SlideShare une entreprise Scribd logo
1  sur  32
Wi-Fi
Wireless Communications
What is Wi-Fi?
   The standard for wireless local area networks
    (WLANs). It’s like a common language that all
    the devices use to communicate to each other.
    If you have a standard, people can make all
    sorts of devices that can work with each other.
   It’s actually IEEE 802.11, a family of standards.
    The IEEE (Eye-triple-E, Institute of Electrical and Electronics
    Engineers Inc.) is a non-profit, technical professional association of
    more than 360,000 individual members in approximately 175
    countries. The Wireless Ethernet Compatibility Alliance started the
    Wi-Fi--wireless fidelity--certification program to ensure that
    equipment claiming 802.11 compliance was genuinely
    interoperable.
US Frequency Bands
Band                            Frequency range
UHF ISM                         902-928 MHz
S-Band                          2-4 GHz
S-Band ISM                      2.4-2.5 GHz
C-Band                          4-8 GHz
C-Band satellite downlink       3.7-4.2 GHz
C-Band Radar (weather)          5.25-5.925 GHz
C-Band ISM                      5.725-5.875 GHz
C-Band satellite uplink         5.925-6.425 GHz
X-Band                          8-12 GHz
X-Band Radar (police/weather)   8.5-10.55 GHz
Wi-Fi Standards

Standard Speed    Freq band   Notes
 802.11   2 Mbps   2.4 GHz   (1997)
  802.11a 54 Mbps   5 GHz     (1999)
  802.11b 11 Mbps   2.4 GHz
  802.11g 54 Mbps   2.4 GHz
ISM Band
ISM stands for industrial, scientific, and medical.
  ISM bands are set aside for equipment that is
  related to industrial or scientific processes or is
  used by medical equipment. Perhaps the most
  familiar ISM-band device is the microwave oven,
  which operates in the 2.4-GHz ISM band. The
  ISM bands are license-free, provided that
  devices are low-power. You don't need a license
  to set up and operate a wireless network.
Wireless LAN Networks
WLAN Architecture—Ad Hoc Mode
    Ad-Hoc mode: Peer-to-peer setup where
    clients can connect to each other directly.
    Generally not used for business networks.
Ad Hoc Structure
 Mobile stations communicate to each
  other directly.
 It’s set up for a special purpose and for a
  short period of time. For example, the
  participants of a meeting in a conference
  room may create an ad hoc network at the
  beginning of the meeting and dissolve it
  when the meeting ends.
WLAN Architecture--Mesh
 Mesh: Every client in
  the network also acts
  as an access or relay
  point, creating a “self-
  healing” and (in
  theory) infinitely
  extensible network.
     Not yet in widespread
      use, unlikely to be in
      homes.
WLAN Architecture—Infrastructure Mode




                       To Wired Network
Infrastructure network
 There is an Access Point (AP), which becomes the
  hub of a “star topology.”
 Any communication has to go through AP. If a
  Mobile Station (MS), like a computer, a PDA, or a
  phone, wants to communicate with another MS, it
  needs to send the information to AP first, then AP
  sends it to the destination MS
 Multiple APs can be connected together and handle
  a large number of clients.
 Used by the majority of WLANs in homes and
  businesses.
Comparison of Two Structures

              Infrastructure   Ad hoc
Expansion          X
Flexibility                       X
Control            X
Routing            X
Coverage           X
Reliability                       X
Extended Service Area
Antennas
All WLAN equipment comes with a built-in
  omni-directional antenna, but some select
  products will let you attach secondary
  antennas that will significantly boost
  range.
Antennas, continued
   Antennas come in all
    shapes and styles:
       Omni-directional:
            Vertical Whip
            Ceiling mount
       Directional:
            Yagi (“Pringles can”)
            Wall mounted panel
            Parabolic dish
How Can Several Users Communicate
Simultaneously?
As we have discussed, there is a difference
  between a network designed for voice
  conversation and one for data exchange.
     For voice conversations, like telephone and cell phone
      calls, each person has a dedicated channel during the
      entire conversation. (3G and 4G cell phones are
      somewhat different, as we will explain later.)
     For data exchange, many users can share one channel.
       A user sends information when no one else is sending.
     New technologies try to accommodate both voice and
      data transmissions, as we will discuss in this course.
Share one channel in data
communication
   In data communication, data are grouped into packets/frames.
    Each packet/frame contains a number of bits of information.
   Devices (phones, computers, etc.) don’t communicate
    simultaneously. It’s like they are sharing one single cable (the air in
    this case), only one person can use it at one time.
   Before an MS (mobile station) sends its packets, it checks to see if
    someone else is sending information. Only when the medium is free
    can an MS sends packets.
   If some station is sending or receiving signal, the MS that intends to
    send will generate a random waiting time and wait for its turn. If
    several MSs are all waiting for their turns, since their waiting times
    are randomly generated and thus not equal, they will not start
    sending simultaneously. Thus collision (two or more MSs sending
    signals simultaneously) is avoided.
   It’s called Carrier Sensing Multiple Access with Collision Avoidance
    (CSMA/CA).
How does CSMA/CA (Carrier Sensing
Multiple Access with Collision Avoidance)
Work? (p. 189, Example 4.18)
RTS/CTS (Request-to-send/clear-to-
send)
   Request-to-send/clear-to-send (RTS/CTS) mechanism
    (p. 191-192, Fig. 4.17 & p. 462, Fig. 11.14)
   A terminal ready for transmission sends an RTS packet
    identifying the source address, destination address, and
    the length of the data to be sent.
   The destination station responds with CTS packet.
   The source terminal receives the CTS and sends the
    data.
   Other terminals go to the virtual carrier-sensing mode
    (NAV signal on), therefore the source terminal sends its
    packet with no contention.
   After completion of the transmission, the destination
    station sends an ACK, opening contention for other
    users.
Spread spectrum in 802.11
 It is a requirement imposed by the
  regulatory authorities for devices in ISM
  band in order to reduce interference.
 There is also limitations on transmitted
  power.
 We discuss two methods specified in
  802.11, FHSS and DSSS.
DSSS in 802.11
   Used by 802.11b
   Symbol transmission rate = 1Mbps
   Multipath spread of up to 1/1 Mbps = 1 µs does
    not cause ISI. For indoor applications this
    ensures that the system does not suffer from ISI.
   Chip rate = 11 Mcps
   Resolution is on the order of 1/11 Mcps = 90 ns.
   Use Barker code (Example 3.16, p. 116).
Complementary code keying (CCK)
 Used to increase the data rate to 11 Mbps
 Example 17, p. 119
 Sec. 11.3.4, p. 457
Frequency Hopping in 802.11
   The frequency can hop over 78 hopping channels each
    separated by 1 MHz. The first channel, Channel 0,
    starts at 2.402 GHz. Channel 1 is at 2.403 GHz,
    Channel 2, 2.404 GHz, and so on up to Channel 77 at
    2.479 GHz (US, Canada, and Europe standards).
   These frequencies are divided into three patterns of 26
    hops each corresponding channel numbers (0, 3, 6, 9,
    …, 75), (1, 4, 7, 10, …, 76), (2, 5, 8, 11, …, 77), see p.
    454, Fig. 11.5.
   Three APs can coexist without any hop collision, that
    results in a threefold increase in the capacity of the cell.
   Hop rate = 2.5 hops per second.
Frequency bands for DSSS
   FHSS uses 1 MHz bandwidth (narrowband), but
    the center frequency hops over 76 MHz. DSSS
    uses a chip rate of 11 Mcps which occupies
    around 26 MHz of bandwidth (wideband).
   The ISM band at 2.4 GHz is divided into 11
    overlapping channels spaced by 5 MHz (see Fig.
    11.6, P. 455).
   APs located close to each other can choose
    different channels to mitigate interference.
Modulation
   Gaussian frequency shift keying (GFSK) is
    used (Sec. 3.6.1, p. 97).
Wi-Fi network services
 Distribution and integration
 Association, re-association, and
  disassociation
 Authentication and deauthentication
 Providing privacy
Distribution
   This service is used by mobile stations in an
    infrastructure network every time they send data.
    Once a frame has been accepted by an access
    point, it uses the distribution service to deliver
    the frame to its destination. Any communication
    that uses an access point travels through the
    distribution service, including communications
    between two mobile stations associated with the
    same access point.
Integration
   Integration is a service provided by the
    distribution system; it allows the
    connection of the distribution system to a
    non-IEEE 802.11 network. The integration
    function is specific to the distribution
    system used and therefore is not specified
    by 802.11, except in terms of the services
    it must offer.
Association
   Delivery of frames to mobile stations is
    made possible because mobile stations
    register, or associate, with access points.
    The distribution system can then use the
    registration information to determine which
    access point to use for any mobile station.
Reassociation
   When a mobile station moves between basic
    service areas within a single extended service
    area, it must evaluate signal strength and
    perhaps switch the access point with which it is
    associated. Reassociations are initiated by
    mobile stations when signal conditions indicate
    that a different association would be beneficial;
    they are never initiated by the access point. After
    the reassociation is complete, the distribution
    system updates its location records to reflect the
    reachability of the mobile station through a
    different access point.
Disassociation
   To terminate an existing association, stations
    may use the disassociation service. When
    stations invoke the disassociation service, any
    mobility data stored in the distribution system is
    removed. Once disassociation is complete, it is
    as if the station is no longer attached to the
    network. Disassociation is a polite task to do
    during the station shutdown process. The MAC
    is, however, designed to accommodate stations
    that leave the network without formally
    disassociating.
Authetication/deauthentication
   Physical security is a major component of a wired LAN
    security solution. Wired network’s equipment can be
    locked inside offices. Wireless networks cannot offer the
    same level of physical security, however, and therefore
    must depend on additional authentication routines to
    ensure that users accessing the network are authorized
    to do so. Authentication is a necessary prerequisite to
    association because only authenticated users are
    authorized to use the network. (In practice, though, many
    access points are configured for "open-system" mode
    and will authenticate any station.)
   Deauthentication terminates an authenticated
    relationship. Because authentication is needed before
    network use is authorized, a side effect of
    deauthentication is termination of any current
    association.

Contenu connexe

Tendances

Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05Ali Habeeb
 
Effects of Shadowing on LoRa LPWAN Radio Links
Effects of Shadowing on LoRa LPWAN Radio Links  Effects of Shadowing on LoRa LPWAN Radio Links
Effects of Shadowing on LoRa LPWAN Radio Links IJECEIAES
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDon Norwood
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networksSalahuddin Jokhio
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALASaikiran Panjala
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11mankuuu
 
Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08Ali Habeeb
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.pptUmme habiba
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Darpan Patel
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDilum Bandara
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Ali Habeeb
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study GuideCCNAResources
 

Tendances (20)

Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05
 
Wlan
WlanWlan
Wlan
 
Effects of Shadowing on LoRa LPWAN Radio Links
Effects of Shadowing on LoRa LPWAN Radio Links  Effects of Shadowing on LoRa LPWAN Radio Links
Effects of Shadowing on LoRa LPWAN Radio Links
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Lect3
Lect3Lect3
Lect3
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALA
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11
 
Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
 
WiFi 802.11
WiFi 802.11WiFi 802.11
WiFi 802.11
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)
 
Wlan 2
Wlan 2Wlan 2
Wlan 2
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study Guide
 

En vedette

Character Encoding and Database Transcoding Project
Character Encoding and Database Transcoding ProjectCharacter Encoding and Database Transcoding Project
Character Encoding and Database Transcoding ProjectHo Kim
 
Science Quiz Winners
Science Quiz WinnersScience Quiz Winners
Science Quiz Winnersguest52588e
 
SKF First-quarter result slide show
SKF First-quarter result slide showSKF First-quarter result slide show
SKF First-quarter result slide showSKF
 
New Phu Leaflet
New Phu LeafletNew Phu Leaflet
New Phu LeafletShirley
 
Skf Internet Presentation Q22009
Skf Internet Presentation Q22009Skf Internet Presentation Q22009
Skf Internet Presentation Q22009SKF
 
Naturaleza
NaturalezaNaturaleza
Naturalezagisepena
 
Raise The Curtain
Raise The CurtainRaise The Curtain
Raise The CurtainEdTechNG
 
Measured Success On Linked In
Measured Success On Linked InMeasured Success On Linked In
Measured Success On Linked Indonmarshall
 
Smulweb Stir 2008 12
Smulweb Stir 2008 12Smulweb Stir 2008 12
Smulweb Stir 2008 12metata
 
Ranking 29.07 Vpp
Ranking 29.07 VppRanking 29.07 Vpp
Ranking 29.07 Vppguestff87a6
 
Appropriation de l’analyse de vidéo pour le développement continu d’enseignan...
Appropriation de l’analyse de vidéo pour le développement continu d’enseignan...Appropriation de l’analyse de vidéo pour le développement continu d’enseignan...
Appropriation de l’analyse de vidéo pour le développement continu d’enseignan...Université de Sherbrooke
 
Footprintproblem
FootprintproblemFootprintproblem
FootprintproblemUCSC
 
Calcula Tu Consumo de Agua
Calcula Tu Consumo de AguaCalcula Tu Consumo de Agua
Calcula Tu Consumo de AguaAlfredo Caicedo
 
Roey Almog Search Engine
Roey Almog Search EngineRoey Almog Search Engine
Roey Almog Search EngineRam Dutt Shukla
 

En vedette (20)

Presentacion Bitacora Farmaceutica
Presentacion Bitacora FarmaceuticaPresentacion Bitacora Farmaceutica
Presentacion Bitacora Farmaceutica
 
LIFE - 5/27/09 - Facebook
LIFE - 5/27/09 - FacebookLIFE - 5/27/09 - Facebook
LIFE - 5/27/09 - Facebook
 
Character Encoding and Database Transcoding Project
Character Encoding and Database Transcoding ProjectCharacter Encoding and Database Transcoding Project
Character Encoding and Database Transcoding Project
 
Science Quiz Winners
Science Quiz WinnersScience Quiz Winners
Science Quiz Winners
 
SKF First-quarter result slide show
SKF First-quarter result slide showSKF First-quarter result slide show
SKF First-quarter result slide show
 
New Phu Leaflet
New Phu LeafletNew Phu Leaflet
New Phu Leaflet
 
CTSB
CTSBCTSB
CTSB
 
Skf Internet Presentation Q22009
Skf Internet Presentation Q22009Skf Internet Presentation Q22009
Skf Internet Presentation Q22009
 
Naturaleza
NaturalezaNaturaleza
Naturaleza
 
Raise The Curtain
Raise The CurtainRaise The Curtain
Raise The Curtain
 
Measured Success On Linked In
Measured Success On Linked InMeasured Success On Linked In
Measured Success On Linked In
 
Smulweb Stir 2008 12
Smulweb Stir 2008 12Smulweb Stir 2008 12
Smulweb Stir 2008 12
 
Ranking 29.07 Vpp
Ranking 29.07 VppRanking 29.07 Vpp
Ranking 29.07 Vpp
 
Appropriation de l’analyse de vidéo pour le développement continu d’enseignan...
Appropriation de l’analyse de vidéo pour le développement continu d’enseignan...Appropriation de l’analyse de vidéo pour le développement continu d’enseignan...
Appropriation de l’analyse de vidéo pour le développement continu d’enseignan...
 
Footprintproblem
FootprintproblemFootprintproblem
Footprintproblem
 
Calcula Tu Consumo de Agua
Calcula Tu Consumo de AguaCalcula Tu Consumo de Agua
Calcula Tu Consumo de Agua
 
Pedersen
PedersenPedersen
Pedersen
 
Grpd Linkedin
Grpd LinkedinGrpd Linkedin
Grpd Linkedin
 
Roey Almog Search Engine
Roey Almog Search EngineRoey Almog Search Engine
Roey Almog Search Engine
 
Df5
Df5Df5
Df5
 

Similaire à Wi Fi

wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wirelessAble George
 
Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationDrAdeelAkram2
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
Comparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlanComparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlanIAEME Publication
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Wireless Networks.pptx
Wireless Networks.pptxWireless Networks.pptx
Wireless Networks.pptxMinecraftJava
 

Similaire à Wi Fi (20)

Wi fi[1]
Wi fi[1]Wi fi[1]
Wi fi[1]
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wireless
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless Communication
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wi fi
Wi fiWi fi
Wi fi
 
IEEE802.16-Anoverview
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Comparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlanComparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlan
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Darsh
DarshDarsh
Darsh
 
Wireless Networks.pptx
Wireless Networks.pptxWireless Networks.pptx
Wireless Networks.pptx
 

Plus de Ram Dutt Shukla (20)

Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Shttp
ShttpShttp
Shttp
 
Web Security
Web SecurityWeb Security
Web Security
 
I Pv6 Addressing
I Pv6 AddressingI Pv6 Addressing
I Pv6 Addressing
 
Anycast & Multicast
Anycast & MulticastAnycast & Multicast
Anycast & Multicast
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Retransmission Tcp
Retransmission TcpRetransmission Tcp
Retransmission Tcp
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Tcp Immediate Data Transfer
Tcp Immediate Data TransferTcp Immediate Data Transfer
Tcp Immediate Data Transfer
 
Tcp Reliability Flow Control
Tcp Reliability Flow ControlTcp Reliability Flow Control
Tcp Reliability Flow Control
 
Tcp Udp Notes
Tcp Udp NotesTcp Udp Notes
Tcp Udp Notes
 
Transport Layer [Autosaved]
Transport Layer [Autosaved]Transport Layer [Autosaved]
Transport Layer [Autosaved]
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
T Tcp
T TcpT Tcp
T Tcp
 
Anycast & Multicast
Anycast & MulticastAnycast & Multicast
Anycast & Multicast
 
Igmp
IgmpIgmp
Igmp
 
Mobile I Pv6
Mobile I Pv6Mobile I Pv6
Mobile I Pv6
 
Mld
MldMld
Mld
 

Dernier

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Wi Fi

  • 2. What is Wi-Fi?  The standard for wireless local area networks (WLANs). It’s like a common language that all the devices use to communicate to each other. If you have a standard, people can make all sorts of devices that can work with each other.  It’s actually IEEE 802.11, a family of standards. The IEEE (Eye-triple-E, Institute of Electrical and Electronics Engineers Inc.) is a non-profit, technical professional association of more than 360,000 individual members in approximately 175 countries. The Wireless Ethernet Compatibility Alliance started the Wi-Fi--wireless fidelity--certification program to ensure that equipment claiming 802.11 compliance was genuinely interoperable.
  • 3. US Frequency Bands Band Frequency range UHF ISM 902-928 MHz S-Band 2-4 GHz S-Band ISM 2.4-2.5 GHz C-Band 4-8 GHz C-Band satellite downlink 3.7-4.2 GHz C-Band Radar (weather) 5.25-5.925 GHz C-Band ISM 5.725-5.875 GHz C-Band satellite uplink 5.925-6.425 GHz X-Band 8-12 GHz X-Band Radar (police/weather) 8.5-10.55 GHz
  • 4. Wi-Fi Standards Standard Speed Freq band Notes  802.11 2 Mbps 2.4 GHz (1997) 802.11a 54 Mbps 5 GHz (1999) 802.11b 11 Mbps 2.4 GHz 802.11g 54 Mbps 2.4 GHz
  • 5. ISM Band ISM stands for industrial, scientific, and medical. ISM bands are set aside for equipment that is related to industrial or scientific processes or is used by medical equipment. Perhaps the most familiar ISM-band device is the microwave oven, which operates in the 2.4-GHz ISM band. The ISM bands are license-free, provided that devices are low-power. You don't need a license to set up and operate a wireless network.
  • 7. WLAN Architecture—Ad Hoc Mode  Ad-Hoc mode: Peer-to-peer setup where clients can connect to each other directly. Generally not used for business networks.
  • 8. Ad Hoc Structure  Mobile stations communicate to each other directly.  It’s set up for a special purpose and for a short period of time. For example, the participants of a meeting in a conference room may create an ad hoc network at the beginning of the meeting and dissolve it when the meeting ends.
  • 9. WLAN Architecture--Mesh  Mesh: Every client in the network also acts as an access or relay point, creating a “self- healing” and (in theory) infinitely extensible network.  Not yet in widespread use, unlikely to be in homes.
  • 11. Infrastructure network  There is an Access Point (AP), which becomes the hub of a “star topology.”  Any communication has to go through AP. If a Mobile Station (MS), like a computer, a PDA, or a phone, wants to communicate with another MS, it needs to send the information to AP first, then AP sends it to the destination MS  Multiple APs can be connected together and handle a large number of clients.  Used by the majority of WLANs in homes and businesses.
  • 12. Comparison of Two Structures Infrastructure Ad hoc Expansion X Flexibility X Control X Routing X Coverage X Reliability X
  • 14. Antennas All WLAN equipment comes with a built-in omni-directional antenna, but some select products will let you attach secondary antennas that will significantly boost range.
  • 15. Antennas, continued  Antennas come in all shapes and styles:  Omni-directional:  Vertical Whip  Ceiling mount  Directional:  Yagi (“Pringles can”)  Wall mounted panel  Parabolic dish
  • 16. How Can Several Users Communicate Simultaneously? As we have discussed, there is a difference between a network designed for voice conversation and one for data exchange.  For voice conversations, like telephone and cell phone calls, each person has a dedicated channel during the entire conversation. (3G and 4G cell phones are somewhat different, as we will explain later.)  For data exchange, many users can share one channel. A user sends information when no one else is sending.  New technologies try to accommodate both voice and data transmissions, as we will discuss in this course.
  • 17. Share one channel in data communication  In data communication, data are grouped into packets/frames. Each packet/frame contains a number of bits of information.  Devices (phones, computers, etc.) don’t communicate simultaneously. It’s like they are sharing one single cable (the air in this case), only one person can use it at one time.  Before an MS (mobile station) sends its packets, it checks to see if someone else is sending information. Only when the medium is free can an MS sends packets.  If some station is sending or receiving signal, the MS that intends to send will generate a random waiting time and wait for its turn. If several MSs are all waiting for their turns, since their waiting times are randomly generated and thus not equal, they will not start sending simultaneously. Thus collision (two or more MSs sending signals simultaneously) is avoided.  It’s called Carrier Sensing Multiple Access with Collision Avoidance (CSMA/CA).
  • 18. How does CSMA/CA (Carrier Sensing Multiple Access with Collision Avoidance) Work? (p. 189, Example 4.18)
  • 19. RTS/CTS (Request-to-send/clear-to- send)  Request-to-send/clear-to-send (RTS/CTS) mechanism (p. 191-192, Fig. 4.17 & p. 462, Fig. 11.14)  A terminal ready for transmission sends an RTS packet identifying the source address, destination address, and the length of the data to be sent.  The destination station responds with CTS packet.  The source terminal receives the CTS and sends the data.  Other terminals go to the virtual carrier-sensing mode (NAV signal on), therefore the source terminal sends its packet with no contention.  After completion of the transmission, the destination station sends an ACK, opening contention for other users.
  • 20. Spread spectrum in 802.11  It is a requirement imposed by the regulatory authorities for devices in ISM band in order to reduce interference.  There is also limitations on transmitted power.  We discuss two methods specified in 802.11, FHSS and DSSS.
  • 21. DSSS in 802.11  Used by 802.11b  Symbol transmission rate = 1Mbps  Multipath spread of up to 1/1 Mbps = 1 µs does not cause ISI. For indoor applications this ensures that the system does not suffer from ISI.  Chip rate = 11 Mcps  Resolution is on the order of 1/11 Mcps = 90 ns.  Use Barker code (Example 3.16, p. 116).
  • 22. Complementary code keying (CCK)  Used to increase the data rate to 11 Mbps  Example 17, p. 119  Sec. 11.3.4, p. 457
  • 23. Frequency Hopping in 802.11  The frequency can hop over 78 hopping channels each separated by 1 MHz. The first channel, Channel 0, starts at 2.402 GHz. Channel 1 is at 2.403 GHz, Channel 2, 2.404 GHz, and so on up to Channel 77 at 2.479 GHz (US, Canada, and Europe standards).  These frequencies are divided into three patterns of 26 hops each corresponding channel numbers (0, 3, 6, 9, …, 75), (1, 4, 7, 10, …, 76), (2, 5, 8, 11, …, 77), see p. 454, Fig. 11.5.  Three APs can coexist without any hop collision, that results in a threefold increase in the capacity of the cell.  Hop rate = 2.5 hops per second.
  • 24. Frequency bands for DSSS  FHSS uses 1 MHz bandwidth (narrowband), but the center frequency hops over 76 MHz. DSSS uses a chip rate of 11 Mcps which occupies around 26 MHz of bandwidth (wideband).  The ISM band at 2.4 GHz is divided into 11 overlapping channels spaced by 5 MHz (see Fig. 11.6, P. 455).  APs located close to each other can choose different channels to mitigate interference.
  • 25. Modulation  Gaussian frequency shift keying (GFSK) is used (Sec. 3.6.1, p. 97).
  • 26. Wi-Fi network services  Distribution and integration  Association, re-association, and disassociation  Authentication and deauthentication  Providing privacy
  • 27. Distribution  This service is used by mobile stations in an infrastructure network every time they send data. Once a frame has been accepted by an access point, it uses the distribution service to deliver the frame to its destination. Any communication that uses an access point travels through the distribution service, including communications between two mobile stations associated with the same access point.
  • 28. Integration  Integration is a service provided by the distribution system; it allows the connection of the distribution system to a non-IEEE 802.11 network. The integration function is specific to the distribution system used and therefore is not specified by 802.11, except in terms of the services it must offer.
  • 29. Association  Delivery of frames to mobile stations is made possible because mobile stations register, or associate, with access points. The distribution system can then use the registration information to determine which access point to use for any mobile station.
  • 30. Reassociation  When a mobile station moves between basic service areas within a single extended service area, it must evaluate signal strength and perhaps switch the access point with which it is associated. Reassociations are initiated by mobile stations when signal conditions indicate that a different association would be beneficial; they are never initiated by the access point. After the reassociation is complete, the distribution system updates its location records to reflect the reachability of the mobile station through a different access point.
  • 31. Disassociation  To terminate an existing association, stations may use the disassociation service. When stations invoke the disassociation service, any mobility data stored in the distribution system is removed. Once disassociation is complete, it is as if the station is no longer attached to the network. Disassociation is a polite task to do during the station shutdown process. The MAC is, however, designed to accommodate stations that leave the network without formally disassociating.
  • 32. Authetication/deauthentication  Physical security is a major component of a wired LAN security solution. Wired network’s equipment can be locked inside offices. Wireless networks cannot offer the same level of physical security, however, and therefore must depend on additional authentication routines to ensure that users accessing the network are authorized to do so. Authentication is a necessary prerequisite to association because only authenticated users are authorized to use the network. (In practice, though, many access points are configured for "open-system" mode and will authenticate any station.)  Deauthentication terminates an authenticated relationship. Because authentication is needed before network use is authorized, a side effect of deauthentication is termination of any current association.