Click here to load reader
Upload
agreeta-sharma
View
110
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Citation preview
2. COVERAGE AREA
3. WIRELESS TOPOLOGY
BSS
IBSS
ESS
In this site survey we are using more than one access points so the
topology we are using is the Extended Service Set i.e. ESS.
4. Available Technologies
802.11 a
IEEE 802.11a-1999or802.11ais an amendment to theIEEE
802.11specification that added a higher data rate of up to
54Mbit/susing the 5GHzband. It has seen widespread worldwide
implementation, particularly within the corporate workspace.
5.
IEEE 802.11b-1999or802.11b, is an amendment to theIEEE
802.11specification that extended throughput up to 11Mbit/susing
the same 2.4GHzband. This specification under the marketing name
ofWi-Fihas been implemented all over the world. 802.11b has a
maximum raw data rate of 11 Mbit/s and uses the sameCSMA/CA media
access method defined in the original standard.
6.
802.11g is the third modulation standard forwireless LANs. It
works in the 2.4 GHz band (like802.11b) but operates at a maximum
raw data rate of 54 Mbit/s, or about 19 Mbit/s net throughput
(identical to802.11acore, except for some additional legacy
overhead for backward compatibility). 802.11g hardware is fully
backwards compatible with 802.11b hardware.
7. Technology Used
Technology for this layout &as per the requirements of the
University I am using is 802.11 a.
8. Why 802.11 a?
Why not 802.11 b ?
devices like the Bluetooth's work.
which is not suited for big crowd &
also not separated by much distance.
9. Why not 802.11 g?
interferences caused by the devices
at that band.
no. of channels that can b used is only 3.
10. Advantages of 802.11a
11. As the band is larger the no. of channels are up to
23.
the crowded places where the crowd is not sparse.
12. Layout
13. Access Points
Incomputer networking, awireless access point(WAP) is a device
which allows wireless devices to connect to a wired network
usingWi-Fi,Bluetoothor related standards. The WAP usually connects
to arouter(via a wired network), and can relay data between the
wireless devices (such as computers or printers) and wired devices
on the network.
14. Why three A.Ps?
The technology we are using i.e. 802.11 a has a disadvantage which
is this technology has short range.
So to have good speed & also better connectivity we need three
access points.
1- LABS.
2- Horizontal Corridor.
3- Vertical Corridor.
15. Security
The Wireless securitystandard we are using is
802.11i or WPA 2.
WPA stands for WIFI Protected Access.Which is the latest protocol
for wireless & has many
good features like AES,TKIP etc.
16. Features of WPA 2
AES (Advance Encryption).
Authentication.
Dynamic Key Management.
Successor of WPA.
17. Advanced Encryption System
The new 802.11i standard, or WPA2, supports the128-bit Advanced
Encryption Standard (AES) .
AES supports 128-bit, 192-bit and 256-bit keys.
18. Authentication
This new standard specifies use of Temporal Key Integrity Protocol
(TKIP) and 802.1x/EAP with mutual authentication .
802.1x authentication and key-management
features for the various 802.11 Wi-Fi flavors.
19. Control Accessing WLAN
SSID
Aservice set identifier(SSID) is a name that identifies a
particular 802.11 wireless LAN. A client device receives broadcast
messages from allaccess pointswithin range advertising their SSIDs.
The client device can then either manually or automaticallybased on
configurationselect the network with which to associate. The SSID
can be up to 32 characters long. As the SSID displays to users, it
normally consists of human-readable characters.
20. Mac Address Filtering
21. MAC addressesare uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use ofblacklistsandwhite lists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a white list entry for each device that he or she would use to access the network.