Wireless Technology.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Faculty of Computer Science & Engineering
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Wireless Networking WAN Design Module-06
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN bridge.
Computer Networks IGCSE ICT Section 4.
MESH Implementation With AP5131 version R.
Wireless Networking 102.
NETWORK CHONGSEOK PARK 10DD MRS. VEENA MONY Content.
Network Design Essentials. Guide to Networking Essentials, Fifth Edition2 Contents 1. Examining the Basics of a Network Layout 2. Understanding Standard.
1 Chapter Overview Wireless Technologies Wireless Security.
Chapter 2 Network Design Essentials Instructor: Nhan Nguyen Phuong.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
The world is going to wireless …
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Networks Types & Topologies. Objectives  To understand the two different setup of networks and their characteristics  Know the 3 different types of.
CWNA Guide to Wireless LANs, Second Edition
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Presented by: Dr. Munam Ali Shah
Overview Mobility Ease and cost of installation Easier network modifications Increased network reliability Speedier disaster recovery Radio signal interference.
Submission doc.: IEEE 11-12/0281r0 March 2012 Jarkko Kneckt, NokiaSlide 1 Recommendations for association Date: Authors:
WLAN.
Guide to Networking Essentials Fifth Edition Chapter 2 Network Design Essentials.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Activity 1 5 minutes to discuss and feedback on the following:
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Introduction to Networks. When Personal Computers first appeared in business, software programs were designed for a single user. However as computers.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
IEEE Wireless LAN Standard
Last updated: 20 April 2006 Sebastian Büttrich ItrainOnline MMTK 1 Basic Wireless Infrastructure and Topologies Developed by Sebastian.
1.4 wired and wireless networks lesson 1
Introduction to Network Hardware
Wi-Fi Technology.
Understanding How Networks Communicate
TERMINOLOGY Define: WPAN
Outline What is Wireless LAN Wireless Transmission Types
PPP Protocol.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Protocols WEP, WPA & WPA2.
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
WLAN Communication Network
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the Bus Ring Star.
Wireless Modes.
PPP PROTOCOL The First semester
Chapter 4: Wireless LANs
How To Set Up A Wireless Network
Wireless Mesh Networks
Designing a local area network
Introduction to Computers
GPRS GPRS stands for General Packet Radio System. GPRS provides packet radio access for mobile Global System for Mobile Communications (GSM) and time-division.
Enhancement to Mesh Discovery
Networks 1 Key Revision Points.
Computer communications
WAVE ITS Station Technical Capabilities Summary
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Configure a Wireless Router
Configure a Wireless Router
Computer Networks Presentation IEEE Architecture
PPP Protocol.
Communication and the Internet
IEEE Wireless Local Area Networks (RF-LANs)
Presentation transcript:

Wireless Technology

Different Types of Configuration Basic Service Set (BSS) Extended Service Set (ESS) Independent Basic Service (IBSS) Now we will begin with the 3 fundamental kinds of WLAN settings. All 3 settings include their benefits and drawbacks which I will be referring to. The network system will ascertain which layout would be the beneficial for the provided condition. In the following slides I am going to be showing images of the settings so you can understand better.

Basic Service Set Single access point Set of wireless devices Infrastructure mode Lecturer Notes- 1st kind of setting I am going to point out would be the fundamental service set. A BSS is known as several wireless instruments managed by one access point. In accordance with (Ciampa, 2006), this sort of WLAN can be also known as infrastructure mode.

Basic Service Set Easy to install Great for small areas Limited number of users The BSS is usually utilized for smaller areas and is easy to setup. The main reason why it’s easy to setup is because it just needs a NIC known as a network interface card and a wireless access point. There are normally restricted amounts of end users that can access the wireless portion of it simultaneously. In accordance with (Ciampa, 2006), it is only encouraged that no more than twenty end users in a high traffic network and fifty end users for a system that makes use of only a common process.

Illustration of a Common BSS As you have seen in the representation, there are a couple of wireless machines maintained by just 1 wireless access point.

Extended Service Set BSS can not sustain users Support more users More than two BSS networks Distribution system An ESS is only required if ever the BSS cannot support and maintain a specific number of end users. It often maybe required including an alternate access point for many reasons, even if it’s for traffic needs or the coverage is too small. When several BSS networks are added together via common distribution structure it is deemed an ESS (Ciampa, 2006)

Extended Service Set More coverage Less secure Connectivity problems ESS typically offers a better and larger coverage as it has multiple access points. However, one thing which ESS does not include is that it’s not so protected. This is the reason it’s safer to use ESS when the signal is often created inside of protected place. One more thing is that when a wireless user roams in between BSA’s which are granted by the access points by distinctive organizations, the customer can suffer from the bad communication. Because of this it’s crucial to make use of the identical brand when building an ESS (Ciampa, 2006)

Illustration of a Common ESS As you have seen in this example, now there is 2 access points.

Independent Basic Service Set No AP needed Ad hoc Peer-to-peer Now we have the Independent Basic Service set regarded as IBSS. IBSS needs an access point. Within this layout, every single wireless device is connected to one another as a way to share documents and features. This may even be termed ad hoc mode, the connection is simply attainable in between those certain devices on the network.

Independent Basic Service Set Fast and easy setup No internet Share Data IBSS possesses the benefit from being fast and easy to install. In accordance with (Ciampa, 2006) IBSS is very widely used when the end users do not entail access to the internet or connecting to a network.

Illustration of a common IBSS Now you have an representation of a IBSS layout. From the picture one views that the devices are linked to one another and there exists no AP’s.

Authentication There are only two types Advantages and disadvantages Open system authentication Shared key authentication Advantages and disadvantages Wireless AP’s will need to verify the clients prior to permitting them to join the network or access it. Open system and shared key would be the two kinds of authorization. The one to make use of must take into consideration the present condition, positive effects, drawbacks as well as other factors as well.

Open System Authentication Network Discovery Passive and active scanning Association request frame SSID of network Data rate capability The simplest and easy method of authorization would be the open system. Within the open system authorization, a device discovers a wireless AP making use of passive scanning of radio frequencies or by checking the frequencies directly for a network. Once the wireless device locates an Access Point, then it transmits a connection call frame. The frame that is forwarded could be a huge portion of data that communicates with the AP and signals the AP just what the device can do and the title of the network it desires to associate with.

Illustration of open system authentication The Representation on this slide demonstrates to you an open system authorization. As one views, the laptop attaches to the AP and communicates with the AP. The laptop transmits the AP a request frame that signals that it must join with the SSID which is the network title.

Shared Key Authentication Authentication frame sent to AP Key for both devices Successful text description We now have the shared key authorization that can be a bit more challenging. For starters to access the network, both APs and the wireless client have to know the access key. The wireless device could nonetheless discover the AP making use of active or passive scanning but it’s unique in such cases. After the authorization frame is sent out, the AP transmits back a challenge expression requesting the client to input a shared key. If it matches up, the client will be permitted to connect to the network.

Illustration of shared key authentication This is a representation of the shared key authorization.

Final Recommendation Open system authentication for easy installation Shared key for security I firmly believe that the most suitable option for this position could be an open system authorization because it’s easy to setup and configure. If they need a superior form of security than the best choice is to choose a shared key authorization to satisfy their requirements. With today’s technologies, the shared key authorization may well be simply established using USB Flash drive. Any computer that needs to get to the network will only require the USB Flash drive as a way to obtain access.

References Ciampa, M. (2006). CWNA guide to wireless LANs (2nd ed.). Boston: Thomson Course Technology