Learning Objectives  Tell how IEEE 802.11a networks function, and how they differ from 802.11b networks  List the advantages and disadvantages of an.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Advertisements

Wireless Networks.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
CS 350 Chapter-12 Wireless Technologies. Wireless Agencies & Standards AgencyPurposeWeb Site Institute of Electrical and Electronics Engineers (IEEE)
Wireless Networks and Spread Spectrum Technologies.
Wireless LANS Part 2 Justin Champion Room C208 - Tel:
CWNA Guide to Wireless LANs, Second Edition
6.1 Chapter 6 Bandwidth Utilization: Multiplexing and Spreading Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Wireless and going mobile Browsing via low energy photons.
5.1 Background Information Modulation Techniques (Chapter 5) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
RELIABILITY OF WIRELESS NETWORKS Cagatay Bozturk.
ESTeem Training Class Radio Technology Overview. Radio Basics Terminology – Familiarization with radio expressions Basic Components – Transmitter – Receiver.
Module contents Technologies overview Spread Spectrum Modulation
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
WLAN b a Johan Montelius
Networks Olga Agnew Bryant Likes Daewon Seo.
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Lecture #2 Chapter 14 Wireless LANs.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
1 Information Technology in Business: Telecommunications and Networks Chapter 6.
Wireless# Guide to Wireless Communications
Sybex CCNA Chapter 12: Wireless Networks.
1 Wi-Fi Jason Orgill John Bodily Scott Rowberry. 2 Background Purpose Develop MAC and PHY layer for wireless connectivity of fixed, portable and moving.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
24-July-2007 Wireless Networks. Wireless Technologies Bluetooth, ZigBee & Wireless USB short range communication between devices typically controlled.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
A PRESENTATION ON “Wireless Networks”
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Wireless Technologies Chapter 9. Learning Objectives Explain current wireless networking technologies Discuss history of wireless networks and their advantages.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards Modified.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
Chapter 6 Multiplexing.
IEEE g Standard Tim Wells Microcomputer Networks (CIS362) Thursday, April 28, 2005.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Francine Lalooses David Lancia Arkadiusz Slanda Donald Traboini
Chapter 15 Wireless LANs 15.# 1
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
1 Quick Review on Data Link Layer – Part 2 Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
CWNA Guide to Wireless LANs, Third Edition Chapter 5: Physical Layer Standards.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
1 March 24, 2016 By Jay, Mihai, and Ryan Wi-Fi. 2 A GENDA ❖ Overview ➢ History ➢ The Big Picture ❖ IEEE Standard ➢ Headers ➢ Payload ❖ Properties.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Chapter 2 PHYSICAL LAYER.
Bandwidth Utilization: Multiplexing and Spreading
Wireless Technologies
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
WiMAX 1EEE Protocol Stack
expanded by Jozef Goetz, 2014 The McGraw-Hill Companies, Inc., 2007
Lecture 4 Continuation of transmission basics Chapter 3, pages 75-96
Chapter 6 Medium Access Control Protocols and Local Area Networks
WLAN Security Antti Miettinen.
Wireless Mesh Networks
Cellular Telephone Networks
Presentation transcript:

Learning Objectives  Tell how IEEE a networks function, and how they differ from b networks  List the advantages and disadvantages of an IEEE g network  Describe the HiperLAN/2 networks  Compare low-speed and high-speed WLANs  Explain basic and enhanced WLAN security features

High Speed WLANs  Three standards for high-speed WLANs that transmit at speeds over 15 Mbps  IEEE a  IEEE g  HiperLAN/2  All WLANs are concerned with security  How to prevent unauthorized access

IEEE a  Approved in 1999, a transmits at speeds of 5.5 Mbps and 11 Mbps  Great demand for a WLANS, also called Wi-Fi5, with maximum speed of 54 Mbps  Devices use gallium arsenide (GaAs) or silicon germanium (SiGe) rather than CMOS semiconductors  Increased speed achieved by higher frequency, more transmission channels, multiplexing techniques, and more efficient error-correction

U-NII Frequency Band  b uses unlicensed Industrial, Scientific, and Medical (ISM) band and specifies 14 frequencies  a uses Unlicensed Information Infrastructure (U-NII) band  Table 7-1 compares ISM and U-NII  U-NII is divided into three bands, shown in Table 7-2  U-NII provides more bandwidth, faster transmission, and increased power  Efforts underway to unify 5 GHz bands globally

ISM vs. U-NII

U-NII Spectrum

Channel Allocation  a WLANs have have 11 channels in USA but requires 25 MHz passband  See Figure 7.1  Figure 7-2 shows 8 channels in Low and Medium Bands with 20 MHz channel supporting 52 carrier signals, each 200 KHz wide  Supports eight networks per AP, as shown in Figure 7-3  IEEE e Task Group is working on standard that supports quality of service (QOS)

802.11b Channels

802.11a Channels

Orthogonal Frequency Division Multiplexing  Electromagnetic waves reflect off surfaces and may be delayed in reaching their destination  Figure 7-4 illustrates multipath distortion  Receiving device waits until all reflections are received before it can transmit  Increasing speed of WLAN only causes longer delays waiting for reflections  a uses Orthogonal Frequency Division Multiplexing (OFDM) to solve this problem

Orthogonal Frequency Division Multiplexing  Dating to 1960s, OFDM’s primary role is to split high-speed digital signal into several slower signals running in parallel  Sending device breaks transmission into pieces and sends it over channels in parallel  Receiving device combines signals to re-create the transmission  See Figure 7-5

Multiple Channels of OFDM

OFDM Breaks B Ceiling Limit  Slowing down transmissions actually delays reflections, increases total throughput, and results in faster WLAN  See Figure 7-6  a specifies eight overlapping channels, each divided into 52 subchannels that are 300 KHz wide  OFDM uses 48 subchannels for data and the remaining four for error correction

OFDM vs. Single Channel

Modulation Techniques Vary Depending on Speed  6 Mbps—phase shift keying (PSK)  Encodes 125 Kbps of data on each of 48 subchannels, resulting in 6Mbps data rate  See Figure 7-7  12 Mbps—quadrature phase shift keying (QPSK)  Encodes 250Kbps per channel for 12 Mbps data rate  See Figure 7-8

PSK

QPSK

Modulation Techniques Vary Depending on Speed  24 Mbps—16-level quadrature amplitude modulation (16-QAM)  16 different signals can encode 500 Kbps per subchannel  See Figure 7-9  54 Mbps—64-level quadrature amplitude modulation (64-QAM)  Transmits 1,125 Mbps over each of 48 subchannels  See Figure 7-10

16-QAM

64-QAM

Higher Speeds  Official top speed of a is 54 Mbps  Specification allows for higher speeds known as turbo mode or 2X mode  Each vendor can develop 2X mode by combining two frequency channels  Produces 96 subchannels and speeds up to 108 Mbps  Other 2X mode techniques include increasing and reallocating individual carriers and using different coding rate schemes

Error Correction  a transmissions significantly reduce errors  Minimizes radio interference from outside sources  a has enhanced error correction  Forward Error Correction (FEC) transmits secondary copy of information that may be used if data is lost  Uses 48 channels for standard transmissions and 4 for FEC transmissions

802.11a Physical Layer  a changed only physical layer  PHY layer is divided into two parts  Physical Medium Dependent (PMD) sublayer defines method for transmitting and receiving data over wireless medium  Physical Layer Convergence Procedure (PLCP) reformats data received from MAC layer into frame that PMD sublayer can transmit

PLCP  Based on OFDM, PLCP frame has three parts  Preamble—allows receiving device to prepare for rest of frame  Header—provides information about frame  Data—information to be transmitted  See Figure 7-11

802.11a PLCP Frame

Fields in PLCP Frame  Synchronization  Rate  Length  Parity  Tail  Service  Data  Pad

802.11a Rate Field Values

Advantages and Disadvantages  Advantages  Good for area that need higher transmission speeds  Disadvantages  Shorter range of coverage  Approximately 225 feet as compared with 375 feet for b WLAN

IEEE g  In 2001, IEEE proposed g draft standard to combine stability of b with faster data transfer rates of a  Operates in 2.4 GHz ISM frequency  Has two mandatory modes: Complementary Code Keying (CCK) mode and Orthogonal Frequency Division Multiplexing (OFDM)  Offers two optional modes: Packet Binary Convolutional Coding (PBCC-22) and CCK-ODFM  g products not expected until 2003

HiperLAN/2  Similar to a, HiperLAN/2 was standardized by European Telecommunications Standards Institute  Figure 7-12 shows protocol stack for HiperLAN/2  Has three basic layers: Physical, Data Link, and Convergence  Products based on HiperLAN/2 may appear in 2003

HiperLAN/2 Protocol Stack

Physical Layer  PHY layers of IEEE a and HiperLAN/2 are almost identical  Operate in 5 GHz band  Use OFDM  Transmit up to 54 Mbps  Connect seamlessly to wired Ethernet networks

Data Link Layer  HiperLAN/2 centralizes control of RF medium to access point (AP)  AP informs clients, known as mobile terminals (MTs), when they may send data  Channel allocation is based on dynamic time-division multiple access (TDMA) that divides bandwidth into several time slots  Quality of Service (QOS) refers to dynamically allocated time slots based on needs of MT and condition of network

Radio Link Control (RLC) Sublayer  Three primary functions of RLC sublayer  Connection setup procedure and connection monitoring—authentication and encryption  Radio resource handling, channel monitoring, and channel selection—automatic transmission frequency allocation (known as Dynamic Frequency Selection (DFS)  Association procedure and reassociation procedure—standardized handoff to nearest AP by roaming MTs  Logical Link Control (LLC) sublayer, also part of Data Link Layer, performs error checking

Convergence Layer  HiperLAN/2 offers seamless high-speed wireless connectivity up to 54 Mbps  Can connect to cellular telephone systems  Can connect to Asynchronous Transfer Mode (ATMs) systems using fiber-optic media and transmitting at 622 Mbps  Can connect to IEEE 1394 (also known as FireWire) high speed external serial bus transmitting at 400 Mbps

Summary: High- and Low-Speed WLANs  May compare different types of WLANs  Do not consider them as competing technologies  Rather, they are complementary technologies, each with its strengths and weaknesses and market niche  HomeRF—combines wireless data, cordless telephony, and streaming media for home networks  Supports QoS and transmits from 1/6 Mbps to 10 Mbps

WLAN Summary  IEEE —provides cable-free access for mobile or fixed location at rate of 1 or 2 Mbps  b (Wi-Fi)—popular choice for business wireless networks  Transmits at 11 Mbps on three simultaneous channels but offers no QoS and uses crowded ISM band

WLAN Summary  a—current leader in business WLANs  Uses U-NII frequency, allows 8 simultaneous channels, and transmits at 54 Mbps standard, can be increased to 108 Mbps  g—offers faster data rates while remaining compatible with b networks  Uses only three channels and crowded ISM frequency

WLAN Summary  HiperLAN/2—uses dynamically allocated time slots and dynamic frequency selection for high-speed communications  Popular in Europe  Table 7-4 compares WLANs

WLAN Comparison

Security  Greatest strength of WLANs is ability to roam freely  Greatest weakness is risk of unauthorized user receiving RF signals  Some flawed IEEE WLAN security provisions  Basic Security involves two areas:  Authenticating users  Keeping transmissions private

Authentication  Verifies user has permission to access network  Each WLAN client can be given Service Set Identifier (SSID) of network  Only clients that know SSID may connect  SSID may be entered manually into wireless device, but anyone with device has access to network  Access points (APs) may freely advertise SSID to any mobile device within range

Privacy  IEEE standard provides optional Wired Equivalent Privacy (WEP) specification for data encryption  Two types of keys used for encryption  Public key cryptography uses matched public and private keys  IEEE uses shared key cryptography with same key used for encryption and decryption  The longer the key, the more secure it is  See Figure 7-13

WEP

WEP Privacy Concerns  In late 2000, researchers revealed “initialization vector” used to encrypt transmissions with WEP were reused about once every five hours  Makes it easy for anyone to collect data to break WEP encryption  Researches recovered 128-bit WEP key in less than 2 hours  Many think IEEE WLANs should be treated as insecure

Enhanced Security  Administrators must use enhanced security measures to prevent WLAN attacks  Four kinds of WLAN attacks  Hardware theft  Access point impersonation  Passive monitoring  Denial of service

Additional Security Procedures  IEEE task group working on draft known as IEEE 802.1x to allow centralized authentication of wireless clients  Uses Extensible Authentication Protocol (EAP)—client negotiates authentication protocols with separate authentication server  Uses Remote Authentication Dial-In User Service (RADIUS)—server on wired network sends security keys to wireless client  See Figure 7-14

802.1x Security

Other Security Steps  Use an access control list with MAC addresses of approved clients, as seen in Figure 7-15  Use digital certificates issued by trusted third party for secure, encrypted online communication  Use digital wrapper or gatekeeper that secures data by wrapping around another program or file  Use a Virtual Private Network (VPN), a secure, encrypted connection between two points

Access Control List

Higher Levels of Security  Reduce transmission power used in WLANs  Decreases distance radio waves travel, thus limiting range where hackers can pick up signals  Change default WLAN security settings  Keep WLAN traffic separate from that of wired network  Use 128-bit WEP keys rather than default 40-bit keys