SlideShare uma empresa Scribd logo
1 de 51
Wi-Fi  Technology Seminar by K.SUBBIAH@SURESH ,             II M.C.A. ,             M.S.UNIVERSITY.
Agenda Introduction. Wi-Fi  Protocol Stack. Wi-Fi Physical Layer. Wi-Fi MAC Sub Layer. Wi-Fi Network Topologies. Wi-Fi Configurations. Applications of Wi-Fi. Wi-Fi Security. Advantages/ Disadvantages of Wi-Fi. Conclusion.
Introduction Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. Physically means ‘communication without wires’. Technicallymeans transmission of signals through  a Electromagnetic waves.  Wi-Fi(Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs). Wi-Fi Network connect computers to each other, to the internet and to the wired network.
Electromagnetic Wave electric field propagation direction magnetic field
How a Wi-Fi Network Works ? AWi-Fihotspot is created by installing an access point to an internet connection. An access point acts as a base station.  When Wi-Fienabled device encounters a hotspot the device can then connect to that network wirelessly. A single access point can support up to 30 users and can function within a range of 100 – 150 feet indoors and up to 300 feet outdoors. Many access points can be connected to each other via Ethernet cables to create a single large network.
  How are WLANs Different? They use specialized physical and data link protocols They integrate into existing networks through access points  which provide a bridging function They let you stay connected as youroam from one coverage area to another They have unique securityconsiderations They have specific interoperability  requirements They require different hardware  They offer performancethat differs from wired LANs.
802.11 Protocol Stack
Wi-Fi Physical layer Physical layer conforms to OSI (five options) 1997: 802.11 infrared, FHSS, DSSS. 1999: 802.11a OFDM and 802.11b HR-DSSS. 2001: 802.11g OFDM. 802.11Infrared. Two capacities 1 Mbps or 2 Mbps. Range is 10 to 20 meters and cannot penetrate walls. Does not work outdoors.
Wi-Fi Physical layer  802.11 FHSS (Frequence Hopping Spread Spectrum) The main issue is multipath fading. 79 non-overlapping channels, each 1 Mhz wide at low end of 2.4 GHz ISM band. Same pseudo-random number generator used by all stations. Dwell time: min. time on channel before hopping (400msec).
Wi-Fi Physical layer
  Wi-Fi Physical layer  802.11 DSSS (Direct Sequence Spread Spectrum) Spreads signal over entire spectrum using pseudo-random sequence . Direct sequence signaling technique divides the 2.4 GHz band into 11 22-MHz channels Each bit transmitted using an 11 chips Barker sequence, PSK at 1Mbaud. 1 or 2 Mbps.
Wi-Fi Physical layer 802.11a OFDM (Orthogonal Frequency Divisional Multiplexing) 54Mbps in wider 5.5 GHz band  transmission range is limited. Uses 52 FDM channels (48 for data; 4 for synchronization). Encoding is complex . More difficulty penetrating walls.
IEEE 802.11 a Introduced in 2001 Operates at 5 GHz (less popular)  54 Mbps (theoretical speed) 15-20 Mbps (Actual speed) 50-75 feet range More expensive Not compatible with 802.11b
Wi-Fi Physical layer 802.11b  HR-DSSS (High Rate Direct Sequence Spread Spectrum) 802.11a  and  802.11b shows a split in the standards committee. 802.11b approved and hit the market before 802.11a. Upto 11 Mbps in 2.4 GHz band using  11 million chips/sec. Note in this bandwidth all these protocols have to deal with interference from microwave ovens, cordless phones and garage door openers. Range is 7 times greater than 11a. 11b and 11a are incompatible!!
IEEE 802.11 b Appear in late 1999 Operates at 2.4GHz radio spectrum 11 Mbps (theoretical speed) - within 30 m Range 4-6 Mbps (actual speed) 100 -150 feet range Most popular, Least Expensive Interference from mobile phones and Bluetooth devices which can reduce the transmission speed.
Wi-Fi Physical layer 802.11g OFDM (Orthogonal Frequency Division Multiplexing) An attempt to combine the best of both 802.11a and 802.11b. Supports bandwidths up to 54 Mbps. Uses 2.4 GHz frequency for greater range. Is backward compatible with 802.11b.
IEEE 802.11 g Introduced in 2003. Combine the feature of both standards (a & b). 100-150 feet range. 54 Mbps Speed. 2.4 GHz radio frequencies. Compatible with ‘b’
Wi-Fi MAC Sublayer protocol In 802.11 wireless LANs, “seizing channel” does not exist as in 802.3 wired Ethernet. Two additional problems:    Hidden Terminal Problem    Exposed Station Problem To deal with these two problems 802.11 supports two modes of operation DCF (Distributed Coordination Function) and PCF (Point Coordination Function).
Hidden Station Problem Wireless stations have transmission ranges and not all stations are within radio range of each other. Simple CSMA will not work! C transmits to B. If A “senses” the channel, it will not hear C’s transmission and falsely conclude that A can begin a transmission to B.
Exposed Station Problem This is the inverse problem. B wants to send to C and listens to the channel. When B hears A’s transmission, B falsely assumes that it cannot send to C.
Exposed Station Problem In 802.11 wireless LANs, “seizing channel” does not exist as in 802.3 wired Ethernet. Two additional problems: Hidden Terminal Problem Exposed Station Problem To deal with these two problems 802.11 supports two modes of operation DCF (Distributed Coordination Function) and PCF (Point Coordination Function). All implementations must support DCF, but PCF is optional. Hidden Station Problem
Distributed Coordination Function Uses CSMA/ CA (CSMA with Collision Avoidance). Uses both physical and virtual carrier sensing. Two methods are supported: based on MACAW ( Multiple Access with Collision Avoidance for Wireless) with virtual carrier sensing.
Wi-Fi MAC Protocol MAC protocol solved hidden, exposed terminal problem by,  Send Ready-to-Send (RTS) and Clear-to-Send (CTS) first  RTS, CTS helps determine who else is in range or busy (Collision avoidance).
Wi-Fi MAC Protocol
Virtual Channel Sensing C (in range of A) receives the RTS and  based on information in RTS creates a virtual channel busyNAV( Network Allocation Vector). D (in range of B) receives the CTS and creates a shorter NAV.
Point Coordination Function  PCF uses a base station to poll other stations to see if they have frames to send. No collisions occur. Base station sends beacon frame periodically. Base station can tell another station to sleep to save on batteries and base stations holds frames for sleeping station.
PCF & DCF Co-Exist Distributed and centralized control can co-exist using Interframe Spacing. SIFS (Short IFS) :- is the time waited between packets in an ongoing dialog (RTS , CTS , data , ACK , next frame) PIFS (PCF IFS) :-when no SIFS response, base station can issue beacon or poll. DIFS (DCF IFS) :-when no PIFS, any station can attempt to acquire the channel. EIFS (Extended IFS) :-lowest priority interval used to report bad or unknown frame.
Interframe Spacing
802.11 Frame Structure a
Wi-Fi Network Topologies AP-based topology (Infrastructure Mode) Peer-to-peer topology (Ad-hoc Mode) Point-to-multipoint bridge topology
Wi-Fi Application The client communicate through Access Point.  BSA-RF coverage provided by an AP. ESA-It consists of 2 or more BSA. ESA cell includes 10-15% overlap to allow roaming.
AP-Based Topology a
Peer to Peer Topology AP is not required. Client devices within a cell can communicate directly with each other. It is useful for setting up of a wireless network quickly  and easily.
Infrastructure Mode & Ad-Hoc Mode .
Point to Multipoint Topology used to connect a LAN in one building to a LANs in other buildings. receive a clear line of sight between buildings.
Wi-Fi Security Requirements Confidentiality Messages sent must be encrypted. Authenticity  Origin of messages received must be verified. Integrity Integrity of messages received  must be verified. access control Access for legitimate entities only.
What is WEP ? WEP( Wired Equivalent Privacy)       part of the IEEE 802.11 specification GOAL      make the Wi-Fi network at least as secure as a wired LAN. Encrypt data transmitted to prevent the attackers from getting the information or  change it. SERVICES access control to the network.       message confidentiality.       messageintegrity and authenticity.
How WEP Works WEP uses encryption algorithm called RC4  The key divided in two parts There are two kinds of WEP  		1)WEP 64 (40 bit + 24 bit). 		2)WEP 128(104 bit + 24 bit).
Example  KSU                K=6Bh        S=73h          U=75h Plaintext        01101011   01110011    01110101 key stream    01101100   10010111    01101111                     ……………………………………………. Cipher text    00000111   11100100    00011010
Flow Chart
Wi-Fi Configuration
Wi-Fi Connected Home
Wi-Fi Security Threats Wireless technology doesn’t remove any old security issues, but introduces new ones Eavesdropping Man-in-the-middle attacks Denial of Service
Eavesdropping Easy to perform, almost impossible to detect By default, everything is transmitted in clear text Usernames, passwords, content ... No security offered by the transmission medium Different tools available on the internet Network sniffers, protocol analysers . . . Password collectors With the right equipment, it’s possible to eavesdrop traffic from few kilometers away
MITM Attack Attacker spoofes a disassociate message from the victim The victim starts to look for a new access point, and the attacker advertises his own AP on a different channel, using the real AP’s MAC address The attacker connects to the real AP using victim’s MAC address
Denial of Service Attack on transmission frequecy used  Frequency jamming  Not very technical, but works Attack on MAC layer Spoofed deauthentication / disassociation messages  can target one specific user Attacks on higher layer protocol (TCP/IP protocol)     SYN Flooding
Wi-Fi Components Access point  PCI cards that accept  wireless PC cards External USB wireless NICs
Wi-Fi Application
Wi-Fi Advantages Mobility Ease of Installation Cost Reliability Security Use unlicensed part of the radio spectrum Roaming Speed
Wi-Fi Disadvantages Interference Degradation in performance High power consumption Limited range
References Computer Networks by  Andrew  S .Tanenbaum,     IV Edition. www.Google.com. www.YouTube.com.

Mais conteúdo relacionado

Mais procurados

Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDon Norwood
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.pptUmme habiba
 
Wireless pan technologies ieee 802.15.x
Wireless pan technologies ieee 802.15.xWireless pan technologies ieee 802.15.x
Wireless pan technologies ieee 802.15.xPawan Koshta
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802Abhishek G
 
802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol MapChris x-MS
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALASaikiran Panjala
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Broadband Wireless 802.16
Broadband Wireless 802.16Broadband Wireless 802.16
Broadband Wireless 802.16coolbp
 
Wireless Network Architecture
Wireless Network ArchitectureWireless Network Architecture
Wireless Network ArchitecturePawandeep Singh
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11mankuuu
 

Mais procurados (20)

WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
WiFi 802.11
WiFi 802.11WiFi 802.11
WiFi 802.11
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
 
Wireless pan technologies ieee 802.15.x
Wireless pan technologies ieee 802.15.xWireless pan technologies ieee 802.15.x
Wireless pan technologies ieee 802.15.x
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802
 
ieee protocols 802.11
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
 
802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol Map
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALA
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
WLAN
WLANWLAN
WLAN
 
Broadband Wireless 802.16
Broadband Wireless 802.16Broadband Wireless 802.16
Broadband Wireless 802.16
 
Ieee standards
Ieee standardsIeee standards
Ieee standards
 
Wireless Network Architecture
Wireless Network ArchitectureWireless Network Architecture
Wireless Network Architecture
 
Cn fundamentals of networks
Cn fundamentals of networksCn fundamentals of networks
Cn fundamentals of networks
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 

Destaque

WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11Rahul Hada
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_khFarzad Ramin
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsArkaprava Sadhu
 
CREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeCREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeEfiong Etuk
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionGuisun Han
 

Destaque (9)

Lan architecture
Lan architectureLan architecture
Lan architecture
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_kh
 
Chapter#14
Chapter#14Chapter#14
Chapter#14
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data Communications
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
CREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeCREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your Life
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) Introduction
 

Semelhante a Seminar on Wi-Fi Technology: History, Standards, Security Issues & Applications

Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networkingM Sabir Saeed
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wirelessAble George
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingNoorNawaz12
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptxstephen972973
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communicationJigsAshley
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Darpan Patel
 

Semelhante a Seminar on Wi-Fi Technology: History, Standards, Security Issues & Applications (20)

Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
J010216776
J010216776J010216776
J010216776
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Darsh
DarshDarsh
Darsh
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wireless
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
WIFI Technology
WIFI TechnologyWIFI Technology
WIFI Technology
 
wifi network
wifi networkwifi network
wifi network
 
Wi fi copy
Wi fi   copyWi fi   copy
Wi fi copy
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)
 

Último

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 

Último (20)

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 

Seminar on Wi-Fi Technology: History, Standards, Security Issues & Applications

  • 1. Wi-Fi Technology Seminar by K.SUBBIAH@SURESH , II M.C.A. , M.S.UNIVERSITY.
  • 2. Agenda Introduction. Wi-Fi Protocol Stack. Wi-Fi Physical Layer. Wi-Fi MAC Sub Layer. Wi-Fi Network Topologies. Wi-Fi Configurations. Applications of Wi-Fi. Wi-Fi Security. Advantages/ Disadvantages of Wi-Fi. Conclusion.
  • 3. Introduction Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. Physically means ‘communication without wires’. Technicallymeans transmission of signals through a Electromagnetic waves. Wi-Fi(Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs). Wi-Fi Network connect computers to each other, to the internet and to the wired network.
  • 4. Electromagnetic Wave electric field propagation direction magnetic field
  • 5. How a Wi-Fi Network Works ? AWi-Fihotspot is created by installing an access point to an internet connection. An access point acts as a base station. When Wi-Fienabled device encounters a hotspot the device can then connect to that network wirelessly. A single access point can support up to 30 users and can function within a range of 100 – 150 feet indoors and up to 300 feet outdoors. Many access points can be connected to each other via Ethernet cables to create a single large network.
  • 6. How are WLANs Different? They use specialized physical and data link protocols They integrate into existing networks through access points which provide a bridging function They let you stay connected as youroam from one coverage area to another They have unique securityconsiderations They have specific interoperability requirements They require different hardware They offer performancethat differs from wired LANs.
  • 8. Wi-Fi Physical layer Physical layer conforms to OSI (five options) 1997: 802.11 infrared, FHSS, DSSS. 1999: 802.11a OFDM and 802.11b HR-DSSS. 2001: 802.11g OFDM. 802.11Infrared. Two capacities 1 Mbps or 2 Mbps. Range is 10 to 20 meters and cannot penetrate walls. Does not work outdoors.
  • 9. Wi-Fi Physical layer 802.11 FHSS (Frequence Hopping Spread Spectrum) The main issue is multipath fading. 79 non-overlapping channels, each 1 Mhz wide at low end of 2.4 GHz ISM band. Same pseudo-random number generator used by all stations. Dwell time: min. time on channel before hopping (400msec).
  • 11. Wi-Fi Physical layer 802.11 DSSS (Direct Sequence Spread Spectrum) Spreads signal over entire spectrum using pseudo-random sequence . Direct sequence signaling technique divides the 2.4 GHz band into 11 22-MHz channels Each bit transmitted using an 11 chips Barker sequence, PSK at 1Mbaud. 1 or 2 Mbps.
  • 12. Wi-Fi Physical layer 802.11a OFDM (Orthogonal Frequency Divisional Multiplexing) 54Mbps in wider 5.5 GHz band  transmission range is limited. Uses 52 FDM channels (48 for data; 4 for synchronization). Encoding is complex . More difficulty penetrating walls.
  • 13. IEEE 802.11 a Introduced in 2001 Operates at 5 GHz (less popular) 54 Mbps (theoretical speed) 15-20 Mbps (Actual speed) 50-75 feet range More expensive Not compatible with 802.11b
  • 14. Wi-Fi Physical layer 802.11b HR-DSSS (High Rate Direct Sequence Spread Spectrum) 802.11a and 802.11b shows a split in the standards committee. 802.11b approved and hit the market before 802.11a. Upto 11 Mbps in 2.4 GHz band using 11 million chips/sec. Note in this bandwidth all these protocols have to deal with interference from microwave ovens, cordless phones and garage door openers. Range is 7 times greater than 11a. 11b and 11a are incompatible!!
  • 15. IEEE 802.11 b Appear in late 1999 Operates at 2.4GHz radio spectrum 11 Mbps (theoretical speed) - within 30 m Range 4-6 Mbps (actual speed) 100 -150 feet range Most popular, Least Expensive Interference from mobile phones and Bluetooth devices which can reduce the transmission speed.
  • 16. Wi-Fi Physical layer 802.11g OFDM (Orthogonal Frequency Division Multiplexing) An attempt to combine the best of both 802.11a and 802.11b. Supports bandwidths up to 54 Mbps. Uses 2.4 GHz frequency for greater range. Is backward compatible with 802.11b.
  • 17. IEEE 802.11 g Introduced in 2003. Combine the feature of both standards (a & b). 100-150 feet range. 54 Mbps Speed. 2.4 GHz radio frequencies. Compatible with ‘b’
  • 18. Wi-Fi MAC Sublayer protocol In 802.11 wireless LANs, “seizing channel” does not exist as in 802.3 wired Ethernet. Two additional problems: Hidden Terminal Problem Exposed Station Problem To deal with these two problems 802.11 supports two modes of operation DCF (Distributed Coordination Function) and PCF (Point Coordination Function).
  • 19. Hidden Station Problem Wireless stations have transmission ranges and not all stations are within radio range of each other. Simple CSMA will not work! C transmits to B. If A “senses” the channel, it will not hear C’s transmission and falsely conclude that A can begin a transmission to B.
  • 20. Exposed Station Problem This is the inverse problem. B wants to send to C and listens to the channel. When B hears A’s transmission, B falsely assumes that it cannot send to C.
  • 21. Exposed Station Problem In 802.11 wireless LANs, “seizing channel” does not exist as in 802.3 wired Ethernet. Two additional problems: Hidden Terminal Problem Exposed Station Problem To deal with these two problems 802.11 supports two modes of operation DCF (Distributed Coordination Function) and PCF (Point Coordination Function). All implementations must support DCF, but PCF is optional. Hidden Station Problem
  • 22. Distributed Coordination Function Uses CSMA/ CA (CSMA with Collision Avoidance). Uses both physical and virtual carrier sensing. Two methods are supported: based on MACAW ( Multiple Access with Collision Avoidance for Wireless) with virtual carrier sensing.
  • 23. Wi-Fi MAC Protocol MAC protocol solved hidden, exposed terminal problem by, Send Ready-to-Send (RTS) and Clear-to-Send (CTS) first RTS, CTS helps determine who else is in range or busy (Collision avoidance).
  • 25. Virtual Channel Sensing C (in range of A) receives the RTS and based on information in RTS creates a virtual channel busyNAV( Network Allocation Vector). D (in range of B) receives the CTS and creates a shorter NAV.
  • 26. Point Coordination Function PCF uses a base station to poll other stations to see if they have frames to send. No collisions occur. Base station sends beacon frame periodically. Base station can tell another station to sleep to save on batteries and base stations holds frames for sleeping station.
  • 27. PCF & DCF Co-Exist Distributed and centralized control can co-exist using Interframe Spacing. SIFS (Short IFS) :- is the time waited between packets in an ongoing dialog (RTS , CTS , data , ACK , next frame) PIFS (PCF IFS) :-when no SIFS response, base station can issue beacon or poll. DIFS (DCF IFS) :-when no PIFS, any station can attempt to acquire the channel. EIFS (Extended IFS) :-lowest priority interval used to report bad or unknown frame.
  • 30. Wi-Fi Network Topologies AP-based topology (Infrastructure Mode) Peer-to-peer topology (Ad-hoc Mode) Point-to-multipoint bridge topology
  • 31. Wi-Fi Application The client communicate through Access Point. BSA-RF coverage provided by an AP. ESA-It consists of 2 or more BSA. ESA cell includes 10-15% overlap to allow roaming.
  • 33. Peer to Peer Topology AP is not required. Client devices within a cell can communicate directly with each other. It is useful for setting up of a wireless network quickly and easily.
  • 34. Infrastructure Mode & Ad-Hoc Mode .
  • 35. Point to Multipoint Topology used to connect a LAN in one building to a LANs in other buildings. receive a clear line of sight between buildings.
  • 36. Wi-Fi Security Requirements Confidentiality Messages sent must be encrypted. Authenticity Origin of messages received must be verified. Integrity Integrity of messages received must be verified. access control Access for legitimate entities only.
  • 37. What is WEP ? WEP( Wired Equivalent Privacy) part of the IEEE 802.11 specification GOAL make the Wi-Fi network at least as secure as a wired LAN. Encrypt data transmitted to prevent the attackers from getting the information or change it. SERVICES access control to the network. message confidentiality. messageintegrity and authenticity.
  • 38. How WEP Works WEP uses encryption algorithm called RC4 The key divided in two parts There are two kinds of WEP 1)WEP 64 (40 bit + 24 bit). 2)WEP 128(104 bit + 24 bit).
  • 39. Example KSU K=6Bh S=73h U=75h Plaintext 01101011 01110011 01110101 key stream 01101100 10010111 01101111 ……………………………………………. Cipher text 00000111 11100100 00011010
  • 43. Wi-Fi Security Threats Wireless technology doesn’t remove any old security issues, but introduces new ones Eavesdropping Man-in-the-middle attacks Denial of Service
  • 44. Eavesdropping Easy to perform, almost impossible to detect By default, everything is transmitted in clear text Usernames, passwords, content ... No security offered by the transmission medium Different tools available on the internet Network sniffers, protocol analysers . . . Password collectors With the right equipment, it’s possible to eavesdrop traffic from few kilometers away
  • 45. MITM Attack Attacker spoofes a disassociate message from the victim The victim starts to look for a new access point, and the attacker advertises his own AP on a different channel, using the real AP’s MAC address The attacker connects to the real AP using victim’s MAC address
  • 46. Denial of Service Attack on transmission frequecy used Frequency jamming Not very technical, but works Attack on MAC layer Spoofed deauthentication / disassociation messages can target one specific user Attacks on higher layer protocol (TCP/IP protocol) SYN Flooding
  • 47. Wi-Fi Components Access point PCI cards that accept wireless PC cards External USB wireless NICs
  • 49. Wi-Fi Advantages Mobility Ease of Installation Cost Reliability Security Use unlicensed part of the radio spectrum Roaming Speed
  • 50. Wi-Fi Disadvantages Interference Degradation in performance High power consumption Limited range
  • 51. References Computer Networks by Andrew S .Tanenbaum, IV Edition. www.Google.com. www.YouTube.com.