SlideShare ist ein Scribd-Unternehmen logo
1 von 36
By.
                           P. Victer Paul

Dear,
 We planned to share our eBooks and project/seminar contents for free
to all needed friends like u.. To get to know about more free
computerscience ebooks and technology advancements in computer
science. Please visit....

http://free-computerscience-ebooks.blogspot.com/
http://recent-computer-technology.blogspot.com/
http://computertechnologiesebooks.blogspot.com/

Please to keep provide many eBooks and technology news for FREE.
Encourage us by Clicking on the advertisement in these Blog.
   Introduction
   Wi-Fi Technologies
   Wi-Fi Architecture
   Wi-Fi Network Elements
   How a Wi-Fi Network Works
   Wi-Fi Network Topologies
   Wi-Fi Configurations
   Applications of Wi-Fi
   Wireless Technology is an alternative to Wired Technology,
    which is commonly used, for connecting devices in wireless
    mode.

   Wi-Fi (Wireless Fidelity) is a generic term that refers to the
    IEEE 802.11 communications standard for Wireless Local
    Area Networks (WLANs).

   Wi-Fi Network connect computers to each other, to the
    internet and to the wired network.

          Wireless Network Design
          Radio Modes
          Bridged Networking
ny wireless network can be thought of as a combination of one or
more of these types of connections:

2.   Point-to-Point
3.   Point-to-Multipoint
4.   Multipoint-to-Multipoint
he simplest connection is the Point-to-Point link. These links can
be used to extend a network over great distances.
hen more than one computer communicates with a central point,
this is a Point-to-Multipoint network.
hen any node of a network may communicate with any other, this
is a multipoint-to-multipoint network(also known as an ad-hoc or
mesh network).
i-Fi cards can be operated in one of these modes:



aster(Access Point) Managed(also known as client or station)
Ad-hoc.

onitor.

ther proprietary modes(e.g. Mikrotik Nstreme).



adios may only operate in one mode at a time.
aster mode (also called AP or infrastructure mode) is used to
create a service that looks like a traditional access point.


he wireless card creates a network with a specified name (called
the SSID) and channel, and offers network services on it.


ireless cards in master mode can only communicate with cards
that are associated with it in managed mode.
anaged mode is sometimes also referred to as client mode.


ireless cards is managed mode will join a network created by a
master, and will automatically change their channel to match it.


lients using a given access point are said to be associated with
it.


anaged mode cards do not communicate with each other
d-hoc mode creates a multipoint-to-multipoint network when
there is no master or AP available.


n ad-hoc mode, each wireless card communicates directly with
its neighbors.


odes must be in range of each other to communicate, and must
agree on a network name and channel.
onitor mode is used by some tools (such as Kismet) to
passively listen to all radio traffic on a given channel.



his is useful for analyzing problems on a wireless link or
observing spectrum usage in the local area.



onitor mode is not used for normal communications.
n a simple local area wireless network, a bridged architecture is
usually adequate.



dvantages:

Very simple configuration Roaming works very well.

isadvantages:

Increasingly inefficient as nodes are added.
arge networks are built by applying routing between nodes.



tatic routing is often used on point-to-point links Dynamic routing
(such as RIP or OSPF) can be used on larger networks, although
they are not designed to work with imperfect wireless links Mesh
routing Protocols (OLSR, HSLS,AODV) work very well with
wireless networks, particularly when using radios in ad-hoc
mode.
Wi-Fi Networks use Radio Technologies to transmit & receive
data at high speed:


1.   IEEE 802.11b
2.   IEEE 802.11a
3.   IEEE 802.11g
   Appear in late 1999
   Operates at 2.4GHz radio spectrum
   11 Mbps (theoretical speed) - within 30 m Range
   4-6 Mbps (actual speed)
   100 -150 feet range
   Most popular, Least Expensive
   Interference from mobile phones and Bluetooth devices which
    can reduce the transmission speed.
   Introduced in 2001
   Operates at 5 GHz (less popular)
   54 Mbps (theoretical speed)
   15-20 Mbps (Actual speed)
   50-75 feet range
   More expensive
   Not compatible with 802.11b
   Introduced in 2003
   Combine the feature of both standards (a,b)
   100-150 feet range
   54 Mbps Speed
   2.4 GHz radio frequencies
   Compatible with ‘b’
There are three sublayers in physical layer:

3.   Direct Sequence Spread Spectrum (DSSS)
4.   Frequency Hoping Spread Spectrum (FHSS)
5.   Diffused Infrared (DFIR) - Wide angle
•   Direct sequence signaling technique divides the 2.4 GHz
    band into 11 22-MHz channels. Adjacent channels overlap
    one another partially, with three of the 11 being completely
    non-overlapping. Data is sent across one of these 22 MHz
    channels without hopping to other channels.
The data link layer consists of two sublayers :

   Logical Link Control (LLC)
   Media Access Control (MAC).

    802.11 uses the same 802.2 LLC and 48-bit addressing as
    other 802 LANs, allowing for very simple bridging from
    wireless to IEEE wired networks, but the MAC is unique to
    WLANs.
   Carrier Sense Medium Access with collision avoidance protocol
    (CSMA/CA)
      Listen before talking
      Avoid collision by explicit Acknowledgement (ACK)
      Problem: additional overhead of ACK packets, so slow
       performance
   Request to Send/Clear to Send (RTS/CTS) protocol
      Solution for “hidden node” problem
      Problem: Adds additional overhead by temporarily reserving
       the medium, so used for large size packets only
       retransmission would be expensive
   Power Management
      MAC supports power conservation to extend the battery life of portable
       devices
     • Power utilization modes

         Continuous Aware Mode

             • Radio is always on and drawing power

         Power Save Polling Mode

             • Radio is “dozing” with access point queuing any data for it

             • The client radio will wake up periodically in time to receive
               regular beacon signals from the access point.
             • The beacon includes information regarding which stations have
               traffic waiting for them
             • The client awake on beacon notification and receive its data
   Fragmentation
   CRC checksum
      Each pocket has a CRC checksum calculated and attached
       to ensure that the data was not corrupted in transit
   Association & Roaming
   Access Point (AP) - The AP is a wireless LAN transceiver or “base
    station” that can connect one or many wireless devices
    simultaneously to the Internet.

   Wi-Fi cards - They accept the wireless signal and relay
    information. They can be internal and external.(e.g. PCMCIA
    Card for Laptop and PCI Card for Desktop PC)

   Safeguards - Firewalls and anti-virus software protect networks
    from uninvited users and keep information secure.
•   Basic concept is same as Walkie talkies.
•   A Wi-Fi hotspot is created by installing an access point to an
    internet connection.
•   An access point acts as a base station.
•   When Wi-Fi enabled device encounters a hotspot the device
    can then connect to that network wirelessly.
•   A single access point can support up to 30 users and can
    function within a range of 100 – 150 feet indoors and up to
    300 feet outdoors.
•   Many access points can be connected to each other via
    Ethernet cables to create a single large network.
p   AP-based topology (Infrastructure Mode)

y   Peer-to-peer topology (Ad-hoc Mode)

o   Point-to-multipoint bridge topology
   The client communicate through Access Point.
   BSA-RF coverage provided by an AP.
   ESA-It consists of 2 or more BSA.
   ESA cell includes 10-15% overlap to allow roaming.
   AP is not required.
   Client devices within a cell
    can communicate directly
    with each other.
   It is useful for setting up of a
    wireless network quickly and
    easily.
This is used to connect a LAN in one building to a LANs in
other buildings even if the buildings are miles apart. These
conditions receive a clear line of sight between buildings.
The line-of-sight range varies based on the type of wireless
bridge and antenna used as well as the environmental
conditions.
   Home
   Small Businesses or SOHO
   Large Corporations & Campuses
   Health Care
   Wireless ISP (WISP)
   Travellers
Thank You

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 
Wi fi / Wireless Fidelity
Wi fi / Wireless FidelityWi fi / Wireless Fidelity
Wi fi / Wireless Fidelity
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 
Grouping
GroupingGrouping
Grouping
 
Wifi Technology
Wifi TechnologyWifi Technology
Wifi Technology
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Concept
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
Wi fi and its application
Wi fi and its applicationWi fi and its application
Wi fi and its application
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
 
WIFI Technology
WIFI TechnologyWIFI Technology
WIFI Technology
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wi Fi
Wi FiWi Fi
Wi Fi
 

Ähnlich wie wifi-technology

Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxssuser86699a
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareokelloerick
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communicationJigsAshley
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
How to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiHow to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiSilicon Univ
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications inssuser6478a8
 
Network protocol
Network protocolNetwork protocol
Network protocolQadarAhmed1
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptArumugam90
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSaagar Shetage
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...sherinjoyson
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod pptDhruvilSTATUS
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptkrishna683602
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptSmitaPatil541701
 

Ähnlich wie wifi-technology (20)

Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
Lan
LanLan
Lan
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
How to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiHow to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in Delhi
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Networking devices.ppt
Networking devices.pptNetworking devices.ppt
Networking devices.ppt
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.ppt
 

Kürzlich hochgeladen

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

wifi-technology

  • 1.
  • 2. By. P. Victer Paul Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends like u.. To get to know about more free computerscience ebooks and technology advancements in computer science. Please visit.... http://free-computerscience-ebooks.blogspot.com/ http://recent-computer-technology.blogspot.com/ http://computertechnologiesebooks.blogspot.com/ Please to keep provide many eBooks and technology news for FREE. Encourage us by Clicking on the advertisement in these Blog.
  • 3. Introduction  Wi-Fi Technologies  Wi-Fi Architecture  Wi-Fi Network Elements  How a Wi-Fi Network Works  Wi-Fi Network Topologies  Wi-Fi Configurations  Applications of Wi-Fi
  • 4. Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode.  Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs).  Wi-Fi Network connect computers to each other, to the internet and to the wired network.  Wireless Network Design  Radio Modes  Bridged Networking
  • 5. ny wireless network can be thought of as a combination of one or more of these types of connections: 2. Point-to-Point 3. Point-to-Multipoint 4. Multipoint-to-Multipoint
  • 6. he simplest connection is the Point-to-Point link. These links can be used to extend a network over great distances.
  • 7. hen more than one computer communicates with a central point, this is a Point-to-Multipoint network.
  • 8. hen any node of a network may communicate with any other, this is a multipoint-to-multipoint network(also known as an ad-hoc or mesh network).
  • 9. i-Fi cards can be operated in one of these modes: aster(Access Point) Managed(also known as client or station) Ad-hoc. onitor. ther proprietary modes(e.g. Mikrotik Nstreme). adios may only operate in one mode at a time.
  • 10. aster mode (also called AP or infrastructure mode) is used to create a service that looks like a traditional access point. he wireless card creates a network with a specified name (called the SSID) and channel, and offers network services on it. ireless cards in master mode can only communicate with cards that are associated with it in managed mode.
  • 11. anaged mode is sometimes also referred to as client mode. ireless cards is managed mode will join a network created by a master, and will automatically change their channel to match it. lients using a given access point are said to be associated with it. anaged mode cards do not communicate with each other
  • 12. d-hoc mode creates a multipoint-to-multipoint network when there is no master or AP available. n ad-hoc mode, each wireless card communicates directly with its neighbors. odes must be in range of each other to communicate, and must agree on a network name and channel.
  • 13. onitor mode is used by some tools (such as Kismet) to passively listen to all radio traffic on a given channel. his is useful for analyzing problems on a wireless link or observing spectrum usage in the local area. onitor mode is not used for normal communications.
  • 14. n a simple local area wireless network, a bridged architecture is usually adequate. dvantages: Very simple configuration Roaming works very well. isadvantages: Increasingly inefficient as nodes are added.
  • 15. arge networks are built by applying routing between nodes. tatic routing is often used on point-to-point links Dynamic routing (such as RIP or OSPF) can be used on larger networks, although they are not designed to work with imperfect wireless links Mesh routing Protocols (OLSR, HSLS,AODV) work very well with wireless networks, particularly when using radios in ad-hoc mode.
  • 16. Wi-Fi Networks use Radio Technologies to transmit & receive data at high speed: 1. IEEE 802.11b 2. IEEE 802.11a 3. IEEE 802.11g
  • 17. Appear in late 1999  Operates at 2.4GHz radio spectrum  11 Mbps (theoretical speed) - within 30 m Range  4-6 Mbps (actual speed)  100 -150 feet range  Most popular, Least Expensive  Interference from mobile phones and Bluetooth devices which can reduce the transmission speed.
  • 18. Introduced in 2001  Operates at 5 GHz (less popular)  54 Mbps (theoretical speed)  15-20 Mbps (Actual speed)  50-75 feet range  More expensive  Not compatible with 802.11b
  • 19. Introduced in 2003  Combine the feature of both standards (a,b)  100-150 feet range  54 Mbps Speed  2.4 GHz radio frequencies  Compatible with ‘b’
  • 20. There are three sublayers in physical layer: 3. Direct Sequence Spread Spectrum (DSSS) 4. Frequency Hoping Spread Spectrum (FHSS) 5. Diffused Infrared (DFIR) - Wide angle
  • 21. Direct sequence signaling technique divides the 2.4 GHz band into 11 22-MHz channels. Adjacent channels overlap one another partially, with three of the 11 being completely non-overlapping. Data is sent across one of these 22 MHz channels without hopping to other channels.
  • 22. The data link layer consists of two sublayers :  Logical Link Control (LLC)  Media Access Control (MAC). 802.11 uses the same 802.2 LLC and 48-bit addressing as other 802 LANs, allowing for very simple bridging from wireless to IEEE wired networks, but the MAC is unique to WLANs.
  • 23. Carrier Sense Medium Access with collision avoidance protocol (CSMA/CA)  Listen before talking  Avoid collision by explicit Acknowledgement (ACK)  Problem: additional overhead of ACK packets, so slow performance  Request to Send/Clear to Send (RTS/CTS) protocol  Solution for “hidden node” problem  Problem: Adds additional overhead by temporarily reserving the medium, so used for large size packets only retransmission would be expensive
  • 24. Power Management  MAC supports power conservation to extend the battery life of portable devices • Power utilization modes  Continuous Aware Mode • Radio is always on and drawing power  Power Save Polling Mode • Radio is “dozing” with access point queuing any data for it • The client radio will wake up periodically in time to receive regular beacon signals from the access point. • The beacon includes information regarding which stations have traffic waiting for them • The client awake on beacon notification and receive its data
  • 25. Fragmentation  CRC checksum  Each pocket has a CRC checksum calculated and attached to ensure that the data was not corrupted in transit  Association & Roaming
  • 26. Access Point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices simultaneously to the Internet.  Wi-Fi cards - They accept the wireless signal and relay information. They can be internal and external.(e.g. PCMCIA Card for Laptop and PCI Card for Desktop PC)  Safeguards - Firewalls and anti-virus software protect networks from uninvited users and keep information secure.
  • 27. Basic concept is same as Walkie talkies. • A Wi-Fi hotspot is created by installing an access point to an internet connection. • An access point acts as a base station. • When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly. • A single access point can support up to 30 users and can function within a range of 100 – 150 feet indoors and up to 300 feet outdoors. • Many access points can be connected to each other via Ethernet cables to create a single large network.
  • 28. p AP-based topology (Infrastructure Mode) y Peer-to-peer topology (Ad-hoc Mode) o Point-to-multipoint bridge topology
  • 29. The client communicate through Access Point.  BSA-RF coverage provided by an AP.  ESA-It consists of 2 or more BSA.  ESA cell includes 10-15% overlap to allow roaming.
  • 30. AP is not required.  Client devices within a cell can communicate directly with each other.  It is useful for setting up of a wireless network quickly and easily.
  • 31. This is used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart. These conditions receive a clear line of sight between buildings. The line-of-sight range varies based on the type of wireless bridge and antenna used as well as the environmental conditions.
  • 32.
  • 33.
  • 34.
  • 35. Home  Small Businesses or SOHO  Large Corporations & Campuses  Health Care  Wireless ISP (WISP)  Travellers