Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Wireless Fidelity (WI-FI) : P.Swathi K.Viswani

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 14

Wireless Fidelity (WI-FI)

P.SWATHI III year CSE


K.VISWANI III year CSE

INSTITUTE OF TECHNOLOGY
RAJAM, SRIKAKULAM DIST
swathi.tinku@gmail.com,
EMAILID: imam.sheik2@gmail.com.
Abstract
Technology is no longer judged by its
technical brilliance, but by the return on
investment (both tangible and Wi-Fi, or wireless fidelity, is freedom: it
intangible). This in turn, is dictated by allows you to connect to the internet
the killer application for that technology. from your couch at home, a bed in a
Wireless Networks fit into this because hotel room, or a conference room at
the technology has been around long work without wires. It is a wireless
enough and can provide enough benefits technology like cell phones, Wi-Fi
to be seriously considered for enabled computers send and receive data
deployment. indoors and outdoors; anywhere within
the range of the base station. And the
At the enterprise, it provides best thing of all, Wi-Fi is fast. In fact,
communication support for mobile it’s several times faster than the fastest
computing. It overcomes and, in fact, cable modem connection.
annihilates the physical limitation of
wired networks in terms of adaptability Wireless technology, therefore is really
to a variation in demand. happening, and should be seriously
considered. The following presentation
Mobility is another feature by wireless. explains wireless LANs, choice of
Mobile users can be truly mobile, in that wireless technologies., how wi-fi
hey don’t need to be bound to their seats works?, examples & it’s supporting
when connecting to the network. systems, security issue , wireless-Lan
Mobility, however is not only associated configuration & finally advantages &
with users, it’s also associated with the disadvantages of wifi.
infrastructure itself. You can have a
wireless network up and running in no
time, a boon for people who need to do it
for exhibitions, events, etc.

This leads to other provision of wireless,


that of scalability. It really helps in
extending your network. It also becomes
important if an enterprise has a rented
office and needs to shift to a new place.
At home, the need for wireless is more
to do with ubiquitous computing.
Introduction

Hotspots. Wi-Fi can also be used to


Wi-Fi, also, WiFi, WI-fi or wifi, is
create a Wireless mesh network.
a brand originally licensed by the Wi-Fi
Alliance to describe the underlying
Wi-Fi also allows connectivity in peer-
technology of wireless local area
to-peer mode, which enables devices to
networks (WLAN) based on the IEEE
connect directly with each other. This
802.11 specifications.
connectivity mode is useful in consumer
electronics and gaming applications.
Wireless LAN (WLAN) is a flexible
data communication system
implemented as an extension to a wired Choice Of Wireless
LAN within a building or campus. Technology
WLANs transmit and receive data over
the air by electrical signals, minimizing
The widespread reliance on networking
the need for wired connections. The
in business and the meteoric growth of
advent of WLAN opened up a whole
the Internet and online services are
new definition of what a network
strong testimonials to the benefits of
infrastructure can be. No longer does an
shared data and shared resources. With
infrastructure need to be solid and fixed,
wireless LANs, users can access shared
difficult to move and expensive to
information without looking for a place
change. Instead it can move with the
to plug-in. Wireless LAN offers the
user and change as fast as the
following productivity and convenience
organization does.
over Wired Networks:
Wi-Fi was developed to be used for
► Mobility
mobile computing devices, such as
laptops, in LANs, but is now
► Installation Speed and Simplicity
increasingly used for more applications,
including Internet and VoIP phone
► Installation Flexibility
access, gaming, and basic connectivity
of consumer electronics such as
televisions and DVD players, or digital ► Reduced Cost of Ownership
cameras.
► Scalability
A person with a Wi-Fi device, such as a
computer, telephone, or personal digital
assistant (PDA) can connect to the
Internet when in proximity of an access
point. The region covered by one or
several access points is called a hotspot.
Hotspots can range from a single room
to many square miles of overlapping
Extended
Service set
Server
Distribution
System

Basic Access
Basic Access Service Point
Service Set Point Set

Statio Statio
Statio Station Station
Station n n
n

IEEE 802.11 WLAN Setup

Wireless LANs are based on a set of technologies known by the IEEE specification number, 802.11
which was finalized in June 1997.The figure indicates the model developed by the 802.11 working
group.

Wi-Fi: How it works


A typical Wi-Fi setup contains one or
more Access Points (APs) and one or
more clients. An AP broadcasts its SSID
(Service Set Identifier, "Network name")
via packets that are called beacons,
which are broadcast every 100 ms. The
beacons are transmitted at 1 Mbit/s, and
are of relatively short duration and
therefore do not have a significant
influence on performance. Since 1
Mbit/s is the lowest rate of Wi-Fi it
assures that the client who receives the
beacon can communicate at least 1
Mbit/s. based on the settings (e.g. the
SSID), the client may decide whether to
connect to an AP. Also the firmware
running on the client Wi-Fi card is of
influence. Say two APs of the same
SSID are in range of the client, the
Firmware may decide based on signal :
strength to which of the two APs it will
connect. The Wi-Fi standard leaves WORKING OF WI-FI
connection criteria and roaming totally
open to the client. This is strength of Wi-
Fi, but also means that one wireless
adapter may perform substantially better
than the other. Since Wi-Fi transmits in
the air, it has the same properties as a
non-switched ethernet network. Even
collisions can therefore appear as in non-
switched ethernet LAN's.

Channels

Except for 802.11a, which operates at 5


GHz, WI-Fi uses the spectrum
near 2.4GHz, which is
standardized and unlicensed by
international agreement; although
the exact frequency allocations
vary slightly in different parts of
the world, as does maximum Examples of Standard
permitted power. However,
channel numbers are Wi-Fi Devices
standardized by frequency
throughout the world, so Wireless Access Point (WAP)
authorized frequencies can be
identified by channel numbers. A wireless access point (AP) connects a
group of wireless stations to an adjacent
The frequencies for 802.11 b/g span wired local area network (LAN). An
2.400 GHz to 2.487 GHz. Each channel access point is similar to an Ethernet
is 22 MHz wide and 5 MHz spacers hub, but instead of relaying LAN data
between the channels are required. only to other LAN stations, an access
point can relay wireless data to all other
compatible wireless devices as well as to
a single (usually) connected LAN
device, in most cases an ethernet hub or
switch, allowing wireless devices to
communicate with any other device on
the LAN.

Wireless Routers

A wireless router integrates a wireless


access point with an ethernet switch and
an ethernet router. The integrated switch A wireless range extender (or wireless
connects the integrated access point and repeater) can increase the range of an
the integrated ethernet router internally, existing wireless network by being
and allows for external wired ethernet strategically placed in locations where a
LAN devices to be connected as well as wireless signal is sufficiently strong and
a (usually) single WAN device such as a near by locations that have poor to no
cable modem or DSL modem. A signal strength. An example location
wireless router advantageously allows all would be at the corner of an L shaped
three devices (mainly the access point corridor, where the access point is at the
and router) to be configured through one end of one leg and a strong signal is
central configuration utility, usually desired at the end of the other leg.
through an integrated web server. Another example would be 75% of the
However one disadvantage is that one way between the access point and the
may not decouple the access point so edge of its useable signal. This would
that it may be used elsewhere. effectively increase the range by 75%.

Wireless Ethernet Bridge Wireless LANs are generally categorized


according to the transmission technique
A wireless Ethernet bridge connects a that is used. Each technique comes with
wired network to a wireless network. its own set of advantages and
This is different from an access point in limitations.
the sense that an access point connects
wireless devices to a wired network at They fall under the following categories:
the data-link layer.
NARROWBAND TECHNOLOGY
Narrowband radio system transmits and
receives user information on a specific
radio frequency. Undesirable crosstalk
between communication channels is
avoided by carefully coordinating
different users on different channel
frequencies. In this system privacy and
noninterference are accomplished by the
use of separate radio frequencies. The
receiver filters out all radio signals
except the ones on its distinguished
frequency.

SPREADSPECTRUM
Two wireless bridges may be used to TECHNOLOGY
connect two wired networks over a Most wireless LAN systems use spread
wireless link, useful in situations where spectrum technology. Designed to trade
a wired connection may be unavailable, off band-width efficiency for reliability,
such as between two separate homes. integrity, and security. More bandwidth
is consumed as compared to
Narrowband Technology but the signal
Range Extender
produced is louder and thus easier to technology. Inexpensive directed
detect provided that the receiver knows systems provide very limited range and
the parameters of the spread spectrum are used for personal area networks.
signal being broadcast.

Wi-Fi and its support by


operating systems
There are two sides to Wi-Fi support
under an operating system. Driver level
support and configuration and
management support.

Driver support is usually provided by the


manufacturer of the hardware or, in the
FREQUENCY HOPPING case of Unix clones such as Linux and
SPREAD SPECTRUM TECHNOLOGY FreeBSD, sometimes through open
Frequency hopping spread spectrum source projects.
(FHSS) uses a narrowband carrier that
changes frequency in a pattern known to Configuration and management support
both transmitter and receiver. Properly consists of software to enumerate, join,
synchronized, the net effect is to and check the status of available Wi-Fi
maintain a single logical channel. To an networks. This also includes support for
unintended receiver, FHSS appears to be various encryption methods. These
short-duration impulse noise. systems are often provided by the
operating system backed by a standard
DIRECT-SEQUENCE SPREAD driver model. In most cases, drivers
SPECTRUM TECHNOLOGY emulate an Ethernet device and use the
Direct-Sequence spread spectrum configuration and management utilities
(DSSS) generates a redundant bit pattern built into the operating system. In cases
for each bit to be transmitted. This bit where built in configuration and
pattern is called CHIP (Chipping Code). management support is non-existent or
The longer the chip the greater the inadequate; hardware manufacturers
probability that the original data can be may include their own software to
recovered. To an unintended receiver, handle the respective tasks.
DSSS appears as low power wide band
noise and is rejected by most Microsoft Windows
narrowband receivers.
Microsoft Windows has comprehensive
INFRARED TECHNOLOGY driver-level support for Wi-Fi, the
Infrared (IR) systems use very high quality of which depends on the
frequencies just below visible light in the hardware manufacturer. Hardware
electromagnetic spectrum to carry data. manufactures almost always ship
IR is either directed or diffused Windows drivers with their products.
Windows ships with very few Wi-Fi
drivers and depends on the OEMs and
device manufactures to make sure users
get drivers. Configuration and
management depend on the version of
Windows.
This is a large security issue for the
• Earlier versions of Windows, owner of the respective unsecured
such as 98 and ME do not have access point and for the owner of the
built-in configuration and Windows Vista based computer
management support and must because shared folders may be open
depend on software provided by to public access.
the manufacturer
• Microsoft Windows XP has
built-in configuration and
management support. The
original shipping version of
The Security Issue
One of the most frequently asked
Windows XP included
questions put to wireless local-area
rudimentary support which was
network (WLAN) vendors is, "what
dramatically improved in Service
about security?"
Pack 2. Support for WPA2 and
The normal Wired LAN is highly
some other security protocols
secured since the communication
require updates from Microsoft.
medium is well guided by a cable
To make up for Windows
usually inside a building. But that is not
inconsistent and sometimes
the case for wireless medium since the
inadequate configuration and
radio waves penetrate outside the
management support, many
building & spread out in the atmosphere,
hardware manufacturers include
creating a risk that their network can be
their own software and require
hacked from anywhere outside. Hence
the user to disable Windows’
WLAN expects WLAN user to be
built-in Wi-Fi support
authenticated. The designers of
• Microsoft Windows Vista is
IEEE802.11b tried to overcome the
expected to have improved Wi-Fi
security issue by devising a user
support over Windows XP.
Authentication and Data Encryption
Current betas automatically
system known as Wired Equivalent
connect to unsecured networks
Privacy (WEP). WEP has got the
without the user’s approval.
following properties for providing
adequate security to Wireless LAN:
► Reasonably Strong Encryption
► Self Synchronizing
► Efficient
► Exportable

WEP – THEORY OF OPERATION


The process of disguising (binary) data
in order to hide its information content is
called encryption (denoted by E). Data external key management service. WEP
that is not enciphered is called plaintext is a symmetric algorithm in which the
(denoted by P) and data that is same key is used for encipherment and
enciphered is called cipher text (denoted decipherment.
by C). The process of turning cipher text
back into plaintext is called decryption
(denoted by D). A cryptographic
algorithm, or cipher, is a mathematical
function used for enciphering or
deciphering data. Modern cryptographic
algorithms use a key sequence (denoted
by k) to modify their out-put. The
encryption function E operates on P to
produce C:
E k (P) = C
In the reverse process, the decryption
function D operates on C to produce P:
D k (C) = P
As illustrated in the figure below, note
that if the same key can be used for
The secret key is concatenated with an
encryption and decryption then initialization vector (IV) and the
D k (E k (P)) = P resulting seed is input to a PRNG. The
PRNG outputs a key sequence k of
pseudorandom octets equal in length to
the number of data octets that are to be
transmitted in the expanded MPDU plus
4 [since the key sequence is used to
protect the integrity check value (ICV)
as well as the data]. Two processes are
applied to the plaintext MPDU. To
protect against unauthorized data
modification, an integrity algorithm
operates on P to produce an ICV.
Encipherment is then accomplished by
mathematically combining the key
sequence with the plaintext concatenated
with the ICV. The output of the process
is a message containing the IV and
cipher text. The WEP PRNG (WEP uses
the RC4 PRNG algorithm from RSA
Generic Encryption / Data Security, Inc.6) is the critical
Decryption component of this process, since it
Referring to above figure and viewing transforms a relatively short secret key
from left to right, encipherment begins into an arbitrarily long key sequence.
with a secret key that has been This greatly simplifies the task of key
distributed to cooperating STAs by an distribution, as only the secret key needs
to be communicated between STAs.
Apart from WEP, WLAN security may
be enhanced using several mechanisms
end to end security such as Remote
Authentication Dial-In User Service
(RADIUS), Firewall etc. or some
proprietary encryption.
One of the standards that IEEE has
drafted for enhancing security is
802.1 x which is designed to
provide enhanced security for users
of 802.11b WLAN.

Ad-hoc LAN

►Client/Server(infrastruct
WIRELESS-LAN ure networking):
CONFIGURATION Offering fully distributed data
A WLAN can be configured in connectivity, this mode typically
consists of multiple PCs linked to a
two basic ways: central hub that acts as a bridge to the
► Peer- to –Peer (ad hoc resources of the wired network. The
carrier waves transporting the data will
mode): not interfere with each other, as long as
An ad hoc network is peer-to-peer
they are sent out on different
network (no centralized server) set up
frequencies. At the other end of the
temporarily to meet some immediate
communication, a radio receiver tuned to
need. This mode consists of two or more
a specific frequency will "hear" only the
PCs equipped with wireless adapter
messages on that frequency. All other
control but with no connection to a
signals will be treated as noise and
wired network. ignored. Most WLANs use the 2.4
Gigahertz (GHz) frequency band.
Countries around the world have set
aside this portion of the airwaves for
unlicensed devices.
Wireless LAN
Connectivity

Each Wireless LAN cell requires some


communications traffic management.
This is coordinated by an Access Point
which communicates with each wireless
station in its coverage area. Stations also
communicate with each other via the AP
so communicating stations can be hidden
from one another. In this way, the AP
functions as a relay, extending the range
of the system.
The AP functions as a bridge between
the wireless stations and the wired
network and the other wireless cells.
Connecting the AP to the backbone or
the other wireless cells can be extended
Infrastructure by cascading several wireless links one
Networking after the other. When any area in the
building is within the reception range of
THE WLAN TOPOLOGY more than one access point the cells’
The basic building block of the wireless coverage is said to overlap. Each
LAN is the cell. This is the area in which wireless station automatically establishes
the wireless communication takes place. the best possible connection with one of
The coverage area of a cell depends on the access point.
the strength of the propagated radio
signal and the type and construction of The Roaming facility allows mobile
the walls, partitions and other physical users with portable stations to move
characteristics of the indoor freely between overlapping cells,
environment. PC-based workstations can constantly maintaining their network
move freely in the cell. connection. Roaming is seamless; a
work session can be maintained while
moving from one cell to another.
Multiple access points can provide
wireless coverage for an entire building
or campus. When coverage area of two
or more APs overlap, the best possible
connection is established. In order to
minimize packet loss during switch over,
the “old” and “new” APs communicate
to co-ordinate the process.
Advantages of Wi-Fi saving mechanisms (WMM
Power Save) make Wi-Fi even
more suitable for latency-
• Allows LANs to be deployed
sensitive applications (such as
without cabling, typically
voice and video) and small form-
reducing the costs of network
factor devices.
deployment and expansion.
Spaces where cables cannot be
run, such as outdoor areas and Disadvantages
historical buildings, can host
wireless LANs. • Wi-Fi can be interrupted by other
• Wi-Fi silicon pricing continues to devices, notably 2.4 GHz
come down, making Wi-Fi a very cordless phones.
economical networking option • Power consumption is fairly high
and driving inclusion of Wi-Fi in compared to some other
an ever-widening array of standards, making battery life
devices. and heat a concern.
• Wi-Fi products are widely • The most common wireless
available in the market. Different encryption standard, Wired
brands of access points and client Equivalent Privacy or WEP, has
network interfaces are been shown to be breakable even
interoperable at a basic level of when correctly configured.
service. Products designated as • Wi-Fi Access Points typically
Wi-Fi CERTIFIED by the Wi-Fi default to an open (encryption-
Alliance are interoperable and free) mode. Novice users benefit
include WPA2 security. from a zero configuration device
• Wi-Fi networks support roaming, that works out of the box but
in which a mobile client station might not intend to provide open
such as a laptop computer can wireless access to their LAN.
move from one access point to WPA Wi-Fi Protected Access
another as the user moves around which began shipping in 2003
a building or area. aims to solve these problems and
• Wi-Fi is a global set of standards. is now generally available, but
Unlike cellular carriers, the same adoption rates remain low. .
Wi-Fi client works in different • Wi-Fi networks can be monitored
countries around the world. and used to read and copy data
• Widely available in more than (including personal information)
250,000 public hot spots and transmitted over the network
millions of homes and corporate when no encryption such as VPN
and university campuses is used.
worldwide. • Interoperability issues between
• As of 2006, WPA and WPA2 brands or deviations from the
encryption are not easily standard can disrupt connections
crackable if strong passwords are or lower throughput speeds on
used other user's devices within range.
• New protocols for Quality of Wi-Fi Alliance programs test
Service (WMM) and power devices for interoperability and
designate devices which pass
testing as Wi-Fi CERTIFIED.

Conclusion
In this article we have learnt how,
essentially, Wi-Fi is really for when
cabling is not a feasible option and
Bluetooth is for intercommunication
between devices without the need for a
PC. Bluetooth makes connecting various
devices to each other without the need
for cables a fairly easy task, whereas
802.11-based products can extend, or
replace, a wired Local Area Network.
From a personal user’s point-of-view, I
would suggest - if possible - having both
available if your everyday life requires
you to travel to different destinations and
meet different people. This way you will
always be ready, if one isn’t available
then you can use the other.

It’s no secret that the overall


performance of a wired LAN is more
superior to a wireless network. However,
expect improvements, in the coming
years things will get bigger and better.
Having said this, the word that comes to
my mind when I think of wireless -
especially Wi-Fi - is Convenience. This
technology makes sitting out on the
porch or in the garden on a hot summer’s
day and browsing the Internet a
possibility.

References
[1] www.windowsnetworking.com
[2] www.bitpipe.com
[3] www.wirelessnetwork.com
[4] www.exampleessays.com

You might also like