SlideShare une entreprise Scribd logo
1  sur  15
CAUTION
• This Slide is self operated. Please do
not use mouse/directional keys to
skip the slide. They will automatically
after some time. Still any problem
Use mouse click.
( Depending upon the size ).
Total Length of the slide - 2.03 minutes
Wireless
Networks
Author- Paritosh Sankhla
What is Wireless?
• A wireless LAN or WLAN is a wireless local area
network that uses radio waves as its carrier.
• The last link with the users is wireless, to give a
network connection to all users in a building or
campus.
• The backbone network usually uses cables
Common Topologies
The wireless LAN connects to a wired LAN
• There is a need of an access point that bridges wireless LAN traffic into the
wired LAN.
• The access point (AP) can also act as a repeater for wireless nodes, effectively
doubling the maximum possible distance between nodes.
Common Topologies
Complete Wireless Networks
• The physical size of the network is determined by the maximum reliable
propagation range of the radio signals.
• Referred to as ad hoc networks
• Are self-organizing networks without any centralized control
• Suited for temporary situations such as meetings and conferences.
How do wireless LANs work?
Wireless LANs operate in almost the same way as
wired LANs, using the same networking protocols
and supporting the most of the same
applications.
How are WLANs Different?
• They use specialized physical and data link protocols
• They integrate into existing networks through access
points which provide a bridging function
• They let you stay connected as you roam from one
coverage area to another
• They have unique security considerations
• They have specific interoperability requirements
• They require different hardware
• They offer performance that differs from wired LANs.
Physical and Data Link Layers
Physical Layer:
• The wireless NIC takes frames of data from the
link layer, scrambles the data in a
predetermined way, then uses the modified data
stream to modulate a radio carrier signal.
Data Link Layer:
• Uses Carriers-Sense-Multiple-Access with
Collision Avoidance (CSMA/CA).
Integration With Existing Networks
• Wireless Access Points (WAPs) - a small device
that bridges wireless traffic to your network.
• Most access points bridge wireless LANs into
Ethernet networks, but Token-Ring options are
available as well.
Integration With Existing Networks
Security
• In theory, spread spectrum radio signals are
inherently difficult to decipher without knowing
the exact hopping sequences or direct sequence
codes used
• The IEEE 802.11 standard specifies optional
security called "Wired Equivalent Privacy"
whose goal is that a wireless LAN offer privacy
equivalent to that offered by a wired LAN. The
standard also specifies optional authentication
measures.
Hardware
• PC Card, either with integral antenna or with
external antenna/RF module.
• ISA Card with external antenna connected by
cable.
• Handheld terminals
• Access points
Hardware
CISCO Aironet 350 series Wireless Handheld Terminal
Semi Parabolic Antenna BreezeCOM AP
Security Problems
• Security features in Wireless products are frequently
not enabled.
• Use of static WEP keys (keys are in use for a very long
time). WEP does not provide key management.
• Cryptographic keys are short.
• No user authentication occurs – only devices are
authenticated. A stolen device can access the network.
• Identity based systems are vulnerable.
• Packet integrity is poor.
Thank You For Watching.
By – Paritosh Sankhla

Contenu connexe

Tendances

types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
Midhun Menon
 

Tendances (20)

2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
 
Lan and Its Components
Lan and Its ComponentsLan and Its Components
Lan and Its Components
 
Setting up a network
Setting up a networkSetting up a network
Setting up a network
 
Internet service provider and network backbone
Internet service provider and network backboneInternet service provider and network backbone
Internet service provider and network backbone
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Network switch
Network switchNetwork switch
Network switch
 
Campus networks best practices core and edges network
Campus networks best practices core and edges networkCampus networks best practices core and edges network
Campus networks best practices core and edges network
 
Network Trends
Network TrendsNetwork Trends
Network Trends
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 
Chapter 1 How to Design a LAN
Chapter 1 How to Design a LANChapter 1 How to Design a LAN
Chapter 1 How to Design a LAN
 
Networking introduction
Networking introductionNetworking introduction
Networking introduction
 
Vision
VisionVision
Vision
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 
Connecting devices
Connecting devicesConnecting devices
Connecting devices
 
Unit02
Unit02Unit02
Unit02
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
 
Trends in Networking
Trends in NetworkingTrends in Networking
Trends in Networking
 
PPT Backbone And Networks
PPT Backbone And NetworksPPT Backbone And Networks
PPT Backbone And Networks
 
NETWORKING PPT
NETWORKING PPTNETWORKING PPT
NETWORKING PPT
 
Network devices
Network devicesNetwork devices
Network devices
 

Similaire à Wireless networks

Wireless Networks 120719.ppt
Wireless Networks 120719.pptWireless Networks 120719.ppt
Wireless Networks 120719.ppt
AbyThomas54
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
Aneesh Nelavelly
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
Amit Shaw
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
hemant Hrhemant5
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
tardeep
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
JigsAshley
 

Similaire à Wireless networks (20)

Wifi security
Wifi securityWifi security
Wifi security
 
Wifi wireless networks
Wifi wireless networksWifi wireless networks
Wifi wireless networks
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.ppt
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless Networks 120719.ppt
Wireless Networks 120719.pptWireless Networks 120719.ppt
Wireless Networks 120719.ppt
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
Networks
NetworksNetworks
Networks
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
Computer network
Computer networkComputer network
Computer network
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Typesofcomputer 130403035730-phpapp02
Typesofcomputer 130403035730-phpapp02Typesofcomputer 130403035730-phpapp02
Typesofcomputer 130403035730-phpapp02
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
MVA slides lesson 3
MVA slides lesson 3MVA slides lesson 3
MVA slides lesson 3
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 

Dernier

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Dernier (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Wireless networks

  • 1. CAUTION • This Slide is self operated. Please do not use mouse/directional keys to skip the slide. They will automatically after some time. Still any problem Use mouse click. ( Depending upon the size ). Total Length of the slide - 2.03 minutes
  • 3. What is Wireless? • A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. • The last link with the users is wireless, to give a network connection to all users in a building or campus. • The backbone network usually uses cables
  • 4. Common Topologies The wireless LAN connects to a wired LAN • There is a need of an access point that bridges wireless LAN traffic into the wired LAN. • The access point (AP) can also act as a repeater for wireless nodes, effectively doubling the maximum possible distance between nodes.
  • 5. Common Topologies Complete Wireless Networks • The physical size of the network is determined by the maximum reliable propagation range of the radio signals. • Referred to as ad hoc networks • Are self-organizing networks without any centralized control • Suited for temporary situations such as meetings and conferences.
  • 6. How do wireless LANs work? Wireless LANs operate in almost the same way as wired LANs, using the same networking protocols and supporting the most of the same applications.
  • 7. How are WLANs Different? • They use specialized physical and data link protocols • They integrate into existing networks through access points which provide a bridging function • They let you stay connected as you roam from one coverage area to another • They have unique security considerations • They have specific interoperability requirements • They require different hardware • They offer performance that differs from wired LANs.
  • 8. Physical and Data Link Layers Physical Layer: • The wireless NIC takes frames of data from the link layer, scrambles the data in a predetermined way, then uses the modified data stream to modulate a radio carrier signal. Data Link Layer: • Uses Carriers-Sense-Multiple-Access with Collision Avoidance (CSMA/CA).
  • 9. Integration With Existing Networks • Wireless Access Points (WAPs) - a small device that bridges wireless traffic to your network. • Most access points bridge wireless LANs into Ethernet networks, but Token-Ring options are available as well.
  • 11. Security • In theory, spread spectrum radio signals are inherently difficult to decipher without knowing the exact hopping sequences or direct sequence codes used • The IEEE 802.11 standard specifies optional security called "Wired Equivalent Privacy" whose goal is that a wireless LAN offer privacy equivalent to that offered by a wired LAN. The standard also specifies optional authentication measures.
  • 12. Hardware • PC Card, either with integral antenna or with external antenna/RF module. • ISA Card with external antenna connected by cable. • Handheld terminals • Access points
  • 13. Hardware CISCO Aironet 350 series Wireless Handheld Terminal Semi Parabolic Antenna BreezeCOM AP
  • 14. Security Problems • Security features in Wireless products are frequently not enabled. • Use of static WEP keys (keys are in use for a very long time). WEP does not provide key management. • Cryptographic keys are short. • No user authentication occurs – only devices are authenticated. A stolen device can access the network. • Identity based systems are vulnerable. • Packet integrity is poor.
  • 15. Thank You For Watching. By – Paritosh Sankhla