WiFi  WiFi is the wireless way to handle networking.  Wi-fi is a wireless technology that uses radio frequency to transmit data through radio frequency.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Advertisements

How to Set Up, Secure and Manage A Network
LUCID Summer Workshop August 3, 2004
© 2008 The McGraw-Hill Companies 1 Understanding Wireless Networking.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
CPET 260 – Network I Wireless Networks Bluetooth.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
Wireless Fidelity (Wi-Fi)
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
WiFi Networking LUCID Summer Workshop August 2, 2004.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
Wireless LANs Presented by: Jerome Thompson Mei-Lun Huang Liu-Yin Hu Kai-Wing Sum.
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
Wireless Networking 102.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter 5 Updated January 2009 Raymond Panko’s Business Data Networks and Telecommunications,
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Data Communication. 2 Data Communications Data communication system components: Message Message Information (data) to be communicated. Sender Sender Device.
Wireless Communication. Learning Objectives: By the end of this topic you should be able to: describe wireless communication methods, describe wireless.
Sybex CCNA Chapter 12: Wireless Networks.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Vijesh J Shukla M.K.Institute Computer Studies Bharuch Presentation on WI _Fi (Wirless LAN) 51st Orientation Programme (11/07/2006 to 07/08/2006)
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
PRESENTATION ON WI-FI TECHNOLOGY
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
Presented by Hampton Smith  An IEEE (Institute for Electrical and Electronics Engineers) protocol ratified in 1997 which defines a standard.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Sybex CCNA Chapter 12: Wireless Networks Instructor & Todd Lammle.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
By. P. Victer Paul Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends like u.. To get to know about more.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
PRESENTATION ON. What is a Wi-Fi Hotspot? A Wi-Fi hotspot is location or access point where you can access wireless broadband using a wireless enabled.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
ICT Unit 4: Network and the effects of using them
1 March 24, 2016 By Jay, Mihai, and Ryan Wi-Fi. 2 A GENDA ❖ Overview ➢ History ➢ The Big Picture ❖ IEEE Standard ➢ Headers ➢ Payload ❖ Properties.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Instructor Materials Chapter 6 Building a Home Network
Wireless Network Computer Science Engineering Technical English II
Wireless Technologies
Network connectivity to the legacy wired LAN
Wireless Fidelity 1 1.
Chapter 6 Medium Access Control Protocols and Local Area Networks
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
basics Richard Dunn CSE July 2, 2003.
Network connectivity to the legacy wired LAN
Presentation transcript:

WiFi  WiFi is the wireless way to handle networking.  Wi-fi is a wireless technology that uses radio frequency to transmit data through radio frequency to transmit data through the air the air  It is also known as networking.  The big advantage of WiFi is its simplicity.

Walkie-Talkie Network  If you want to understand wireless networking at its simplest level, think about a pair of walkie-talkie.  These are small radios that can transmit and receive radio signals.  The only problem would be that the data rate would be very slow.  Another problem: the walkie-talkies could not be used to connect to the internet.

WiFi’s Radio Technology  The radios used in WiFi are not so different from the radios used in walkie-talkies.  They have the ability to transmit and receive.  They have the ability to convert 1s and 0s into radio waves and then back into 1s and 0s.  There are major differences, of course.

WiFi’s Radio Technology (Cont’d)  WiFi radios that work with the b and g standards transmit at 2.4 GHz, while those that comply with the a standard transmit at 5 GHz. The higher frequency allows higher data rates.  The radios used for WiFi have the ability to change frequencies,i.e frequency hop between channels.

Wireless Networking Standards  WiFi refers to the protocols that allow wireless networking.  These protocols are codified in standards.  Standards are mutually agreed upon rules adopted by the industry on how the wireless networks operate.  There are several standards that enable wireless local area networks (WLANs).

802.11b, a, and g  b was first to reach the marketplace b transmits at 2.4 GHz and go up to 11 Mbps.  a was next. It operates at 5 GHz and can handle up to 54 Mbps.  g is a mix of both worlds. It operates at 2.4Ghz but it has the 54 megabits per second speed of a.

802.11b  Any b signal occupies approximately 30 MHz.  Thus, b signal overlaps with several adjacent channel frequencies.  Any given area can therefore support at most 3 access points (operating on different channels) at once.

802.11b (Cont’d) Access Point Neighboring AP’s use different channels to reduce interference. “Reuse cluster” size is equal to 3.

802.11b (Cont’d) 11 Mbps 5.5 Mbps 2 Mbps

802.11a  a specification operates at radio frequencies between 5.15 and GHz, i.e a utilizes 300 MHz bandwidth in Unlicensed National Information Infrastructure (U-NII) band.  The FCC has divided total 300 MHz in this band into three distinct 100 MHz bands: low, middle, and high, each with different legal maximum power. BandChannel High band GHz 9-12 Middle band GHz 5-8 Low band GHz 1-4

802.11a (Cont’d)  The low and middle bands have a total of 200 MHz of frequency.  This 200 MHz supports 8 non- overlapping channels.

802.11a (Cont’d) Access Point Neighboring AP’s use different channels to reduce interference. “Reuse cluster” size is equal to 8.

802.11a (Cont’d) 54 Mbps 48 Mbps 36 Mbps 24 Mbps 12 Mbps 2 Mbps 5.5 Mbps 11 Mbps a b

802.11g  g operates over 3 non-overlapping channels.  g operates in 2.4 GHz band but it delivers data rates from 6 Mbps to 54 Mbps.

802.11g  Once again, g’s "backward compatibility" with b.  So both 11a and 11g offer the same data rates. Which is better?

Comparing 11a and 11g (Cont’d)  a operates in underused 5 GHz band; g operates in heavily used 2.4 GHz band.  Higher number of channels in 11a allows more flexibility in avoiding interference.  a has range ft in practical scenarios. 11g has range comparable to 11b (approximately 1000 ft).  11a range is smaller than 11b and 11g. This is because 11a operates at a much higher frequency band.

Comparing 11a and 11g (Cont’d)  Because of its smaller range, 11a requires more Access Points to a region, thereby increasing cost. It is the most expensive of the three options.  b is the cheapest and most popular WLAN option.  g is more expensive than 11b but cheaper than 11a.

What does a typical Packet look like?  Typical packet:  Preamble  PLCP (Physical Layer Convergence Procedure)  Data  CRC is the cyclic redundancy check PreamblePLCP HeaderDataCRC

How are Multiple Transmitters Supported?  In systems, only one user is allowed to communicate with a receiver at a time (cannot use another frequency channel support a second or third additional user).  The way the one user is selected depends on the carrier sense multiple access with collision avoidance (CSMA/CA) random access method.

CSMA  To help illustrate the operation of CSMA, we will use an analogy of a dinner table conversation.  Let’s represent our wireless medium as a dinner table, and let several people engaged in polite conversation at the table represent the wireless nodes.

CSMA (Cont’d)  The term multiple access covers what we already discussed above: When one wireless device transmits, all other devices using the wireless medium hear the transmission.

2 Way Handshake  Node with packet to send monitors channel.  If channel idle for specified time interval called DIFS, then node transmits.  If channel busy, then node continues to monitor until channel idle for DIFS.node continues to monitor until channel idle for DIFS. At this point, terminal backs-off for random time (collision avoidance) and attempts transmitting after waiting this random amount of time.At this point, terminal backs-off for random time (collision avoidance) and attempts transmitting after waiting this random amount of time.

2 Way Handshake (Cont’d)  First way of the 2 way handshake was for the transmitter to send its information packet to the destination node, after following the collision avoidance method described above.  If the packet reaches the destination without problems, the destination sends a short packet over the wireless medium acknowledging the correct reception.  This packet is typically called an ACK packet. ACK is the second way of the 2 way handshake.

4 Way Handshake  “Listen before you talk”  If medium is busy, node backs-off for a random amount of time after waiting DIFS, just as before.  But now, instead of packet, sends a short message: Ready to Send (RTS). This message is basically attempting to inform others that “I have something to send.”

4 Way Handshake (Cont’d) Access Point Laptop RTS CTS Data ACK

Adding WiFi to Your Computer  One of the best things about WiFi is how simple it is.  Many new laptops already come with a WiFi card built in -- in many cases you don't have to do anything to start using WiFi.  It is also easy to add a WiFi card to an older laptop or a desktop PC.

Adding WiFi to an Older Computer  a, b or g network card. For a laptop, this card will normally be a PCMCIA cardFor a laptop, this card will normally be a PCMCIA card For a desktop machine, a PCI cardFor a desktop machine, a PCI card  Install the card

Adding WiFi to an Older Computer  Install the drivers for the card  Find an hotspot.  Access the hotspot.

Locating Hotspots  There are many WiFi hotspots now available in public places like restaurants, hotels, libraries and airports. For example, Starbucks.  You can also create your own hotspot in your home, as we will see in a little bit.  One way to find a hotspot is to go on- line.

Finding Hotspots O-Line

Connecting to a Hotspot  There are actually two steps to making a connection.  The first is to have your notebook "talk" to the hotspot  On the newest machines, an card will automatically connect with an hotspot and a network connection will be established.

Connecting to a Hotspot (Cont’d)  On older machines you often have to go through a simple 3-step process to connect to a hotspot.

Connecting to a Hotspot (Cont’d)  Access the software for the card -- normally there is an icon for the card down in the system tray at the bottom right of the screen.  Click the "Search button" in the software. The card will search for all of the available hotspots in the area and show you a list.  Double-click on one of the hotspots to connect to it.

Connecting to a Hotspot (Cont’d)  On older machines you often have to go through a simple 3-step process to connect to a hotspot.  Find what is the SSID of the hotspot  All the search feature (in newer equipment) is doing is grabbing these two pieces of information from the radio signals generated by the hotspot and displaying them for you.

Connecting to a Hotspot (Cont’d)  On most notebook models, you will see some sort of signal icon on the bottom right hand corner of your screen or a lit indicator on the notebook itself, which will give you feedback for "On" and signal strength (a red screen means your radio is Off; a green screen indicates it is On). OFFON

Connecting to a Hotspot (Cont’d)  You can also see the quality of the signal by clicking on the radio icon (may vary by system):  You can also see the quality of the signal by clicking on the radio icon (may vary by system):

Connecting to a Hotspot (Cont’d)  Sign up with a wireless Internet service provider and configure your notebook according to their instructions.  If you don't subscribe to a service, chances are you will need to use your credit card to pay for access every time you want to connect.  After this, you will end up at the log-on page of the wireless provider (or, in some cases, the wireless location).

Connecting to a Hotspot (Cont’d)  Enter your user name and password if you are already a customer.  Once you successfully log on, you should see the following icon in your tool bar, indicating the connection has been made:

WiFi Security  WiFi hotspots can be open or secure.  If a hotspot is open, then anyone with a WiFi card can access the hotspot.  If it is secure, then the user needs to know a WEP key to connect.  WEP stands for Wired Equivalent Privacy

WiFi Security (Cont’d)  WEP is an encryption system for the data that sends through the air.  Specifically, it is the process of encoding bit stream in such a way that only the person (or computer) with the key (a digital sequence) can decode it.

Setting up a Hotspot at Home  If you already have several computers hooked together on an Ethernet network and want to add a wireless hotspot to the mix, you can purchase a Wireless Access Point and plug it into the Ethernet network. Wireless Access Point

Setup #1

WiFi Range  In a typical home, hotspot will provide coverage for about 100 feet (30.5 meters) in all directions, although walls and floors do cut down on the range.

One Type of Amplifier Or a directional antenna can be used to give better range in a particular direction.

Another Way to Amplify WiFi Signals A WiFi repeater is installed to extend coverage. Wireless Access Point

Configuring a Hotspot  Most wireless access points come with default values built-in.  Once you plug them in, they start working with these default values.  However, you may want to change things.  You normally get to set three things on your access point.

Things to Configure in a Hotspot  The SSID -- Service Set IDentifier is a sequence of charactersthat uniquely names a WLAN.  The channel – the radio link used by access point/router to communicate to wireless devices.  The WEP key -- The default is to disable WEP.

Applications  Common applications for Wi-Fi include Internet and VoIP phone access, gaming, and network connectivity for consumer electronics such as televisions, DVD players, and digital cameras InternetVoIPgamingconsumer electronicstelevisionsDVD players digital camerasInternetVoIPgamingconsumer electronicstelevisionsDVD players digital cameras

Advantages of Wi-Fi

Disadvantages  Planning – Depending on the goal  Security – Greater exposure to risks  Access  Compromising Data  Denial of Service  Speed – Slower than cable  Range – Affected by various medium

Difference between Bluetooth and Wi-Fi

THANK YOU THANK YOU