Click here to load reader

Site survey- Deployement of Wi Fi

Embed Size (px)

DESCRIPTION

 

Citation preview

  • 1. THE MASTER PIECE
    SITE SURVEY

2. COVERAGE AREA
3. WIRELESS TOPOLOGY
BSS
IBSS
ESS
In this site survey we are using more than one access points so the topology we are using is the Extended Service Set i.e. ESS.
4. Available Technologies
802.11 a
IEEE 802.11a-1999or802.11ais an amendment to theIEEE 802.11specification that added a higher data rate of up to 54Mbit/susing the 5GHzband. It has seen widespread worldwide implementation, particularly within the corporate workspace.
5.

  • 802.11 b

IEEE 802.11b-1999or802.11b, is an amendment to theIEEE 802.11specification that extended throughput up to 11Mbit/susing the same 2.4GHzband. This specification under the marketing name ofWi-Fihas been implemented all over the world. 802.11b has a maximum raw data rate of 11 Mbit/s and uses the sameCSMA/CA media access method defined in the original standard.
6.

  • 802.11g

802.11g is the third modulation standard forwireless LANs. It works in the 2.4 GHz band (like802.11b) but operates at a maximum raw data rate of 54 Mbit/s, or about 19 Mbit/s net throughput (identical to802.11acore, except for some additional legacy overhead for backward compatibility). 802.11g hardware is fully backwards compatible with 802.11b hardware.
7. Technology Used
Technology for this layout &as per the requirements of the University I am using is 802.11 a.
8. Why 802.11 a?
Why not 802.11 b ?

  • It works on 2.4 GHz at this band many

devices like the Bluetooth's work.

  • Secondly, thespeed is of 11 Mbps only

which is not suited for big crowd &
also not separated by much distance.
9. Why not 802.11 g?

  • It also uses the 2.4 GHz band so there are

interferences caused by the devices
at that band.

  • Secondly, as it uses a smaller band the

no. of channels that can b used is only 3.
10. Advantages of 802.11a

  • Uses a band of 5.7 GHz so the issue of interference are very less.

11. As the band is larger the no. of channels are up to 23.

  • The speed is of 54 Mbps & it also suits

the crowded places where the crowd is not sparse.
12. Layout
13. Access Points
Incomputer networking, awireless access point(WAP) is a device which allows wireless devices to connect to a wired network usingWi-Fi,Bluetoothor related standards. The WAP usually connects to arouter(via a wired network), and can relay data between the wireless devices (such as computers or printers) and wired devices on the network.
14. Why three A.Ps?
The technology we are using i.e. 802.11 a has a disadvantage which is this technology has short range.
So to have good speed & also better connectivity we need three access points.
1- LABS.
2- Horizontal Corridor.
3- Vertical Corridor.
15. Security
The Wireless securitystandard we are using is
802.11i or WPA 2.
WPA stands for WIFI Protected Access.Which is the latest protocol for wireless & has many
good features like AES,TKIP etc.
16. Features of WPA 2
AES (Advance Encryption).
Authentication.
Dynamic Key Management.
Successor of WPA.
17. Advanced Encryption System
The new 802.11i standard, or WPA2, supports the128-bit Advanced Encryption Standard (AES) .
AES supports 128-bit, 192-bit and 256-bit keys.
18. Authentication
This new standard specifies use of Temporal Key Integrity Protocol (TKIP) and 802.1x/EAP with mutual authentication .
802.1x authentication and key-management
features for the various 802.11 Wi-Fi flavors.
19. Control Accessing WLAN
SSID
Aservice set identifier(SSID) is a name that identifies a particular 802.11 wireless LAN. A client device receives broadcast messages from allaccess pointswithin range advertising their SSIDs. The client device can then either manually or automaticallybased on configurationselect the network with which to associate. The SSID can be up to 32 characters long. As the SSID displays to users, it normally consists of human-readable characters.
20. Mac Address Filtering

  • In computer networking,MACFiltering(or EUI filtering, orlayer 2address filtering) refers to a security access control methodology whereby the 48-bit address assigned to eachnetwork cardis used to determine access to the network.

21. MAC addressesare uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use ofblacklistsandwhite lists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a white list entry for each device that he or she would use to access the network.