages the emergency preparedness committee at one of the hospitals, and lectures widely to medical students, residents, and paramedics.
This document summarizes research being conducted on the potential for introducing Bikram yoga, a type of hot yoga practiced in 40.6°C and 40% humidity, to Saint Petersburg, Russia. The researchers will use ethnographic research, interviews, focus groups, and surveys to understand the experiences people seek from yoga and saunas/banyas, explore combining the two, and determine interest and optimal pricing for hot yoga classes. Risks include small samples and subjective observations. The goal is to understand Bikram yoga's viability in Saint Petersburg by studying participant experiences qualitatively and quantitatively.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In just one sentence, it pitches the idea of using Haiku Deck to easily create engaging slideshows.
The document describes the logo and branding for a proposed soccer team called the BlackJackets located in Las Vegas, Nevada. The team name and logo are inspired by Las Vegas' history as a gambling city as well as the yellow jacket, a fierce insect. The master logo depicts a yellow jacket made up of playing card suits. Alternate logos showcase a striped spade mimicking a yellow jacket and poker chips ringing the logo. Short marketing slogans leverage blackjack and card game terminology to promote the BlackJackets.
1. The document discusses a lesson plan about environmental impacts in Ip ́-\m-S≥. It describes several environmental impacts such as the effect of litter and waste on water quality and wildlife habitats.
2. The lesson aims to help students understand these environmental impacts, recognize how they affect the balance of nature in Ip ́-\m-S≥, and identify ways to reduce harmful impacts.
3. A variety of teaching methods are used including discussions, activities, and assessments to engage students and achieve the learning outcomes.
WiMAX Networks was once popular in 2009 and quickly faded away.
The case examined in 1 of Pakistan WiMAX operators showed how the network failed to meet customer expectation
Picnik is a photo editing website created by Bitnik, an 18 person team located in Seattle. Picnik aims to make photo editing fun and accessible by allowing users to enhance photos across various social networks and websites. Picnik has over 30 million monthly visitors and averages 18 minutes of use per session. It has received numerous industry awards and integrates with many large websites.
Space Policy - Vis Viva - 10th bi-weekly meeting - August 7, 2013Society Vis Viva
This presentation was given by Philippe Carous, LLM Air and Space Law, at the 10th bi-weekly meeting of the Society of Space Professionals Vis Viva.
It shall be pointed out that our meetings are about more than just slides—they are about the interaction of our Fellows. Vis Viva offers a forum for the active discussion of space topics, and so our talks are lively get-together with a permanent conversation of the speaker and the audience. Since just slides cannot get this across, we kindly invite you to join one of our bi-weekly activities.
Google is a large-scale web search engine prototype designed to index and search the web more efficiently than existing systems. It makes heavy use of hyperlink structure (PageRank) and anchor text to produce higher quality search results. The paper describes Google's design goals of improving search quality for large web collections through leveraging hypertextual information. It also aims to advance academic research on web search through publishing technical details and providing access to web-scale datasets.
Ieee institute of electrical and electronics engineershimanshu yadav
The document discusses the IEEE (Institute of Electrical and Electronics Engineers), which is an international non-profit organization dedicated to advancing technology for the benefit of humanity. It has over 419,000 members in 160 countries. The document then summarizes several key IEEE standards including 802.3 Ethernet, 802.11 WiFi, 802.15 Bluetooth, 802.16 WiMAX, and provides details on technologies such as CSMA/CD, FHSS, DSSS, and MIMO.
The document outlines a presentation on wireless technology and migrating to wireless LANs. It discusses key topics such as the IEEE 802.11 standards, securing wireless LANs, and considerations for cutting the cord to wired networks. An overview of wireless LAN technologies like 802.11a, 802.11b, 802.11g is provided along with their advantages and disadvantages. The presentation also covers wireless LAN fundamentals, security issues, and best practices for planning a wireless network migration through access point placement and site surveys.
Wireless Technologies
Presented by
Sean Shields
And
Gabriel Taveras
Definition
Term “Wireless” refers to all the communications sent and received without wires.
So Wireless Technology
Means a technology that use radio waves to transmit or receive data.
Wi-Fi
Bluetooth
Cellular
Wimax
TYPES OF
TECHNOLOGIES
INTRODUCTION:
Wireless Fidelity termed as Wi-Fi uses the IEEE 802.11 specification to create a wireless local-area network.
A Wi-Fi network basically consists of a wired connection to the Internet that leads to a wireless router for transmutation and receiving data from individual devices, connecting them not only to the outside world but also to each other.
HOW WIFI WORKS?
1. All devices use a wireless adapter to convert request into a radio signal and broadcasts it into the air.
2. The Wi-Fi device, or wireless router, picks up the signal and translates it back into its original form.
3. The router passes the request to the Internet using a hardwired connection.
4. The Internet returns the requested information to the router across the same connection.
5. The router converts the information into a radio signal and broadcasts it into the air.
6. The computer or cell phone's wireless adapter picks up the information and displays it on your screen
WIFI TOPOLOGIES
Wifi have following topologies
AP-based topology (Infrastructure Mode)
Peer-to-peer topology (Ad-hoc Mode)
Point-to-multipoint bridge topology
Wi Fi Network
Wireless Standards
802.11
In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the first WLAN standard. They called it 802.11 after the name of the group formed to oversee its development. Unfortunately, 802.11 only supported a maximum network bandwidth of 2 Mbps - too slow for most applications. For this reason, ordinary 802.11 wireless products are no longer manufactured.
Wireless Standards
802.11b
IEEE expanded on the original 802.11 standard in July 1999, creating the 802.11b specification. 802.11b supports bandwidth up to 11 Mbps, comparable to traditional Ethernet.
Wireless Standards
802.11a
Supports bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz. This higher frequency compared to 802.11b shortens the range of 802.11a networks. The higher frequency also means 802.11a signals have more difficulty penetrating walls and other obstructions.
Wireless Standards
802.11g
Attempts to combine the best of both 802.11a and 802.11b. 802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4 Ghz frequency for greater range. 802.11g is backwards compatible with 802.11b, meaning that 802.11g access points will work with 802.11b wireless network adapters and vice versa.
Wireless Standards
802.11n
The newest IEEE standard in the Wi-Fi category is 802.11n.
802.11n connections support data rates of over 100 Mbps. 802.11n also offers somewhat better range over earlier Wi-Fi standards due to its increased signal.
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of wireless technology, outlines the 802.11 standards including 802.11a, 802.11b, 802.11g, security features, and challenges. It also summarizes how WLANs integrate with existing networks through access points and allow roaming between coverage areas.
The document discusses wireless LAN (WLAN) and wireless metropolitan area network (WMAN) technologies. It provides an overview of the IEEE 802.11 and 802.16 standards for WLANs and WMANs respectively, outlining the goals and evolution of the standards over time to support higher data rates and new frequencies of operation. It also discusses wireless personal area network (WPAN) technologies including Bluetooth and how they differ from WLANs in terms of power levels, coverage areas, and supported devices.
The document discusses wireless local area networks (WLANs). It describes how an access point is used to connect wireless devices like laptops and desktops to a wired local area network. The access point bridges the wireless and wired networks. It also discusses the benefits of WLANs like providing mobility and reducing installation costs compared to wired networks.
Wi-Fi and WiMAX are wireless networking technologies. Wi-Fi uses radio waves to connect devices in local areas like homes and offices, while WiMAX can connect devices over longer distances of up to 30 miles, making it suitable for connecting entire cities. Both technologies transmit data using radio signals in specific frequency ranges and support various transmission speeds and encryption standards. Wi-Fi devices connect directly to a local wireless router or access point, while WiMAX uses wireless towers similar to cellular networks to connect multiple users over wider areas.
The document discusses WiMax (Worldwide Interoperability for Microwave Access), which is a wireless broadband technology defined by the IEEE 802.16 standard. It can deliver broadband speeds up to 75 Mbps within a range of 50 kilometers. The standard supports point-to-multipoint and mesh networks. WiMax operates in several frequency bands between 2-66 GHz and provides non-line-of-sight connectivity. It is used for broadband internet access, VoIP, IPTV, and cellular networks.
The document discusses wireless networks and wireless local area networks (WLANs). It provides an overview of wireless technology, IEEE 802.11 WLAN standards including 802.11a, 802.11b, security considerations, and migrating to wireless networks. The key topics covered include how wireless LANs work and differ from wired LANs, common network topologies, hardware requirements, and performance comparisons between the different 802.11 standards.
Wireless networking technology uses wireless stations like computers or devices with radios to transmit and receive data without wires. There are two main types of wireless networks: infrastructure networks with an access point that devices connect to and ad-hoc peer-to-peer networks without an access point where devices connect directly. Wireless networks use radio frequencies and transmission methods like frequency hopping spread spectrum or direct sequence spread spectrum to transmit data over the air. Newer standards are developing technologies like MIMO that use multiple antennas to improve wireless network performance and speeds.
Wi-Fi is a wireless technology that uses radio frequencies to transmit data through the air based on the 802.11 standard. Security for Wi-Fi networks has evolved from the basic WEP encryption to WPA and WPA2, which provide stronger encryption through the use of keys, authentication, and integrity checks. Additional security measures for Wi-Fi networks include blocking the SSID, changing default passwords, MAC filtering, firewalls, VPNs, and protocols like Kerberos that authenticate nodes and check for modifications to data.
The document discusses various IEEE 802.11 wireless networking standards including their release dates, operating frequencies, data rates, and typical indoor and outdoor ranges. It provides details on 802.11, 802.11a, 802.11b, 802.11g, and 802.11n standards, explaining their key characteristics and technological developments over time to increase wireless network performance and capabilities.
This is a presentation discussing wireless adapters, what they are, how they work, wireless standards they use, speeds they can reach, and how secure they are.
When setting up and maintaining Wi-Fi home networks, consider these tips for maximizing the security of the computers and data on these networks.
Securing Wireless Networks by maximizing the security of 802.11 standard and minimizing the Risk on Wireless network
Access point or wireless router general questions tell youIT Tech
A wireless access point, or AP, adds Wi-Fi capability to a wired network by bridging traffic from workstations onto an Ethernet LAN.
A wireless router combines broadband router capabilities--such as acting as the gateway between the internet and a local area network--as well as wireless AP features, inside a single device.
...
A wireless local area network (WLAN) uses radio waves to wirelessly connect devices within a local area like a home or office, often including an access point to connect to the internet. WLANs use specialized protocols at the physical and data link layers and integrate into existing networks through access points. Common WLAN standards include IEEE 802.11b, 802.11a, and 802.11g which provide speeds up to 11Mbps, 54Mbps, and 54Mbps respectively in the 2.4GHz and 5GHz bands. Real-time services like voice can be transported over WLANs using protocols like PCF but may require echo cancellation to meet latency requirements.
Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc.
In this module, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures you can put in place to protect against such attacks.
The document discusses various wireless networking technologies and standards. It provides details on:
- Types of wireless technologies including Wi-Fi, Bluetooth, RFID, WiMax.
- Wireless networking standards set by IEEE including 802.11, 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac.
- Components of wireless networks such as routers, gateways, antennas, and security methods like WEP, WPA, WPA2.
1. Wireless Home Networks
A home network or home area network (HAN) is a local area network (LAN)used in residential areas
for communication between digital devices, but it it is used to connect small numbers of digital
devices, computers laptops , tablets, pdas,mobile phones and printers. An important and the most
common function is the sharing of Internet access. If an ISP have only one IP address, a router is
used it has network address translation (NAT), proxy server software and a network firewall, this
allows several computers and other electronic devices to share the IP address.
Network
A network is defined as a system that is used to connect multiple electronic devices together, so
they can exchange the information with each other. Thenetwork are not just established for
offices but is also used for homes because in many homes there is more than one pc.
Any kind of data can be shared on network either files, photos videos or music, and the most
effective use is if u have broadband service at your home then many computers can be connected
to one single connection through wireless network which was not possible earlier or few years back.
http://technet.microsoft.com/en-us/library/cc757419(v=ws.10).aspx
There are two types of network: wired or wireless
Wired Network:
As it is obvious from the name that in wired networks devices are connected with physical wires or
cables on wired network each device should have an Ethernet (RJ-45) port. Each computer then
connects to the router with the help of Ethernet cable or there are few other ways to connect
devices in wired network.
Wireless home network:
Because of this wireless technology the wireless home networks have become friendlierthen
it used to be, it means you no longer have to carry yards of cables from room to room to get
connected.In wireless we just need a wireless router and an adapter that is usually installed on
all modern devices or PCs that you want to connect. Mostly in modern devices the wireless
adapter is built in .
Also wireless networking devices don't need to have ports, but just need antennas, which are
mostly now a days hidden inside the device itself. To have a Wi-Fi connection, an access
point is needed and a Wi-Fi client.
Access Point: In order to broad cast the Wi-Fi signal for Wi-Fi clients an An Access point
(AP) is used . For each wireless network, you need an access point. Although an AP can be
purchased separately, and can be connected to a router or a switch to add Wi-Fi support to a
wired network, but now a days the routers available in shops has a built-in AP. Some routers
even come with more than one access point and are called dual-band AP.
We can think of a Wi –Fi network as a device that has an invisible network port and invisible
cable and the length of this unseen cable is equal to the range of the Wi-Fi.
2. Wi-Fi client:
A Wi-Fi client we means that it includes devices that detects the signal broadcast by an AP,
and they also maintain the connection.A Wi-Fi connection in which AP is used is called the
Infrastructure mode.All laptops, smartphones, and tablets on the market come have built-in
Wi-Fi capability. But if any device doesn’t have its easy to upgrade by using USB or either
by PCIE Wi-Fi adapter.
Difference between Router and Access Point
To connect computer or other devices on to the networkwe need Hub , switches, routers, and
access points, although the all used to connect the different devices to a network but each of
them have different functions.
Routers
Computer communicates using router and the information exchanged between two networks
by using router for eg between home network and the Internet. Routers can be wireless or
wired. For connecting just computers we can use hub and switches but if you want to connect
all your computers to the internet using one modem we need to use router or modem with
built-in router. Routers provide built-in security, it has a a firewall. Routers are more
expensive than hubs and switches.
Access points
Access point is used to provide wireless access to a wired Ethernet network. An access point
is connected into a hub, switch, or router and then sends the wireless signals. This enables
computers and devices to connect to a wired network wirelessly. By using Access points
you can move from one place to another and have wireless access to a network. If you want
to give wirless connection to your computers and you have a router that enables wireless
capability, you don't need an access point. There is no buitin technology in Access points for
sharing Internet connections. To share an Internet connection, you must have an access point
into a router or a modem with a built-in router.
As we know that wireless network offers two modes of configuration Adhoc and infra
structure mode
Ad hoc mode:
In adhoc mode it is not centralizedall computer are connected to each other in peer to peer
connection , Adhoc mode is ok for few devices to connect but for more connections it
becomes complicated and its difficult to manage.
In Adhoc mode the network has no structure and fixed node.No access point is needed in this
mode it is useful for short duration network for small group of people.
3. Infrastructure Mode:
The connections made by infrastructure mode is centralised . For infra structure mode we
need a wireless access point (AP).In order to make the connection to the the WLAN, we
must configure the AP and all wireless clients to use the same SSID. The AP is then
connected to the wired network inorder to establish a wireless clients access. Additional APs
can be added to increase the coverage area and support more clients.The access point has
either one or more antennas that is used to connect u to the wireless nodes.
Frequency bands: These bands are the radio frequencies used by the Wi-Fi standards:
2.4GHz and 5GHz. The 2.4GHz band is currently the most popular, meaning, it's used by
most existing network devices. That plus the fact that home appliances, such as cordless
phones, also use this band, makes its signal quality generally worse than that of the 5GHz
band due to oversaturation and interference.
IEEE 802.11
It is a standard and was found in 1987 to start the standardization of spread spectrum WLAN
that is used in ISM band, and is used for the communication between computers using
WLAN in the 2.4, 3.6, 5 and 60 GHz frequency bands. They are established by the IEEE
LAN/MAN Standards Committee (IEEE 802). Initially it was released in 1997 and had to go
through various changes. It is used by devices To establish wireless networks.
4. IEEE Frequency/Medium Speed Modes Transmission Spread
Standard Range Spectrum
802.11 2.4GHz RF 1 to Ad 20-60 feet DSSS
2Mbps hoc/infrastructure indoors. FSSS
802.11a 5GHz Up to Ad 35 to 115 feet OFDM
54Mbps hoc/infrastructure indoors.
802.11b 2.4GHz Up to Ad 35 to 115 feet DSSS
11Mbps hoc/infrastructure indoors.
802.11g 2.4GHz Up to Ad 38 to 125 feet OFDM,
54Mbps hoc/infrastructure indoors. DSSS
802.11n 2.4GHz/5GHz Up to Ad 70 TO 130 feet OFDM
600Mbps hoc/infrastructure indoors.
FHSS, DSSS, OFDM, and 802.11 Standards
The standard set by the 802.11 had given two standards of spread spectrum DSSS and FSSS,there is
no difference in terms of the speed but only use different technologies.
DSSS
It operates at the radio frequency band of 2.4 GHz and has a data rate of 1 0r 2 Mbps. There is also
an option for fall back which is 1Mbps this is for just in case if the environment is crowded.
FSSS:
The 802.11 standard also used DSSS and had a data rate of 2Mbps this has a fall back i.e 1Mbps for a
crowded environment .
This shows that the data rate is same for both schemes the only difference is in their spread spectrum
technology.
Below all the details are summed up in the following table.
IEEE Standard RF Used Spread Spectrum Data Rate (in Mbps)
802.11 2.4GHz DSSS 1 or 2
802.11 2.4GHz FHSS 1 or 2
802.11a 5GHz OFDM 54
802.11b 2.4GHz DSSS 11
802.11g 2.4Ghz DSSS 54
802.11n 2.4/5GHz OFDM 600 (theoretical)
< Back Page 4 of 14 Next >
5. As seen above that there are different wireless standards set be IEEE 802.11 and it depends
on these standards that how devices communicate inThere are several different wireless
standards that control how devices communicate. The main ones are IEEE 802.11b and IEEE
802.11g – ‘b’ and ‘g’ for short.
The major difference between these two devices is speed.
A wireless ‘b’ device can transfer data at a maximum speed of 11Mbps, while the newer ‘g’
standard can reach speeds of up to 54Mbps.Now adays most common wireless equipment
now available is 802.11g. Although the two standards are compatible with each other,but an
802.11g network may run more slowly if it is connectedto a 802.11b.
Although 802.11 operates at 2.4GHz ISM band no licence is required. and the maximum
data rate is 54 Mbits/s and the net throughput for this is 19 Mbits/s.
Modulation Scheme:
The modulation scheme used in 802.11 is OFDM(Orthogonal Frequency Division
Multiplexing)
Data rate is 54Mbps but it can do automatic rate selection (with fallback to 48, 36, 24, 12, 11,
6, 5.5, 2, 1Mbps).
*They operate in both
point-to-access point (infrastructure mode)
point-to-point (ad hoc mode, peer-to-peer networking).
IEEE 802.11N:
IT is also compatible with IEEE 802.11 b/g
802.11g is the third modulation standard for wLANs. It has a frequency range of about 2.4
GHz band (like 802.11b) but operates at a data rate of 54 Mbit/s, or the net throughput is
about 19 Mbit/s which is similar to 802.11a core, except for some additional legacy overhead
which are there for backward compatibility. The hardware of 802.11g is backwards
compatible with 802.11b hardware. Details of making b and g work well together occupied
much of the lingering technical process. In an 802.11g network, because of the presence of a
legacy 802.11b participant the overall speed of 802.11g network will be reduced.
The modulation scheme used in 802.11g is orthogonal frequency-division multiplexing
(OFDM) copied from 802.11a with data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbit/s,
and reverts to CCK (like the 802.11b standard) for 5.5 and 11 Mbit/s and
DBPSK/DQPSK+DSSS for 1 and 2 Mbit/s. Even though 802.11g operates in the same
frequency band as 802.11b, it can achieve higher data rates because of its heritage to
802.11a
Wireless Channels
wireless nodes communicate with each other by using radio frequency signals in the
ISM (Industrial, Scientific, and Medical) band between 2.4 GHz and 2.5 GHz. Each
neighbouring channel is 5MHz from next channel inorder to avoid interference. due to the
spread spectrum effect of the signals, a node
The original 802.11 had two standards DSSS and FSSS, although they both offers the same speed but
6. use different spread spectrum. The first one used used the 2.4GHz radio frequency band and operated at
a 1 or 2Mbps data rate. Since this original standard, wireless implementations have favored DSSS.
The second 802.11 standard used DSSS and had a data rate of 2Mbps peak data rate with an option of
fallbacki.e 1Mbps if the environment is noisy. 802.11, 802.11b, and 802.11g use DSSS. This means that
the underlying modulation scheme is similar between each standard, all DSSS systems to have 2, 11, and
54Mbps 802.11 standards
If we send signals using a particular channel it will utilize frequency spectrum which is12.5
MHz above center channel frequency and 12.5MHZ below the center frequency. If two
different wireless network use neighbouring channel e.g channel 1 and channel 2 it will
cause iinterference with each other. So inorder to avoid interference use two different
channels that has a difference in frequency range for example channel 1 and channel 6 it will
reduce the cross-talk and give better performance.
IEEE 802.11 Protocols and Technologies:
*The IEEE802.11-related protocols and technologies are briefly defined here :
•802.11. The IEEE 802.11 wireless standard had specify the defination of both es the physical
layer and the media access control (MAC) layer.
•Wi-Fi Protected Access (WPA). WPA is an interim standard which was used until the IEEE
802.11i standard was officialy approved. These standards, were used to be a replacement for
the WEP standard, they use various method of data encryption and network authentication.
•Wireless Auto Configuration. The Wireless Auto Configuration feature was introduced in
Windows XP and Windows Server 2003 had an ability to detect the wireless network to
which a connection has to be established, it is based on configured preferences or default
settings.
802.11 Protocol
The IEEE 802 standards committee defines two separate layers, the Logical Link Control
(LLC) and media access control, for the Data-Link layer of the OSI model. The IEEE 802.11
wireless standard defines the specifications for the physical layer and the media access
control (MAC) layer that communicates up to the LLC layer, as shown in the following
figure.
802.11 and OSI Model
7. The components in the 802.11 architecture lie in the MAC sublayer of data-link layer or
the physical layer.
802.11 MAC Frame
802.11 MAC Frame Format
Frame Control Field
The Frame Control field, actually contains the control information which is used to define
the type of 802.11 Mac frame . the number in the following figure represents the no of bits
for each field.
Frame Control Field
Protocol Version
It gives the current version of the 802.11 protocol that is used. When STAs receive this
value they use it to determine if the frame that has been received its version protocol is
supported.
Type
There are three type of frame fields they are control, data, and management.
8. Subtype There are different number of subtype fields for each frame type . Each type
perform certain function and for each type their subtype also perform the specific function.
To DS and From DSIt is only used in data type frames of STAs that belongs to an AP its
function I sthat it indicates whether the frame is going to or leaving from the DS (distributed
system.
More Fragmentsused to give information if more fragments of the frame are still have to
come they can be data or management type..
Retry It basically takes the decision whether data or management frame needs to be
retransmitted or not.
Power ManagementThis indicates the mode of sending STA which could be either in
active mode or power-save mode.
More DataWhen STA is in power save mode it indicates STA the there are more frames to
send by AP. It is also used for APs to show that there are broadcast/multicast frames arestill
there to send.
WEPrepresents if encryption and authentication are used in the frame. for all data frames
and management frames it has to be set.
Ordershow that frames received has to be processed in order.
Duration/ID Field
This is used for control type frames,but should not be used with those who have a subtype of
power save Poll.
Address Fields
There are different address fields depending upon the the frame type, the four address fields
has a combination of the following address types:
BSS Identifier (BSSID). BSSID uniquely identifies each BSS. When the frame is from an STA in
an infrastructure BSS, the BSSID is the MAC address of the AP. When the frame is from a STA
in an IBSS, the BSSID is the randomly generated, locally administered MAC address of the
STA that initiated the IBSS.
Destination Address (DA) It is the MAC address of the destination.
Source Address (SA). It is the MAC address of the original source .
Receiver Address (RA). RA shows the MAC address of the next STA to receive the frame on
the wireless medium.
9. Transmitter Address (TA). The fram transmitted by STA its transmitted address is
represented by TA.
Sequence Control
It is divided into two subfields, the fragment number field and the sequence number field.
Sequence Control Field
Sequence Number shows the sequence number of individual frame.
Fragment Number when each frame of a segmented frame is sent it represent
the sequence number of each frame.
Frame Body
The frame body holds the data or information which is present in either management type or
data type frames.
Frame Check Sequence
On all fields of MAC header and the frame body field the cyclic redundancy
check(CRC) is performed by the transmitting STA to generate the FCS value.
Then this same CRC calculation to determine the values of FCS field to verify if
there is any error occurred in the frame during transmission.
802.11 PHY Sublayer
IEEE 802.11 At the physical (PHY) sublayer, defines a different encoding and transmission
schemes for wireless communications, the most commonly used transmission schemes are
the Frequency Hopping Spread Spectrum (FHSS), Direct Sequence Spread Spectrum (DSSS),
and Orthogonal Frequency Division Multiplexing (OFDM).
Standards for 802.11 at the PHY Layer
10. 802.1X Protocol
The IEEE 802.1X this standard was designed for wired Ethernet networks, it has been
adapted to 802.11 wireless LANs.
Components of 802.1X
{{{{{{{{{{{*Port access entity. A LAN port, also known as port access entity (PAE), is the
logical entity that supports the IEEE 802.1X protocol that is associated with a port. A PAE can
adopt the role of the authenticator, the supplicant, or both.
Authenticator. For wireless connections,for wireless AP’s it acts as the logical LAN port,
through this Authenticator wireless clients in infrastructure mode gain access to other
wireless clients in the network and the wired network.
*Supplicant. For wireless connections, the supplicant is the logical LAN port on a wireless
LAN network adapter that requests access to the other wireless clients and the wired
network by associating with and then authenticating itself to an authenticator.
Whether for wireless connections or wired Ethernet connections, the supplicant and
authenticator are connected by a logical or physical point-to-point LAN segment.
**Authentication server. To verify the credentials of the supplicant, the authenticator uses
an authentication server, which checks the credentials of the supplicant on behalf of the
authenticator and then responds to the authenticator, indicating whether or not the
supplicant is authorized to access the authenticator's services.}}
The following figure shows these components for a wireless LAN network.
Components of IEEE 802.1X Authentication
11. The authentication server can be the following:
A component of the access point. In this case, the AP must be configured with the sets of
user credentials corresponding to the supplicants that will be attempting to connect (it is
typically not implemented for wireless APs).
A separate entity. In this case, the AP forwards the credentials of the connection attempt to
a separate authentication server. Typically, a wireless AP uses the Remote Authentication
Dial-In User Service (RADIUS) protocol to send a connection request message to a RADIUS
server.
12. BLUETOOTH AND PERSONAL AREA NETWORK:
After the boom of Wireless technology for past 2 decades the ,
manufacturers realized that it would be great for consumer to implement
the wireless technology for removing the cumbersome wire that connects
the devices, as consumer find it irritating to move along wire it provide
people mobility within small range these included devices like (wireless
mouse, keyboard, printers, scannners, head phones ) this wireless gives
these devices invisible short distance connection.
Bluetooth is an standard it is used by most of the electronic appliances
manufacturers. In order to communicate devices in Bluetooth it use that
ad-hoc –Mode approach and allow the communication within the range of
10 m.It is designed to have communication over short distance It supports a
large number of channels and power levels.
Bluetooth radio interface basics
The bluetooth operates in the 2.4 GHz ISM band, Bluetooth uses Frequency Hopping Spread
Spectrum (FHSS) techniques with the carrier modulated using Gaussian Frequency Shift
Keying (GFSK).
Since there is interference that has to be avoided by bluetooth the reason for this is the
devices like microwave and corless telephone or baby monitors these are operated on ISM
band . As we discussed above Bluetooth transmission use FHSS so it remains on one
frequency only for a short period of time as the frequency keep on hopping on different
frequency channels , but if incase any error occurs in transmission it has to resend the data
again , and at this time it might be using a difeerent channel which is more likely interference
free. The hopping rate is standardized that is of 1600 hops per second, and the system hops
over all frequencies that are available by using a pre-determined pseudo-random hop
sequence it depends on the Bluetooth address of the master node in the network.
Bluetooth channels and frequencies
The Bluetooth channels are spaced 1 MHz apart, it startsfrom 2 402 MHz to 2 480 MHz.we
can determine this as 2401 + n, where n varies from 1 to 79.
Bluetooth channels is arranged in such a way that Bluetooth channels gives a guard band of
2 MHz at the bottom of the band and 3.5 MHz at the top.
13. Bluetooth pairing
To establish a connectivity between two devices by using a bluetooth a scheme called
bluetooth pairing I sused. Once Bluetooth pairing has established two devices may
communicate with each other.
Bluetooth pairing is simple is done manuallyonce u activate the bluetooth on your device
then bluetooth link can be seen on the phone and other devices within range is also seen and
connect to any device that is known to you that you wanted to connect on.
The Bluetooth pairing process is typically triggered automatically the first time a device
receives a connection request from a device with which it is not yet paired. In order that
Bluetooth pairing may occur, a password has to be exchanged between the two devices. This
password or "Passkey" as it is more correctly termed is a code shared by both Bluetooth
devices. It is used to ensure that both users have agreed to pair with each other.
.