Download presentation
Presentation is loading. Please wait.
Published byCornelia Watson Modified over 9 years ago
1
Implementing Wireless and WLAN Chapter 19 powered by DJ 1
2
Chapter Objectives Describe standards associated with wireless media Identify and describe the purpose of the components in a small wireless network Identify common issues with implementing wireless networks At the end of this Chapter you will be able to: powered by DJ 2
3
Introduction to Wireless Technology Transmitting a signal using the typical 802.11 specifications works a lot like it does with a basic Ethernet hub: They’re both two-way forms of communication, and they both use the same frequency to both transmit and receive, often referred to as half-duplex. Wireless LANs (WLANs) use radio frequencies (RFs) that are radiated into the air from an antenna that creates radio waves powered by DJ 3
4
4
5
The 802.11 Standards Committee Purpose IEEE 802.11a 54Mbps, 5GHz standard IEEE 802.11b Enhancements to 802.11 to support 5.5 and 11Mbps IEEE 802.11c Bridge operation procedures; included in the IEEE 802.1D standard IEEE 802.11d International roaming extensions IEEE 802.11e Quality of service IEEE 802.11F Inter-Access Point Protocol IEEE 802.11g 54Mbps, 2.4GHz standard (backward compatible with 802.11b) IEEE 802.11h Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC) at 5Ghz IEEE 802.11i Enhanced security IEEE 802.11j Extensions for Japan and U.S. public safety IEEE 802.11k Radio resource measurement enhancements powered by DJ 5
6
Conti... IEEE 802.11mMaintenance of the standard; odds and ends IEEE 802.11n Higher throughput improvements using MIMO (multiple input, multiple output antennas) IEEE 802.11p Wireless Access for the Vehicular Environment (WAVE) IEEE 802.11r Fast roaming IEEE 802.11s Extended Service Set (ESS) Mesh Networking IEEE 802.11T Wireless Performance Prediction (WPP) IEEE 802.11u Internetworking with non-802 networks (cellular, for example) IEEE 802.11v Wireless network management IEEE 802.11w Protected management frames IEEE 802.11y 3650–3700 operation in the U.S powered by DJ 6
7
Comparing 802.11 powered by DJ 7
8
Wireless Topologies Wireless topologies are: Ad-hoc Topology Infrastructure Topology powered by DJ 8
9
Ad-hoc Topology Ad hoc wireless networks technically use an Independent Basic Service Set (IBSS) topology. This means that each wireless device independently manages the wireless network. This type of wireless network originates from and includes the wireless device, as shown in Figure. powered by DJ 9
10
Infrastructure Topology involves using a dedicated piece of equipment (typically a wireless access point) to initiate and manage the wireless network. Wireless access points can be configured to use one of two infrastructure modes: Basic Service Set (BSS) or Extended Service Set (ESS). The BSS is the simplest form of wireless network. It includes a single wireless access point managing a group of clients, as shown in Figure. powered by DJ 10
11
Single basic service set design powered by DJ 11
12
An extended service set design powered by DJ 12
13
Wireless Security Wireless Security – A Brief Overview Points:- SSIDs, WEP, and MAC Address Authentication SSID is a common network name for the devices in a WLAN system that creates the wireless LAN. An SSID prevents access by any client device that doesn’t have the SSID. Two types of authentication were specified by the IEEE 802.11 committee: open and shared-key authentication. Open authentication involves little more than supplying the correct SSID—but it’s the most common method in use today. powered by DJ 13
14
Conti.. With shared-key authentication, the access point sends the client device a challenge-text packet that the client must then encrypt with the correct Wired Equivalency Protocol (WEP) key and return to the access point. Without the correct key, authentication will fail and the client won’t be allowed to associate with the access point MAC addresses can be statically typed into each access point, and any of them that show up without that MAC addresses in the filter table would be denied access. powered by DJ 14
15
WPA or WPA 2 Pre-Shared Key WPA or WPA2 Pre-Shared Key (PSK) is a better form of wireless security than any other basic wireless security method mentioned so far. Wi-Fi Protected Access (WPA) is a standard developed in 2003 by the Wi-Fi Alliance, formerly known as WECA. WPA provides a standard for authentication and encryption of WLANs that’s intended to solve known security problems existing up to and including the year 2003. powered by DJ 15
16
Configuring Our Wireless Internetwork Interface and Connections powered by DJ 16
17
Conti.. Edit Interface Connection powered by DJ 17
18
Conti.. Wireless Express Setup powered by DJ 18
19
Conti.. SSID Configuration powered by DJ 19
20
Conti.. Network Interface Radio Settings powered by DJ 20
21
Conti.. Wireless Setting Configuration powered by DJ 21
22
Conti.. Security Summary powered by DJ 22
23
Conti.. Express Setup Screen powered by DJ 23
24
Wireless Troubleshooting Client Troubleshooting Most wireless issues are related to the client: Verify that the wireless card is enabled: Most new laptops have a button or switch that disables the wireless card to save battery life. Move to a “known good” region of the building: Do your testing in an area known to have a strong wireless signal. This may require using multiple wireless devices. Verify that the client can identify the wireless network using the installed wireless utility: If you are unable to identify wireless SSID(s) in your vicinity, the client’s wireless card may be disabled, or the wireless access point may not be working. powered by DJ 24
25
Conti.. Ensure that the wireless client has the correct wireless security information and supports your security standards: You may need to re- enter the pre shared key to ensure that you entered it correctly. Likewise, the wireless card may not support the wireless security on your network. Try connecting to an SSID that does not use security from the wireless device. powered by DJ 25
26
Wireless Access Point Troubleshooting Most troubleshooting that deals with the wireless access point focuses on physical considerations: Verify that the wireless access point is running the latest firmware version: Nothing is worse than spending hours on a problem that is related to a bug in the wireless firmware. Test the wireless reception radius at different times of the day: Because of the varying degrees of interference that may occur over time, it is best to run multiple tests on your signal strength. You can do this simply and inexpensively by carrying around a laptop and observing the reception at differing locations. powered by DJ 26
27
Conti.. Verify your wireless channel configuration: If you have multiple wireless access points or are in an area where other access points may interfere, verify (using wireless software) the most saturated and unsaturated channels. For 802.11b/g, use channels 1, 6, or 11 in the U.S. For 802.11a, many more channels are available, and you should test for the cleanest frequency. Consider the materials around and close to the access point: Try to avoid installing the access point near metal objects, which reflect the signal. Realize that a concrete block wall will absorb much more signal than a drywall barrier. powered by DJ 27
28
THANK YOU powered by DJ 28
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.