Wireless LANs PPT.ppt

Wireless LANs
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Wireless?
• A wireless LAN or WLAN is a wireless local
area network that uses radio waves as its
carrier.
• The last link with the users is wireless, to give
a network connection to all users in a building
or campus.
• The backbone network usually uses cables
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Common Topologies
The wireless LAN connects to a wired LAN
• There is a need of an access point that bridges wireless LAN traffic into the wired
LAN.
• The access point (AP) can also act as a repeater for wireless nodes, effectively
doubling the maximum possible distance between nodes.
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Integration With Existing Networks
• Wireless Access Points (APs) - a small device
that bridges wireless traffic to your network.
• Most access points bridge wireless LANs into
Ethernet networks, but Token-Ring options are
available as well
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
How are WLANs Different?
• They use specialized physical and data link protocols
• They integrate into existing networks through access
points which provide a bridging function
• They let you stay connected as you roam from one
coverage area to another
• They have unique security considerations
• They have specific interoperability requirements
• They require different hardware
• They offer performance that differs from wired LANs.
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Physical and Data Link Layers
Physical Layer:
• The wireless NIC takes frames of data from
the link layer, scrambles the data in a
predetermined way, then uses the modified
data stream to modulate a radio carrier
signal.
Data Link Layer:
• Uses Carriers-Sense-Multiple-Access with
Collision Avoidance (CSMA/CA).
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11 WLANs - Outline
• 801.11 bands and layers
• Link layer
• Media access layer
– frames and headers
– CSMA/CD
• Physical layer
– frames
– modulation
• Frequency hopping
• Direct sequence
• Infrared
• Security
• Implementation
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11 WLAN technologies
• IEEE 802.11 standards and rates
– IEEE 802.11 (1997) 1 Mbps and 2 Mbps (2.4 GHz
band )
– IEEE 802.11b (1999) 11 Mbps (2.4 GHz band) = Wi-
Fi
– IEEE 802.11a (1999) 6, 9, 12, 18, 24, 36, 48, 54
Mbps (5 GHz band)
– IEEE 802.11g (2001 ... 2003) up to 54 Mbps (2.4
GHz) backward compatible to 802.11b
• IEEE 802.11 networks work on license free industrial,
science, medicine (ISM) bands
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Other WLAN technologies
• High performance LAN or HiperLAN (ETSI-BRAN EN 300
652) in the 5 GHz ISM
– version 1 up to 24 Mbps
– version 2 up to 54 Mbps
• HiperLAN provides also QoS for data, video, voice and
images
• Bluetooth
– range up to 100 meters only (cable replacement tech.)
– Bluetooth Special Interest Group (SIG)
– Operates at max of 740 kbps at 2.4 GHz ISM band
– Applies fast frequency hopping 1600 hops/second
– Can have serious interference with 802.11 2.4 GHz range
network
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
IEEE 802.11a rates and modulation
formats
Data Rate
(Mbps)
Modulation Coding Rate
Coded bits per
sub-carrier
Code bits per
OFDM symbol
Data bits per
OFDM symbol
6 BPSK 1 / 2 1 48 24
9 BPSK 3 / 4 1 48 36
12 QPSK 1 / 2 2 96 48
18 QPSK 3 / 4 2 96 72
24 16QAM 1 / 2 4 192 96
36 16QAM 3 / 4 4 192 144
48 64QAM 2 / 3 6 288 192
54 64QAM 3 / 4 6 288 216
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
The IEEE 802.11 and
supporting LAN Standards
• See also IEEE LAN/MAN Standards Committee
Web site
www.manta.ieee.org/groups/802/
IEEE 802.3
Carrier
Sense
IEEE 802.4
Token
Bus
IEEE 802.5
Token
Ring
IEEE 802.11
Wireless
IEEE 802.2
Logical Link Control (LLC)
MAC
PHY
OSI Layer 2
(data link)
OSI Layer 1
(physical)
bus star ring
a b g
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Figure 14.1 Basic service sets (BSSs)
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Figure 14.2 Extended service sets (ESSs)
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
PHY
IEEE 802.11 Architecture
• IEEE 802.11 defines the physical (PHY), logical link (LLC) and media access
control (MAC) layers for a wireless local area network
• 802.11 networks can work as
– basic service set (BSS)
– extended service set (ESS)
• BSS can also be used in ad-hoc
networking
LLC: Logical Link Control Layer
MAC: Medium Access Control Layer
PHY: Physical Layer
FHSS: Frequency hopping SS
DSSS: Direct sequence SS
SS: Spread spectrum
IR: Infrared light
BSS: Basic Service Set
ESS: Extended Service Set
AP: Access Point
DS: Distribution System
DS,
ESS
ad-hoc network
LLC
MAC
FHSS DSSS IR
Network
802.11
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Extended service set (ESS)
Basic (independent) service set (BSS)
BSS and ESS
• In ESS multiple access points connected by access points and a distribution
system as Ethernet
– BSSs partially overlap
– Physically disjoint BSSs
– Physically collocated BSSs (several antennas)
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11 Logical architecture
• LLC provides addressing and data link control
• MAC provides
– access to wireless medium
• CSMA/CA
• Priority based access (802.12)
– joining the network
– authentication & privacy
– Services
• Station service: Authentication, privacy, MSDU* delivery
• Distributed system: Association** and participates to data distribution
• Three physical layers (PHY)
– FHSS: Frequency Hopping Spread
Spectrum (SS)
– DSSS: Direct Sequence SS
– IR: Infrared transmission
LLC: Logical Link Control Layer
MAC: Medium Access Control Layer
PHY: Physical Layer
FH: Frequency hopping
DS: Direct sequence
IR: Infrared light
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11 DSSS
• Supports 1 and 2 Mbps data transport, uses BPSK and QPSK modulation
• Uses 11 chips Barker code for spreading - 10.4 dB processing gain
• Defines 14 overlapping channels, each having 22 MHz channel bandwidth, from
2.401 to 2.483 GHz
• Power limits 1000mW in US, 100mW in EU, 200mW in Japan
• Immune to narrow-band interference, cheaper hardware
DS-transmitter
PPDU:baseband data frame
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11 FHSS
• Supports 1 and 2 Mbps data transport and applies two level - GFSK modulation*
(Gaussian Frequency Shift Keying)
• 79 channels from 2.402 to 2.480 GHz ( in U.S. and most of EU countries) with 1
MHz channel space
• 78 hopping sequences with minimum 6 MHz hopping space, each sequence uses
every 79 frequency elements once
• Minimum hopping rate
2.5 hops/second
• Tolerance to multi-path,
narrow band interference,
security
• Low speed, small range
due to FCC TX power
regulation (10mW)
* , 160kHz
c nom
f f f f
     Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11 LAN architecture
 wireless host communicates
with base station
 base station = access point
(AP)
 Basic Service Set (BSS) (aka
“cell”) in infrastructure mode
contains:
 wireless hosts
 access point (AP): base
station
 ad hoc mode: hosts only
BSS
1
BSS 2
Internet
hub, switch
or router
AP
AP
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11: Channels, association
• 802.11b: 2.4GHz-2.485GHz spectrum divided into 11 channels
at different frequencies
– AP admin chooses frequency for AP
– interference possible: channel can be same as that
chosen by neighboring AP!
• host: must associate with an AP
– scans channels, listening for frames containing
AP’s name and MAC address
– selects AP to associate with
– may perform authentication
– will typically run DHCP to get IP address in AP’s
subnet
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
IEEE 802.11 MAC Protocol: CSMA/CA
802.11 sender
1 if sense channel idle for DIFS (DCF InterFrame
Spacing) then
transmit entire frame (no CD)
2 if sense channel busy then
start random backoff time
timer counts down while channel idle
transmit when timer expires
if no ACK, increase random backoff interval,
repeat 2
802.11 receiver
- if frame received OK
return ACK after SIFS (Short InterFrame Spacing)-
(ACK needed due to hidden terminal problem)
sender receiver
DIFS
data
SIFS
ACK
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Avoiding collisions (more)
idea: allow sender to “reserve” channel rather than random access of
data frames: avoid collisions of long data frames
• sender first transmits small request-to-send (RTS) packets to BS using
CSMA
– RTSs may still collide with each other (but they’re short)
• BS broadcasts clear-to-send CTS in response to RTS
• CTS heard by all nodes
– sender transmits data frame
– other stations defer transmissions
avoid data frame collisions completely
using small reservation packets!
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Collision Avoidance: RTS-CTS exchange
AP
A B
time
DATA (A)
reservation
collision
defer
IEEE 802.11 Media
Access Control (MAC)
DIFS: Distributed Inter-Frame Spacing
SIFS: Short Inter-Frame Spacing
ack: Acknowledgement
Carrier-sense multiple access protocol
with collision avoidance (CSMA/CS)
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Table 14.2 Values of subfields in control frames
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Table 14.4 Physical layers
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Security
• In theory, spread spectrum radio signals are
inherently difficult to decipher without knowing the
exact hopping sequences or direct sequence codes
used
• The IEEE 802.11 standard specifies optional security
called "Wired Equivalent Privacy" whose goal is that
a wireless LAN offer privacy equivalent to that
offered by a wired LAN
• The standard also specifies optional authentication
measures
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Authentication and privacy
• Goal: to prevent unauthorized access & eavesdropping
• Realized by authentication service prior access
• Open system authentication
– station wanting to authenticate sends authentication management frame -
receiving station sends back frame for successful authentication
• Shared key authentication (included in WEP*)
– Secret, shared key received by all stations by a separate, 802.11 independent
channel
– Stations authenticate by a shared knowledge of the key properties
• WEP’s privacy (blocking out eavesdropping) is based on ciphering:
*WEP: Wired Equivalent Privacy
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
802.11b Security Features
• Wired Equivalent Privacy (WEP) – A protocol to
protect link-level data during wireless transmission
between clients and access points.
• Services:
– Authentication: provides access control to the network by
denying access to client stations that fail to authenticate
properly.
– Confidentiality: intends to prevent information
compromise from casual eavesdropping
– Integrity: prevents messages from being modified while in
transit between the wireless client and the access point.
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Authentication
Means:
• Based on cryptography
• Non-cryptographic
• Both are identity-based verification
mechanisms (devices request access based on
the SSID – Service Set Identifier of the wireless
network).
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Authentication
• Authentication techniques
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Privacy
• Cryptographic techniques
• WEP Uses RC4 symmetric key, stream cipher algorithm to
generate a pseudo random data sequence. The stream is
XORed with the data to be transmitted
• Key sizes: 40bits to 128bits
• Unfortunately, recent attacks have shown that the WEP
approach for privacy is vulnerable to certain attack regardless
of key size
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Data Integrity
• Data integrity is ensured by a simple encrypted
version of CRC (Cyclic Redundant Check)
• Also vulnerable to some attacks
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
Security Problems
• Security features in Wireless products are frequently
not enabled.
• Use of static WEP keys (keys are in use for a very long
time).
• WEP does not provide key management.
• Cryptographic keys are short.
• No user authentication occurs – only devices are
authenticated. A stolen device can access the
network.
• Identity based systems are vulnerable.
• Packet integrity is poor.
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
WLAN Network Planning
• Network planning target
– Maximize system performance with limited resource
– Including
• coverage
• throughput
• capacity
• interference
• roaming
• security, etc.
• Planning process
– Requirements for project management personnel
– Site investigation
– Computer-aided planning practice
– Testing and verifying planning
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
WLAN benefits
• Mobility
– increases working efficiency and productivity
– extends the On-line period
• Installation on difficult-to-wire areas
– inside buildings
– road crossings
• Increased reliability
– Note: Pay attention to security!
• Reduced installation time
– cabling time and convenient to users and difficult-to-
wire cases
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
WLAN benefits (cont.)
• Broadband
– 11 Mbps for 802.11b
– 54 Mbps for 802.11a/g (GSM:9.6Kbps,
HCSCD:~40Kbps, GPRS:~160Kbps, WCDMA:up to
2Mbps)
• Long-term cost savings
– O & M cheaper that for wired nets
– Comes from easy maintenance, cabling cost, working
efficiency and accuracy
– Network can be established in a new location just by
moving the PCs!
Prepared by, Dr.T.Thendral, Assistant
Professor, SRCW
1 de 37

Recomendados

awsn module 1.ppt por
awsn module 1.pptawsn module 1.ppt
awsn module 1.pptnandhakumar421744
29 visualizações110 slides
Mobile Communication por
Mobile CommunicationMobile Communication
Mobile CommunicationKathirvel Ayyaswamy
3K visualizações142 slides
Wireless-4.pptx por
Wireless-4.pptxWireless-4.pptx
Wireless-4.pptxTapodhirAcharjee2
1 visão84 slides
Wireless presentation-1 por
Wireless presentation-1Wireless presentation-1
Wireless presentation-1Mayur Garg
1.7K visualizações64 slides
wlans por
wlanswlans
wlansnarayana swamy
399 visualizações19 slides
Ieee institute of electrical and electronics engineers por
Ieee  institute of electrical and electronics engineersIeee  institute of electrical and electronics engineers
Ieee institute of electrical and electronics engineershimanshu yadav
85 visualizações25 slides

Mais conteúdo relacionado

Similar a Wireless LANs PPT.ppt

Wc nots final unit new 8 por
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8SURESHA V
4.8K visualizações19 slides
ieee protocols 802.11 por
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11Narendar Bogala
1.1K visualizações26 slides
Wireless Networks.pptx por
Wireless Networks.pptxWireless Networks.pptx
Wireless Networks.pptxMinecraftJava
4 visualizações34 slides
Ccna Wireless Study Guide por
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study GuideCCNAResources
1.5K visualizações16 slides
High performance browser networking ch5,6 por
High performance browser networking ch5,6High performance browser networking ch5,6
High performance browser networking ch5,6Seung-Bum Lee
28 visualizações25 slides
WiFi Networks.pdf por
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdfwaqas232871
68 visualizações10 slides

Similar a Wireless LANs PPT.ppt(20)

Wc nots final unit new 8 por SURESHA V
Wc nots final unit new  8Wc nots final unit new  8
Wc nots final unit new 8
SURESHA V4.8K visualizações
ieee protocols 802.11 por Narendar Bogala
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
Narendar Bogala1.1K visualizações
Wireless Networks.pptx por MinecraftJava
Wireless Networks.pptxWireless Networks.pptx
Wireless Networks.pptx
MinecraftJava4 visualizações
Ccna Wireless Study Guide por CCNAResources
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study Guide
CCNAResources1.5K visualizações
High performance browser networking ch5,6 por Seung-Bum Lee
High performance browser networking ch5,6High performance browser networking ch5,6
High performance browser networking ch5,6
Seung-Bum Lee28 visualizações
WiFi Networks.pdf por waqas232871
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdf
waqas23287168 visualizações
Ieee 802.11 wireless lan por Parthipan Parthi
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
Parthipan Parthi2.7K visualizações
Computer networks--networking hardware por Mziaulla
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
Mziaulla9.8K visualizações
It fundamentals wired and wireless troubleshooting por Prof. Dr. AMOL KASTURE
It fundamentals   wired and wireless troubleshootingIt fundamentals   wired and wireless troubleshooting
It fundamentals wired and wireless troubleshooting
Prof. Dr. AMOL KASTURE60 visualizações
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C... por Soumen Santra
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Soumen Santra278 visualizações
IEEE standards 802.3.&802.11 por Keshav Maheshwari
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
Keshav Maheshwari3.1K visualizações
Wlan IEEE 802.11 por Adeel Mirza
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11
Adeel Mirza558 visualizações
Seminar por cnnithin
SeminarSeminar
Seminar
cnnithin1.9K visualizações
Lecture 14 por Joe Christensen
Lecture 14Lecture 14
Lecture 14
Joe Christensen2.9K visualizações
Unit 1-converted.pptx por Pavithra525349
Unit 1-converted.pptxUnit 1-converted.pptx
Unit 1-converted.pptx
Pavithra5253497 visualizações
Computer networks--networking hardware por okelloerick
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
okelloerick43 visualizações
Wireless networksppt por pmuthumca51
Wireless networkspptWireless networksppt
Wireless networksppt
pmuthumca51493 visualizações
Wireless networksppt por dxmuthu
Wireless networkspptWireless networksppt
Wireless networksppt
dxmuthu989 visualizações
802 standerd por sandeshkumar91
802 standerd802 standerd
802 standerd
sandeshkumar911.2K visualizações
Wireless%20networking%20technology(1) por Darpan Patel
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)
Darpan Patel338 visualizações

Mais de DrTThendralCompSci

The Application Layer.ppt por
The Application Layer.pptThe Application Layer.ppt
The Application Layer.pptDrTThendralCompSci
99 visualizações35 slides
Transport Layer.pptx por
Transport Layer.pptxTransport Layer.pptx
Transport Layer.pptxDrTThendralCompSci
76 visualizações28 slides
SOFTWARE QUALITY ASSURANCE.ppt por
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.pptDrTThendralCompSci
250 visualizações30 slides
Software Configuration Management.ppt por
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.pptDrTThendralCompSci
12 visualizações23 slides
UNIT TESTING.pptx por
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptxDrTThendralCompSci
114 visualizações21 slides
SOFTWARE TESTING.pptx por
SOFTWARE TESTING.pptxSOFTWARE TESTING.pptx
SOFTWARE TESTING.pptxDrTThendralCompSci
362 visualizações48 slides

Mais de DrTThendralCompSci(20)

The Application Layer.ppt por DrTThendralCompSci
The Application Layer.pptThe Application Layer.ppt
The Application Layer.ppt
DrTThendralCompSci99 visualizações
Transport Layer.pptx por DrTThendralCompSci
Transport Layer.pptxTransport Layer.pptx
Transport Layer.pptx
DrTThendralCompSci76 visualizações
SOFTWARE QUALITY ASSURANCE.ppt por DrTThendralCompSci
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.ppt
DrTThendralCompSci250 visualizações
Software Configuration Management.ppt por DrTThendralCompSci
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.ppt
DrTThendralCompSci12 visualizações
UNIT TESTING.pptx por DrTThendralCompSci
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptx
DrTThendralCompSci114 visualizações
SOFTWARE TESTING.pptx por DrTThendralCompSci
SOFTWARE TESTING.pptxSOFTWARE TESTING.pptx
SOFTWARE TESTING.pptx
DrTThendralCompSci362 visualizações
Software design and Software engineering.pptx por DrTThendralCompSci
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
DrTThendralCompSci105 visualizações
NETWORK LAYER.ppt por DrTThendralCompSci
NETWORK LAYER.pptNETWORK LAYER.ppt
NETWORK LAYER.ppt
DrTThendralCompSci189 visualizações
MEDIUM-ACCESS CONTROL SUB LAYER.ppt por DrTThendralCompSci
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
DrTThendralCompSci155 visualizações
DATA-LINK LAYER.ppt por DrTThendralCompSci
DATA-LINK LAYER.pptDATA-LINK LAYER.ppt
DATA-LINK LAYER.ppt
DrTThendralCompSci348 visualizações
Software design and Software engineering.pptx por DrTThendralCompSci
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
DrTThendralCompSci253 visualizações
Software prototyping.pptx por DrTThendralCompSci
Software prototyping.pptxSoftware prototyping.pptx
Software prototyping.pptx
DrTThendralCompSci148 visualizações
Requirement Engineering.ppt por DrTThendralCompSci
Requirement Engineering.pptRequirement Engineering.ppt
Requirement Engineering.ppt
DrTThendralCompSci130 visualizações
Unit 1 - Introduction to Software Engineering.ppt por DrTThendralCompSci
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
DrTThendralCompSci210 visualizações
EFFECTIVE MODULAR DESIGN.pptx por DrTThendralCompSci
EFFECTIVE MODULAR DESIGN.pptxEFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptx
DrTThendralCompSci309 visualizações
PHYSICAL LAYER.ppt por DrTThendralCompSci
PHYSICAL LAYER.pptPHYSICAL LAYER.ppt
PHYSICAL LAYER.ppt
DrTThendralCompSci302 visualizações
PROCESS MODELS.ppt por DrTThendralCompSci
PROCESS MODELS.pptPROCESS MODELS.ppt
PROCESS MODELS.ppt
DrTThendralCompSci393 visualizações

Último

Structure and Functions of Cell.pdf por
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdfNithya Murugan
719 visualizações10 slides
Women from Hackney’s History: Stoke Newington by Sue Doe por
Women from Hackney’s History: Stoke Newington by Sue DoeWomen from Hackney’s History: Stoke Newington by Sue Doe
Women from Hackney’s History: Stoke Newington by Sue DoeHistory of Stoke Newington
163 visualizações21 slides
ICS3211_lecture 09_2023.pdf por
ICS3211_lecture 09_2023.pdfICS3211_lecture 09_2023.pdf
ICS3211_lecture 09_2023.pdfVanessa Camilleri
115 visualizações10 slides
MIXING OF PHARMACEUTICALS.pptx por
MIXING OF PHARMACEUTICALS.pptxMIXING OF PHARMACEUTICALS.pptx
MIXING OF PHARMACEUTICALS.pptxAnupkumar Sharma
95 visualizações35 slides
Narration lesson plan por
Narration lesson planNarration lesson plan
Narration lesson planTARIQ KHAN
61 visualizações11 slides
Drama KS5 Breakdown por
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 BreakdownWestHatch
98 visualizações2 slides

Último(20)

Structure and Functions of Cell.pdf por Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan719 visualizações
Women from Hackney’s History: Stoke Newington by Sue Doe por History of Stoke Newington
Women from Hackney’s History: Stoke Newington by Sue DoeWomen from Hackney’s History: Stoke Newington by Sue Doe
Women from Hackney’s History: Stoke Newington by Sue Doe
History of Stoke Newington163 visualizações
ICS3211_lecture 09_2023.pdf por Vanessa Camilleri
ICS3211_lecture 09_2023.pdfICS3211_lecture 09_2023.pdf
ICS3211_lecture 09_2023.pdf
Vanessa Camilleri115 visualizações
MIXING OF PHARMACEUTICALS.pptx por Anupkumar Sharma
MIXING OF PHARMACEUTICALS.pptxMIXING OF PHARMACEUTICALS.pptx
MIXING OF PHARMACEUTICALS.pptx
Anupkumar Sharma95 visualizações
Narration lesson plan por TARIQ KHAN
Narration lesson planNarration lesson plan
Narration lesson plan
TARIQ KHAN61 visualizações
Drama KS5 Breakdown por WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch98 visualizações
REPRESENTATION - GAUNTLET.pptx por iammrhaywood
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptx
iammrhaywood138 visualizações
Classification of crude drugs.pptx por GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra14101 visualizações
CUNY IT Picciano.pptx por apicciano
CUNY IT Picciano.pptxCUNY IT Picciano.pptx
CUNY IT Picciano.pptx
apicciano54 visualizações
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively por PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 623 visualizações
Sociology KS5 por WestHatch
Sociology KS5Sociology KS5
Sociology KS5
WestHatch85 visualizações
Jibachha publishing Textbook.docx por DrJibachhaSahVetphys
Jibachha publishing Textbook.docxJibachha publishing Textbook.docx
Jibachha publishing Textbook.docx
DrJibachhaSahVetphys51 visualizações
When Sex Gets Complicated: Porn, Affairs, & Cybersex por Marlene Maheu
When Sex Gets Complicated: Porn, Affairs, & CybersexWhen Sex Gets Complicated: Porn, Affairs, & Cybersex
When Sex Gets Complicated: Porn, Affairs, & Cybersex
Marlene Maheu85 visualizações
Create a Structure in VBNet.pptx por Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P78 visualizações
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx por Ms. Pooja Bhandare
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptxPharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
Ms. Pooja Bhandare113 visualizações
UNIDAD 3 6º C.MEDIO.pptx por MarcosRodriguezUcedo
UNIDAD 3 6º C.MEDIO.pptxUNIDAD 3 6º C.MEDIO.pptx
UNIDAD 3 6º C.MEDIO.pptx
MarcosRodriguezUcedo134 visualizações
Use of Probiotics in Aquaculture.pptx por AKSHAY MANDAL
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptx
AKSHAY MANDAL119 visualizações

Wireless LANs PPT.ppt

  • 1. Wireless LANs Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 2. Wireless? • A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. • The last link with the users is wireless, to give a network connection to all users in a building or campus. • The backbone network usually uses cables Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 3. Common Topologies The wireless LAN connects to a wired LAN • There is a need of an access point that bridges wireless LAN traffic into the wired LAN. • The access point (AP) can also act as a repeater for wireless nodes, effectively doubling the maximum possible distance between nodes. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 4. Integration With Existing Networks • Wireless Access Points (APs) - a small device that bridges wireless traffic to your network. • Most access points bridge wireless LANs into Ethernet networks, but Token-Ring options are available as well Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 5. How are WLANs Different? • They use specialized physical and data link protocols • They integrate into existing networks through access points which provide a bridging function • They let you stay connected as you roam from one coverage area to another • They have unique security considerations • They have specific interoperability requirements • They require different hardware • They offer performance that differs from wired LANs. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 6. Physical and Data Link Layers Physical Layer: • The wireless NIC takes frames of data from the link layer, scrambles the data in a predetermined way, then uses the modified data stream to modulate a radio carrier signal. Data Link Layer: • Uses Carriers-Sense-Multiple-Access with Collision Avoidance (CSMA/CA). Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 7. 802.11 WLANs - Outline • 801.11 bands and layers • Link layer • Media access layer – frames and headers – CSMA/CD • Physical layer – frames – modulation • Frequency hopping • Direct sequence • Infrared • Security • Implementation Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 8. 802.11 WLAN technologies • IEEE 802.11 standards and rates – IEEE 802.11 (1997) 1 Mbps and 2 Mbps (2.4 GHz band ) – IEEE 802.11b (1999) 11 Mbps (2.4 GHz band) = Wi- Fi – IEEE 802.11a (1999) 6, 9, 12, 18, 24, 36, 48, 54 Mbps (5 GHz band) – IEEE 802.11g (2001 ... 2003) up to 54 Mbps (2.4 GHz) backward compatible to 802.11b • IEEE 802.11 networks work on license free industrial, science, medicine (ISM) bands Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 9. Other WLAN technologies • High performance LAN or HiperLAN (ETSI-BRAN EN 300 652) in the 5 GHz ISM – version 1 up to 24 Mbps – version 2 up to 54 Mbps • HiperLAN provides also QoS for data, video, voice and images • Bluetooth – range up to 100 meters only (cable replacement tech.) – Bluetooth Special Interest Group (SIG) – Operates at max of 740 kbps at 2.4 GHz ISM band – Applies fast frequency hopping 1600 hops/second – Can have serious interference with 802.11 2.4 GHz range network Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 10. IEEE 802.11a rates and modulation formats Data Rate (Mbps) Modulation Coding Rate Coded bits per sub-carrier Code bits per OFDM symbol Data bits per OFDM symbol 6 BPSK 1 / 2 1 48 24 9 BPSK 3 / 4 1 48 36 12 QPSK 1 / 2 2 96 48 18 QPSK 3 / 4 2 96 72 24 16QAM 1 / 2 4 192 96 36 16QAM 3 / 4 4 192 144 48 64QAM 2 / 3 6 288 192 54 64QAM 3 / 4 6 288 216 Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 11. The IEEE 802.11 and supporting LAN Standards • See also IEEE LAN/MAN Standards Committee Web site www.manta.ieee.org/groups/802/ IEEE 802.3 Carrier Sense IEEE 802.4 Token Bus IEEE 802.5 Token Ring IEEE 802.11 Wireless IEEE 802.2 Logical Link Control (LLC) MAC PHY OSI Layer 2 (data link) OSI Layer 1 (physical) bus star ring a b g Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 12. Figure 14.1 Basic service sets (BSSs) Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 13. Figure 14.2 Extended service sets (ESSs) Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 14. PHY IEEE 802.11 Architecture • IEEE 802.11 defines the physical (PHY), logical link (LLC) and media access control (MAC) layers for a wireless local area network • 802.11 networks can work as – basic service set (BSS) – extended service set (ESS) • BSS can also be used in ad-hoc networking LLC: Logical Link Control Layer MAC: Medium Access Control Layer PHY: Physical Layer FHSS: Frequency hopping SS DSSS: Direct sequence SS SS: Spread spectrum IR: Infrared light BSS: Basic Service Set ESS: Extended Service Set AP: Access Point DS: Distribution System DS, ESS ad-hoc network LLC MAC FHSS DSSS IR Network 802.11 Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 15. Extended service set (ESS) Basic (independent) service set (BSS) BSS and ESS • In ESS multiple access points connected by access points and a distribution system as Ethernet – BSSs partially overlap – Physically disjoint BSSs – Physically collocated BSSs (several antennas) Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 16. 802.11 Logical architecture • LLC provides addressing and data link control • MAC provides – access to wireless medium • CSMA/CA • Priority based access (802.12) – joining the network – authentication & privacy – Services • Station service: Authentication, privacy, MSDU* delivery • Distributed system: Association** and participates to data distribution • Three physical layers (PHY) – FHSS: Frequency Hopping Spread Spectrum (SS) – DSSS: Direct Sequence SS – IR: Infrared transmission LLC: Logical Link Control Layer MAC: Medium Access Control Layer PHY: Physical Layer FH: Frequency hopping DS: Direct sequence IR: Infrared light Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 17. 802.11 DSSS • Supports 1 and 2 Mbps data transport, uses BPSK and QPSK modulation • Uses 11 chips Barker code for spreading - 10.4 dB processing gain • Defines 14 overlapping channels, each having 22 MHz channel bandwidth, from 2.401 to 2.483 GHz • Power limits 1000mW in US, 100mW in EU, 200mW in Japan • Immune to narrow-band interference, cheaper hardware DS-transmitter PPDU:baseband data frame Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 18. 802.11 FHSS • Supports 1 and 2 Mbps data transport and applies two level - GFSK modulation* (Gaussian Frequency Shift Keying) • 79 channels from 2.402 to 2.480 GHz ( in U.S. and most of EU countries) with 1 MHz channel space • 78 hopping sequences with minimum 6 MHz hopping space, each sequence uses every 79 frequency elements once • Minimum hopping rate 2.5 hops/second • Tolerance to multi-path, narrow band interference, security • Low speed, small range due to FCC TX power regulation (10mW) * , 160kHz c nom f f f f      Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 19. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW 802.11 LAN architecture  wireless host communicates with base station  base station = access point (AP)  Basic Service Set (BSS) (aka “cell”) in infrastructure mode contains:  wireless hosts  access point (AP): base station  ad hoc mode: hosts only BSS 1 BSS 2 Internet hub, switch or router AP AP
  • 20. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW 802.11: Channels, association • 802.11b: 2.4GHz-2.485GHz spectrum divided into 11 channels at different frequencies – AP admin chooses frequency for AP – interference possible: channel can be same as that chosen by neighboring AP! • host: must associate with an AP – scans channels, listening for frames containing AP’s name and MAC address – selects AP to associate with – may perform authentication – will typically run DHCP to get IP address in AP’s subnet
  • 21. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW IEEE 802.11 MAC Protocol: CSMA/CA 802.11 sender 1 if sense channel idle for DIFS (DCF InterFrame Spacing) then transmit entire frame (no CD) 2 if sense channel busy then start random backoff time timer counts down while channel idle transmit when timer expires if no ACK, increase random backoff interval, repeat 2 802.11 receiver - if frame received OK return ACK after SIFS (Short InterFrame Spacing)- (ACK needed due to hidden terminal problem) sender receiver DIFS data SIFS ACK
  • 22. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW Avoiding collisions (more) idea: allow sender to “reserve” channel rather than random access of data frames: avoid collisions of long data frames • sender first transmits small request-to-send (RTS) packets to BS using CSMA – RTSs may still collide with each other (but they’re short) • BS broadcasts clear-to-send CTS in response to RTS • CTS heard by all nodes – sender transmits data frame – other stations defer transmissions avoid data frame collisions completely using small reservation packets!
  • 23. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW Collision Avoidance: RTS-CTS exchange AP A B time DATA (A) reservation collision defer
  • 24. IEEE 802.11 Media Access Control (MAC) DIFS: Distributed Inter-Frame Spacing SIFS: Short Inter-Frame Spacing ack: Acknowledgement Carrier-sense multiple access protocol with collision avoidance (CSMA/CS) Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 25. Table 14.2 Values of subfields in control frames Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 26. Table 14.4 Physical layers Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 27. Security • In theory, spread spectrum radio signals are inherently difficult to decipher without knowing the exact hopping sequences or direct sequence codes used • The IEEE 802.11 standard specifies optional security called "Wired Equivalent Privacy" whose goal is that a wireless LAN offer privacy equivalent to that offered by a wired LAN • The standard also specifies optional authentication measures Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 28. Authentication and privacy • Goal: to prevent unauthorized access & eavesdropping • Realized by authentication service prior access • Open system authentication – station wanting to authenticate sends authentication management frame - receiving station sends back frame for successful authentication • Shared key authentication (included in WEP*) – Secret, shared key received by all stations by a separate, 802.11 independent channel – Stations authenticate by a shared knowledge of the key properties • WEP’s privacy (blocking out eavesdropping) is based on ciphering: *WEP: Wired Equivalent Privacy Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 29. 802.11b Security Features • Wired Equivalent Privacy (WEP) – A protocol to protect link-level data during wireless transmission between clients and access points. • Services: – Authentication: provides access control to the network by denying access to client stations that fail to authenticate properly. – Confidentiality: intends to prevent information compromise from casual eavesdropping – Integrity: prevents messages from being modified while in transit between the wireless client and the access point. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 30. Authentication Means: • Based on cryptography • Non-cryptographic • Both are identity-based verification mechanisms (devices request access based on the SSID – Service Set Identifier of the wireless network). Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 31. Authentication • Authentication techniques Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 32. Privacy • Cryptographic techniques • WEP Uses RC4 symmetric key, stream cipher algorithm to generate a pseudo random data sequence. The stream is XORed with the data to be transmitted • Key sizes: 40bits to 128bits • Unfortunately, recent attacks have shown that the WEP approach for privacy is vulnerable to certain attack regardless of key size Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 33. Data Integrity • Data integrity is ensured by a simple encrypted version of CRC (Cyclic Redundant Check) • Also vulnerable to some attacks Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 34. Security Problems • Security features in Wireless products are frequently not enabled. • Use of static WEP keys (keys are in use for a very long time). • WEP does not provide key management. • Cryptographic keys are short. • No user authentication occurs – only devices are authenticated. A stolen device can access the network. • Identity based systems are vulnerable. • Packet integrity is poor. Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 35. WLAN Network Planning • Network planning target – Maximize system performance with limited resource – Including • coverage • throughput • capacity • interference • roaming • security, etc. • Planning process – Requirements for project management personnel – Site investigation – Computer-aided planning practice – Testing and verifying planning Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 36. WLAN benefits • Mobility – increases working efficiency and productivity – extends the On-line period • Installation on difficult-to-wire areas – inside buildings – road crossings • Increased reliability – Note: Pay attention to security! • Reduced installation time – cabling time and convenient to users and difficult-to- wire cases Prepared by, Dr.T.Thendral, Assistant Professor, SRCW
  • 37. WLAN benefits (cont.) • Broadband – 11 Mbps for 802.11b – 54 Mbps for 802.11a/g (GSM:9.6Kbps, HCSCD:~40Kbps, GPRS:~160Kbps, WCDMA:up to 2Mbps) • Long-term cost savings – O & M cheaper that for wired nets – Comes from easy maintenance, cabling cost, working efficiency and accuracy – Network can be established in a new location just by moving the PCs! Prepared by, Dr.T.Thendral, Assistant Professor, SRCW