Assignmnt 1 Wired& Wireless Connections

Embed Size (px)

Citation preview

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    1/41

    KOLEJ MASA

    ASSIGNMENT 1

    WIRED AND WIRELESS COMMUNICATION

    KALAI ARASI D/O DORAISAMY

    DIT 04-1009652

    MR.SATHIYA MURASAN SINGGAL RAIN

    SUBMISSION DATE:

    16/5/2011

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    2/41

    ACKNOWLEDGEMENT

    First of all I would like to thank my lecturers,fellow,parents and in the last but not least my

    friend,who is in a communication company for a good moral support.

    When I got this assignment I was little nervous but excited as well because I knew that this

    assignment need a lot of hardwork.search not only soft search but hard search also.

    During the search I found some reviews from internet and some from my friends,relatives and

    etc. about the wired and wirelss communication.then I collect the reviews will be helpful to do

    my assignment.

    At last,I again would like to thank all the parties for commitment and cooperation to made this

    thing possible.thank you.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    3/41

    ABSTRACT

    Computer networking or Data communications is the engineering discipline concerned with the

    message between computer systems or devices. A computer network is any set of computers ordevices related to each other with the capability to switch over data. Computer networking is

    sometimes calculated a sub-restraint of electrical engineering, telecommunications, computerscience, information technology and/or computer engineering since it relies a great deal upon the

    hypothetical and rational submission of these scientific and engineering disciplines.

    The three types of networks are : Internet, intranet, and extranet.

    Examples of dissimilar network methods are:

    y Local area network (LAN), which is frequently a small network unnatural to a smallgeographic area. An example of a LAN would be a computer network within a shop.

    yy Metropolitan area network (MAN), which is worn for medium size area. examples for a

    town or status.

    yy Wide area network (WAN) that is usually a larger network that cover a huge geographic

    area.

    Wireless LANs and WANs (WLAN & WWAN) are the wireless matching of the LAN and

    WAN

    All networks are interconnected to allow communication with a diversity of dissimilar kinds

    of media, including twisted-pair copper wire cable, coaxial cable, optical fiber, power lines and a

    selection of wireless technologies. The devices can be not speaking by a few meters e.g via

    Bluetooth or nearly boundless distances . Networking, routers, routing protocols, and networking

    over the public Internet have their condition definite in documents called RFC.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    4/41

    Table of content

    Topic Page number

    Network 1-4

    Wired connection 4-9

    Wireless connection 9-16

    Advantages and disadvantages of wired and wireless connection 17-22

    802 architeture 22-38

    Pie chart 39

    conclusion 40

    References 41

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    5/41

    Views of networks

    Network administrator can see networks from both corporal and reasonable standpoint. The

    physical outlook involve geographic location, physical cabling, and the network basics (ex.,routers, bridges and application layer gateways that interconnect the physical medium. Logicalnetworks, call in the TCP/IP architecture, subnets, map into one or more life form medium. For

    example, a normal do in a campus of building is to make a put of LAN cable in each array comeinto view to be a ordinary subnet, using virtual LAN (VLAN) technology.

    Both users and administrator will be aware, to untrustworthy extents, of the trust and varietycharacteristics of a network. Again using TCP/IP architectural terminology, an intranet is a group

    of people of interest beneath private administration usually by an venture, and is only easy to getto by official users .Intranets do not contain to be connected to the Internet, but generally have a

    restricted connection. An extranet is an extension of an intranet that allows safe communications

    to users exterior of the intranet.

    illegally, the Internet is the set of users, enterprise, and happy providers that are organized by

    Internet Service Providers (ISP). From an engineering point of view the Internet is the set ofsubnets, and aggregate of subnets, which split the registered IP address space and swap

    information about the reachability of those IP addresses by the Border Gateway Protocol.characteristically, the human-readable names of servers are translate to IP addresses perceptibly

    to users, by means of the directory cause of the Domain Name System (DNS).

    in surplus of the Internet, there be able to be business-to-business (B2B), business-to-consumer(B2C) and consumer-to-consumer (C2C) communications. particularly when money or open

    information is swap, the communications are appropriate to be tenable by some form ofcommunications security device. Intranets and extranets can be firmly superimpose on top of the

    Internet, without any right of entry by general Internet user, using protected Virtual PrivateNetwork (VPN) technology.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    6/41

    History of computer networks

    Before the arrival of computer networks that were base upon some kind of telecommunicationssystem, communication between computation machines and early computers was perform byhuman user by carrying instructions among them. Many of the social behaviors seen in today's

    Internet were obviously there in the nineteenth century and debatably in even previous networksusing diagram signal.

    y In September 1940 George Stibitz used a teletype machine to send orders for a problemset from his copy at Dartmouth College to his Complex Number Calculator in New Yorkand established consequences back by the similar means. connecting output systems

    approximating teletypes to computers was an attention at the Advanced Research ProjectsAgency (ARPA) when, in 1962. was hire and urbanized a operational group he call the

    "Intergalactic Network", a forerunner to the ARPANET.y In 1964, researchers at Dartmouth urbanized the Dartmouth Time Sharing System for

    spread users of big computer systems. The same year, at Massachusetts Institute of

    Technology, a research group support by General Electric and Bell Labs used a computerto route and direct telephone connections.

    y all through the 1960 Leonard Kleinrock, Paul Baran and Donald Davies separatelyconceptualized and urbanized network system which used packets that can be used in anetwork flanked by computer systems.

    y 1965 THOMAS MERRILL anD Lawrence produced the first wide area network (WAN).y The first widely used telephone switch that used truthful computer control was introduce

    by Western Electric in 1965.y In 1969 the University of California at Los Angeles, the Stanford Research Institute,

    University of California at Santa Barbara, and the University of Utah were associated asthe launch of the ARPANET network by 50 kbit/s circuits.

    yprofitable services using X.25 were deploy in 1972, and afterward used as an basiccommunications for increasing TCP/IP networks.

    computer networks are the center of current communication. All modern trait of the PublicSwitched Telephone Network (PSTN) are computer-forbidden, and telephony more and more

    runs over the Internet Protocol, though not of necessity the public Internet. The range ofcommunication has greater than before considerably in the past decade, and this bang in

    communications would not have been probable without the gradually advance computernetwork. Computer networks, and the technology sought to connect and communicate through

    and stuck between them, continue to drive computer hardware, software, and peripheralsindustry. This growth is mirror by growth in the information and types of user of networks from

    the investigator to the home user.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    7/41

    Network ..

    One way to classify computer networks is by their geographic range, though many real-worldnetworks interconnect Local Area Networks (LAN) via Wide Area Networks (WAN) with

    wireless wide area networks (WWAN). These three (broad) types are:

    The history of communiqu dates back to prehistory. Communication can variety from very

    minor processes of switch over, to full conversations and mass communication. Human

    communication was change with speech possibly 200,000 years ago. Symbols were urbanized

    about 30,000 years ago, and writing about 7,000. On a much shorter level, there have been major

    development in the pasture of telecommunication in the past hardly any centuries.

    Histry of telecommunication.

    The history of telecommunication - the transmission of signals over a coldness for the principleof communication - began thousands of years ago by the use of smoke signals and drums in

    Africa, America and part of Asia. In the 1790s the first permanent semaphore systems emerge inEurope however it was not awaiting the 1830s that electrical telecommunication systems in

    progress to become visible.

    Distance telecommunications

    Visual signals(non-electronic)

    y prehistoric:fires,beacons,smoke signalsy 6th century bc: maily 5th century bc:pigeon posty 4th century bc:hydraulic semaphoresy 490 bc: heliographsy 15th century AD: maritime flagsy 1790 AD: semaphore linesy 19th century AD: signal lampsy Audio signals:y Prehistoric:communication drums,hornsy 1838 AD:electrical telegraphy 1876:telephoney 1880:photophone

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    8/41

    y 1896:radioy Advanced electrical/electrical signalsy 1927:televisiony 1930:videophoney 1964:fiber optic telecommunicationsy 1969:computer networkingy 1981:analog cellular mobile phonesy 1982:smtp emaily 1983:internety 1998:satellite phones

    wired link.

    In telecommunications, cable Internet access, often abridged to cable Internet or simply

    cable, is a shape of broadband Internet access that uses the cable television

    communications. Like digital subscriber line and fiber to the premises armed forces,

    cable Internet access provides network rim connectivity (last mile access) from the

    Internet service provider to an end user. It is included keen on the cable television

    communications analogously to DSL which uses the obtainable telephone network. Cable

    TV networks and telecommunications networks are the two main forms of residential

    Internet access. newly, both have seen enlarged antagonism from fiber deployments,

    wireless, and mobile networks.

    Ethernet

    Ethernet and wireless networks both have advantages and disadvantages depending on your

    needs, one may hand out you enhanced than the other. Wired networks have the funds for users

    with bounty of security and the capacity to move lots of data very fast. Wired networks are

    strangely faster than wireless networks, and they can be very inexpensive. However, the cost of

    Ethernet cable can add up -- the more computers on your network and the past not together they

    are, the more exclusive your network will be. In addition, unless you're building a new house andinstall Ethernet cable in the walls, you'll be bright to see the cables running from place to place

    roughly your home, and wires can to the highest degree limit your mobility. A laptop owner, for

    example, won't be able to budge around effortlessly if his computer is tethered to the wall.

    There are three basic system people use to place up wired networks. An Ethernet system usemoreover a twisted copper-pair or coaxial-based transport system. The most generally used cable

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    9/41

    for Ethernet is a category 5 unshielded twisted pair (UTP) cable it's useful for businesses whowant to connect a number of devices together, such as computers and printers, but it's massive

    and exclusive, making it less realistic for home use. A phone line, on the other hand, merely usesto be had phone wiring originate in most homes, and can make available fast navy such as DSL.

    Finally, broadbandsystems make available cable Internet and use the same nature of coaxial

    cable that give us cable television.

    If you plan to connect only two computers, all need is a network interface card (NIC) in each

    computer and a line to run between them. If you want to connect several computers or other

    diplomacy, you'll need an additional section of equipment: an Ethernet router. You'll also

    necessitate a cable to connect each supercomputer or apparatus to the router

    Hardware and bits rates

    Broadband cable Internet access require a cable modem at the customer's location and a cable

    modem termination system at a cable operator ability, typically a cable television headend. The

    two are linked via coaxial cable or a Hybrid Fiber Coaxial (HFC) fix. While access networks are

    now and then referred to as last-mile technologies, cable Internet systems can classically work

    where the distance among the modem and the execution system is up to 100 miles (160 km). If

    the HFC network is big, the cable modem killing system can be group into hubs for resourceful

    management.

    Downstream, the course en route for the user, bit rates can be as a large amount as 400Mbit/s forbusiness connections, and 100Mbit/s for housing check in some countries. Upstream traffic,originate at the userrange from 384Kbit/s to more than 20Mbit/s. One downstream canal can

    handle hundreds of cable modems. As grow, the cable modem termination system (CMTS) canbe advanced with more downstream and upstream ports, and group into hubs CMTS for

    proficient management.

    Most data over cable service interface specificationMost (DOCSIS) cable modems restrictupload and download rates, with customizable limits. These limits are set in configurationarchive which are downloaded to the modem using the Trivial File Transfer Protocol, when the

    modem opening establish a connection to the contributor's equipment.Some users have attemptto take precedence over the bandwidth limit and put on access to the jam-packed bandwidth of

    the classification (often as much as 30 Mbit/s), by uploading their own arrangement file to thecable modem

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    10/41

    Shared bandwidth

    Like most housing broadband technologies, such as FTTX, Satellite Internet, or WiMAX, a

    people of users share the on hand bandwidth. Some technology share only their core network,

    whilst some counting Cable Internet and PON also divide up the access network. This thoughtful

    allow the network operative to take gain of statistical multiplexing, a bandwidth giving outtechnique which is in employment to allocate bandwidth somewhat, in order to supply an plenty

    level of check at an tolerable price. However, the operative has to monitor tradition pattern and

    degree the network properly, to make certain that customers collect adequate examine even

    through peak-usage period. If the network operator does not supply adequate bandwidth for a

    fussy neighborhood, the service can become sluggish if many people are using the service at the

    same time. Operators have been identified to use a bandwidth cap, or other bandwidth throttling

    technique users download rate is limited all through peak times, if they have downloaded a large

    quantity of data that day.

    Bundled service offerings

    Many cable TV Internet access provider offer Internet access without tying it to a cable

    television donation, but stand-alone cable internet is determinedly provided at superior rate. the

    extra charge is said to cover the cable procession contactmuch like phone companies incriminate

    a diminutive line access payment for having DSL Internet service without a phone subscription.

    There are those who contend that the elevated stand-alone charge are not so much to more

    resourcefully cover in point of fact-improved rate as it is to oblige the customer to bunch it with

    a cable television payment (and as a result to buy or rent a television earpiece from the

    company). In the instances where a cable internet customer insist on using stand alone cable

    internet, the cable TV signals are repeatedly unconcerned by filter at the line beat inside the

    customer's premises.

    for the meantime, internet service providers (ISP) who obtain and then resell high-speed Internetright to use from, or all the way through, cable companies are generally not theme to the cable

    companies' higher charge, and as a result can pass on usua lmarket rate cable internet to their enduser customers (giving the manifestation of a lower price). Billing for such ISP sponsor cable

    internet services is still handle by the cable corporation, albeit on behalf of the ISP.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    11/41

    Broadband over the telephone network (DSL)

    The telephone network is one of the oldest and the majority ever-present communicationsinfrastructures. Without any upgrade the same network that bring your grandparents a gatheringline can give you admission to the Internet through a dial up modem. The telephone network can

    also make available broadband examine using Digital Subscriber Lines (DSL). DSL is existingduring the local phone company. Call your local phone company to locate out if DSL service is

    to be had in your community or neighborhood.

    Advantages: A key advantage of DSL check is that it works with accessible wiring. The onlyequipment wanted is a modem plugged into an accessible phone jack and filter for each

    telephone in your house or office. Another advantage of DSL service is that each user has adedicated link and the alacrity is stable and will not make smaller if more people in your locality

    are also using DSL. DSL provides steadfast broadband service for suburban and small businessregulars but is not likely to be passable for huge businesses.

    Disadvantages: A major disadvantage of DSL service is the incapability to carry the serviceadvance than 18,000 feet from the central phone office. DSL cannot be deliver to home orbusinesses away from this distance. Another disadvantage is that upload speed do not equivalent

    download speeds.

    Broadband the cable network(cable modem)

    one more pipe running into most homes is the coaxial cable that conventionally providestelevision indoctrination. According to the National Cable and Telecommunications Association

    cable pass by 99% of engaged homes in the United States. Most cable company have upgradetheir networks to carry cable modem broadband tune-up over the equivalent network that deliver

    video programming.

    Broadband over the electric network (BPL)

    a different pipe that goes to every house is on or after the electric company. It is now potential to

    deliver broadband service from beginning to end a technology called Broadband overPowerlineor BPL. BPL is a moderately new entry in the rescue of broadband service. quite a lot of electric

    company have urban pilot projects to establish the profitable possibility of using BPL todistribute broadband. in principle BPL service allow customers to merely cork a special modem

    into any vent in their home to admission high speed Internet.

    Fiber to the home (FTTH)

    Fiber optic cable is an additional type of wired broadband delivery technology. Fiber optic cableshold digital information in the obvious form of light pulse and are proficient of deliver very high

    level of broadband. The Internet backbone run crossways the earth on fiber optic cable.There arenumerous acronyms related with fiber cable put up outs.

    Below is a brief list of the common fiber acronyms:

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    12/41

    y FTTH Fiber to the Home, also know as FTTPy FTTN Fiber to the neighborhood.y FTTC Fiber to the curb.y FTTx Fiber to everyplace.

    Fiber to the home networks connect a fiber optic string the diameter of a coat to each home orbusiness. The towering bandwidth offered through fiber technology enable delivery of the TriplePlay voice video and data over the equivalent network roads.

    The number of fiber to the home networks is upward. Several large telephone companies are inthe course of building fiber to the home networks to transport video prepared forces in adding

    equally to voice and data services. Most new fiber to the home correlations are to be found insuperficial reach and new development where companies get a sufficient amount subscribers to

    pay for the network exploitation or government support projects such as UTOPIA in Utah thatinvolve quite a few cities.

    What is wireless

    Wireless network refer to any kind of computer network that is not unconnected by cables of any

    kind. It is a means by which telecommunications networks and endeavor (business), installation

    avoid the precious process of introducing cables into to a building, or as a association between a

    blend of equipment locations.Wireless telecommunications networks are by and large execute

    and administer using a program classification called radio waves. This awareness take place at

    the substantial level, , of the network configuration.

    Type of wireless

    Wireless PAN

    Wireless Personal Area Networks (WPANs) interconnect devices within a comparatively smallarea, generally within a persons reach. For example, both Bluetooth radio and indistinguishable

    Infrared light provide a WPAN for interconnect a headset to a laptop. ZigBee also chains WPAN

    applications . Wi-Fi PANs are handsome commonplace (2010) as equipment expensive start tojoin together Wi-Fi into a selection of shopper electronic devices. Intel "My WiFi" and Windows7 virtual Wi-Fi capability have made Wi-Fi PANs simpler and easier to set up and build up.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    13/41

    Wireless LAN

    Wireless local area network (WLAN) links two or more campaign using a wireless distributionmeans, provided that a connection all the way through an right of entry top to the wider internet.The use of spread-spectrum or OFDM technologies also give user the mobility to budge around

    contained by a local reporting area, and still stay after unrelated to the network.

    y Wi-Fi: "Wi-Fi" is a phrase used to depict 802.11 WLANs, even if it is theoretically aconfirmed standard of interoperability amid 802.11 devices.

    y Fixed Wireless Data: This rigging point to point links among computers or network attwo far-flung locations, often using committed microwave or modulate laser light beams

    over line of sight path. It is often used in city to unite networks in two or more buildingwithout install a restless link.

    Wireless MAN

    Wireless Metropolitan Area Networks are a type of wireless complex that connect quite a fewWireless LANs.

    WiMAX is a form of Wireless MAN and is describe by the IEEE 802.16 standard.

    Wireless WAN

    Wireless wide area networks are wireless networks that as expected cover fat out-of-doors areas.These networks can be worn to fix branch office of business or as a municipal internet access

    system. They are regularly deploy on the 2.4 GHz band. A distinctive system contain foot stationgateways, admittance point and wireless bridge relays. supplementary configurations are network

    systems where each access reach your peak acts as a convey also. When collective withrenewable joie de vivre system such as photo-voltaic cosmological panel or wind system they

    can be set single-handedly system.

    Mobile Device Networking

    With the expansion of smart phones, cellular telephone networks usually lug data in toting up to

    phone conversations:

    y Global System for Mobile Communications (GSM) The GSM system is at probabilityinto three major systems the switching system, the base station system, and theprocedure and prop up system. The cell phone connect to the base classification station

    which then connect to the maneuver and support station it then connect to the switchinglocation where the term is transfer to where it requirements to go. GSM is the most

    general regular and is old for a best part of cell phones.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    14/41

    y Personal Communications Service (PCS) PCS is a radio band with the principle of can bedilapidated by mobile phone in North America and South Asia. Sprint happen to be the

    cavity examine to set up a PCS.y D-AMPS: Digital Advanced Mobile Phone Service, an advance elucidation of AMPS, is

    living wage being phased out wonderful to progression in technology. The newer GSM

    network are replace the elder system.

    Uses

    Wireless networks go on to develop, procedure has grown in 2010. Cellular phones are part of

    everyday wireless networks, allow easy special roads. Inter-continental network system use radiosatellites to talk across the world. Emergency services such as the police force make the most of

    wireless networks to communicate effectively. persons and business use wireless networks tosend and share data speedily, whether it be in a minuscule office building or across the world.

    Another use for wireless networks is a fee efficient means to join to the Internet, in region where

    the telecommunications infrastructure is both needy and not there in income, normally in pastoralareas and developing countries.

    Compatibility issues also come up when selling with wireless networks. poles apart campaign

    may have compatibility issue, or power require modifications to get to the bottom of these issue.Wireless networks are frequently typically slower than those create in current version of Ethernet

    cable connected installation.

    A wireless network is more helpless, because a person can grab and sometimes detour a network

    diffusion gesture when summit to peak connections be used. Many wireless network use WEP -Wired Equivalent Privacy safe keeping systems. These have been set up to be unmoving

    defenseless to infringement. Though WEP does slab some intruder, the protection troubles havecause some businesses to keep on with wired network pending a more relevant wellbeing trial

    system can be commence. The use of suitable firewalls overcome some haven troubles inwireless network that are unarmed to shot unlawful access.

    Broadband application

    Infrastructure and topography will be very diverse for every the public. unlike communicationstechnology will work bigger in some area than others. anyway of what broadband expertise are

    on hand in your the public or what communications project your the community may come to averdict to start, the submission made to be had by broadband scrutinize will support all land

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    15/41

    Common broadband uses

    y Send / receive large files together with software updatesy take part in multiplayer network sports meetingy a local coffee shop, or on the roady

    divide an internet connectiony Make free phone calls to anywhere in the worldy Access video on demandy Use Interactive TVy share contenty lay up backup files online

    numerous of today's applications require broadband to work properly. The table below shows theleast amount and ideal speeds compulsory for some of the more popular application

    Application Minimum Speed Ideal Speed

    Teleworking 110 kbps 1.5 - 7 Mbps

    Videoconferencing 110 kbps 800 kbps

    E-Learning 110 kbps 1.5 - 7 Mbps

    Telemedicine 110 kbps 1.5 -7 Mbps

    Video Telephony 70 kbps 200 kbps

    Near Video on Demand 1 Mbps 1.5 - 7 Mbps

    Movies on Demand 1 Mbps 1.5 - 7 Mbps

    Audio on Demand 110 kbps 700 kbps

    Telegaming 40 kbps 600 kbps

    Home Shopping 40 kbps 1.5 - 7 Mbps

    Electronic Banking 40 kbps 400 kbps

    Electronic Newspapers 40 kbps 2 Mbps

    Digital Television 1 Mbps 7 Mbps

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    16/41

    Commercial broadband applications

    y telemediciney application for personsy teleworkingy e-governmenty agriculturey distance learningy public safetyy national securityy utlitity applicationsy small business assistancey information gatheringy tourismy entertainment

    advantage of wired connection

    Wired networking use network cables, as well known as Ethernet cable, to attach networkcampaign such as computers, servers and printers. In addition, recognizable technologies such as

    the telephone and line up television at a standstill use wired networking widely. Wired networkhas taken a back stool in remote compute since the prologue of wireless network, but it

    unmoving offer advantages that give it the periphery more than wireless networking.

    Faster

    Wired connections can attain networking speeds of up to 1,000 Mbps, which is additional than

    900 times faster than a wireless association that only reach up to 54 Mb. The hyper associationspeed is compulsory in maneuver big companionship where quite a lot of servers and

    supercomputer use the network. There is more or less no lag time because each system have itsown exact wired correlation to the network, meaning no competitions for obtain signals, which

    happens a lot in wireless networking.

    A wired network provide connections to the filled amount of bandwidth to each user, creation it

    faster. It also does not tie to an transmitter or Wi-Fi (source of signals for wireless networking)that can give puny signals when too far or hindered.

    Wired networking is also supreme for users who behavior their businesses from home, allow

    them to download huge video archive and print graphical images. keen gamers also help fromwired networking by speed up connections for sport that can be bandwidth hogs.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    17/41

    Reliable

    Wired networking uses shortest, fixed, physical relatives that do not knowledge intervention andfluctuations of bandwidth. Wired associations also have smaller number drop associations than

    wireless associations.

    Secure

    Wired networks are not susceptible to network snoopers and eavesdroppers, which are universal

    harms in wireless networking. To increase contact to a wired network, hackers have to usedetailed tools or creep into the location physically, which can be well-appointed, hazardous and

    time consuming for them. Wired network do not need extra refuge actions that wireless networksneed, such as use of encryption and passwords for network setting in regulate to stop others from

    by means of the connections.

    With wired networking, do not have to be concerned about others trying to use your relations toget a "free ride" or, worse, admittance your susceptible and individual files. This is a general

    dilemma with wireless networking since the signal are easy to catch. With wired networking, donot have to worry about your fellow citizen uncertain crossways your files because you do not

    use a wireless indicator that can reach past your goods line.

    Disadvantage of wired

    management the wires from each room within the home can be a complicated task.

    Network cable can look messy.

    Network cables can disconnect or turn out to be out of order consequently cause the association

    to fail.

    Adding more computers to a wired network may corollary in startling spend if you run out of

    associations on your network and might slow bringing up the rear the network.

    All wired networks differ from each other. The nearly all household type of wired network is an

    Ethernet network.

    1)Wired and as a result more complex to setup. drill holes in wall, in a row cables in loftsfitting socket and redecorate.2) More luxurious to set up

    3) More time uncontrollable to set up4) Not as plastic, can only use where there is a opening - cannot use external for example

    5) Wired systems cannot be used in ex listed buildings

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    18/41

    Advantage of wireless

    Having a wireless network opens up many possibilities.

    Wireless networks supply an economical and easy way to share a solitary Internet connection

    surrounded by a number of computers. This resources you only need one modem, and you can

    add supplementary computers to the network just by plug in a wireless card and rotary them on.

    The new tackle are connected to the Internet without delay.

    A wireless network also lets you entre files and printers from somewhere in your home. It

    allows you to orchestrate files you have on your laptop with your home computer, and you canwith no trouble send files between computers as well. Using a wireless network to remove files

    is faster than distribution them through email or flaming them to a CD! Because printers coupled

    to one of the computers on a network are common by all the computers on that network, you can

    write papers somewhere in your home, press the print button, and assemble the printed files from

    a imprinter that is related to another computer.

    If you are a game player, you have probably noticed that your sports meeting often have an

    another to play more than a local area network or LAN. Wireless networks are LAN This income

    you and your family can have fun these games together and do not have to be on computer that

    are after that to each other to do so. it is more fun to play alongside real people, and it is smoothmore fun to play touching people you know as an alternative of stranger on the Internet. Your

    sports meeting will also play much faster over your LAN. Additionally, you can connect game

    console to the Internet and start on singing these games online. It is much easier to practice

    online play from side to side an Xbox or PlayStation 2 that is connected to a wireless complex

    than have to use a modem.

    Wireless network relatives are always on. This resources you can connect to the Internet when

    you want without in the making for your modem to dial in. Laptops can be accepted from room

    to room, and they will always have right to use to the Internet. Since wireless network work

    without the call for to log in, you do not need to set up usernames or passwords.

    The single maximum thing about a wireless network is that it is, well, wireless The biggest

    motive to have a wireless network is since it eliminates the need for dear, ugly, and treacherous

    wires sprawling all over your house. You can use your CPU in any room you want no more

    being attentive near a phone vent or walking over that interweave of wires in your home. The

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    19/41

    cost of receiving enough Ethernet cables can add up, and now and again, may even have to make

    hole in your parapet to set up a wired network. If you are renting, of course, this is impracticable.

    With a wireless network, you do not have these problems you can even use your computer outer

    And if move, there is no need to separate and pack up all those wires, and you no longer have to

    scrutinize all the wires for hurt whenever your Internet connection go down.

    Disadvantages of wireless communication

    The improvement in the communication system and the network has given go up to the wirelessnetworks. The acceptance and flexibility of wireless message has allow us to use person prop up

    drive to be used everyplace. This has enable the mankind to outperform in every pasture of thelife, but at

    the same time it has numerous pressure as well.

    Security threats to wireless networks

    Besides all the comfort of the life wireless networks poses serious security threats. The majorgrounds is the signal are stretch in the air and it is fitting for the hackers to grasp wireless signal.

    Wireless networks have need of very stretched security so that the informal users cannot makeuse of the in development. As more and users are creation use of the wireless technology, the

    risk of information being lost is swelling. The existing wireless encryption protocol are easiersaid than done to handle .moreover the common users are not aware of the ways of addressing

    wireless security matter. One must build brawny security protocols in order to safe and sound thewireless signal like WPA and WPA2. Moreover wireless imposition obstacle system is another

    better way to build strapping security system.

    Major disadvantages of wireless technology

    Wireless is a community frequency network as a result its boundary is highly hazardous to be

    used for administrator private in turn. The speed and the capability of the wireless signal drop asmore and more user use the same regularity. Moreover its original throughput is three times less

    than it claim to deliver. Wireless technology is on hand in only three major channels collectionfrom 2.5 GHz, 11 and 1.6 GHz, Which is much minor than the wired network. They are 50 time

    slower than the wired network technology. The wireless signals are also in rung by theobstruction such while walls, doors and campaign itself. The set of family of the wireless

    technology is easier said than done preserve. Hence it an unstable network. Though wirelesstechnologies have the funds for give to use and heave your laptop or any other practical device

    with you anyplace, but the longer the store up the weaker the signals. The wide-ranging use of

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    20/41

    wireless signals over the mobile phone is hazardous to the toughness of the traits beings. The arange of wellbeing evils that wireless can pose are remembrance loss and level cancer.

    Wireless signal are lying face down to put out of place by the infrared and radio signals. Wirelesstechnology are four times more limited than wired proficiency due to their complicated setup. Ifone needs to transfer hush-hush data over the network wireless technology is a demanding risk to

    be used. Banks, exploration agencies and above-board data should be transfer using wirednetwork technologies, because they are more confined and sound. The wireless technology offer

    free access points which hinder the well-organized transport of data.

    Type of unauthorized access to wireless networks

    The unauthorized access to the wireless signal is really everyday. The an mixed bag of types ofunauthorized access are unkind association, chance association, ad hoc networks, and non

    traditional networks, man in the focus attack, uniqueness theft and disagreement of service.When a user turn on its PC, and he or she receives unofficial signal from a neighboring building.

    User might not even signals are budding and make use of it are enclose a indication from where

    they are budding and make use of it , then we can call it inadvertent connection. When a personuses bananas to access the code word of the wireless network it is term as nasty network. Whenthe wireless technology has no centre gadget to act for it encryption setting are hard to mange

    thus security can not be achieve. Bluetooth campaign and PDAs are non traditional form ofnetworks they can be easily hack by using cracker technology.

    Ethernet card/wireless card

    -gives computer/lap top wired/wireless capabilities if not already present.

    Wireless router/modem

    -the main control centre of your network. for all operation..

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    21/41

    Ethernet cable

    -required create a wires network or to connect other hardware.

    Wireles

    A wireless network or Wireless Local Area Network (WLAN) serve the same idea as a wired

    one to link a group of computers. Because "wireless" doesn't want costly wiring, the main

    assistance is that it's in general easier, faster and cheaper to set up.

    By judgment, create a network by pull wires right from beginning to end the embankment andceiling of an office can be labor intensive and as a result luxurious. But even when have a

    energetic network formerly in place, a wireless network can be a cost-effective way to enlarge oraugment it. In fact, there's in truth no such thing as a solely wireless network, because most linkback to a wired network at some point.

    The essentials

    Wireless networks function using radio frequency (RF) technology, a frequency within the

    electromagnetic spectrum linked with radio wave broadcast. When an RF in progress is total toan mast, an electromagnetic countryside is shaped that then is able to promulgate through gap.

    The foundation stone of a wireless network is a piece of equipment known as an access point

    (AP). The primary job of an access point is to broadcast a wireless signal that computer candetect and "tune" into. Since wireless networks are habitually connected to wired ones, an

    admittance point also habitually serves as a link to the property available on the a wired network,such as an Internet connection.

    In organize to connect to an admittance top and connect a wireless network, computers must be

    set with wireless network adapters. These are repeatedly built exact into the computer, but if not,just about any computer or notebook can be completed wireless capable all the way through the

    use of an add-on adapter plug into an vacant expansion slot, USB port, or in the crate ofnotebooks, a PC Card niche.

    Wireless technology standards

    there are numerous technology standards for wireless networking, it pays to do your homeworkbefore business any tools. The most ordinary wireless technology standards enclose the

    following:

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    22/41

    y 802.11b: The first broadly used wireless network technology, known as 802.11b (morecommonly called Wi-Fi), first debuted almost a decade past, but is unmoving in use.

    y 802.11g: In 2003, a follow-on report called 802.11g appear offering larger performance(that is, speed and range) and remainder today's most widespread wireless networking

    technology.y

    802.11n: Another enhanced standard called 802.11n is at this time underneathdevelopment and is planned to be complete in 2009. But even despite the fact that the802.11n standard has yet to be finalize, you can still buy goods based on the outline

    802.11n standard, which you will be able to raise later to the final set.

    All of the Wi-Fi variant (802.11b, g and n products) exercise the same 2.4 GHz radio frequency,and as a result are considered to be well-suited with each other, so you can habitually use devices

    based on the poles apart values within the same wireless network. The hold is that doing so oftenrequire special arrangement to provide somewhere to stay the prior devices, which in rotate can

    diminish the overall concert of the network. In an superlative scenario you'll fancy all yourwireless devices, the admittance point and all wireless capable computers, to be with the same

    technology average and to be beginning the same wholesaler whenever potential.

    Wireless speed & range

    When you buy a section of wireless network hardware, it will often citation performance figures

    based on the type of wireless networking standard it use, plus any added technologicalenhancement. In genuineness, these routine figures are exactly always wildly confident.

    While the administrator speeds of 802.11b, 802.11g, and 802.11n networks are 11, 54, and 270

    megabits per second (Mbps) in that order, these figures symbolize a situation that.s purely notpossible in the real world. As a general rule, you should take for granted that in a best case

    scenario you.ll get more or less one-third of the advertise performance.

    It's also worth note that a wireless network is by classification a shared network, so the morecomputers you have connected to a wireless access point the less data each will be able to send

    and receive. Just as a wireless network's speed can be different to a great extent, so too can theseries. For example, 802.11b and g officially work over a distance of up to 328 feet indoors or

    1,312 feet outdoors, but the key term there is up to. Chances are you won't see anywhere close tothose numbers.

    As you might expect, the closer you are to an access point, the stronger the signal and the faster

    the connection speed. The range and speed you get out of wireless network will also depend onthe kind of environment in which it operates. And that brings us to the subject of interference.

    Wireless interference

    nterference is an issue with any outward appearance of radio message, and a wireless network isno exception. The likely for interference is in particular great inside, where unlike types of

    building equipment can absorb or imitate radio waves, upsetting the strength and steadiness of awireless network's signal. Similarly, plans like microwave ovens and some battery phones can

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    23/41

    cause prying because they activate in the same 2.4 frequency sequence as 802.11b/g/n networks.can't avoid prying entirely, but in most cases it's not noteworthy enough to concern the usability

    of the network. When it do, you can habitually minimize the nosiness by relocating wirelessnetworking hardware or using dedicated antennas.

    The IEEE 802.11 protocol is a network access technology for provided that connectivity stuck

    between wireless station and wired networking infrastructures.

    By deploy the IEEE 802.11 protocol and connected technologies, allow the mobile user to travel

    to various places, meeting rooms, hallway, lobbies, cafeterias, classrooms, and so onwards andstill have admittance to networked data. Also, further than the corporate workplace, enable right

    to use to the Internet and even communal sites can be made offered through free wireless hotspot networks. restaurants, rail stations, and familiar areas throughout cities can be configured

    to make available this service.

    802 11 ARCHITECTURE

    The 802.11 logical architecture contain several main components station (STA), wireless access

    point (AP), independent basic service set (IBSS), basic service set (BSS), division system (DS),and extended service set (ESS). Some of the mechanism of the 802.11 logical arrangement map

    frankly to hardware devices,such as STAs plus wireless APs. The wireless STA contain an

    adapter card, PC Card, or an embedded device to offer wireless connectivity. The wireless APfunction as a overpass among the wireless STAs and the to be had network vertebral editorial fornetwork access.

    An IBSS is a wireless network, consisting of at smallest amount two STAs, used somewhere no

    inauguration to a DS is existing. An IBSS is also sometimes referred to as an commercial hocwireless network.

    A BSS is a wireless network, consisting of a one and only wireless AP at the underside of one ora number of wireless clients. A BSS is also sometimes referred to as an highway and rail network

    wireless network. every STAs in a BSS community through the AP. The AP provide

    connectivity to the wired LAN and provide bridging functionality when one STA inauguratecommunication to a further STA or a node on the DS.

    An ESS is a position of two or more wireless APs connected to the same manic network thatdefine a single logical network piece encircled by a router).

    The APs of many BSSs are unified by the DS. This allow for mobility, because STAs can budge

    from one BSS to a new BSS. APs can be interconnected with or devoid of wires; nevertheless,

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    24/41

    most of the time they are connected with chains. The DS is the logical module used tointerconnect BSSs. The DS provide giving out army to allow for the wandering of STAs among

    BSSs

    802.11 OPERATING MODES

    y INFRASTRUCTURE MODEy AD HOC MODE

    In in cooperation operating modes, a Service Set Identifier (SSID), also acknowledged as thewireless network name, identify the wireless network. The SSID is a name configured on the

    wireless AP or an opening wireless shopper that identify the wireless network. The SSID is oncein a while advertise by the wireless AP or the original wireless buyer using a special 802.11

    MAC executive frame notorious as a beacon frame.

    802.11 infastructure mode

    In infrastructure mode, there is at smallest amount one wireless AP and one wirelesspatron. The wireless patron uses the wireless AP to access the property of a conventional

    wired network. The wired network can be an society intranet or the Internet, dependingon the situation of the wireless AP.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    25/41

    wireless clients in AD hoc Mode

    In hoc mode wieless clients communicate directly with each other without the use ofwireless AP,

    wireless clients in AD Hoc Mode

    Ad hoc mode is also call peer-to-peer mode. Wireless clients in ad hoc mode shape an

    self-determining basic overhaul set (IBSS). One of the wireless clients, the originalwireless client in the IBSS, take over some of the household tasks of the wireless AP.

    These everyday jobs contain the periodic beaconing process and the verification of newmembers. This wireless client does not act as a overpass to relay in order sandwiched

    between wireless clients. Ad hoc mode is used to connect wireless clients mutually when

    there is no wireless AP in attendance. The wireless clients must be plainly configured touse ad hoc mode. There can be a highest of nine members in an ad hoc 802.11 wireless.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    26/41

    protocols

    The IEEE. 802 standards board define two undo layers, the Logical Link Control (LLC) andmedia access control, for the Data-Link layer of the OSI model. The IEEE 802.11 wireless

    standard define the provision for the physical layer and the media access control (MAC) layer

    that communicate up to the LLC layer.

    OSI

    All of the components in 802.11 architetcture fall into either the media accesscontrol(MAC) sublaver of the data-link layer or the physical layer.

    MAC frame

    consists of a MAC header, the frame remains, and a frame check sequence (FCS). The numbersin the following figure signify the number of bytes for each grassland.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    27/41

    Frame control fild

    The Frame Control field, contains control in order used for crucial the type of 802.11 MACframe and only if information required for the subsequent fields to comprehend how to process

    the MAC frame. The statistics in the following stature represent the digit of bits for each field.

    Frame control fields

    description of each Frame Control field subfield

    y Protocol Version provide the current side of the 802.11 protocol used. getting STAs usethis value to conclude if the version of the protocol of the established frame is supported.

    y Type and Subtypedetermine the function of the frame. There are three poles apart frametype fields: control, data, and supervision. There are multiple subtype fields for each

    frame type . Each subtype determine the specific function to act upon for its coupledframe type.

    y To DS and From DS indicate whether the frame is going to or exit from the DS , and isonly used in data type frames of STAs allied with an AP.

    y More Fragments indicate whether more rubbish of the frame, either data or managingtype, are to trail.

    y Retryindicate whether or not the frame, for moreover data or supervision frame types, isbeing retransmitted.

    y Power Management indicate whether the transport STA is in active mode or power-savemode.

    y More Data indicate to a STA in power put away style that the AP has more frame to send.It is also used for APs to designate that additional broadcast/multicast frame are to

    follow.

    y WEP indicate whether or not encryption and verification are used in the frame. It can beposition for all data frames and management frames, which have the subtype situate toauthentication.

    Order indicates that all acknowledged data frames must be process in order.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    28/41

    Duration/id field

    This field is used for all be in charge of type frames, not including with the subtype of PowerSave (PS) Poll, to specify the lingering duration needed to collect the next frame communication.

    When the sub-type is PS Poll, the field contain the association distinctiveness (AID) of the

    transmitting STA.

    ADDRESS fields..

    Depending upon the frame type, the four address field will contain a blend of the followingaddress types:

    y BSS Identifier (BSSID).BSSID uniquely identify each BSS. When the frame isbeginning an STA in an road and rail network BSS, the BSSID is the MAC deal with ofthe AP. When the frame is from a STA in an IBSS, the BSSID is the randomly generate,

    locally administered MAC address of the STA that initiated the IBSS.

    y Destination Address (DA).DA indicates the MAC address of the final end to receive theframe.

    y Source Address (SA).SA indicates the MAC address of the inventive resource thatinitially created and transmitted the frame.

    y Receiver Address (RA). RA indicate the MAC address of the next instant STA on thewireless intermediate to receive the frame.

    y Transmitter Address (TA). TAindicate the MAC address of the STA that transmit theframe onto the wireless medium.

    For more in turn about the address types and the filling of the address fields in the 802.11 MAC

    header, see the IEEE 802.11 standard at the IEEE Web site.

    Sequence control

    The Sequence Control field contain two subfields, the Fragment Number field and the chainNumber field,

    Sequence Control field..

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    29/41

    y Sequence Numberindicate the sequence digit of each frame. The progression number isthe same for each frame sent for a fragmented frame otherwise, the integer is incremented

    by one until reaching 4095, when it then begin at zero again.

    y Fragment Numberindicate the number of each frame sent of a scrappy frame. The earlyvalue is locate to 0 and then incremented by one for each successive frame sent of the

    scrappy frame.

    Frame check sequence

    The transmit STA uses a cyclic joblessness check (CRC) over all the field of the MACdescription and the frame body field to cause the FCS value. The in receipt of STA then uses the

    same CRC sum to establish its be in possession of value of the FCS field to substantiate whetheror not any errors occur in the frame for the duration of the transmission.

    802.11 PHY sublayer

    At the physical (PHY) sublayer, IEEE 802.11 define a series of programming and spread schemefor wireless communications, the most universal of which are the Frequency Hopping Spread

    Spectrum (FHSS), Direct Sequence Spread Spectrum (DSSS), and Orthogonal FrequencyDivision Multiplexing (OFDM) spread schemes. the 802.11, 802.11b, 802.11a, and 802.11g

    standards that stay alive at the PHY sublayer. These standards are describe in the section thatfollow.

    Standards for 802.11 PHY Layer

    IEEE 802.11

    The bit rate for the novel IEEE 802.11 standard is 2 Mbps using the FHSS program scheme andthe S-Band Industrial, Scientific, and Medical (ISM) frequency crew, which operate in the

    frequency choice of 2.4 to 2.5 GHz. on the other hand, under less-than-ideal environment, asubordinate bit rate speed of 1 Mbps is used.

    802.11b

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    30/41

    The major augmentation to IEEE 802.11 by IEEE 802.11b is the homogeny of the physical layerto support elevated bit rates. IEEE 802.11b chains two supplementary speeds, 5.5 Mbps and 11

    Mbps, using the S-Band ISM. The DSSS spread idea is used in order to make available thehigher bit duty. The bit rate of 11 Mbps is reachable in ideal environment. In less-than-ideal

    environment, the slower speeds of 5.5 Mbps, 2 Mbps, and 1 Mbps are used.

    802.11a

    IEEE 802.11a (the first standard to be ratify, but just now being broadly sold and deploy) operateat a bit rate as high as 54 Mbps and use the C-Band ISM, which operate in the regularity series of

    5.725 to 5.875 GHz. as a substitute of DSSS, 802.11a uses OFDM, which allows statistics to betransmitted by subfrequencies in analogous and provides superior struggle to nosiness and

    greater throughput. This higher-speed know-how enables wireless LAN network to make betterfor video and conferencing application.

    OFDM and IEEE 802.11a endow with both a elevated data velocity and a cleaner signal. The bit

    rate of 54 Mbps is reachable in ideal environment. In less than ideal surroundings, the slowerspeeds of 48 Mbps, 36 Mbps, 24 Mbps, 18 Mbps, 12 Mbps, and 6 Mbps are worn.

    802.11g

    IEEE 802.11g operate at a bit rate as high as 54 Mbps, but use the S-Band ISM with OFDM.802.11g is also backward companionable with 802.11b and can activate at the 802.11b bit toll

    and use DSSS. 802.11g wireless network adapters can unite to an 802.11b wireless AP, with802.11b wireless network adapters can unite to an 802.11g wireless AP. accordingly, 802.11g

    provide a movement path for 802.11b network to a frequency-attuned standard technology with ahigher bit rate. to be had 802.11b wireless network adapters cannot be upgrade to 802.11g by

    update the firmware of the adapter they must be replace. Unlike migrating from 802.11b to 802,migrate from 802.11b to 802.11g can be done incrementally.

    802.1x protocol

    The IEEE 802.1X standard define port-based, network access control used to supply realnetwork access for Ethernet networks. This port based network access control uses the animaluniqueness of the switched LAN communications to confirm devices close to a LAN port.

    Access to the port can be shorn of if the substantiation process fails. even though this standardwas considered for wired Ethernet networks, it has been bespoke to 802.11 wireless LANs.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    31/41

    Components of 802.1x

    y Port access entity. A LAN port, also known as portadmittanceentity (PAE), is the logicalthing that ropes the IEEE 802.1X etiquette that is connected with a port. A PAE can

    approve the role of the authenticator, the activist, or both.

    y Authenticator. An authenticatoris a LAN port that enforce validation before allowingaccess to services handy using that port. For wireless connections, the authenticator is thelogical LAN port on a wireless AP all the way through which wireless regulars in roads

    manner expand inauguration to other wireless clients and the wired network.

    y Supplicant. The supplicantis a LAN port that desires access to services reachable on theauthenticator. For wireless connections, the lobbyist is the logical LAN port on a wirelessLAN network adapter that desires access to the other wireless consumers and the wired

    network by associate with and then authenticate itself to an authenticator.

    Whether for wireless connections or wired Ethernet links, the asker and authenticator areconnected by a logical or physical point-to-point LAN division.

    Authentication server. To verify the certificate of the lobbyist, the authenticator uses an

    authenticationserver, which checks the recommendation of the activist on behalf of theauthenticator and then respond to the authenticator, signifying whether or not the campaigner is

    allowed to access the army.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    32/41

    Components of IEEE 802.1X AUNTHETICATION

    CONTROLLED AND UNCONTROLLED PORTS

    The authenticator's port-based admittance control defines the following poles apart type oflogical ports that installment the wired LAN by means of a sole physical LAN port:

    y Uncontrolled Port. The uncontrolled port allows an uncontrolled switch over between theauthenticator (the wireless AP) and other networking campaign on the wired network

    anyway of any wireless client's consent state. Frames sent by the wireless consumer are

    on no account send using the uncontrolled port.

    y Controlled Port. The controlled port allows data to be sent among a wireless consumerand the wired network no more than if the wireless patron is allowed by 802.1X. Before

    substantiation, the knob is open and no frame are forward between the wireless client andthe wired network. When the wireless client is profitably legitimate using IEEE 802.1X,

    the switch is closed, and frames can be sent amid the wireless user and nodes on thewired network.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    33/41

    CONTROLLED AND UNCONTROLLED PORTS FOE ieee 802.1x

    On an authenticate Ethernet knob, the wired Ethernet patron can send Ethernet frames to the

    wired network as before long as substantiation is entire. The switch identify the traffic of adefinite wired Ethernet patron using the physical port to which the Ethernet client is coupled.

    naturally, only a single Ethernet client is related to a physical harbor on the Ethernet switch.

    Because many wireless clients put yourself forward for admittance to the same occurrence straitand send data using the same channel, an annex to the basic IEEE 802.1X protocol is mandatoryto tolerate a wireless AP to identify the held traffic of a fussy wireless client. The wireless patron

    and wireless AP do this from first to last the communal purpose of a per-client unicast assemblykey. barely true wireless clients have familiarity of their per-client unicast session key. lacking a

    valid unicast session key united to a successful certification, a wireless AP junk the traffic sentfrom the wireless user.

    EAP over LAN

    To offer a standard authentication machine for IEEE 802.1X, the Extensible verification Protocol

    (EAP) was select. EAP is a Point-to-Point Protocol (PPP)-base certification machine that wastailored for use on point-to-point LAN segment. EAP letters are normally sent as the

    consignment of PPP frames. To adapt EAP messages to be sent over Ethernet or wireless LANsegment, the IEEE 802.1X ordinary define EAP over LAN (EAPOL), a standard encapsulation

    scheme for EAP messages.

    WEP

    WEP provide data discretion military by encrypting the data sent connecting wireless nodes.

    situation a WEP flag in the MAC header of the 802.11 frame indicate that the casing is encryptedwith WEP encryption. WEP provide data honor by together with an integrity check value (ICV)

    in the encrypted section of the wireless frame.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    34/41

    y Multicast/global key:multicast/globalkeyis an encryption key that protect multicast andtelevise traffic from a wireless AP to all of its connected wireless regulars.

    Unicast session key: unicastsession keyis an encryption key that protect unicast traffic among a

    wireless client and a wireless AP and multicast and broadcast interchange sent by the wireless

    client to the wireless AP.

    WEP encryption process

    A 32-bit integrity check value (ICV) is intended for the frame data.

    The ICV is append to the end of the frame data.

    A 24-bit initialization vector (IV) is generate and append to the WEP encryption key.

    The recipe of initialization vector and WEP encryption type is used as the enter of a pseudo-random

    number generator (PRNG) to cause a bit sequence that is the same size as the amalgamation of data and

    ICV.

    The PRNG bit string, also famous as the key stream, is bit-wise limited ORed (XORed) with the recipe of

    data and ICV to bring into being the encrypted portion of the freight that is sent stuck between the

    wireless access point (AP) and the wireless client.

    To create the consignment for the wireless MAC frame, the IV is supplementary to the front of

    the encrypted blend of the data and ICV, along with other fields.

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    35/41

    WEP decryption process

    Security issues with wep and IEEE 802.11

    The problem with WEP is that the willpower and giving out of WEP encryption keys are not

    clear. WEP keys must be spread by using a secure strait external of the 802.11 protocol. In putinto practice, WEP keys are text string that must be by hand configured using a grand piano for

    both the wireless AP and wireless clients. However, this key division system does not balancewell to an endeavor society and is not safe and sound.

    moreover, there is no clear mechanism for change the WEP encryption keys any persubstantiation or once in a while for an valid connection. All wireless APs and customers use the

    same by hand configured WEP key for multiple session. With various wireless regulars sendinga large quantity of data, an enemy can remotely take into custody large amount of WEP and use

    cryptanalysis methods to establish the WEP key.

    The lack of a WEP key administration protocol is a primary check to provided that 802.11security, especially in roads mode with a large amount of stations. Some example of this type of

    network include corporate and didactic institutional campus and municipal seats such as airportsand malls. The lack of computerized certification and key fortitude services also affect maneuver

    in ad hoc mode, in which users valor want to use in peer-to-peer mutual announcement in areassuch as symposium rooms.

    Wpa

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    36/41

    Although 802.1X addresses many of the security issues of the original 802.11 standard, issuesstill exist with regard to weaknesses in the WEP encryption and data integrity methods. The

    long-term solution to these problems is the IEEE 802.11i standard, which is currently in draftform.

    Until the IEEE 802.11i standard is ratify, wireless vendors have approved on an interoperableprovisional standard acknowledged as Wi-Fi Protected Access (WPA). The goals of WPA arethe following:

    y To require secure wireless networking. WPA require secure wireless network by require802.1X confirmation, encryption, and unicast and multicast/global encryption keysupervision.

    y To address WEP issues with a software upgrade. The discharge of the RC4 stream cipherwithin WEP is defenseless to known plaintext attack. Additionally, the data honor

    provide with WEP is quite weak. WPA solves all the lingering security issue with WEP,yet only require firmware updates in wireless equipment and an keep posted for wireless

    regulars. Existing wireless tools is not expected to want surrogate.

    y To provide a secure wireless networking answer for small office/home office (SOHO)wireless users. For the SOHO, there is no RADIUS matre d'htel to provide 802.1Xsubstantiation with an EAP type. SOHO wireless clients must use either shared key

    authentication (highly discouraged) or open system validation with a single standingWEP key for both unicast and multicast traffic. WPA provides a pre-shared key option

    intended for SOHO configurations. The pre-shared key is configured on the wireless APand each wireless patron. The opening unicast encryption key is resulting from the

    validation process, which verify that both the wireless consumer and the wireless APhave the pre-collective key.

    y To be compatible with the upcoming IEEE 802.11i standard. WPA is a rift of thesafekeeping facial appearance in the projected IEEE 802.11i standard. All the facial

    appearance of WPA are describe in the in progress sketch of the 802.11i standard.

    WPA Security Features

    WPA contains

    y Authenticationy Ncryptiony Data intergrity

    Authentication

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    37/41

    802.11 and 802.1X authentication is optional through WPA, 802.1X substantiation iscompulsory. Authentication with WPA is a recipe of open system and 802.1X authentication,

    which uses the subsequent phases:

    y The first phase use open system validation to indicate to the wireless client that it cansend frame to the wireless AP.

    y The second phase uses 802.1X to execute a user-level substantiation. For environmentwithout a RADIUS road and rail network, WPA chains the use of a pre-shared key for

    environment with a RADIUS transportation, WPA supports EAP and RADIUS.

    Encryption

    802.1X, rekeying of nicast encryption keys is voluntary. moreover, 802.11 and 802.1X

    provide no machine to change the global encryption key that is worn for multicast andbroadcast interchange. With WPA, rekeying of both unicast and total encryption keys is

    essential. The worldly Key Integrity Protocol (TKIP) changes the unicast encryption keyfor each frame, and each change is matched between the wireless patron and the wireless

    AP. For the multicast OR global encryption key, WPA include a flair for the wireless APto puff changes to the allied wireless regulars.

    TKIP

    y The substantiation of the safekeeping configuration after the encryption keys areunwavering.

    y The in time changing of the unicast encryption key for both frame.The willpower of a exclusive starting unicast encryption key for every one pre-shared key

    certification.

    AES

    WPA is describe Advanced Encryption Standard (AES) as an optional replacement forWEP encryption.adding AES support by using a firmware keep informed force not bepossible for existing wireless equipment, support for AES on wireless network adapters

    and wireless APs is not required

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    38/41

    Expected output

    PIE CHART

    Number of people using line:14.4 BILLION

    8.2

    7.8

    4.4

    1.2

    USERS

    DIGI

    MAXIS

    CELCOM

    U-MOBILE

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    39/41

    Conclusion..

    Its ready to make conclusion. Bottom line, then, which is better - wired or wireless?. If very

    cost mindful, need maximum act users home system, and don't care much on mobility, then awired Ethernet LAN is most likely right.

    If on the other hand, cost is more of an issue, user like living being an early adopter of foremost-

    edge technologies, and user in fact troubled about the mission of wiring users home or smallbusiness with Ethernet cable, then user ought to certainly judge a wireless LAN.

    Many of user will as likely fall somewhere in between these two edges. If user still unsure,

    regard as asking friends and family about their experiences with building LANs. And, waste just

    a few added minutes with our interactive Home Network Advisor tool. It should help user chooseon the type of network as fit as the equipment user will want to boast.

    Wired wireless

    Installation moderate complexity easier, but be cautious interference

    Cost a smaller amount more

    Reliability high reasonably high

    Performance very high-quality good

    Security sensibly good sensibly good

    Mobility restricted exceptional

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    40/41

    References

    http://www.ciscopress.com/articles/article.asp?p=344242%5c

    http://www.webopedia.com/DidYouKnow/Computer_Science/2008/wireless_networks_expl

    ained.asp

    http://technet.microsoft.com/en-us/library/cc757419%28WS.10%29.aspx

    http://technet.microsoft.com/en-us/library/cc757419%28WS.10%29.aspx

    http://www.howstuffworks.com/wireless-network.htm

    http://computer.howstuffworks.com/home-network2.htm

    http://en.wikipedia.org/wiki/Celcom

    http://en.wikipedia.org/wiki/Maxis_Communications

    http://compnetworking.about.com/cs/homenetworking/a/homewiredless_2.htm

    http://en.wikipedia.org/w/index.php?title=Special%3ASearch&search=wired+and+wireles

    s

    http://computer.howstuffworks.com/home-network2.htm

    http://www.webopedia.com/DidYouKnow/Computer_Science/2008/wireless_networks_expl

    ained.asp

    http://www.webopedia.com/DidYouKnow/Computer_Science/2008/wireless_networks_expl

    ained.asp

    http://compnetworking.about.com/cs/homenetworking/a/homewiredless_2.htm

    http://en.wikipedia.org/wiki/Wired

    http://computer.howstuffworks.com/home-network2.htm

    http://www.howstuffworks.com/wireless-network.htm

  • 8/6/2019 Assignmnt 1 Wired& Wireless Connections

    41/41