0% found this document useful (0 votes)
66 views25 pages

Wireless LAN: Presented by V.Murali Krishna

Wireless LAN (WLAN) extends a wired local area network by using electromagnetic waves instead of cables to communicate between devices. It allows mobility and flexibility compared to wired networks. Common wireless technologies include Wi-Fi, which uses radio waves to transmit data using standards like 802.11b and 802.11a. Wireless LANs can be configured in an ad-hoc peer-to-peer mode or infrastructure mode with an access point connected to a wired network. Security is provided through encryption methods but newer standards like 802.11i using AES are more secure than the original WEP standard. Wireless LANs see applications in places like schools, hospitals, and warehouses for improved mobility and reduced installation costs over

Uploaded by

Sriniketh Saka
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views25 pages

Wireless LAN: Presented by V.Murali Krishna

Wireless LAN (WLAN) extends a wired local area network by using electromagnetic waves instead of cables to communicate between devices. It allows mobility and flexibility compared to wired networks. Common wireless technologies include Wi-Fi, which uses radio waves to transmit data using standards like 802.11b and 802.11a. Wireless LANs can be configured in an ad-hoc peer-to-peer mode or infrastructure mode with an access point connected to a wired network. Security is provided through encryption methods but newer standards like 802.11i using AES are more secure than the original WEP standard. Wireless LANs see applications in places like schools, hospitals, and warehouses for improved mobility and reduced installation costs over

Uploaded by

Sriniketh Saka
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 25

Wireless LAN

PRESENTED BY

V.MURALI KRISHNA
INTRODUCTION

Wireless LAN (WLAN) is a flexible data


communication system implemented as an
extension to a wired LAN within a building or
campus.
 Thus WLANs combine data connectivity with
user mobility.
Wireless LANs are based on a set of technologies
known by the IEEE specification number, 802.11
CHOICE OF WIRELESS TECHNOLOGY

Wireless LAN offers the following productivity


and convenience over Wired Networks:
► Mobility
► Installation Speed and Simplicity
► Installation Flexibility
► Reduced Cost of Ownership
► Scalability
THE TECHNOLOGY

Wireless LANs use electromagnetic airwaves (radio or


infrared) to communicate information from one point to
another without relying on any physical connection.
The smallest building block of a wireless LAN is a Basic
Service Set (BSS), which consists of some number of
stations executing the same MAC protocol and
competing for the access to the same shared medium.
An Extended Service Set (ESS) consists of two or more
basic service sets interconnected by a distribution
system.
Extended Server
Service set

Distribution
Distribution
System
System

Basic
Access Basic Access
Service Set
Point Service Set Point

Station Station
Station Station Station Station
Typical 802.11 protocol stack

IEEE 802.11 WLAN Setup


The standard defines three types of stations based
on mobility:
► No Transition
► BSS Transition
► ESS Transition
The typical IEEE 802.11 protocol stack for
WLAN is shown as above
IEEE has also given some standards for Wireless LAN. They
are as follows
 
Standard Operating frequency Maximum Data Rate
IEEE 802.11 ► Frequency Hopping Spread
Spectrum in 2.4 GHz Band
► Direct Sequence Spread 1or 2 Mbps
Spectrum in 2.4 GHz Band
► Infra Red
 
IEEE 802.11b ► Direct Sequence Spread 5.5 or 11 Mbps
Spectrum in 2.4 GHz Band
 
IEEE802.11a ► Orthogonal Frequency Division Up to 54 Mbps
Multiplexing in 5 GHz Band
If channel is sensed
idle for an amount of
time equal to or
greater than the
Distributed Inter
Frame Space (DIFS), a
station is then
allowed to transmit.
This frame will be
successfully
transmitted to the
destination if no
interference occurs.
Data Transmission and acknowledgement in IEEE
802.11

When a receiving station receives the complete frame it waits for a short period of
time and sends an explicit acknowledgement frame back to the sender.
NARROWBAND TECHNOLOGY
Narrowband radio system transmits and receives
user information on a specific radio frequency.
Undesirable crosstalk between communication
channels is avoided by carefully coordinating
different users on different channel frequencies. In
this system privacy and noninterference are
accomplished by the use of separate radio
frequencies. The receiver filters out all radio
signals except the ones on its distinguished
frequency.
SPREAD SPECTRUM TECHNOLOGY
Most wireless LAN systems use spread spectrum
technology. Designed to trade off band-width
efficiency for reliability, integrity, and security.
More bandwidth is consumed as compared to
Narrowband Technology but the signal produced
is louder and thus easier to detect provided that
the receiver knows the parameters of the spread
spectrum signal being broadcast.
FREQUENCY HOPPING SPREAD SPECTRUM TECHNOLOGY

Frequency hopping spread spectrum (FHSS) uses


a narrowband carrier that changes frequency in a
pattern known to both transmitter and receiver.
Properly synchronized, the net effect is to
maintain a single logical channel. To an
unintended receiver, FHSS appears to be short-
duration impulse noise.
DIRECT-SEQUENCE SPREAD SPECTRUM TECHNOLOGY

Direct-Sequence spread spectrum (DSSS)


generates a redundant bit pattern for each bit to be
transmitted. This bit pattern is called CHIP
(Chipping Code). The longer the chip the greater
the probability that the original data can be
recovered. To an unintended receiver, DSSS
appears as low power wide band noise and is
rejected by most narrowband receivers.
INFRARED TECHNOLOGY

Infrared (IR) systems use very high frequencies


just below visible light in the electromagnetic
spectrum to carry data. IR is either directed or
diffused technology. Inexpensive directed systems
provide very limited range and are used for
personal area networks.
WIRELESS-LAN CONFIGURATION

A WLAN can be configured in two basic ways:

► Peer- to –Peer (ad hoc mode):

Ad-hoc LAN
► Client/Server (infrastructure networking):

Infrastructure Networking
THE WLAN TOPOLOGY

Wireless LAN Connectivity


 
THE SECURITY ISSUE

Authentication and Data Encryption system


known as Wired Equivalent Privacy (WEP).
WEP has got the following properties for providing
adequate security to Wireless LAN:
► Reasonably Strong Encryption
► Self Synchronizing
► Efficient
► Exportable
WEP – THEORY OF OPERATION
The encryption function E operates on P to produce C:
E k (P) = C
In the reverse process, the decryption function D
operates on C to produce P:
D k (C) = P
As illustrated in the figure below, note that if the same
key can be used for encryption and decryption then
D k (E k (P)) = P
Key Management Service

Key

Original
Plaintext
Ciphertext
Plaintext
Encryption Decryption

Eavesdropper

Generic Encryption / Decryption


Initialization
Vector
Key Sequence

Seed
WEP Ciphertext
Secret Key PRNG

Message
Plaintext

Integrity Algorithm

Integrity Check Value (ICV)

WEP Algorithm
IEEE 802.1x (Port based authentication)

WLAN security can be broken down into three


components –
► Authentication Mechanism
► Authentication Algorithm
► Data Frame Encryption
 IEEE defines a port based authentication. The IEEE 802.1x
frames are treated as authentication message carriers. When
the client starts establishing wireless connection it sends the
authentication messages inside the IEEE frame to the Access
Point (AP). The AP then forwards the authentication message
to the authentication server.
IEEE 802.11i (Advanced encryption standard)

Another WLAN security specification IEEE802.11i


is under development. This standard also called
as Advanced Encryption Standard (AES) is
replacement for WEP.IEEE 802.11i incorporates an
entirely new privacy algorithm & authentication
mechanism. It uses the properties of RC4 & WEP
algorithms. The AES standard relies on Rijndael
symmetric encryption algorithm. It supports key
sizes of 128 bit, 192 bit, 256 bit.
REAL WORLD APPLICATIONS OF WLAN
The following list describes the applications made possible through the power and
flexibility of wireless LANs:
► Network managers implement wireless LAN to provide backup for mission-
critical application running on wired network.
 
► Training sites at corporations and students at universities use wireless
connectivity to ease access to information.
 
► Doctors and nurses in hospitals are more productive because hand held
computers with wireless LAN capability deliver patient information instantly.
 
► Students holding class on a campus access the catalog of the library.
 
► Warehouse workers use wireless LANs to exchange information with central
database, thereby increasing productivity.
 
► Network managers installing networked computers in order buildings find that
wireless LANs are a cost-effective network infrastructure solution.
 
CONCLUSION

Thus wireless LANs has gained strong popularity in a number of vertical


markets, including the health care, retail, manufacturing, warehousing and
academia. Today Wireless LANs are becoming more widely recognized as a
general purpose connectivity alternative for a broad range of people.
The result? That surprising conclusion that wireless LANs can be, in fact,
more secure than their wired counterparts.
With the emergence of a converged standard for wireless local area
networks (WLAN), the stage is set for a multimode marketplace. Much like
its wired predecessor, wireless Ethernet (802.11) will flourish in an
environment characterized by multimode operation. Converging the
separate 10- and 100-megabit per second technologies of wired Ethernet
into the now familiar 10/100 networks accelerated the market's acceptance
of wired Ethernet. The same should be expected of WLAN technology and
the merging of the 802.11b and 802.11a versions of the standard into 802.11g.
Wireless LAN

You might also like