Download presentation
Presentation is loading. Please wait.
Published byCorey Bennett Modified over 9 years ago
1
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN
2
2 Objectives At the end of this presentation, you will be able to:
3
3 Define wireless LAN, WLAN, wireless access point (AP), 802.11A, 802.11b, and 802.11g. Specify the speed, access methods, topology, and media of wireless LANs. Given a troubleshooting scenario involving a wireless LAN, identify the cause of the problem.
4
4 The Wireless LAN can be defined as: A data communication system that uses electromagnetic or infrared waves, rather than wired connections, as a communications medium. Designed to augment or replace a wired LAN.
5
5 Wireless LAN Makes the LAN portable. Reduces the need for connecting cables. Adds flexibility and convenience while reducing costs.
6
6 Applications of wireless LANs Hospitals – Medical information on patients is available to doctors and nurses Schools – Facilitates information transfer to students Warehouses – Gives portable access to inventory, storage locations, quantities, turns ratio, etc. Executives – Gives portable access to the company LAN from a variety of locations.
7
7 Benefits of WLANs Mobility - Provides users with access to information anywhere in their organization. Flexibility – New clients can be quickly and effortlessly added to the system or moved from one location to another. Simplicity of installation – No cables to run. Reduced total cost of ownership – Installation expense is lower. Scalability – Easily sized to meet new needs.
8
8 Wireless Medium Spread Spectrum Radio Frequency (RF) Infrared
9
9 Spread Spectrum RF Frequency Power
10
10 Frequency-Hopping Spread Spectrum (FHSS) Frequency Power
11
11 Frequency Hopping Spread Spectrum (FHSS) Frequency Power
12
12 Frequency Hopping Spread Spectrum (FHSS) Frequency Power
13
13 Direct-Sequence Spread Spectrum (DSSS) Frequency Power
14
14 Wired Ethernet LAN Hub Copper Cables
15
15 Wireless LAN (WLAN) Access Point (AP)
16
16 IEEE-802.11 Standards IEEE-802.11A IEEE-802.11B IEEE-802.11G IEEE-802.11N
17
17 A vs B vs G 802.11B802.11A802.11G Speed (Max)11Mbps54Mbps Frequency2.4GHz5GHz2.4GHz Range
18
18 A vs B vs G 802.11B802.11A802.11G Speed (Max)11Mbps54Mbps Frequency2.4GHz5GHz2.4GHz Range
19
19 A vs B vs G 802.11B802.11A802.11G Speed (Max)11Mbps54Mbps Frequency2.4GHz5GHz2.4GHz Range
20
20 A vs B vs G 802.11B802.11A802.11G Speed (Max)11Mbps54Mbps Frequency2.4GHz5GHz2.4GHz Range
21
21 The ISM Band Industrial, Scientific, Medical Unlicensed band that may be used for many purposes. 2.4 GHz to 2.5 GHz Used by 802.11B and 802.11G
22
22 Independent Basic Service Set (IBSS) Independent Basic Service Set (IBSS)
23
23 Basic Service Set (BSS) Access Point (AP)
24
24 Extended Service Set (ESS) AP BSS-1 BSS-2
25
25 AP BSS-1 AP BSS-2 AP
26
26 Carrier Sense Multiple Access (CSMA) Methods Ethernet uses Collision Detection or CSMA/CD Wireless uses a variation of this technique called Collision Avoidance or CSMA/CA. Collision Avoidance adds a level of handshaking to the basic Collision Detection model.
27
27 Review of CSMA/CD Carrier Sense means that each node listens before transmitting. Multiple Access means that each node is free to transmit when ever it has data to send. Collision Detection refers to the ability of each node to detect when two nodes transmit at once.
28
28 Collision Detection does not work well with wireless. The transmitted signal drowns out the received signal. It is much harder to detect collisions. Wireless adds a handshaking arrangement to the Collision Detection scheme.
29
29 Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA) Node listens until channel is clear. Node transmits a Request to Send (RTS) signal. If no one less is transmitting, the access point sends back a Clear to Send (CTS) signal. This tells the node that it is okay to transmit its data.
30
30 Collisions still occur Nodes listen until channel is clear. Two nodes transmits a Request to Send (RTS) signal simultaneously. The AP detects the collision and does not send the Clear to Send (CTS) signal.
31
31 Throughput vs. Distance Range and throughput vary inversely. 802.11b automatically adjusts for interference and weak signal strength by dynamically down shifting the transmission rate.
32
32 Typical Operating Range Indoor – 50 Meters @ 11Mbps – 80Meters @ 5.5 Mbps – 120 Meters @ 2 Mbps – 150 Meters @ 1 Mbps Outdoor – 250 Meters @ 11 Mbps – 350 Meters @ 5.5 Mbps – 400 Meters @ 2 Mbps – 500 Meters @ 1 Mbps
33
33 Wireless Security Extended Service Set Identity (ESSID) Access Control Lists Remote Authentication Dial-In User Service (RADIUS) Protocol Wired Equivalent Privacy (WEP) Encryption
34
34 Remote Authentication Dial-In User Service (RADIUS) Protocol A client/server security protocol defined by IETF. Centralizes authentication and permissions into a single server. Authenticates MAC addresses Associate clients with keys or passwords Secures the wireless LAN against hackers.
35
35 Wired Equivalent Privacy (WEP) Two levels of encryption: 64-bit & 128-bit All devices must use the same encryption level. Authorized Users have a “key” that allows them to unscramble the encrypted incoming transmissions and to scramble their own outgoing transmissions. The default for these schemes is “encryption disabled.”
36
36 What is 40-bit WEP encryption? A different name for 64-bit WEP encryption 40-bit secret key with a 24-bit initialization vector (40 + 24 = 64) Wireless vendors may use either term. We will call it 64-bit encryption.
37
37 Wireless Components Wireless Access Point Wireless NIC Wireless Laptop PCMCIA Card
38
38 Wireless Network Access Point Power LinkAct To Wired LAN To Wireless LAN To Wireless LAN
39
39 Power LAN Configuration Port Configuration Port
40
40
41
41
42
42 Competing Technologies Bluetooth – Speed:780KBps – Range:10 Meters HomeRF – Speed:1.6 MBps – Range:150 Feet
43
43 Troubleshooting the WLAN Isolate the trouble to the WLAN. Use general LAN troubleshooting techniques. Use techniques specific to the WLAN. – Same channel – Same ESSID – Same encryption level – Within range
44
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals End
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.