3. WIRELESS TOPOLOGY BSS IBSS ESS In this site survey we are using more than one access points so the topology we are using is the Extended Service Set i.e. ESS.
4. Available Technologies 802.11 a IEEE 802.11a-1999 or 802.11a is an amendment to the IEEE 802.11 specification that added a higher data rate of up to 54 Mbit/s using the 5 GHz band. It has seen widespread worldwide implementation, particularly within the corporate workspace.
5.
6.
7. Technology Used Technology for this layout & as per the requirements of the University I am using is 802.11 a.
13. Access Points In computer networking, a wireless access point (WAP) is a device which allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router (via a wired network), and can relay data between the wireless devices (such as computers or printers) and wired devices on the network.
14. Why three A.P’s? The technology we are using i.e. 802.11 a has a disadvantage which is this technology has short range. So to have good speed & also better connectivity we need three access points. 1- LABS. 2- Horizontal Corridor. 3- Vertical Corridor.
15. Security The Wireless security standard we are using is 802.11i or WPA 2. WPA stands for WIFI Protected Access.Which is the latest protocol for wireless & has many good features like AES,TKIP etc.
16. Features of WPA 2 AES (Advance Encryption). Authentication. Dynamic Key Management. Successor of WPA.
17. Advanced Encryption System The new 802.11i standard, or WPA2, supports the 128-bit Advanced Encryption Standard (AES) . AES supports 128-bit, 192-bit and 256-bit keys.
18. Authentication This new standard specifies use of Temporal Key Integrity Protocol (TKIP) and 802.1x/EAP with mutual authentication . 802.1x authentication and key-management features for the various 802.11 Wi-Fi flavors.
19. Control Accessing WLAN SSID A service set identifier (SSID) is a name that identifies a particular 802.11 wireless LAN. A client device receives broadcast messages from all access points within range advertising their SSIDs. The client device can then either manually or automatically—based on configuration—select the network with which to associate. The SSID can be up to 32 characters long. As the SSID displays to users, it normally consists of human-readable characters.
20.
21.
22. Thank You Agreeta Sharma M.Sc Networking Management’12 Amity University