Wifi
Wifi
Wifi
1
Wi-Fi (Wireless-Fidelity) is a wireless
technology brand owned by the Wi-Fi Alliance
intended to improve the interoperability of
wireless local area network products based
on the IEEE 802.11 standards.
Common applications for Wi-Fi include
Internet, VOIP etc.,
Official Wi-Fi logo
2
802.11 and Wi-Fi
“IEEE 802.11” is a set of industry
standards for the operation of wireless
networks.
Wi-Fi (“Wireless Fidelity”) is a
marketing term.
Synonymous with 802.11
3
802.11: Several Flavors
compatible
4
Wi-Fi “Access Points”
A Wi-Fi “access point” is a blackbox that
connects to the Internet, and also accepts
Wi-Fi connections.
The area covered by one or several
interconnected access points is called “hot
spot”.
5
WiFi Network Topologies
Ad Hoc Network
This is a peer to peer
network.
Infrastructure Network
This network allows to
access various wired
networks. This requires a
base station called
Access Point.
6
802.11b
The 802.11b standard defines a total of
14 frequency channels.
Channel represents a center frequency.
Only 5 MHz separation between center
frequencies of channels.
5 MHz
Channel 1 2 3 4 5 6 7 8 9 10 11
Center 2.412 2.417 2.422 2.427 2.432 2.437 2.442 2.447 2.452 2.457 2.462
Frequency
(GHz)
7
Ideally, 802.11b supports wireless connections
between an access point and a wireless device at
four possible data rates: 1 Mbps, 2 Mbps, 5.5 Mbps,
and 11 Mbps.
Specifically, as terminal travels farther from its AP,
the connection will remain intact but connection
speed decreases (falls back). 2 Mbps
5.5 Mbps
11 Mbps
8
802.11b Spread Spectrum
802.11b makes use of DSSS.
Each bit is transmitted as 11 bits which is called as
Barker Sequence.
To transmit a bit 1, 802.11b does is this by actually
transmitting a fixed sequence of 11 shorter bits
(01001000111).
These shorter bits are called “chips.”
Higher data rates are achieved by using more
complex modulation schemes and/or changing the
chip sequence.
9
802.11a
802.11a specification operates at radio frequencies
between 5.15 and 5.825 GHz
The FCC has divided total 300 MHz in this band into
three distinct 100 MHz bands: low, middle, and high,
each with different legal maximum power.
10
Because of high power output, high band used for
building-to-building products. Lower two bands
suitable for in-building wireless products.
In 802.11a, radio signals are generated using a
method called Orthogonal Frequency Division
Multiplexing (OFDM).
802.11a (like 11b) has a rate fall back mechanism,
i.e., as the distance between the transmitter and
receiver increases, the supported data rate
decreases.
11
802.11a
12 Mbps
24 Mbps
36 Mbps
48 Mbps
54 Mbps
12
802.11g
802.11g offers throughput of 802.11a with
backward compatibility of 802.11b
802.11g operates in 2.4 GHz band but it
delivers data rates from 6 Mbps to 54 Mbps.
802.11g also uses OFDM but supports
spread-spectrum capabilities if any one
component of the system has older
equipment, i.e., 802.11b equipment.
13
Wireless Technologies
Technology Frequen Range Speed
cy
802.11a 5GHz 25 to 75 feet Up to 54Mbps
indoors
15
WiFi Architecture Layers
Data Link Layer (MAC)
Physical Layer
Data Link
802.11 MAC
Layer
FS DS IR Physical Layer
16
802.11 MAC Layer
802.11 makes use of CSMA/CA (Carrier sense
multiple access with collision avoidance)
A CSMA/CD works as (in LAN) : A station desires to
transmit, senses the medium, if the medium is busy,
then the station will defer its transmission to a later
time, if the medium is sensed free then the station is
allowed to transmit.
Two modes of operation are supported by CSMA/CA.
17
In the first method, when a station
wants to transmit, it senses the
channel.
If the channel is idle, it starts
transmitting else it waits until the
channel is idle.
The second method makes use of
virtual carrier sensing.
18
Virtual Carrier Sense
A station willing to transmit sends a short control packet called RTS
(Request to Send) which includes source, destination and duration of the
following transaction. Then the Access Point will send a response control
packet, CTS (Clear To Send) which consists the same information.
19
Access
Point Laptop
RTS
CTS
Data
ACK
20
How WiFi Works?
When a station wants to join the Cell, it can
know the synchronization information from
the Access Point in two ways
Passive scanning – waits to receive
Beacon Frames from the AP
Active scanning – transmits the Probe
request to find the AP and waiting for the
Probe response from AP
21
WLAN Discovery
“Open” WLANs
RESPONSE:
SSID Access Point continuously transmits
SSID
“BeaconPassive
Frames”Scanning
containing network’s
OPEN SSID.
PROBE
REQUEST
{
(ANY)
Active Scanning
RESPONSE:
SSID “Closed” WLANs PROBE
REQUEST
Beacon frames do not contain SSID(SSID)
and/or
CLOSED beacons frames are turned off. 22
Wi-Fi Privacy
Problem: Your radio transmissions can be
picked up by anyone.
Solution: Encryption 23
Wi-Fi privacy is provided by using some
keys called as
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)
24
Wi-Fi Privacy: Observations
38%: WEP
62%:
Completely
open
Source: http://www.worldwidewardrive.org/wwwdstats.html
25
Services
The services provided by 802.11 are divided in to two
categories as
Distribution Services
Station Services
26
Distribution services relate to managing
cell membership and interacting with
stations outside the cell.
In contrast, the station services relate
to activity with in a single cell.
27
Distribution Services
Association: This service is used by mobile stations
to connect themselves to the base stations.
Disassociation: Either station or the base station
may use this service before shutting down or leaving.
Reassociation: This process of moving a station
from old base station to new base station.
Distribution: This service determines how to route
frames sent to base station.
Integration: If a frame needs to be send through a
non-802.11 network with different format, this
service handles the format translation.
28
Station Services
There are 4 station services which are intracell. They
are used after association has taken place and are as
follows.
Authentication:
Because wireless communication can easily be sent
or received by unauthorized stations, a station must
authenticate itself before it is permitted to send data.
After a mobile station has been associated by the
base station, the base station sends a challenge
frame to see if the mobile knows the secret key
(WEP)
29
The mobile is supposed to encrypt the challenge
frame with the key and send back to the base
station.
If the result is correct then the mobile is enrolled in
the cell.
Authentication Frame
Device
NIC
Encrypted Text (using WEP key)
31
Examples
Virtual Guide in Shopping Mall
Virtual Guide in Shopping Mall is an application
which guide the a customer who comes to a big
shopping mall.
As soon as he enter’s into shopping mall a virtual
character comes on his wireless terminal and assist
you through out your shopping
32
Examples
Friendly Job Fair
Friendly Job Fair is a WiFi
based application which
allow the job seekers various
information such as which
companies are participation
in job fair what are their
requirements and what is
the selection process for
various job levels. This also
provide you in which stalls
which companies are their.
33
Patient Monitoring System on Tips
This is an application which allows the doctor’s to
medicate the patients without the help of nurses by
getting their details instantly through their wireless
terminals. A doctor no needs to depend on nurses for
the patient condition. All the details of the patients
are maintained by the server which can be accessed
by wireless terminals such as PDA.
34
A Virtual Friend at Airport
A Virtual Friend In Airport is a WiFi based application which
makes the airline passenger to experience wonderful feeling at
airports.
Usually most of the passengers feel difficult in finding
out the ATM’s, Restaurants, Waiting room etc.
This application could paves the way to the location
which you want to go.
This also gives you alerts about flight arrival or delay
details.
Alerts about various discount offerings at various
shops. Also offers you various city related info
services.
35