Escolar Documentos
Profissional Documentos
Cultura Documentos
The IEEE 802.11 working group published the 802.11 standard for wireless LANs
in 1999. 802.11b is a supplement to 802.11 that specifies a higher data rate and is
currently the industry-accepted standard for WLANs. 802.11b products that meet
a base standard of interoperability are certified by the Wireless Ethernet
Compatibility Alliance (WECA) with the Wi-Fi logo. Several IEEE 802.11
working groups are creating standards for improvements in data rates, quality of
service, and security.
Wi-Fi is not a fully wireless LAN. It is an extension to the existing wired
network. By using device called Access Point (AP) wireless nodes can be
connected to the wired network. Otherwise wireless nodes has to be connected in
AdHoc style. Its typical coverage area is 100 to 500 feet.
Wireless LANs give the enterprise more mobility and flexibility by allowing
workers to stay connected to the Internet and to the network as they roam from
one coverage area to another. This increases efficiency by allowing data to be
entered and accessed on site.
CHAPTER 1
INTRODUCTION
In September of 1999, the Institute of Electrical and Electronic engineers (IEEE)
ratified the specification for IEEE 802.11b, also known as Wi-Fi. IEEE 802.11b
defines the physical layer and media access control (MAC) sublayer for
communications across a shared, wireless local area network (WLAN).
At the physical layer, IEEE 802.11b operates at the radio frequency of
2.45-gigahertz (GHz) with a maximum bit rate of 11 Mbps. It uses the direct
sequence spread spectrum (DSSS) transmission technique. At the MAC sublayer
of the Data Link layer, 802.11b uses the carrier sense multiple access with
collision avoidance (CSMA/CA) media access control (MAC) protocol [1].
A wireless station with a frame to transmit first listens on the wireless
medium to determine if another station is currently transmitting (this is the carrier
sense portion of CSMA/CA). If the medium is being used, the wireless station
calculates a random backoff delay. Only after the random backoff delay elapses
can the wireless station again listen for a transmitting station. By instituting a
random backoff delay, multiple stations that are waiting to transmit do not end up
trying to transmit at the same time (this is the collision avoidance portion of
CSMA/CA) [1].
Collisions can occur and, unlike with Ethernet, they might not be detected
by the transmitting nodes. Therefore, 802.11b uses a Request to Send (RTS)/Clear
to Send (CTS) protocol with an Acknowledgment (ACK) signal to ensure that a
frame is successfully transmitted and received.
CHAPTER 2
clients through the wireless AP. Wireless APs are not mobile and act as peripheral
bridge devices that extend a wired network.
2.3 PORTS
A port is a channel of a device that can support a single point-to-point connection.
For IEEE 802.11b, a port is an association, a logical entity over which a single
wireless connection is made. A typical wireless client with a single wireless
network adapter has one port and can support only one wireless connection [1]. A
typical wireless AP has multiple ports and can simultaneously support multiple
wireless connections. The logical connection between a port on the wireless client
and the port on a wireless AP is a point-to-point bridged LAN segment similar to
an Ethernet-based network client that is connected to an Ethernet switch.
Fig 2.1 shows typical Wi-Fi Network with stations & APs
CHAPTER 3
The Fig 3.3 shows a typical 802.11b LAN, with the components described
previously.
CHAPTER 4
HOW IT WORKS?
When a wireless adapter is turned on, it begins to scan across the wireless
frequencies for wireless APs and other wireless clients in AdHoc mode. Assuming
that the wireless client is configured to operate in infrastructure mode, the wireless
adapter chooses a wireless AP with which to connect. This selection is made
automatically by using an SSID and signal strength and frame error rate
information. Next, the wireless adapter switches to the assigned channel of the
selected wireless AP and negotiates the use of a port. This is known as establishing
an association.
If the signal strength of the wireless AP is too low, the error rate too high,
or if instructed by the operating system (in the case of Windows XP), the wireless
adapter scans for other wireless APs to determine whether a different wireless AP
can provide a stronger signal or lower error rate. If such a wireless AP is located,
the wireless adapter switches to the channel of that wireless AP and negotiates the
use of a port. This is known as Reassociation [1].
Reassociation with a different wireless AP can occur for several reasons.
The signal can weaken as either the wireless adapter moves away from the
wireless AP or the wireless AP becomes congested with too much traffic or
interference. By switching to another wireless AP, the wireless adapter can
distribute the load to other wireless APs, increasing the performance for other
wireless clients. You can achieve contiguous coverage over large areas by placing
your wireless APs so that their signal areas overlap slightly. As a wireless client
roams across different signal areas, it can associate and reassociate from one
wireless AP to another, maintaining a continuous logical connection to the wired
CHAPTER 5
10
11
12
13
CHAPTER 6
Wi-Fi SECURITY
Inherent in the nature of wireless networks, securing physical access to the
network is difficult. Because a physical port is not required, anyone within range
of a wireless AP can send and receive frames, as well as listen for other frames
being sent. Without WEP, eavesdropping and remote packet sniffing would be
very easy. WEP is defined by the IEEE 802.11 standard and is intended to provide
the level of data confidentiality that is equivalent to a wired network [1].
The IEEE 802.11 standard defines the following mechanisms for wireless
security:
1. Open System Authentication
2. Shared Key authentication
3. Wired Equivalent Privacy (WEP)
14
15
16
to remotely capture large amounts of WEP cipher text and use cryptanalysis
methods to determine the WEP key.
The lack of WEP key management, to both automatically determine a WEP
key and change it frequently, is a principal limitation of 802.11 security,
especially with a large number of wireless clients in infrastructure mode. The lack
of automated authentication and key determination services also effects operation
in AdHoc mode, where users might want to engage in peer-to-peer collaborative
communication (for example, in areas such as conference rooms).
17
CHAPTER 7
18
CHAPTER 8
CONCLUSION
Wireless networks can make work easier and make life more fun, today wi-fi is
the good solution for wireless network. Wi-Fi is a wireless technology like a cell
phone. Wi-Fi enabled computers send and receive data indoors and out; anywhere
within the range of a base station. And the best thing of all, it's fast. In fact, it's
several times faster than the fastest cable modem connection.
Wireless LANs give the enterprise more mobility and flexibility by
allowing workers to stay connected to the Internet and to the network as they
roam from one coverage area to another. This increases efficiency by allowing
data to be entered and accessed on site.
Also it costs far less to deploy a wireless LAN than to deploy a wired
version. The saving isnt just in the falling cost of wireless components; its in the
installation of the infrastructure as well. A major cost of installing and modifying
a wired network is the expense to run network and power cables, all in
accordance with local building codes. For this reason, WLANs are being installed
even when the network is comprised only of non-roaming desktops. Wi-Fi has
become the standard wireless Ethernet networking technology for both business
and home.
19
Bibliography
[1] Sultan Weatherspoon, Overview of IEEE 802.11b Security, Intel
Technology Journal Q2, 2000
[2] Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrezej Duda,
Performance Anomaly of 802.11b, proceeding of IEEE INFOCOM 2003,
PP 0-7803-7753-2/03.
20