WiFi Technology

TechnologyMaster Student-2015
Prepared by: Hasan K. Ali
Almustansyria Unv.
Iraq-Baghdad
Outlines
◦ Introduction
◦ What is Wi-Fi ?
◦ Wi-Fi Standards
◦ Wi-Fi Technologies
◦ Hotspots
◦ Wi-Fi Network Elements
◦ Channels and Association
◦ How a Wi-Fi Network Works?
◦ The 802.11 MAC Protocol
◦ The IEEE 802.11 Frame
◦ Mobility in the Same IP Subnet
◦ Wi-Fi NETWORK TOPOLOGIES
◦ Advantages and Limitations of Wi-Fi
◦ Wi-Fi Security
◦ Conclusion
2
What is Wi-Fi?
Wi-Fi (Wireless *Fidelity) is a generic term that refers
to the IEEE 802.11 communications standard for
Wireless Local Area Networks (WLANs).
Wireless Technology is an alternative to Wired
Technology, which is commonly used, for connecting
devices in wireless using radio waves.
Allows you to access the Internet while on the move ;
you can remain online while moving from one area to
another, without a disconnection or loss in coverage.
3
*‫دقة‬
IEEE 802.11 standard
In 1997, the Institute of Electrical and Electronic
Engineers (IEEE) drafted* the 802.11 standard for
wireless local area networking.
In 1999, networking hardware companies accepted the
standard and began manufacturing products using the
802.11b protocol which operated in the 2.4 GHz and
was capable of transmitting at speeds of 11 Mbps.
The 802.11a protocol was also released in 1999,
operating at 5 GHz with transmissions speeds of 54
Mbps, but its cost was high.
4
‫*وضعت‬
• IEEE 802.11 is a long and complicated standard. Despite the best efforts of the standards body,
there are bound to be areas that are ambiguous or not fully defined. Also there are a number of
features that are optional and different manufacturers might make different choices in their designs.
To avoid interoperability problems, the Wi-Fi Alliance was formed by a group of major manufacturers
and the logo "Wi-Fi" was created.
• To obtain Wi-Fi certification, a manufacturer must submit its product for testing against a set of "gold
standard" Wi-Fi products. The Wi-Fi Alliance created its own test plan based on IEEE 802.11. Some
features of IEEE 802.11 are not required for Wi-Fi certification. Conversely, there are some
requirements that are additional to the standard. Where there is ambiguity in the standard, the
correct behavior is defined by the way the gold standard products work. In this way interoperability is
ensured. In summary, Wi-Fi defines a subset of IEEE 802.11 with some extensions, as shown in
Figure 7.2.
5
Relationship Between Wi-Fi and IEEE 802.11
The 802.11 Architecture
The next Figure illustrates the principal components of the 802.11 wireless LAN
architecture.
The fundamental building block of the 802.11 architecture is the basic service set
(BSS). A BSS contains one or more wireless stations and a central base station,
known as an access point (AP) in 802.11 parlance. Figure shows the AP in each of
two BSSs connecting to an interconnection device (such as a switch or router), which
in turn leads to the Internet. In a typical home network, there is one AP and one router
(typically integrated together as one unit) that connects the BSS to the Internet.
6
General Scheme of IEEE 802.11 standard
7
* Basic service set (BSS)
8
• A number of dual mode (802.11a/g) and tri-mode (802.11a/b/g) devices are
also available.
IEEE 802.11 standard
(cont.)
Network
standard
Maximum
Speed
(Mbps)
Range
(feet)
Frequency
(GHz)
*Power
drain
Cost
802.11b 11 100-150 2.4 Moderate Low
802.11a 54 60-100 5 High High
802.11g 54 150-250 2.4 Moderate Moderate
802.11n 200
Up to 300
feet
2.4 & 5 Moderate Moderate
9
* ‫استنزاف‬‫الطاقة‬
The first three 802.11 standards share many characteristics
1. They all use the same medium access protocol, CSMA/CA
2. All three use the same frame structure for their link-layer
frames as well.
3. All three standards have the ability to reduce their transmission
rate in order to reach out over greater distances.
4. And all three standards allow for both “infrastructure mode”
and “ad hoc mode,”
10
The Three standards have some major
differences at the physical layer.
• The 802.11b wireless LAN has a data rate of 11 Mbps and operates in the
unlicensed frequency band of 2.4–2.485 GHz, competing for frequency
spectrum with 2.4 GHz phones and microwave ovens.
• 802.11a wireless LANs can run at significantly higher bit rates, but do so,
by highe operating at r frequencies.
• 802.11a LANs have a shorter transmission distance for a given power level
and suffer more from multipath propagation. yet with the higher-speed
transmission rates of 802.11a, allows users to have their cake and eat it
too.
11
Cont.
• 802.11g LANs, operating in the same lower-frequency band as
802.11b and being backwards compatible with 802.11b (so one
can upgrade 802.11b clients incrementally).
• 802.11n [IEEE 802.11n 2012], uses multiple-input & multiple-
output (MIMO) antennas; i.e., two or more antennas on the
sending side and two or more antennas on the receiving side
that are transmitting/receiving different signals. Depending on
the modulation scheme used, transmission rates of several
hundred megabits per second are possible with 802.11n.
12
13
Hotspot
A Hotspot is any location where Wi-Fi
Hotspots are equipped with a Broadband Internet
connection, and one or more Access Points that
allow users to access the Internet wirelessly.
Hotspots can be setup in any public location that
can support an Internet connection. All the locations
discussed below are examples of Hotspots.
14
What is a Hotspot ?
network access is made publicly available.
Wi-Fi Hotspot Locations
15
Airports
Hotels & Resorts
Restaurants
Coffee Shops
Bookstores
Shopping Malls
 There are several online services
allow you find hotspot locations.
Hotspot Revolution
16
Elements of a Wi-Fi Network
 Access Point (AP) - The AP is a wireless LAN transceiver
or “base station” that can connect one or many wireless
devices in the same time to the Internet.
 Safeguards - Firewalls and anti-virus software protect
networks from uninvited users and keep information secure.
 Wi-Fi cards (Adapters) - They accept the wireless signal
and relay information. They can be internal and external.
17
Channels
18
Channels and Association
• When a network administrator installs an AP, the administrator assigns a one or two-word
Service Set Identifier (SSID) to the access point. (When you “view available networks” in
Microsoft Windows XP, for example, a list is displayed showing the SSID of each AP in
range.)
• The administrator must also assign a channel number to the AP. To understand channel
numbers, recall that 802.11 operates in the frequency range of 2.4 GHz to 2.485 GHz. Within
this 85 MHz band, 802.11 defines 11 partially overlapping channels. Any two channels are
non-overlapping if and only if they are separated by four or more channels. In particular, the
set of channels 1, 6, and 11 is the only set of three non-overlapping channels.
19
Cont.
• This means that an administrator could create a wireless LAN
with an aggregate* maximum transmission rate of 33 Mbps by
installing three 802.11b APs at the same physical location,
assigning channels 1, 6, and 11 to the APs, and interconnecting
each of the APs with a switch.
20*‫مجموع‬
• Association :its the connection process between the wireless station and
the Access point in wireless network, wither it used passive scanning or
active scanning for connection between the tow entities.
How a Wi-Fi Network Works ?
• The 802.11 standard requires that an AP periodically# send *beacon frames, each of
which includes the AP’s SSID and MAC address. Your wireless station(e.g mobile
phone), knowing that APs are sending out beacon frames, scans the 11 channels,
seeking beacon frames from any APs that may be out there (some of which may be
transmitting on the same channel—it’s a jungle out there!). Having learned about
available APs from the beacon frames, you (or your wireless host) select one of the
APs for association.
21
*‫شعلة‬ #‫بشكل‬‫دوري‬
• The process of scanning channels and listening for beacon frames is
known as passive scanning.
• A wireless host can also perform active scanning, by broadcasting a
*probe frame that will be received by all APs within the wireless
host’s range. APs respond to the probe request frame with a probe
response frame. The wireless host can then choose the AP with which to
associate from among the responding APs
22
‫*مسبار‬
Cont.
23
The 802.11 MAC Protocol
• A station is either a wireless station or an AP.
• Because multiple stations may want to transmit data frames at the same
time over the same channel, a multiple access protocol is needed to
coordinate the transmissions.
• the designers of 802.11 chose a random access protocol & referred to as
CSMA/CA carrier sense multiple access with collision avoidance.
• meaning that each station senses the channel before transmitting, and
*refrains from transmitting when the channel is sensed busy.
24
‫*يمتنع‬
• The 802.11 MAC protocol does not implement
collision detection.
There are two important reasons for this:-
• The ability to detect collisions requires the ability to send and receive
at the same time. Because the strength of the received signal is
typically very small compared to the strength of the transmitted signal
at the 802.11 adapter, & it is costly to build hardware that can detect
a collision.
• More importantly, even if the adapter could transmit and listen at the
same time (and probably abort transmission when it senses a busy
channel), the adapter would still not be able to detect all collisions,
due to the hidden terminal problem and *fading.
(fading is deviation of the attenuation affecting a signal over
certain propagation media)
25
*‫التالشي‬
Hidden terminal problem
• In wireless networking, the hidden node problem or hidden
terminal problem occurs when a node is visible from a wireless
access point (AP), but not from other nodes communicating
with that AP. This leads to difficulties in media access control.
26
802.11 CSMA/CA protocol.
Suppose that a station (wireless station or an AP) has a frame to transmit.
1. If initially the station senses the channel idle, it transmits its frame after a short period of time known as
the Distributed Inter-frame Space (DIFS); see
Figure 6.10.
2. Otherwise, the station chooses a random backoff value using binary exponential backoff (as we
encountered in Section 5.3.2) and counts down this value when the channel is sensed idle. While the
channel is sensed busy, the counter value remains frozen.
3. When the counter reaches zero (note that this can only occur while the channel is sensed idle), the
station transmits the entire frame and then waits for an acknowledgment.
4. If an acknowledgment is received, the transmitting station knows that its frame has been correctly
received at the destination station. If the station has another frame to send, it begins the CSMA/CA
protocol at step 2. If the acknowledgment isn’t received, the transmitting station reenters the backoff phase
in step 2, with the random value chosen from a larger interval. 27
28
The IEEE 802.11 Frame
• Its contains a number of fields that are specific to its use for wireless links. The 802.11
frame is shown in Figure. The numbers above each of the fields in the frame represent
the lengths of the fields in bytes; the numbers above each of the subfields in the frame
control field represent the lengths of the subfields in bits.
29
Address Fields
The first three address fields. The 802.11 standard defines these fields as follows:
• Address 2 is the MAC address of the station that transmits the frame. Thus, if
a wireless station transmits the frame, that station’s MAC address is inserted
in the address 2 field. Similarly, if an AP transmits the frame, the AP’s MAC
address is inserted in the address 2 field.
• Address 1 is the MAC address of the wireless station that is to receive the
frame. Thus if a mobile wireless station transmits the frame, address 1
contains the MAC address of the destination AP. Similarly, if an AP
transmits the frame, address 1 contains the MAC address of the destination
wireless station.
• To understand address 3, recall that the BSS (consisting of the AP and wireless stations) is part of a
subnet, and that this subnet connects to other subnets via some router interface. Address 3 contains
the MAC address of this router interface.
30
31
The IEEE 802.11 Frame Types
• Control Frames
– RTS/CTS/ACK
– CF-Poll/CF-End
• Management Frames
– Beacons
– Probe Request/Response
– Association Request/Response
– Disasociation/Reassociation
– Authentication/Deauthentication
– ATIM
• Data Frames
Mobility in the Same IP Subnet
• In order to increase the physical range of a wireless LAN, companies and universities will often deploy
multiple BSSs within the same IP subnet. This naturally raises the issue of mobility among the BSSs.
• mobility can be handled in a relatively direct manner when the BSSs are part of the subnet. When
stations move between subnets, more sophisticated mobility management protocols will be needed.
32
• Let’s now look at a specific example of mobility between BSSs in the same subnet. Figure shows two
interconnected BSSs with a host, H1, moving from BSS1 to BSS2. Because in this example the
interconnection device that connects the two BSSs is not a router, all of the stations in the two BSSs,
including the APs, belong to the same IP subnet. Thus, when H1 moves from BSS1 to BSS2, it may
keep its IP address and all of its ongoing TCP connections.
• If the interconnection device were a router, then H1 would have to obtain a new IP address in the
subnet in which it was moving. This address change would disrupt (and eventually terminate) any
ongoing TCP connections at H1.
33
Cont.
Cont.
• But what specifically happens when H1 moves from BSS1 to BSS2? As H1 wanders
away from AP1, H1 detects a weakening signal from AP1 and starts to scan for a
stronger signal. H1 receives beacon frames from AP2 (which in many corporate and
university settings will have the same SSID as AP1). H1 then disassociates with AP1
and associates with AP2, while keeping its IP address and maintaining its ongoing
TCP sessions.
• This addresses the handoff problem from the host and AP viewpoint.
34
Wi-Fi NETWORK TOPOLOGIES
• Topology generally means network
shape or structure
AP-based topology(Infrastructure Mode)
Peer-to-peer topology(Ad-hoc Mode)
35
1. AP BASED TOPOLOGY
• The client communicate through Access Point.
• BSA-RF coverage provided by an AP
36
2. PEER-TO-PEER TOPOLOGY
• AP is not required.
• Client devices within a cell can communicate directly
with each other.
• It is useful for setting up of a wireless network quickly
and easily.
37
Long-range Wi-Fi
• Long-range Wi-Fi is used for low-cost, unregulated point-to-point computer
network connections, as an alternative to other fixed wireless, cellular networks or
satellite Internet access.
• Wi-Fi networks have a range that's limited by the transmission power, antenna type,
the location they're used in, and the environment. A typical wireless router in an
indoor point-to-multipoint arrangement using 802.11b or 802.11g and a stock antenna
might have a range of 32 metres (105 ft). Outdoor point-to-point arrangements,
through use of directional antennas, can be extended with many kilometers between
stations.
38
WiFi Range
• Regardless of which setup you use, once you turn your Wireless
Access Point on, you will have a WiFi hotspot in your house.
• In a typical home, this hotspot will provide coverage for about 100 feet
(30 meters) in all directions, although walls and floors do cut down on
the range.
• Even so, you should get good coverage throughout a typical home. For
a large home, you can buy inexpensive signal boosters to increase the
range of the Hotspot.
Advantages of Wi-Fi
No Wires - A truly wireless networking solution.
No Waiting - Fast, easy deployments.
No Worries - A wireless networking system that is
secure, easy to manage, and built to grow with you.
Ease of Installation - Quick, easy setup.
Fast data transfer rates
40
Limitations of Wi-Fi
Limited range
Data security risks :a huge challenge for Wi-Fi
networks.
Interference from other devices : such as
telephones, microwave ovens.
High power consumption :making battery life and
heat a concern .
41
Basic Wi-Fi Security Techniques
WEP(Wired Equivalent Privacy) : The original encryption technique specified
by the IEEE 802.11 standard.
WPA(Wi-Fi Protected Access ): A new standard that provides improved
encryption security over WEP.
WPA2 : is an improved version of WPA that uses Advanced Encryption
Standard (AES) technology.
42
Conclusion
• Wi-Fi is a simple, cost-effective way to connect to the Internet, without the
need to physically connecting wires.
• Hotspot is a geographic area setup in any public location, and has a readily
accessible wireless network.
• Security is a huge challenge for Wi-Fi Networks, many Security Techniques
are used to improve it.
• Wi-Fi Networks have a several limitations that should be concerned.
43
• The future of Wi-Fi is very bright. Its growing in
popularity because of decreasing costs and the freedom
it gives to users.
1 sur 43

Recommandé

Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Hem Pokhrel
3K vues23 diapositives
Wifi pptWifi ppt
Wifi pptShubham Singh
1.4K vues16 diapositives
Wi fiWi fi
Wi fiNaveen Sihag
4.3K vues32 diapositives
wi-fi pptwi-fi ppt
wi-fi pptvijaykumar vodnala
10.7K vues19 diapositives
Wi fi technologyWi fi technology
Wi fi technologyHimanshu Shakyawar
1.4K vues18 diapositives
Wifi pptWifi ppt
Wifi pptYousaf Sahota
1.8K vues10 diapositives

Contenu connexe

Tendances

WiFi Technology & IEEEWiFi Technology & IEEE
WiFi Technology & IEEEvasanthimuniasamy
3.7K vues14 diapositives
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityGurpreet Singh
17.1K vues28 diapositives
Wifi Technology pptWifi Technology ppt
Wifi Technology pptSABIR ALI MOLLAH
23.3K vues21 diapositives
Wi fi technologyWi fi technology
Wi fi technologyFaiq Ali Sayed
8.1K vues26 diapositives
Wifi technologyWifi technology
Wifi technologyBiju Patnaik University
19.9K vues18 diapositives

Tendances(20)

WiFi Technology & IEEEWiFi Technology & IEEE
WiFi Technology & IEEE
vasanthimuniasamy3.7K vues
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
Gurpreet Singh17.1K vues
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
SABIR ALI MOLLAH23.3K vues
Wi fi technologyWi fi technology
Wi fi technology
Faiq Ali Sayed8.1K vues
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
OECLIB Odisha Electronics Control Library2K vues
Wifi technologyWifi technology
Wifi technology
Biju Patnaik University19.9K vues
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
Bhushan Jadhav9.5K vues
WiMAX Basics WiMAX Basics
WiMAX Basics
Jarin Tasnim Khan15.8K vues
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applications
Saad Mazhar3.3K vues
Wireless networks pptWireless networks ppt
Wireless networks ppt
Jennifer Christy3.2K vues
wimaxwimax
wimax
Chaitanya Ram1.2K vues
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
Ryma Chohan16K vues
WifiWifi
Wifi
Jaydeep Palekar4.9K vues
Wireless networkingWireless networking
Wireless networking
Online 47.3K vues
 wi-fi technology wi-fi technology
wi-fi technology
sai kumar R786 vues
ppt on WIFIppt on WIFI
ppt on WIFI
Rohit Lakkabathini28.9K vues
wifi pptwifi ppt
wifi ppt
Jawad Ali12.1K vues
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
Ajnish Rana1.6K vues
Introduction to Wi-Fi DirectIntroduction to Wi-Fi Direct
Introduction to Wi-Fi Direct
Wei-Tsung Su7.7K vues
Wifi wimaxWifi wimax
Wifi wimax
varun19295.3K vues

Similaire à WiFi Technology

SRWE_Module_12.pptxSRWE_Module_12.pptx
SRWE_Module_12.pptxNguyenNM
1 vue56 diapositives
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN TechnoloyDavid Livingston J
3.1K vues55 diapositives
5  IEEE standards5  IEEE standards
5 IEEE standardsRodgers Moonde
2K vues29 diapositives
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8Ramesh Babu
4.9K vues77 diapositives

Similaire à WiFi Technology(20)

SRWE_Module_12.pptxSRWE_Module_12.pptx
SRWE_Module_12.pptx
NguyenNM1 vue
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
David Livingston J3.1K vues
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
Hitesh Mohapatra5.3K vues
5  IEEE standards5  IEEE standards
5 IEEE standards
Rodgers Moonde2K vues
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8
Ramesh Babu4.9K vues
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8
SURESHA V4.8K vues
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol
umardanjumamaiwada742 vues
Wireless NetworkingWireless Networking
Wireless Networking
Dawn Jones3 vues
PACE-IT: Wireless LAN Infrastructure (part 1)PACE-IT: Wireless LAN Infrastructure (part 1)
PACE-IT: Wireless LAN Infrastructure (part 1)
Pace IT at Edmonds Community College501 vues
 wifi-technology wifi-technology
wifi-technology
tardeep5.2K vues
41 wifi technology41 wifi technology
41 wifi technology
SALMAN SHAIKH559 vues
41 wifi technology41 wifi technology
41 wifi technology
SALMAN SHAIKH524 vues
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
Sajid Marwat4.5K vues
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
Inocentshuja Ahmad2.3K vues
Presentation of-wimaxPresentation of-wimax
Presentation of-wimax
Rubab Fatima2.8K vues
WI-FI and Wi MaxWI-FI and Wi Max
WI-FI and Wi Max
Siyad Ca1.4K vues
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
Pawan Parande - CSM®776 vues
wifi technologywifi technology
wifi technology
Akhil Kumar1.6K vues
wi-fi technologywi-fi technology
wi-fi technology
Akhil Kumar1.2K vues

WiFi Technology

  • 1. TechnologyMaster Student-2015 Prepared by: Hasan K. Ali Almustansyria Unv. Iraq-Baghdad
  • 2. Outlines ◦ Introduction ◦ What is Wi-Fi ? ◦ Wi-Fi Standards ◦ Wi-Fi Technologies ◦ Hotspots ◦ Wi-Fi Network Elements ◦ Channels and Association ◦ How a Wi-Fi Network Works? ◦ The 802.11 MAC Protocol ◦ The IEEE 802.11 Frame ◦ Mobility in the Same IP Subnet ◦ Wi-Fi NETWORK TOPOLOGIES ◦ Advantages and Limitations of Wi-Fi ◦ Wi-Fi Security ◦ Conclusion 2
  • 3. What is Wi-Fi? Wi-Fi (Wireless *Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs). Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless using radio waves. Allows you to access the Internet while on the move ; you can remain online while moving from one area to another, without a disconnection or loss in coverage. 3 *‫دقة‬
  • 4. IEEE 802.11 standard In 1997, the Institute of Electrical and Electronic Engineers (IEEE) drafted* the 802.11 standard for wireless local area networking. In 1999, networking hardware companies accepted the standard and began manufacturing products using the 802.11b protocol which operated in the 2.4 GHz and was capable of transmitting at speeds of 11 Mbps. The 802.11a protocol was also released in 1999, operating at 5 GHz with transmissions speeds of 54 Mbps, but its cost was high. 4 ‫*وضعت‬
  • 5. • IEEE 802.11 is a long and complicated standard. Despite the best efforts of the standards body, there are bound to be areas that are ambiguous or not fully defined. Also there are a number of features that are optional and different manufacturers might make different choices in their designs. To avoid interoperability problems, the Wi-Fi Alliance was formed by a group of major manufacturers and the logo "Wi-Fi" was created. • To obtain Wi-Fi certification, a manufacturer must submit its product for testing against a set of "gold standard" Wi-Fi products. The Wi-Fi Alliance created its own test plan based on IEEE 802.11. Some features of IEEE 802.11 are not required for Wi-Fi certification. Conversely, there are some requirements that are additional to the standard. Where there is ambiguity in the standard, the correct behavior is defined by the way the gold standard products work. In this way interoperability is ensured. In summary, Wi-Fi defines a subset of IEEE 802.11 with some extensions, as shown in Figure 7.2. 5 Relationship Between Wi-Fi and IEEE 802.11
  • 6. The 802.11 Architecture The next Figure illustrates the principal components of the 802.11 wireless LAN architecture. The fundamental building block of the 802.11 architecture is the basic service set (BSS). A BSS contains one or more wireless stations and a central base station, known as an access point (AP) in 802.11 parlance. Figure shows the AP in each of two BSSs connecting to an interconnection device (such as a switch or router), which in turn leads to the Internet. In a typical home network, there is one AP and one router (typically integrated together as one unit) that connects the BSS to the Internet. 6
  • 7. General Scheme of IEEE 802.11 standard 7 * Basic service set (BSS)
  • 8. 8 • A number of dual mode (802.11a/g) and tri-mode (802.11a/b/g) devices are also available.
  • 9. IEEE 802.11 standard (cont.) Network standard Maximum Speed (Mbps) Range (feet) Frequency (GHz) *Power drain Cost 802.11b 11 100-150 2.4 Moderate Low 802.11a 54 60-100 5 High High 802.11g 54 150-250 2.4 Moderate Moderate 802.11n 200 Up to 300 feet 2.4 & 5 Moderate Moderate 9 * ‫استنزاف‬‫الطاقة‬
  • 10. The first three 802.11 standards share many characteristics 1. They all use the same medium access protocol, CSMA/CA 2. All three use the same frame structure for their link-layer frames as well. 3. All three standards have the ability to reduce their transmission rate in order to reach out over greater distances. 4. And all three standards allow for both “infrastructure mode” and “ad hoc mode,” 10
  • 11. The Three standards have some major differences at the physical layer. • The 802.11b wireless LAN has a data rate of 11 Mbps and operates in the unlicensed frequency band of 2.4–2.485 GHz, competing for frequency spectrum with 2.4 GHz phones and microwave ovens. • 802.11a wireless LANs can run at significantly higher bit rates, but do so, by highe operating at r frequencies. • 802.11a LANs have a shorter transmission distance for a given power level and suffer more from multipath propagation. yet with the higher-speed transmission rates of 802.11a, allows users to have their cake and eat it too. 11
  • 12. Cont. • 802.11g LANs, operating in the same lower-frequency band as 802.11b and being backwards compatible with 802.11b (so one can upgrade 802.11b clients incrementally). • 802.11n [IEEE 802.11n 2012], uses multiple-input & multiple- output (MIMO) antennas; i.e., two or more antennas on the sending side and two or more antennas on the receiving side that are transmitting/receiving different signals. Depending on the modulation scheme used, transmission rates of several hundred megabits per second are possible with 802.11n. 12
  • 13. 13
  • 14. Hotspot A Hotspot is any location where Wi-Fi Hotspots are equipped with a Broadband Internet connection, and one or more Access Points that allow users to access the Internet wirelessly. Hotspots can be setup in any public location that can support an Internet connection. All the locations discussed below are examples of Hotspots. 14 What is a Hotspot ? network access is made publicly available.
  • 15. Wi-Fi Hotspot Locations 15 Airports Hotels & Resorts Restaurants Coffee Shops Bookstores Shopping Malls  There are several online services allow you find hotspot locations.
  • 17. Elements of a Wi-Fi Network  Access Point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices in the same time to the Internet.  Safeguards - Firewalls and anti-virus software protect networks from uninvited users and keep information secure.  Wi-Fi cards (Adapters) - They accept the wireless signal and relay information. They can be internal and external. 17
  • 19. Channels and Association • When a network administrator installs an AP, the administrator assigns a one or two-word Service Set Identifier (SSID) to the access point. (When you “view available networks” in Microsoft Windows XP, for example, a list is displayed showing the SSID of each AP in range.) • The administrator must also assign a channel number to the AP. To understand channel numbers, recall that 802.11 operates in the frequency range of 2.4 GHz to 2.485 GHz. Within this 85 MHz band, 802.11 defines 11 partially overlapping channels. Any two channels are non-overlapping if and only if they are separated by four or more channels. In particular, the set of channels 1, 6, and 11 is the only set of three non-overlapping channels. 19
  • 20. Cont. • This means that an administrator could create a wireless LAN with an aggregate* maximum transmission rate of 33 Mbps by installing three 802.11b APs at the same physical location, assigning channels 1, 6, and 11 to the APs, and interconnecting each of the APs with a switch. 20*‫مجموع‬ • Association :its the connection process between the wireless station and the Access point in wireless network, wither it used passive scanning or active scanning for connection between the tow entities.
  • 21. How a Wi-Fi Network Works ? • The 802.11 standard requires that an AP periodically# send *beacon frames, each of which includes the AP’s SSID and MAC address. Your wireless station(e.g mobile phone), knowing that APs are sending out beacon frames, scans the 11 channels, seeking beacon frames from any APs that may be out there (some of which may be transmitting on the same channel—it’s a jungle out there!). Having learned about available APs from the beacon frames, you (or your wireless host) select one of the APs for association. 21 *‫شعلة‬ #‫بشكل‬‫دوري‬
  • 22. • The process of scanning channels and listening for beacon frames is known as passive scanning. • A wireless host can also perform active scanning, by broadcasting a *probe frame that will be received by all APs within the wireless host’s range. APs respond to the probe request frame with a probe response frame. The wireless host can then choose the AP with which to associate from among the responding APs 22 ‫*مسبار‬ Cont.
  • 23. 23
  • 24. The 802.11 MAC Protocol • A station is either a wireless station or an AP. • Because multiple stations may want to transmit data frames at the same time over the same channel, a multiple access protocol is needed to coordinate the transmissions. • the designers of 802.11 chose a random access protocol & referred to as CSMA/CA carrier sense multiple access with collision avoidance. • meaning that each station senses the channel before transmitting, and *refrains from transmitting when the channel is sensed busy. 24 ‫*يمتنع‬
  • 25. • The 802.11 MAC protocol does not implement collision detection. There are two important reasons for this:- • The ability to detect collisions requires the ability to send and receive at the same time. Because the strength of the received signal is typically very small compared to the strength of the transmitted signal at the 802.11 adapter, & it is costly to build hardware that can detect a collision. • More importantly, even if the adapter could transmit and listen at the same time (and probably abort transmission when it senses a busy channel), the adapter would still not be able to detect all collisions, due to the hidden terminal problem and *fading. (fading is deviation of the attenuation affecting a signal over certain propagation media) 25 *‫التالشي‬
  • 26. Hidden terminal problem • In wireless networking, the hidden node problem or hidden terminal problem occurs when a node is visible from a wireless access point (AP), but not from other nodes communicating with that AP. This leads to difficulties in media access control. 26
  • 27. 802.11 CSMA/CA protocol. Suppose that a station (wireless station or an AP) has a frame to transmit. 1. If initially the station senses the channel idle, it transmits its frame after a short period of time known as the Distributed Inter-frame Space (DIFS); see Figure 6.10. 2. Otherwise, the station chooses a random backoff value using binary exponential backoff (as we encountered in Section 5.3.2) and counts down this value when the channel is sensed idle. While the channel is sensed busy, the counter value remains frozen. 3. When the counter reaches zero (note that this can only occur while the channel is sensed idle), the station transmits the entire frame and then waits for an acknowledgment. 4. If an acknowledgment is received, the transmitting station knows that its frame has been correctly received at the destination station. If the station has another frame to send, it begins the CSMA/CA protocol at step 2. If the acknowledgment isn’t received, the transmitting station reenters the backoff phase in step 2, with the random value chosen from a larger interval. 27
  • 28. 28
  • 29. The IEEE 802.11 Frame • Its contains a number of fields that are specific to its use for wireless links. The 802.11 frame is shown in Figure. The numbers above each of the fields in the frame represent the lengths of the fields in bytes; the numbers above each of the subfields in the frame control field represent the lengths of the subfields in bits. 29
  • 30. Address Fields The first three address fields. The 802.11 standard defines these fields as follows: • Address 2 is the MAC address of the station that transmits the frame. Thus, if a wireless station transmits the frame, that station’s MAC address is inserted in the address 2 field. Similarly, if an AP transmits the frame, the AP’s MAC address is inserted in the address 2 field. • Address 1 is the MAC address of the wireless station that is to receive the frame. Thus if a mobile wireless station transmits the frame, address 1 contains the MAC address of the destination AP. Similarly, if an AP transmits the frame, address 1 contains the MAC address of the destination wireless station. • To understand address 3, recall that the BSS (consisting of the AP and wireless stations) is part of a subnet, and that this subnet connects to other subnets via some router interface. Address 3 contains the MAC address of this router interface. 30
  • 31. 31 The IEEE 802.11 Frame Types • Control Frames – RTS/CTS/ACK – CF-Poll/CF-End • Management Frames – Beacons – Probe Request/Response – Association Request/Response – Disasociation/Reassociation – Authentication/Deauthentication – ATIM • Data Frames
  • 32. Mobility in the Same IP Subnet • In order to increase the physical range of a wireless LAN, companies and universities will often deploy multiple BSSs within the same IP subnet. This naturally raises the issue of mobility among the BSSs. • mobility can be handled in a relatively direct manner when the BSSs are part of the subnet. When stations move between subnets, more sophisticated mobility management protocols will be needed. 32
  • 33. • Let’s now look at a specific example of mobility between BSSs in the same subnet. Figure shows two interconnected BSSs with a host, H1, moving from BSS1 to BSS2. Because in this example the interconnection device that connects the two BSSs is not a router, all of the stations in the two BSSs, including the APs, belong to the same IP subnet. Thus, when H1 moves from BSS1 to BSS2, it may keep its IP address and all of its ongoing TCP connections. • If the interconnection device were a router, then H1 would have to obtain a new IP address in the subnet in which it was moving. This address change would disrupt (and eventually terminate) any ongoing TCP connections at H1. 33 Cont.
  • 34. Cont. • But what specifically happens when H1 moves from BSS1 to BSS2? As H1 wanders away from AP1, H1 detects a weakening signal from AP1 and starts to scan for a stronger signal. H1 receives beacon frames from AP2 (which in many corporate and university settings will have the same SSID as AP1). H1 then disassociates with AP1 and associates with AP2, while keeping its IP address and maintaining its ongoing TCP sessions. • This addresses the handoff problem from the host and AP viewpoint. 34
  • 35. Wi-Fi NETWORK TOPOLOGIES • Topology generally means network shape or structure AP-based topology(Infrastructure Mode) Peer-to-peer topology(Ad-hoc Mode) 35
  • 36. 1. AP BASED TOPOLOGY • The client communicate through Access Point. • BSA-RF coverage provided by an AP 36
  • 37. 2. PEER-TO-PEER TOPOLOGY • AP is not required. • Client devices within a cell can communicate directly with each other. • It is useful for setting up of a wireless network quickly and easily. 37
  • 38. Long-range Wi-Fi • Long-range Wi-Fi is used for low-cost, unregulated point-to-point computer network connections, as an alternative to other fixed wireless, cellular networks or satellite Internet access. • Wi-Fi networks have a range that's limited by the transmission power, antenna type, the location they're used in, and the environment. A typical wireless router in an indoor point-to-multipoint arrangement using 802.11b or 802.11g and a stock antenna might have a range of 32 metres (105 ft). Outdoor point-to-point arrangements, through use of directional antennas, can be extended with many kilometers between stations. 38
  • 39. WiFi Range • Regardless of which setup you use, once you turn your Wireless Access Point on, you will have a WiFi hotspot in your house. • In a typical home, this hotspot will provide coverage for about 100 feet (30 meters) in all directions, although walls and floors do cut down on the range. • Even so, you should get good coverage throughout a typical home. For a large home, you can buy inexpensive signal boosters to increase the range of the Hotspot.
  • 40. Advantages of Wi-Fi No Wires - A truly wireless networking solution. No Waiting - Fast, easy deployments. No Worries - A wireless networking system that is secure, easy to manage, and built to grow with you. Ease of Installation - Quick, easy setup. Fast data transfer rates 40
  • 41. Limitations of Wi-Fi Limited range Data security risks :a huge challenge for Wi-Fi networks. Interference from other devices : such as telephones, microwave ovens. High power consumption :making battery life and heat a concern . 41
  • 42. Basic Wi-Fi Security Techniques WEP(Wired Equivalent Privacy) : The original encryption technique specified by the IEEE 802.11 standard. WPA(Wi-Fi Protected Access ): A new standard that provides improved encryption security over WEP. WPA2 : is an improved version of WPA that uses Advanced Encryption Standard (AES) technology. 42
  • 43. Conclusion • Wi-Fi is a simple, cost-effective way to connect to the Internet, without the need to physically connecting wires. • Hotspot is a geographic area setup in any public location, and has a readily accessible wireless network. • Security is a huge challenge for Wi-Fi Networks, many Security Techniques are used to improve it. • Wi-Fi Networks have a several limitations that should be concerned. 43 • The future of Wi-Fi is very bright. Its growing in popularity because of decreasing costs and the freedom it gives to users.

Notes de l'éditeur

  1. After 21