This is a power point Presentation about wifi and the various standards of IEEE used for the transmission of data over the wireless network.
You must have encountered with term 802.11.a/b/g/n of your wireless network device.
This presentation will break the ice for your knowledge about those terms, their standards and how they get connected.
Let's Get Started.
This is a power point Presentation about wifi and the various standards of IEEE used for the transmission of data over the wireless network.
You must have encountered with term 802.11.a/b/g/n of your wireless network device.
This presentation will break the ice for your knowledge about those terms, their standards and how they get connected.
Let's Get Started.
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
This presentation gives brief description of Wi-Fi Technolgy, standards, applications,topologies, how Wi-Fi network works, security,advantages and innovations.
Wireless phone standards have a life of their own. You can tell, because they are spoken of reverently in terms of generations. There's Great-Granddad, whose pioneering story pre-dates cellular; Grandma and Grandpa 1G, or analog cellular, Mom and Dad 2G, or digital cellular; 3G wireless, 4G, 5G and so on. This is a survey report PPT on these technology.
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
This presentation gives brief description of Wi-Fi Technolgy, standards, applications,topologies, how Wi-Fi network works, security,advantages and innovations.
Wireless phone standards have a life of their own. You can tell, because they are spoken of reverently in terms of generations. There's Great-Granddad, whose pioneering story pre-dates cellular; Grandma and Grandpa 1G, or analog cellular, Mom and Dad 2G, or digital cellular; 3G wireless, 4G, 5G and so on. This is a survey report PPT on these technology.
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...IJERA Editor
The past several years have witnessed a rapid development in the wireless network area. So far wireless networking has been focused on high-speed and long range applications. Zigbee technology was developed for a Wireless Personal Area Networks (WPAN), aimed at control and military applications with low data rate and low power consumption. Zigbee is a standard defines the set of communication protocols for low-data-rate short-range wireless networking. Zigbee-based wireless devices operate in 868 MHz, 915 MHz, and 2.4 GHz frequency bands. The maximum data rate is 250K bits per second. Zigbee is mainly for battery-powered applications where low data rate, low cost, and long battery life are main requirements. This paper explores Verilog design for various blocks in Zigbee Transmitter architecture for an acknowledgement frame. The word digital has made a dramatic impact on our society. Developments of digital solutions have been possible due to good digital system design and modeling techniques. Further developments have been made and introduced VLSI in order to reduce size of the architecture, to improve speed of operation, improvements in predictability of the circuit behavior. Digital Zigbee Transmitter comprises of Cyclic Redundancy Check, Bit-to-Symbol block, Symbol-to-chip block, Modulator and Pulse shaping block. The work here is to show how we can design Zigbee transmitter with its specifications by using Verilog with less number of slices and Look up tables (LUTs).
The Differences Between Bluetooth, ZigBee and WiFiMostafa Ali
Understanding Differences Between Bluetooth, ZigBee and WiFi.
It's not about what is the best it's just a description, the best you have to choose for your project what is suitable more?
Wireless Technologies
Presented by
Sean Shields
And
Gabriel Taveras
Definition
Term “Wireless” refers to all the communications sent and received without wires.
So Wireless Technology
Means a technology that use radio waves to transmit or receive data.
Wi-Fi
Bluetooth
Cellular
Wimax
TYPES OF
TECHNOLOGIES
INTRODUCTION:
Wireless Fidelity termed as Wi-Fi uses the IEEE 802.11 specification to create a wireless local-area network.
A Wi-Fi network basically consists of a wired connection to the Internet that leads to a wireless router for transmutation and receiving data from individual devices, connecting them not only to the outside world but also to each other.
HOW WIFI WORKS?
1. All devices use a wireless adapter to convert request into a radio signal and broadcasts it into the air.
2. The Wi-Fi device, or wireless router, picks up the signal and translates it back into its original form.
3. The router passes the request to the Internet using a hardwired connection.
4. The Internet returns the requested information to the router across the same connection.
5. The router converts the information into a radio signal and broadcasts it into the air.
6. The computer or cell phone's wireless adapter picks up the information and displays it on your screen
WIFI TOPOLOGIES
Wifi have following topologies
AP-based topology (Infrastructure Mode)
Peer-to-peer topology (Ad-hoc Mode)
Point-to-multipoint bridge topology
Wi Fi Network
Wireless Standards
802.11
In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the first WLAN standard. They called it 802.11 after the name of the group formed to oversee its development. Unfortunately, 802.11 only supported a maximum network bandwidth of 2 Mbps - too slow for most applications. For this reason, ordinary 802.11 wireless products are no longer manufactured.
Wireless Standards
802.11b
IEEE expanded on the original 802.11 standard in July 1999, creating the 802.11b specification. 802.11b supports bandwidth up to 11 Mbps, comparable to traditional Ethernet.
Wireless Standards
802.11a
Supports bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz. This higher frequency compared to 802.11b shortens the range of 802.11a networks. The higher frequency also means 802.11a signals have more difficulty penetrating walls and other obstructions.
Wireless Standards
802.11g
Attempts to combine the best of both 802.11a and 802.11b. 802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4 Ghz frequency for greater range. 802.11g is backwards compatible with 802.11b, meaning that 802.11g access points will work with 802.11b wireless network adapters and vice versa.
Wireless Standards
802.11n
The newest IEEE standard in the Wi-Fi category is 802.11n.
802.11n connections support data rates of over 100 Mbps. 802.11n also offers somewhat better range over earlier Wi-Fi standards due to its increased signal.
Competing technologies have a time-to-market advantage
- Many mobile operators have invested heavily in 3G systems.
Multiple technologies will co-exist as they meet different needs
Mobility may become a powerful differentiating factor when competing with DSL or Cable
-Definition of Information Security
-Evolution of Information Security
-Basics Principles of Information Security
-Critical Concepts of Information Security
-Components of the Information System
-Balancing Information Security and Access
-Implementing IT Security
-The system Development Life cycle
-Security professional in the organization
Cloud and Virtualization (Using Virtualization to form Clouds)Rubal Sagwal
-Cloud
-Underlying technology pieces from which cloud computing -Infrastructure is built
-Characteristics of Cloud
-Types of cloud services (SaaS, IaaS and PaaS)
-Cloud deployment models
-Virtualization
-Using Virtualization to form Clouds
Entity type
Entity sets
Attributes and keys
Relationship model
Mapping Constraints
The ER Model
Cardinality Constraints
Generalization, Specialization and Aggregation
ER Diagram & Database design with the ER Model
Introduction
Relational Model
Concepts
Characteristics
Database Models, Client-Server Architecture, Distributed Database and Classif...Rubal Sagwal
Introduction to Data Models
-Hierarchical Model
-Network Model
-Relational Model
-Client/Server Architecture
Introduction to Distributed Database
Classification of DBMS
Overview of Data Base Systems Concepts and ArchitectureRubal Sagwal
Data
Data Hierarchy
Introduction of Database
DBMS
Characteristics of database approach
Advantages of DBMS
Data models
Schemas, Three schema architecture:
-The external level
-The conceptual level and
-The internal level.
Data Independence
Database languages and Interfaces
Roles of Database Administrator
Principles of Virtualization - Introduction to Virtualization Software Rubal Sagwal
Introduction to virtualization Software:
-Introduction to Vsphere
-ESXi
- Types of Hyper-visor
-VCenter Server
-Vsphere client
-Introduction to HYPER-V.
Prepare and Manage Remote Applications through Virtualization Rubal Sagwal
Prepare and manage remote applications:
-Configuring application sharing
-Package applications for deployment by using RemoteApp
-Installing and configuring the RD Session Host Role Service on the server
Managing Virtual Hard Disk and Virtual Machine ResourcesRubal Sagwal
Managing Virtual Hard Disk and Virtual Machine Resources:
-Creating and managing virtual hard disks
-Configuring virtual machine resources including network resources
-Preparing host machines
-Create, deploy, and maintain images.
Configure and Manage Virtualization on different Platforms Rubal Sagwal
Configure and Manage Virtualization on different Platforms:
-Configure the BIOS to support hardware virtualization
-Install and configure Windows Virtual PC
-Installing Windows Virtual PC on various platforms (32-bit, 64-bit)
Virtualization Uses - Server Consolidation Rubal Sagwal
Server Consolidation.
Why do we need Server Consolidation and what are the outcomes?
Benefits of Server consolidation
How to do server consolidation?
Server product architecture:
1. Virtual Machine
2. Guest OS
3. Host OS
What are server consolidation consideration?
Types of server consolidation.
Benefits of VMware over Server Consolidation.
VMware infrastructure.
Disaster recovery and backup plan.
Basics of Virtualization:
What is Virtual and Virtualization?
Why do we need Virtualization?
Benefits of Virtualization.
Before and after Virtualization.
How Virtualization works?
Virtual Machines.
VMware
Types of Virtualization:
1. Server Virtualization
2. Storage virtualization
3. I/O virtualization
4. Network virtualization
5. Client virtualization
6. Desktop virtualization
7. Application Virtualization
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
4. Wireless Technology
• Wireless – No physical transmission device –
telecommunications in which electromagnetic waves
(rather than some form of wire) carry the signal over
part or all of the communication path.
• For Example:
• Wi-Fi
• Mobile phones
• GPS (Global positioning System)
• Cordless mouse/ keyboard
• Home entertainment system
• Wireless Ethernet – Bluetooth
https://www.youtube.com/watch?time_continue=42&v=u21lNHy0
72U
ADAD 4
5. Benefits of Wireless Technology
• Advantage of a wireless network over a wired – users
can move around freely within the area of the network
with their laptops, handheld devices etc and get an
internet connection.
• Users are also able to share files and other resources
with other devices that are connected to the network
without having to be cabled to a port.
• Not having to lay lots of cables and put them through
walls etc – less cost.
• Wireless networks can sometimes handle a larger
amount of users because they are not limited by a
specific number of connection ports.
ADAD 5
7. Wireless Network
• IEEE 802.11 – Specification for wireless LAN
defined by IEEE – Covers physical and data link
layer.
ADAD 7
Architecture
BSS (Basic Service
Set)
ESS (Extended
Service Set)
8. 1. BSS (Basic Service Set)
• Building block of a wireless LAN.
• Made of – Stationary or Mobile service station –
Assess Point ( AP, Optional central base station).
• Without an AP – Ad-hoc Architecture
• Stand-alone network, can’t send data to other BSSs.
• Can form a network without the need of an AP.
• With an AP – Infrastructure Network
ADAD 8
10. 2. ESS (Extended Service Set)
• Made up of two or more BSS with Aps.
• Connected through a distribution system (Wired
LAN).
• Distribution system – connects the APs in the BSSs.
ADAD 10
11. 2. ESS (Extended Service Set)
• It uses two station – Mobile and Stationary.
• Mobile station are normal station inside a BSS
• Stationary station are AP stations that are part of wired
LAN.
• When BSS are connected, the stations within reach
of one another can communicate without the use
of an AP.
ADAD 11
12. Station Type
1. No-Transition: either stationary (not moving) or
moving only inside a BSS.
2. BSS-transition: move from one BSS to another,
but the movement is confined inside one ESS.
3. ESS-transition: can move from one ESS to
another.
ADAD 12
14. Wireless Access Point
• A wireless access point (WAP) – a hardware device
or configured node on a local area network (LAN).
• That allows wireless capable devices and wired
networks to connect through a wireless standard,
including Wi-Fi or Bluetooth.
• WAPs feature antennae, which facilitate
connectivity between devices and the Internet or a
network.
ADAD 14
15. Wireless NIC
• A Wireless Network Card performs basically the
same operation as a normal network card, except
instead of operating through network cables, it
operates wirelessly.
• A W-NIC, just like other NICs, works on the Layer 1
and Layer 2 of the OSI Model.
• This card uses an antenna to
communicate via microwave radiate
on.
ADAD 15
16. Advantages of Wireless-NIC
• SETUP:
• Because wireless networks operate wirelessly, they
become very easy to setup and change.
• SECURITY:
• Today the security that wireless routers and cards offer,
is great, if you are willing to just go about setting it up.
• CHEAPER:
• wireless is so much cheaper than wired.
• SPEED:
• with the latest progressions, wireless is quickly
becoming just as fast or faster than their wired
counterparts.
ADAD 16
18. IEEE 802.11
• IEEE 802.11 is a set of media access control (MAC) (also
known as data link layer) and physical layer (PHY)
specifications for implementing wireless local area
network(WLAN).
• They are the world's most widely used wireless computer
networking standards, used in most home and office
networks to allow laptops, printers, and smartphones to talk
to each other and access the Internet without connecting
wires.
• They are created and maintained by the Institute of
Electrical and Electronics
Engineers (IEEE) LAN/MAN Standards Committee (IEEE 802).
• The base version of the standard was released in 1997, and
has had subsequent amendments.
ADAD 18
19. IEEE 802.11a
• The IEEE 802.11a standard is capable of producing a high level of
performance, and being in a band which is used less than the levels of
interference are less allowing high levels of performance.
• The 802.11a standard is alphabetically the first of the variety of 802.11
standards that are in widespread use today.
• Although 802.11a was ratified at the same time as 802.11b, it never
caught on in the same way despite the fact that it offered a much higher
data transfer rate.
ADAD 19
PARAMETER VALUE
Date of standard approval July 1999
Maximum data rate
(Mbps)
54
Typical data rate (Mbps) 25
20. IEEE 802.11b
ADAD 20
• IEEE 802.11b was the first wireless LAN standard to be
widely adopted and built in to many laptop computers
and other forms of equipment.
• The standard for 802.11b was ratified by the IEEE in July
1999 and the idea for wireless networking quickly
caught on with many W-Fi hotspots being set up so
that business people could access their emails and surf
the Internet as required when they were travelling.
• It was only after 802.11 was ratified and products
became available that W-Fi took off in a large way. Wi-
Fi hotspots were set up in many offices, hotels and
airports and the idea of using portable laptop
computers while travelling became far easier.
21. IEEE 802.11b Specifications
ADAD 21
• 802.11b boasts an impressive performance. It is
able to transfer data with raw data rates up to 11
Mbps, and has a good range, although not when
operating at its full data rate.
PARAMETER VALUE
Date of standard
approval
July 1999
Maximum data rate
(Mbps)
11
Typical data rate
(Mbps)
5
22. IEEE 802.11g
ADAD 22
• After the introduction of Wi-Fi with the 802.11a and
802.11b standards, the 802.11b standard became the most
popular operating in the 2.4 GHz ISM band.
• This standard proved to be the most popular despite the
faster operating speed of the a variant of the standard
because the cost of producing chips to operate at 2.4 GHz
were much less than ones to run at 5 GHz.
• In order to provide the higher speeds of 802.11a while
operating on the 2.4 GHz ISM band, a new standard was
introduced. Known as 802.11g, it soon took over from the b
standard.
• Even before the standard was ratified, 802.11g products
were available on the market, and before long it became the
dominant Wi-Fi technology.
23. IEEE 802.11g Specification
ADAD 23
• The 802.11g standard provided a number of
improvements over the 802.11b standard which
was its predecessor. The highlights of its
performance are given in the table below.
IEEE 802.11G WI-FI FEATURES
FEATURE 802.11G
Date of standard approval June 2003
Maximum data rate (Mbps) 54
Modulation CCK, DSSS, or OFDM
RF Band (GHz) 2.4
Channel width (MHz) 20
25. 1. WEP (Wired Equivalent Privacy)
ADAD 25
• Wired Equivalent Privacy (WEP) is a security
algorithm for IEEE 802.11 wireless networks.
• Specified in the IEEE Wireless Fidelity (Wi-Fi)
standard, 802.11b, that is designed to provide a
wireless local area network (WLAN) with a level of
security and privacy comparable to what is usually
expected of a wired LAN.
• A wired local area network (LAN) is generally protected
by physical security mechanisms (For example,
controlled access to a building) that are effective for a
controlled physical environment, but may be ineffective
for WLANs because radio waves are not necessarily
bound by the walls containing the network.
26. WEP (Wired Equivalent Privacy)
ADAD 26
• WEP seeks to establish similar protection to that offered by
the wired network's physical security measures by
encrypting data transmitted over the WLAN.
Data encryption protects the vulnerable wireless link
between clients and access points.
• Once this measure has been taken, other typical LAN
security mechanisms such as password protection, end-to-
end encryption, virtual private networks (VPNs),
and authentication can be put in place to ensure privacy.
27. 2. Wi-Fi Protected Access (WPA)
ADAD 27
• Wi-Fi Protected Access (WPA) is a security standard for
users of computing devices equipped
with wireless internet connections.
• WPA was developed by the Wi-Fi Alliance to provide
more sophisticated data encryption and better
user authentication than Wired Equivalent Privacy
(WEP), the original Wi-Fi security standard.
• The new standard, which was ratified by the IEEE in
2004 as 802.11i , was designed to be backward-
compatible with WEP to encourage quick, easy
adoption. Network security professionals were able to
support WPA on many WEP-based devices with a
simple firmware update.
28. Wi-Fi Protected Access (WPA)
ADAD 28
• WPA has discrete modes for enterprise users and for
personal use.
• The enterprise mode, WPA-EAP, uses more stringent 802.1x
authentication with the Extensible Authentication Protocol
(EAP).
• The personal mode, WPA-PSK, uses preshared keys for
simpler implementation and management among
consumers and small offices.
• Enterprise mode requires the use of an authentication
server.
• WPA's encryption method is the Temporal Key Integrity
Protocol (TKIP).
29. Wi-Fi Protected Access (WPA)
ADAD 29
• TKIP includes a per-packet mixing function, a message integrity check,
an extended initialization vector and a re-keying mechanism.
• WPA provides strong user authentication based on 802.1x and the
Extensible Authentication Protocol (EAP). WPA depends on a central
authentication server, such as RADIUS, to authenticate each user.
• Software updates that allow both server and client computers to
implement WPA became widely available during 2003.
• Access points can operate in mixed WEP/WPA mode to support both
WEP and WPA clients. However, mixed mode effectively provides only
WEP-level security for all users.
• Home users of access points that use only WPA can operate in a special
home mode in which the user need only enter a password to be
connected to the access point. The password will trigger authentication
and TKIP encryption.
30. 3. 802.1X
ADAD 30
• The 802.1X standard is designed to enhance the
security of wireless local area networks (WLANs)
that follow the IEEE 802.11 standard.
• 802.1X provides an authentication framework for
wireless LANs, allowing a user to be authenticated
by a central authority.
• 802.1X uses an existing protocol, the Extensible
Authentication Protocol (EAP, RFC 2284), that works
on Ethernet, Token Ring, or wireless LANs, for
message exchange during the authentication
process.
31. 802.1X
ADAD 31
• In a wireless LAN with 802.1X, a user (known as the supplicant)
requests access to an access point (known as the authenticator).
• The access point forces the user (actually, the user's client
software) into an unauthorized state that allows the client to send
only an EAP start message.
• The access point returns an EAP message requesting the user's
identity.
• The client returns the identity, which is then forwarded by the
access point to the authentication server, which uses an
algorithm to authenticate the user and then returns an accept or
reject message back to the access point.
• Assuming an accept was received, the access point changes the
client's state to authorized and normal traffic can now take place.