presentation on wi-fi technology

30
PRESENTATION ON WI-FI TECHNOLOGY

Upload: antionette-frankie

Post on 01-Jan-2016

52 views

Category:

Documents


0 download

DESCRIPTION

PRESENTATION ON WI-FI TECHNOLOGY. Contents. Need of WIFI Introduction Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Architecture How a Wi-Fi Network Works Wi-Fi Network Topologies Wi-Fi Security Post Implementation Advantages/ Disadvantages of Wi-Fi - PowerPoint PPT Presentation

TRANSCRIPT

The Freedom of Wi-Fi

PRESENTATION ON WI-FI TECHNOLOGY ContentsNeed of WIFIIntroductionWi-Fi TechnologiesWi-Fi Network ElementsWi-Fi ArchitectureHow a Wi-Fi Network WorksWi-Fi Network TopologiesWi-Fi SecurityPost ImplementationAdvantages/ Disadvantages of Wi-FiApplications

NEED ????Higher authorities do not want wiring When guest/auditor comes then installation of new LAN is not possibleEmployees seat is not fixedHandling of cables(wires) is difficult

KIntroductionWireless Technology is an alternative to Wired Technology,

Wi-Fi Network connect computers to each other, to the internet and to the wired network.

A The Wi-Fi TechnologyWi-Fi Networks use Radio Technologies to transmit & receive data at high speed:

IEEE 802.11bIEEE 802.11aIEEE 802.11gK

IEEE 802.11b Operates at 2.4GHz radio spectrum100 -150 feet rangeMost popular, Least Expensive IEEE 802.11aOperates at 5 GHz (less popular) 50-75 feet rangeMore expensive,Not compatible with 802.11b

B-KA-AIEEE 802.11g

Combine the feature of both standards (a,b)100-150 feet range2.4 GHz radio frequencies,Compatible with b

K Elements of a WI-FI Network1.Switch --- Nortel WLAN 23602.Access point --- NORTEL WLAN 23303.Devices --- Mobiles, Laptop, Personal computers4.WIFI Cards--- PCMCIA Cards, PCI Cards5.Safeguards--- Antivirus & Firewalls

AWI FI Architecture

A,K How a Wi-Fi Network WorksBasic concept is same as Walkie talkies.A Wi-Fi hotspot is created by installing an access point to an internet connection.An access point acts as a base station. When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly.A single access point can support up to 30 users and can function within a range of 100 150 feet indoors and up to 300 feet outdoors.Many access points can be connected to each other via Ethernet cables to create a single large network.A-kHow are Multiple Transmitters Supported ?Carrier Sense Medium Access with collision avoidance protocol (CSMA/CA)Listen before talkingAvoid collision by explicit Acknowledgement (ACK)Problem: additional overhead of ACK packets, so slow performance

K Wi-Fi Network TopologiesAP-based topology

Peer-to-peer topology

Point-to-multipoint bridge topology

A,K AP-based topologyThe client communicate through Access Point.

k Peer-to-peer topologyAP is not required.Client devices within a cell can communicate directly with each other.It is useful for setting up of a wireless network quickly and easily.

aPoint-to-multipoint bridge topologyThis is used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart. These conditions receive a clear line of sight between buildings.

k WI-FI Security The requirements for Wi-Fi network security can be broken down into two primary components:AuthenticationUser AuthenticationServer AuthenticationPrivacy

A WI-FI Security TechniquesService Set Identifier (SSID)

Wired Equivalent Privacy (WEP)

802.1X Access Control

Wireless Protected Access (WPA)

IEEE 802.11i

A,K Post Implementation TestThere are basically two types of testing to be done1. QTR-WEB Testing2. QTR-GUEST Testing

QTR-WEB TestingStep1:Click on Wireless icon on the Taskbar

KStep 2: Below shown window will appear, click on Refresh network list.

AStep 3: Double click on QTR-Web WI-FI Connection.

K Step 4: Insert the Authentication Key Step 5: Wait for few moments, while it is accruing the IP address

AStep 6: After acquiring the IP address it will show the connected as shown below

KStep 7:Now try to open any link it will redirect to the authentication page put user domain login ID and Password

AStep 8: Click on Yes on the below Security alert

KStep 9: It will be authenticated if below message will be shown on the web screen.

A AdvantagesMobility Ease of InstallationFlexibilityCostReliabilitySecurityUse unlicensed part of the radio spectrumRoamingSpeedK LIMITATIONSInterferenceDegradation in performanceHigh power consumptionLimited range

A Wi-Fi ApplicationsHomeSmall BusinessesLarge Corporations & CampusesHealth CareTravellers

KTHANKS A