Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wireless Technology.

Similar presentations


Presentation on theme: "Wireless Technology."— Presentation transcript:

1 Wireless Technology

2 Different Types of Configuration
Basic Service Set (BSS) Extended Service Set (ESS) Independent Basic Service (IBSS) Now we will begin with the 3 fundamental kinds of WLAN settings. All 3 settings include their benefits and drawbacks which I will be referring to. The network system will ascertain which layout would be the beneficial for the provided condition. In the following slides I am going to be showing images of the settings so you can understand better.

3 Basic Service Set Single access point Set of wireless devices
Infrastructure mode Lecturer Notes- 1st kind of setting I am going to point out would be the fundamental service set. A BSS is known as several wireless instruments managed by one access point. In accordance with (Ciampa, 2006), this sort of WLAN can be also known as infrastructure mode.

4 Basic Service Set Easy to install Great for small areas
Limited number of users The BSS is usually utilized for smaller areas and is easy to setup. The main reason why it’s easy to setup is because it just needs a NIC known as a network interface card and a wireless access point. There are normally restricted amounts of end users that can access the wireless portion of it simultaneously. In accordance with (Ciampa, 2006), it is only encouraged that no more than twenty end users in a high traffic network and fifty end users for a system that makes use of only a common process.

5 Illustration of a Common BSS
As you have seen in the representation, there are a couple of wireless machines maintained by just 1 wireless access point.

6 Extended Service Set BSS can not sustain users Support more users
More than two BSS networks Distribution system An ESS is only required if ever the BSS cannot support and maintain a specific number of end users. It often maybe required including an alternate access point for many reasons, even if it’s for traffic needs or the coverage is too small. When several BSS networks are added together via common distribution structure it is deemed an ESS (Ciampa, 2006)

7 Extended Service Set More coverage Less secure Connectivity problems
ESS typically offers a better and larger coverage as it has multiple access points. However, one thing which ESS does not include is that it’s not so protected. This is the reason it’s safer to use ESS when the signal is often created inside of protected place. One more thing is that when a wireless user roams in between BSA’s which are granted by the access points by distinctive organizations, the customer can suffer from the bad communication. Because of this it’s crucial to make use of the identical brand when building an ESS (Ciampa, 2006)

8 Illustration of a Common ESS
As you have seen in this example, now there is 2 access points.

9 Independent Basic Service Set
No AP needed Ad hoc Peer-to-peer Now we have the Independent Basic Service set regarded as IBSS. IBSS needs an access point. Within this layout, every single wireless device is connected to one another as a way to share documents and features. This may even be termed ad hoc mode, the connection is simply attainable in between those certain devices on the network.

10 Independent Basic Service Set
Fast and easy setup No internet Share Data IBSS possesses the benefit from being fast and easy to install. In accordance with (Ciampa, 2006) IBSS is very widely used when the end users do not entail access to the internet or connecting to a network.

11 Illustration of a common IBSS
Now you have an representation of a IBSS layout. From the picture one views that the devices are linked to one another and there exists no AP’s.

12 Authentication There are only two types Advantages and disadvantages
Open system authentication Shared key authentication Advantages and disadvantages Wireless AP’s will need to verify the clients prior to permitting them to join the network or access it. Open system and shared key would be the two kinds of authorization. The one to make use of must take into consideration the present condition, positive effects, drawbacks as well as other factors as well.

13 Open System Authentication
Network Discovery Passive and active scanning Association request frame SSID of network Data rate capability The simplest and easy method of authorization would be the open system. Within the open system authorization, a device discovers a wireless AP making use of passive scanning of radio frequencies or by checking the frequencies directly for a network. Once the wireless device locates an Access Point, then it transmits a connection call frame. The frame that is forwarded could be a huge portion of data that communicates with the AP and signals the AP just what the device can do and the title of the network it desires to associate with.

14 Illustration of open system authentication
The Representation on this slide demonstrates to you an open system authorization. As one views, the laptop attaches to the AP and communicates with the AP. The laptop transmits the AP a request frame that signals that it must join with the SSID which is the network title.

15 Shared Key Authentication
Authentication frame sent to AP Key for both devices Successful text description We now have the shared key authorization that can be a bit more challenging. For starters to access the network, both APs and the wireless client have to know the access key. The wireless device could nonetheless discover the AP making use of active or passive scanning but it’s unique in such cases. After the authorization frame is sent out, the AP transmits back a challenge expression requesting the client to input a shared key. If it matches up, the client will be permitted to connect to the network.

16 Illustration of shared key authentication
This is a representation of the shared key authorization.

17 Final Recommendation Open system authentication for easy installation
Shared key for security I firmly believe that the most suitable option for this position could be an open system authorization because it’s easy to setup and configure. If they need a superior form of security than the best choice is to choose a shared key authorization to satisfy their requirements. With today’s technologies, the shared key authorization may well be simply established using USB Flash drive. Any computer that needs to get to the network will only require the USB Flash drive as a way to obtain access.

18 References Ciampa, M. (2006). CWNA guide to wireless LANs (2nd ed.). Boston: Thomson Course Technology


Download ppt "Wireless Technology."

Similar presentations


Ads by Google