Anda di halaman 1dari 26

Wi-Fi Technology

Agenda
Introduction Wi-Fi Technologies Wi-Fi Network Elements How a Wi-Fi Network Works Wi-Fi Network Topologies Wi-Fi Related and current technology Applications of Wi-Fi Wi-Fi Security Advantages/ Disadvantages /limitation of WI-FI

Introduction
Wireless Technology is an alternative to Wired

Technology, which is commonly used, connecting devices in wireless mode.

for

Wi-Fi (Wireless Fidelity) is a generic term that

refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs).
Wi-Fi Network connect computers to each other,

to the internet and to the wired network.

The Wi-Fi Technology


Wi-Fi Networks use Radio Technologies to transmit & receive data at high speed:
IEEE 802.11b IEEE 802.11a IEEE 802.11g

IEEE 802.11b
Appear in late 1999

Operates at 2.4GHz radio spectrum


11 Mbps (theoretical speed) - within 30 m

Range 4-6 Mbps (actual speed) 100 -150 feet range Most popular, Least Expensive Interference from mobile phones and Bluetooth devices which can reduce the transmission speed.

IEEE 802.11a
Introduced in 2001

Operates at 5 GHz (less popular)


54 Mbps (theoretical speed) 15-20 Mbps (Actual speed) 50-75 feet range More expensive Not compatible with 802.11b

Components of Wi-Fi

Access point

Adapters

Wi-Fi Antenna

Wi-Fi Bridge

How a Wi-Fi Network Works


Basic concept is same as Walkie talkies. A Wi-Fi hotspot is created by installing an access

point to an internet connection. An access point acts as a base station. When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly. A single access point can support up to 30 users and can function within a range of 100 150 feet indoors and up to 300 feet outdoors. Many access points can be connected to each other via Ethernet cables to create a single large network.

Wi-Fi Network Topologies


AP-based topology (Infrastructure Mode) Peer-to-peer topology (Ad-hoc Mode)

Point-to-multipoint bridge topology

AP-based topology
The client communicate through Access Point. BSS-RF coverage provided by an AP.

ESS-It consists of 2 or more BSA.


ESS cell includes 10-15% overlap to allow

roaming.

Peer-to-peer topology
AP is not required. Client devices within a cell

can communicate directly with each other. It is useful for setting up of a wireless network quickly and easily.

Point-to-multipoint bridge topology


This is used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart.These conditions receive a clear line of sight between buildings. The line-of-sight range varies based on the type of wireless bridge and antenna used as well as the environmental conditions.

Related technology related to WIFI


Based upon the same technology as wifi, wimax

offers larger coverage areas with greater bandwidth and speeds compared to wifi. In many cases municipal wifi networks are being created with a combination of wimax and wifi. Wimax works on radio band 802.16, while wifi is 802.11.

Current technology related to Wifi


4/4/2013 Times of india INDORE: In a development which is probably the first of its kind

in the country, BSNL's Indore division today launched a Wi-Fi technology module for cars which will enable people to use internet while they are travelling. A Wi-Fi technology module which costs around Rs 5000 to Rs 6000 was first installed on an experimental basis in the official car of BSNL Indore unit's general manager GC Pandey. Pandey said that this was probably the first model in the country where the car has an antenna which receives Wi-Fi signals with 3.5Mbps speed, from an exchange based on CDMA technology. The model is expected be adopted by customers in a big way, once it gains popularity, he said.

Wi-Fi Applications
Home

Small Businesses
Large Corporations & Campuses Travellers

Wi-Fi Security Threats


Wireless technology doesnt remove any old

security issues, but introduces new ones


Eavesdropping Man-in-the-middle attacks

Eavesdropping
Easy to perform, almost impossible to detect

By default, everything is transmitted in clear

text
Usernames, passwords, content ... No security offered by the transmission medium

Different tools available on the internet Network sniffers, protocol analysers . . . Password collectors

With the right equipment, its possible to

eavesdrop traffic from few kilometers away

MITM Attack
1.

2.

3.

Attacker spoofes a disassociate message from the victim The victim starts to look for a new access point, and the attacker advertises his own AP on a different channel, using the real APs MAC address The attacker connects to the real AP using victims MAC address

Wi-Fi Security
The requirements for Wi-Fi network security can be broken down into two primary components: Authentication
User Authentication Server Authentication

Privacy

Authentication
Keeping unauthorized users off the network

User Authentication Authentication Server is used Username and password Risk:


Data (username & password) send before secure channel

established Prone to passive eavesdropping by attacker

Solution Establishing a encrypted channel before sending username and password

Authentication (cont..)
Server Authentication
Digital Certificate is used Validation of digital certificate occurs automatically

within client software

Advantages
Mobility

Ease of Installation
Flexibility Reliability Security Speed

Disadvantage
1. Power consumption is fairly high compared to

some other low bandwidth standards 2. Wi-Fi networks have limited range.

Limitations
Interference

Degradation in performance
High power consumption Limited range

Anda mungkin juga menyukai