Wifi A-31
Wifi A-31
Wifi A-31
Presented By-
Wifi’ What it stands
for?
“Wi-fi suggests Wireless-Fidelity, compared with the long
established audio recording term High Fidelity or Hi-Fi.”
Wi-Fi is simply a trademarked term meaning IEEE 802.11x.
.
When Wi-Fi
Originated ?
• The precursor to wi-fi was invented in
1991 by NCR Corporation in Nieuwegein,
the Netherland.
• The first wireless products were brought
on the market under the name WaveLAN
with speeds of 1 Mbit/s to 2 Mbit/s.
• Vic Hayes has been named as father of
“Wi-Fi’’.
The Architecture
How Wi-Fi Works?
Wi-Fi Standards
Standard Speed Freq band Notes
• 802.11 2 Mbps 2.4 GHz (1997)
802.11a 54 Mbps 5 GHz (1999)
802.11b 11 Mbps 2.4 GHz 802.11g
54 Mbps 2.4 GHz
Introduction to Wireless /802.11b
Standards
IEEE 802.11.b –2.4GHz – 11Mbps
International standard for wireless networking that
operates in the 2.4 GHz frequency range (2.4 GHz to
2.4835 GHz) and provides a throughput of up to 11 Mbps
with a range of just over 300 feet indoors. This is a very
commonly used frequency. Microwave ovens, cordless
phones, medical and scientific equipment, as well as
Bluetooth devices, all work within the 2.4 GHz frequency
band.
Introduction to Wireless /802.11b
Standards
IEEE 802.11.b –2.4GHz – 11Mbps
802.11b enables transfers of up to 11 Mbps.
Comparable to 10BaseT in speeds, 802.11b is the most
common wireless standard deployed today. In
comparison T1 speeds are 1.54Mbps and DSL is
normally in the 640Kbps range.
Standards
IEEE 802.11.a –5GHz – 11Mbps
International standard for wireless networking that
operates in the 5 GHz frequency range (5.725 GHz to
5.850 GHz) with a maximum 54 Mbps data transfer
rate. The 5 GHz frequency band is not as crowded as
the 2.4 GHz frequency, because the 802.11a
specification offers more radio channels than the
802.11b. These additional channels can help avoid
radio and microwave interference.
Cost of 802.11a equipment is approximately twice that
of 802.11b and current deployment is limited.
Introduction to Wireless /802.11b
Standards
• IEEE 802.11.b –2.4GHz – 11Mbps
• IEEE 802.11.a – 5GHz – 54 Mbps
• IEEE 802.11g – 2.4Ghz – Hybrid
11/54Mbps
802.11g is in the final stages of development.
The current draft (V5.0) is open for
comments until January 8, 2003.
802.11a (Cont’d)
802.11a 802.11b
2 Mbps
12 Mbps
5.5 Mbps
24 Mbps
36 Mbps
48 Mbps
11 Mbps
54 Mbps
What a wireless network
is made up of:
Wireless Network cards
- The base station sends and receives radio signals to and from
the Wi-Fi radio in your laptop or PC, enabling you to share your
Internet connection with other users on the network. Access
points and gateways have a wide range of features and
performance capabilities, but they all provide this basic network
connection service.
.
WLAN Architecture—Ad
Hoc Mode
Ad-Hoc mode: Peer-to-peer setup where
clients can connect to each other directly.
Generally not used for business networks.
WLAN Architecture--
Mesh
Mesh: Every client in
the network also acts
as an access or relay
point, creating a “self-
healing” and (in
theory) infinitely
extensible network.
Not yet in widespread
use, unlikely to be in
homes.
WLAN Architecture—
Infrastructure Mode
To Wired Network
Propagation Characteristics
900MHz
Multipath: High
Foliage: Pine (Absorb Radiation)
2.4GHz
Multipath: Very High (Concrete, Brick, Steel)
Foliage: Any Absorbs Radiation (water resonance)
5GHz
Multipath: Very High (Concrete, Brick, Steel, Foliage)
Foliage: Limited Absorption
WiFi 24
Security (Encryption, Content Filtering, Privacy, etc.)
Partition The Network
– A safe practice is to create two separate
networks. A private network for day to day
business and a network for public access.
Both can be wireless. These networks can
talk to one another through a proxy server
that will protect the private network from
malicious attacks via the public network.
Security (Encryption, Content Filtering, Privacy, etc.)
Encryption
• Encryption on the pubic network can be used
but would create administrative overhead.
Encryption keys would have to be changed
regularly and anyone using their own laptop
would have to be given the key.
• Encryption works best in a network that does
not allow people to use their own laptops.
• Encryption increases privacy, but can be
thwarted, either by software, or by gaining
access to a PC configured with wireless and
writing down the key.
Security (Encryption, Content Filtering, Privacy, etc.)
Content Filtering & Proxy Servers
Web content filtering that has generally been
software on the desktop would have to be handled
by a server if people are allowed to use their own
laptops.