Wi-Fi Technology: of Electrical and Electronics Engineers (IEEE) and Released in 1997. The Term Wi-Fi
Wi-Fi Technology: of Electrical and Electronics Engineers (IEEE) and Released in 1997. The Term Wi-Fi
Wi-Fi Technology: of Electrical and Electronics Engineers (IEEE) and Released in 1997. The Term Wi-Fi
1
stations, airports, and hotels) with wireless
networks. These access areas are called "Hot 3] IEEE 802.11g :-
Spots".
• It was introduced in 2003
• I has combined features of both
IEEE 802.11 :- standards (a,b)
• The range is 100-150 feet.
IEEE 802.11 is a standard of communication • It has 54 Mbps Speed
between computers and wireless devices. The • It operates at 2.4 GHz radio frequencies
standards were set by IEEE LAN/MAN Standard • It is compatible with ‘b’
committee in 5GHZ and 2.4 GHz public
spectrum bands.
Elements of a WI-FI Network :-
The IEEE 802.11 is consisting of numerous
mechanism and services that interrelate to
present station mobility translucent to the higher 1. Access Point (AP) - The AP is a
layers of the network mass. IEEE 802.11 is a wireless LAN transceiver or “base
combination of wireless LAN. We can use IEEE station” that can connect one or many
802.11 and Wi-Fi often as interchangeably wireless devices simultaneously to the
depends on market demand. It is a basic protocol Internet.
of any high speed wireless network from 1997 to
2008. There are lots of change occurred in it but 2. Wi-Fi cards - They accept the
the basics “high performance" never change. The
wireless signal and relay
frequency of it is from 2.4 GHz to 5 GHz and
information.They can be internal and
range is from 100 meter to 5000 meter. The
external.(e.g PCMCIA Card for Laptop
IEEE 802.11 starts from the need to connect
and PCI Card for Desktop PC)
more than one computer with each other
wirelessly especially where the wire cannot go.
3. Safeguards - Firewalls and anti-virus
Depending upon the development occurred in software protect networks from
IEEE 802.11, there are following types. uninvited users and keep information
secure.
Types of IEEE 802.11 :-
2] IEEE 802.11a :-
How Wi – Fi networks work ?
• It was introduced in 2001.
• It operates at 5 GHz . • Basic concept is same as Walkie talkies.
• Theoretical speed – 54Mbps • A Wi-Fi hotspot is created by installing
• Actual speed – 15-20 Mbps an access point to an internet
• The range is 50-75 feet. connection.
• It is More expensive, so less popular. • An access point acts as a base station.
• It is not compatible with 802.11b.
2
• When Wi-Fi enabled device encounters
a hotspot the device can then connect to
that network wirelessly.
• A single access point can support up to
30 users and can function within a range
of 100 – 150 feet indoors and up to 300
feet outdoors.
• Many access points can be connected to
each other via Ethernet cables to create
a single large network.
Wi-Fi Modes :-
Setting Up Infrastructure Mode :-
Wireless technology has change the way for us
to connect to internet, local and remote Setting up infrastructure mode for wireless
computers, it has enabled the implementation of connectivity is not that hard, all we are require to
imagination beyond the limits. There are two follow number of steps which will do the job.
most common modes by which we connect to We need to make sure that Internet cable is
Wi-Fi for connectivity for accessing internet or plugged in Ethernet port, second step is to
other computer for file sharing etc. configure AP (Access point). http://192.168.1.1
is usually the access panel address. Write this
The most common modes for Wi-Fi connectivity URL at your Internet browser, username and
are as follow: password window will appear, default settings
are usually, admin username and admin
A ] Infrastructure mode password. We name the connection name which
B ] Ad hoc Mode will appear to all wireless devices, then we
enable infrastructure mode and also assign SSID
in the switch/router for it broadcast
A ] Infrastructure Mode:-
Now we scan wireless adaptor to see if any
Infrastructure mode is one of the two methods wireless network is available to connect, when
for connecting to wireless networks with Wi-Fi configured network is appear, click and connect
enabled devices such as laptops, Pda’s I-phone and provide SSID information, here you should
etc. These devices are connected to wireless be able to connect to the network for internet
network with the help of Access point (AP). So, browsing and file sharing.
Also known as “ AP Topology”. Wireless
Access Points are usually routers or switches Advantages of Infrastructure mode :-
which are connected to internet by Ethernet port.
Infrastructure mode provide much more stability,
Wireless Access points are always required for scalability, ease of management and improved
infrastructure mode of wireless networking. It is security. Ad hoc on the other hand does not
necessary to use SSID while configuring AP, this provide security to that level and managing can
SSID should be known to clients for their be difficult incase of network growth.
computers to connect WLAN. SSID is basically Performance suffers as we increase devices as
security key which help prevent un authorized well.
access to WLAN. The Access point is then The only disadvantage associated with
connected to wire network (Internet) to provide infrastructure mode is extra cost to for Access
wireless internet connectivity to clients. Multiple points (routers and switches).Compared to the
access points can be added in the WLAN, this alternative, ad-hoc wireless networks,
increases the reach of infrastructure for infrastructure mode networks offer the advantage
supporting many number of wireless clients. of scalability, centralized security management
and improved reach. The disadvantage of
3
infrastructure wireless networks is simply the bridge to wire LANs and cannot access internet
additional cost to purchase AP hardware. without installing special gateways.
4
Wi-Fi performance decreases roughly The most important now you can play online
quadratically as distance increases at constant radio. Wifi technology system is rather
radiation levels. remarkable, you can download songs, send email
Due to reach requirements for wireless LAN and transfer files expediently at sky-scraping
applications, power consumption is fairly high speed and you can move your computer easily
compared to some other standards. Technologies because your WiFi network has no cable to
such as Bluetooth, which are designed to support disrupt your work so we can say that it is quite
wireless PAN applications, provide a much easy, helpful and most of all expedient.
shorter propagation range of <10m (ref. e.g.
IEEE Std. 802.15.4 section 1.2 scope) and so in 3] Fortress Technology :-
general have a lower power consumption. Other WiFi providing secure wireless solutions
low-power technologies such as ZigBee have support the growth and release of a prototype
fairly long range, but much lower data rate. The mobile ad hoc wireless network for use in the
high power consumption of Wi-Fi makes battery wireless strategic skirmish.
life a concern for mobile devices.
A number of "no new wires" technologies have
been developed to provide alternatives to Wi-Fi
for applications in which Wi-Fi's indoor range is
not adequate and where installing new wires 4] Support an entire age bracket :-
(such as CAT-5) is not possible or cost-effective. WiFi technology has several advantages it
Due to the complex nature of radio propagation support an entire age bracket and create a
at typical Wi-Fi frequencies, particularly the connection between components on the same
effects of signal reflection off of trees and network and have ability to transfer data between
buildings, Wi-Fi signal strength can only be the devices and enable different kind of devices
predicted generally for any given area in relation such as game, MP3 player, PDA’s and much
to a transmitter.This effect does not apply more!
equally to long-range Wi-Fi, since longer links
typically operate from towers that broadcast
above the surrounding foliage
5] It's convenient and every where :-
WiFi is a convenient technology and where the
range station exists you are online during travel
Features of “WiFi” Technology :- you can equip with a Wi-Fi network and set up
shop anyplace. You will automatically connect
with internet if you are near hotspot. These days
1] A new aspect in networking :- WiFi exist every where with all its wonders.
WiFi has brought a new aspect in the ground of
networking. The broadcast of data is completed
via radio waves and the cost of cables for
6] More faster and secure :-
network lying down.Wi-Fi enable a user to get With WiFi you can get high speed of internet
access to internet anywhere in the given location. because it is very fast than DSL and Cable
Now you can make a network in Hotels, connection you can establish a Wifi network in
Libraries, colleges, universities, campus, private small space now you don’t need any professional
institutes, and coffee shops and even on a public installation just connect to a power outlet with an
place to make your business more profitable and Ethernet cord, and start browsing. WiFi security
connect with their client any time. WiFi makes system for Threats makes it more renewable and
waves for business with their highly effective its tool protect your VPN and secure web page.
cable less media. You can easily configure the device to take
better performance. The standard devices,
embedded systems and network security make it
2] Unmatched mobility and more powerful.
elasticity :-
Wi-Fi, is allowing new intensity of connectivity Application :-
without giving up functions. Wi-Fi introduced
various types of utilities such music streamers • Home
that transmit your music to speakers without any • Small Businesses or SOHO
wire you can also play music from the remote • Large Corporations & Campuses
computer or any other attached to the network.
5
• Health Care 2] www.google.com
• Wireless ISP (WISP)
• Travellers 3] wikipidia
Wi – Fi Security
The requirements for Wi-Fi network security
can be broken down into two primary
components:
• Authentication
User Authentication
Server Authentication
• Privacy
Authentication :-
Authentication is done with the RADIUS server,
which ”tells” the access point whether access to
controlled ports should be allowed or not
• AP forces the user into an
unauthorized state
• user send an EAP start
message
• AP return an EAP message
requesting the user’s identity
• Identity send by user is then
forwared to the authentication
server by AP
• Authentication server
authenticate user and return an
accept or reject message back
to the AP
• If accept message is return, the
AP changes the client’s state to
authorized and normal traffic
flows
Reference:
1] www.wifinotes.com