Unit IV

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 54

Unit-IV:.

Wireless LAN

M V K GAYATRI SHIVANI
Asst.Professor
Contents
• Introduction
• Fundamentals of WLANs
• Network Architecture
• IEEE 802.11standards
• WiFi Protocols – 802.11b, 802.11g, 802.11a, 802.11n, 802.11ac;
• Frequency allocation - 802.11b, 802.11g, 802.11a;
• Modulation and coding schemes - 802.11b, 802.11g, 802.11a, 802.11n;
• Security,
• Hot spots
• Virtual private networks,
• HIPERLAN standard.
References
• NPTEL Video Lecture :-
https://www.youtube.com/watch?v=6SWBxiPeSqk
• Textbook:- Wireless Communication and Networks, William
Stallings [UNIT-14]
• Website :-
https://in.mathworks.com/help/wlan/gs/what-is-wlan.html
• https://www.spiceworks.com/tech/networking/articles/wp
a-wifi-protected-access
/
Introduction
• 802.11 is a member of the IEEE 802 family,
which is a series of specifications for local area
network (LAN) technologies.
• IEEE 802 specifications are focused on the two
lowest layers of the OSI model because they
incorporate both physical and data link
component
Individual specifications in the 802 series are identified by a second number

Other specifications describe other parts of the 802 protocol stack. 802.2 specifies a
common link layer, the Logical Link Control (LLC), which can be used by any lower-layer
LAN technology. Management features for 802 networks are specified in 802.1. Among
802.1's many provisions are bridging (802.1d) and virtual LANs, or VLANs (802.1q).
Advantage Of WLAN

•Flexibility
•Planning
•Design
•Robustness
•Cost
•Ease of Use
Disadvantages of WLAN
•Quality of Services.
•Proprietary Solutions
•Restrictions
•Global operation
•Low Power
•License free operation
•Robust transmission technology
Network Architecture
• 802.11 networks consist of four major physical
components, The components are:
- Distribution System
- Access Points
- Wireless Medium
- Stations
Terminology
• Distribution System:- When several access
points are connected to form a large coverage
area, they must communicate with each other
to track the movements of mobile stations.
• The distribution system is the logical
component of 802.11 used to forward frames to
their destination
Terminology
• Access points
Frames on an 802.11 network must b
converted to another type of frame for delivery
to the rest of the world. Devices called access
points perform the wireless-to-wired bridging
function
Terminology
• Stations
Networks are built to transfer data between
stations. Stations are computing devices with
wireless network interfaces. Typically, stations
are battery-operated laptop or handheld
computers
Types of Network Architecture
Infrastructure Networks
• Access points are used for communication
• The communication is carried out with two hops
• Advantages of using a AP
- There is no restriction on the distance
between mobile stations
- AP can help with power saving
Association
• stations must associate with an access point to
obtain network service
• Association is the process by which mobile
station joins an 802.11 network
• Associations are also exclusive on the part of the
mobile station: a mobile station can be
associated with only one access point.
Extended Service set (ESS)
• BSS cannot provide coverage for large areas
• 802.11 allows wireless networks of arbitrarily large size
to be created by linking BSSs into an extended service
set (ESS)
• An ESS is created by chaining BSSs together with a
backbone network.
• 802.11 does not specify a particular backbone technology
( but usually Ethernet is used)
IEEE 802.11 Standards
IEEE 802.11 Standards
802.11 (WIFI)
• Released in 1997
• Multiplexing Scheme used: DSSS
• PN Sequence:- Barker Sequence
• Modulation Scheme : DBPSK
• Base Frequency: 2.4 GHz
• Bandwidth : 11 MHz
• Maximum Throughput : 2Mbps
• Antenna Scheme : SISO
• PPDU Format: non-HT
802.11 b (WIFI 1)
• Released in 1999
• Technology used: DSSS
• Modulation Scheme: DQPSK
• Base Frequency: 2.4 GHz
• Bandwidth : 11 MHz
• Maximum Throughput : 11 Mbps
• Antenna Scheme : SISO
• PPDU Format: non-HT
802.11 a (WIFI 2)
• Released in 1999
• Technology used: OFDM
• Modulation Scheme: BPSK, QPSK, 16 QAM, 64 QAM ( based on data
rate)
• Base Frequency: 5 GHz
• Bandwidth : 5,10,20 MHz
• Maximum Throughput : 54 Mbps
• Antenna Scheme : SISO
• PPDU Format: non-HT
802.11 g (WIFI 3)
• Released in 2003
• Modulation Scheme used: Multiple
• Base Frequency: 2.4 GHz
• Bandwidth : Multiple
• Maximum Throughput : 54 Mbps
• Antenna Scheme : SISO
• PPDU Format: non-HT
802.11 n (WIFI 4)
• Released in 2009
• Modulation Scheme used: OFDM
• Base Frequency: 2.4 GHz and 5GHz
• Bandwidth : 20,40 Mhz
• Maximum Throughput : < 600 Mbps
• Antenna Scheme : MIMO up to 4 streams
• PPDU Format: HT, non-HT, Duplicate
802.11 n (WIFI 5)
• Released in 2013
• Modulation Scheme used: OFDM
• Base Frequency: 2.4 GHz and 5GHz
• Bandwidth : 20,40 Mhz
• Maximum Throughput : < 600 Mbps
• Antenna Scheme : MIMO up to 4 streams
• PPDU Format: HT, non-HT, Duplicate
802.11 n (WIFI 6)
• Released in 2021
• Modulation Scheme used: OFDMA
• Base Frequency: 2.4 GHz, 5 GHz, 6 GHz ( WIFI 6E)
• Bandwidth : 20, 40, 80, 160, 80+80 MHz
• Maximum Throughput : < 10 Gbps
• Antenna Scheme : UL and DL MU-MIMO up to eight
streams
• PPDU Format: HE, non-HT duplicate
802.11 be (WIFI 7)
• To be released in 2024 tentatively
• Modulation Scheme used: OFDMA
• Base Frequency: 2.4 GHz, 5 GHz, 6 GHz
• Bandwidth : 20, 40, 80, 160, 320 Mbps
• Maximum Throughput : < 40 Gbps
• Antenna Scheme : UL and DL MU-MIMO up to 16 streams
• PPDU Format: EHT
Security
• The 802.11i task group has developed a set of capabilities to
address the WLAN security issues.
• In order to accelerate the introduction of strong security into
WLANs, the Wi-Fi Alliance promulgated Wi-Fi Protected Access
(WPA) as a Wi-Fi standard.
• WPA is a set of security mechanisms that eliminates most 802.11
security issues and was based on the current state of the 802.11i
standard.
• As 802.11i evolves, WPA will evolve to maintain compatibility
FEATURES OF WPA

• WPA, is a network security standard mandatory for wireless networks to


protect them via authentication and encryption, replacing the older Wired
Equivalent Privacy (WEP) system.
• It was formally adopted in 2003
• WPA requires that users input a password for authentication to ensure
that the WiFi networks are protected.
• It supports authentication servers or remote authentication dial-in
(RADIUS) servers. Additionally, it also encrypts data better than WEP.
• WPA was designed to be backward-compatible and doesn’t require
upgrading the hardware.
• Users can add WPA to the hardware through firmware upgrades.
• WPA uses TKIP protocol
FEATURES OF WPA

• Organizations can apply the WPA standard in one of two


modes, and they can use these modes in all three generations
of WPA:
WPA personal: It is also referred to as WPA pre-shared key
(WPA-PSK). It is designed for use on small or home networks
WPA enterprise: This mode is designed for medium or large
networks and is also known as WPA-802.1x. Its system is
more challenging to configure. Users must employ their
personal identities to join the network through a RADIUS
server ( remote authentication dial-in )
Essential Elements of WPA

• . Temporal Key Integrity Protocol (TKIP)


-TKIP employs a 128-bit shared temporary key between the
wireless user and access points (AP). It distributes new
temporary keys every 10,000 packets, enhancing the network’s
security. It ensures that the same key is not re-used to encrypt
data by frequently processing changes in the encryption keys.
• Advanced Encryption Standard (AES)
• Built-in authentication
• Four-way handshake
• Message Integrity Check (MIC)
• The 802.11i architecture consists of three main ingredients:

• Authentication: A protocol is used to define an exchange


between a user and an AS that provides mutual authentication and
generates temporary keys to be used between the client and the AP
over the wireless link.
• Access control: This function enforces the use of the
authentication function, routes the messages properly, and
facilitates key exchange. It can work with a variety of authentication
protocols.
• Privacy with message integrity: MAC-level data (e.g., an LLC
PDU) are encrypted, along with a message integrity code(MIC)
that ensures that the data have not been altered .
Hotspots
• Hotspot: A hotspot is a physical location
where people can access the Internet,
typically using Wi-Fi, via a wireless local area
network (WLAN) with a router connected to
an Internet service provider.
Hotspots
• Mobile hotspot: A mobile hotspot (sometimes
called a portable hotspot) is a hotspot that’s just
that—mobile! While a “regular” Wi-Fi hotspot is
tied to a physical location, you can create a
mobile hotspot by using your Smartphone's
data connection to connect your laptop to the
Internet. This process is called “tethering.”
Security Issues with Public Wi-Fi Network
• Evil twin attack. Hackers set up malicious hotspots with seemingly trustworthy names
(e.g. “Cafe free Wi-Fi”). When you connect, they can easily intercept your data.
• Man-in-the-middle attack (MitM). Bad actors break into a network and eavesdrop on data
as it travels between connected devices and the Wi-Fi router. For example, as you enter
your password into your online bank account.
• Password cracking attack. Scammers use software that automatically tries a huge volume
of usernames and passwords to unlock a router’s management interface.
• Packet sniffing attack. Malicious hackers capture data units sent across unsecured Wi-Fi.
Then, they unpack the data to extract individual login credentials or financial information.
• Security vulnerabilities and/or misconfigurations. Sometimes default router settings allow
cybercriminals to log in as an administrator, or plant malicious software on compromised
devices.
Virtual Private Networks
• VPN stands for "Virtual Private Network" and
describes the opportunity to establish a protected
network connection when using public networks. VPNs
encrypt your internet traffic and disguise your online
identity.
• This makes it more difficult for third parties to track
your activities online and steal data. The encryption
takes place in real time.
Virtual Private Networks
• A VPN is created by establishing a virtual point-to-
point connection through the use of tunneling
protocols over existing networks
• User can be part of a local network sitting at a remote
location. It makes use of tunneling protocols to
establish a secure connection
• VPN can be used to camouflage our geolocation.
How VPN works
• A VPN hides your IP address by letting the network redirect it through
a specially configured remote server run by a VPN host.
• This means that if you surf online with a VPN, the VPN server
becomes the source of your data.
• This means your Internet Service Provider (ISP) and other third parties
cannot see which websites you visit or what data you send and receive
online.
• A VPN works like a filter that turns all your data into "gibberish".
Even if someone were to get their hands on your data, it would be
useless.
Advantages of VPN
• Secure Communication over insecure network
- Encryption of IP
-Encryption of protocols
-Two Factor Authentication
• Private address on top of public address
• Access regional content
HIPERLAN STANDARD
• Stands for High Performance Radio LAN
• It is European alternative for WLAN networks
• It is defined by the European Telecommunications Standards Institute (ETSI)
• The 4 Hiperlan standards are Hiperlan 1 , Hiperlan 2, HIPERACCESS,
HIPERLINK
• Due to competition from IEEE 802.11, which was simpler to implement and made it
faster to the market, HiperLAN never received much commercial implementation.
• Much of the work on HiperLAN/2 has survived in the PHY specification for IEEE
802.11a, which is nearly identical to the PHY of HiperLAN/2.
• HIPERACCESS was intended as a last-mile technology.
• HIPERLINK was intended as a short-range point-to-point technology at 155 Mbit/s.
HiperLan Features
• HIPERLAN uses cellular-based data networks to connect to an
ATM backbone.
• The main idea behind HIPERLAN is to provide an
infrastructure or ad-hoc wireless with low mobility and a small
radius.
• HIPERLAN supports isochronous traffic with lo
• On the physical layer FSK and GMSK modulations are used in
HiperLAN
Hiperlan Vs 802.11
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy