Lecture 3 - Wireless Networks
Lecture 3 - Wireless Networks
AP
AP wired AP
network
ad-hoc network
Common Topologies
4
Wi-Fi™ Alliance
WECA changed its name to Wi-Fi
Wireless Ethernet Compatibility Alliance
Wireless Fidelity Alliance
170+ members
Over 350 products certified
Wi-Fi’s™ Mission
Certify interoperability of WLAN products (802.11)
Wi-Fi™ is the “stamp of approval”
Promote Wi-Fi™ as the global standard
IEEE 802.11
8
High availability
Scalability
Manageability
Open access
Security
Low cost
How do wireless LANs work?
11
Physical Layer:
The wireless NIC takes frames of data from the link
layer, scrambles the data in a predetermined way, then
uses the modified data stream to modulate a radio
carrier signal.
Data Link Layer:
Uses Carriers-Sense-Multiple-Access with Collision
Avoidance (CSMA/CA).
Integration With Existing Networks
14
Users maintain a
continuous connection
as they roam from one
physical area to another
Mobile nodes
automatically register
with the new access
point.
Methods: DHCP,
Mobile IP
Security
17
Cost
2.4 GHz will still has >40% cost advantage
Range
At equivalent power, 5 GHz range will be ~50% of 2.4
GHz
Power consumption
Higher data rates and increased signal require more
power
OFDM is less power-efficient then DSSS
802.11a Applications
29
Building-to-building connections
Video, audio conferencing/streaming video,
and audio
Large file transfers, such as engineering
CAD drawings
Faster Web access and browsing
High worker density or high throughput scenarios
Numerous PCs running graphics-intensive applications
802.11a Vs. 802.11b
30
Means:
Based on cryptography
Non-cryptographic
Both are identity-based verification mechanisms
(devices request access based on the SSID –
Service Set Identifier of the wireless network).
Authentication
37
Authentication techniques
Privacy
38
Cryptographic techniques
WEP Uses RC4 symmetric key, stream cipher
algorithm to generate a pseudo random data
sequence. The stream is XORed with the data to be
transmitted
Key sizes: 40bits to 128bits
Unfortunately, recent attacks have shown that the
WEP approach for privacy is vulnerable to certain
attack regardless of key size
Data Integrity
39
Essential Questions
Choosing the Right Technology
Data Rates
Access Point Placement and Power
Antenna Selection and Placement
Connecting to the Wired LAN
The Site Survey
Essential Questions
43
Permanently attached.
Remote antennas connected using an antenna cable.
Coax cable used for RF has a high signal loss,
should not be mounted more than a 1 or 2 meters
away from the device.
Placement: consider building construction, ceiling
height, obstacles, and aesthetics. Different
materials (cement, steel) have different radio
propagation characteristics.
Connecting to the Wired LAN
48