You are on page 1of 28

Computer Networks

Fundamentals | Prepared by: Mohamed Abosehly


1
WIRELESS COMMUNICATION

WIRELESS
COMMUNICATION

BY :MOHAMED ABO SEHLY 2


NETWORK DEVICES ( HARDWARE ) -TRANSMISSION
MEDIA

Wireless Media
• Flexible (Used in areas where it
is hard to install cables )
• Used in wireless LANs
• Hybrid environment is one which
wireless components communicate
with a network that use cables

BY :MOHAMED ABO SEHLY


3
WIRELESS COMMUNICATION

WIRELESS NETWORK CATEGORIZATION


 According to the coverage area
 WPAN
 WLAN
 WMAN
 WWAN

BY :MOHAMED ABO SEHLY 4


WIRELESS COMMUNICATION
WIRELESS PERSONAL AREA NETWORK (WPAN)
 Typically designed to cover your
personal work space.
 Standardization is Bluetooth.
 cover a range of from 10 m up to 50+.
 Data rate is about 4.0+ Mbps.
 Good applications of this technology
is communications between PC and
peripheral (wireless keyboard ,
wireless mouse and Handsets.
 NO Fees
BY :MOHAMED ABO SEHLY 5
WIRELESS COMMUNICATION
WIRELESS LOCAL AREA NETWORKS (WLAN)
 Designed to cover medium range of Network
(Enterprise LAN or Campus Network).
 It cover a range of about 32m Indoor and
95m outdoors
 Data rate is about 150 Mbps.
 NO Fees

BY :MOHAMED ABO SEHLY 6


WIRELESS COMMUNICATION
WIRELESS METROPOLITAN AREA NETWORK (WMAN)

 Typically designed to cover Large range


of Network (Campus or City).
 It cover a range of about 2 Km to 50 Km.
 Data rate is about 70 Mbps.
 Licensed band (Local radio)
 Technology used WIMAX

BY :MOHAMED ABO SEHLY 7


WIRELESS COMMUNICATION

WIRELESS WIDE AREA NETWORK (WWAN)

 Typically designed to cover Very Large range


of Network (Country).

 Its Network deployment is using (3G,4G,5G)

 Data rate is smaller than MAN data rate.


 Its application is (mobile phone )

BY :MOHAMED ABO SEHLY 8


WIRELESS COMMUNICATION

WIRELESS LAN (WLAN)


 A WLAN is a shared network.
 An access point is a shared device and functions like a
shared hub.
 Data is transmitted over radio waves.
 Two-way radio communications (half-duplex) are used.
 The same radio frequency is used for sending and
receiving (transceiver).

BY :MOHAMED ABO SEHLY 9


WIRELESS COMMUNICATION
SIMILARITIES BETWEEN WLAN AND LAN
 Transmits data over the air vs. data over
the wire
 Looks like a wired network to the user
 Defines physical and data link layer
 Uses MAC addresses
 The same protocols/applications run over
both WLANs and LANs.
 IP (network layer)
 Web, FTP, SNMP (applications)

BY :MOHAMED ABO SEHLY 10


WIRELESS COMMUNICATION
SERVICE SET IDENTIFIER (SSID)
Unique identifier that client devices use to distinguish between
multiple wireless networks in the same vicinity (separate WLANs)
Alphanumeric, case-sensitive entry from 2 to 32 characters long.
• Sometimes access points may even have multiple SSIDs.
• The SSID is configured on the AP and can be either
broadcasted to the outside world or hidden.
• The SSID must match on client and access point.
• Access point broadcasts one SSID in beacons.
• Client cannot be configured without SSID.

BY :MOHAMED ABO SEHLY 11


WIRELESS COMMUNICATION

CLIENT ASSOCIATION STEPS


1. Access point advertise beacons.
2. Beacons contains: SSID, Power, Radio type
and Security type (ex:WPA/WPA2-PSK).
3. Client sends probe request.
4. Access point sends probe response.
5. Client initiates association.
6. Access point accepts association.
7. Access point adds client MAC address to
association table with its SSID.
BY :MOHAMED ABO SEHLY 12
WIRELESS COMMUNICATION

SERVICE MODES
Independent Mode:
–Mobile clients connect directly without an
intermediate access point.
–Ad hoc mode
Infrastructure Mode:
–Mobile clients use a single access point for
connecting to each other or to wired network
resources.

BY :MOHAMED ABO SEHLY 13


WIRELESS COMMUNICATION
PEER-TO-PEER TOPOLOGY

Same SSID configured on all other clients


This can be used for a small office , distance (20 m – 40 m maximum)
BY :MOHAMED ABO SEHLY 14
WIRELESS COMMUNICATION DEVICES
WIRELESS ACCESS POINTS
 An access point connects wireless clients (or
stations) to the wired LAN.
 Client devices do not typically communicate
directly with each other; they communicate with
the AP.
 The access point converts the TCP/IP data
packets from their 802.11 frame encapsulation
format in the air to the 802.3 Ethernet frame
format on the wired Ethernet network.

By :Mohamed Abo Sehly 15


WIRELESS COMMUNICATION DEVICES
WIRELESS ROUTERS
 Wireless routers perform the role of
 Access point
 Ethernet switch
 Router.
 FIREWALL
 DHCP

 FIVE devices in one box.

By :Mohamed Abo Sehly 16


WIRELESS COMMUNICATION
WLAN
 Advantages
 Provide the ability to work anywhere within range of your access points
 Extends the range of your network without running additional wires
 Disadvantages
 Introduces serious security concerns
 provides much less bandwidth than wired devices

By :Mohamed Abo Sehly 17


VIRTUALIZATION

VIRTUALIZATION
VIRTUALIZATION

19
VIRTUALIZATION
VIRTUALIZATION
VIRTUALIZATION
VIRTUALIZATION
Cloud Computing

 A pool of resources that can be rapidly provisioned in an


automated, on-demand manner.
 Value of cloud computing is :
 Economies of scale
 Elastic enough to scale with the needs of your organization.
 Cost and operational benefits
 Easily accessed by users no matter where they reside

By :Mohamed Abo Sehly 24


Cloud computing service models

25
By :Mohamed Abo Sehly
Cloud computing service models

 Software as a service (SaaS).


 Customers are provided access to an application running on a cloud infrastructure.
 but the customer has no knowledge of, and does not manage or control, the underlying cloud infrastructure.
 Platform as a service (PaaS).
 Customers can deploy supported applications onto the provider’s cloud infrastructure,
 but the customer has no knowledge of, and does not manage or control, the underlying cloud infrastructure.
 The company owns the deployed applications and data, and it is therefore responsible for the security of those
applications and data.
 Infrastructure as a service (IaaS).
 Customers can provision processing, storage, networks, and other computing resources, and deploy and
run operating systems and applications.
 the customer has no knowledge of, and does not manage or control, the underlying cloud infrastructure. The
customer has control over operating systems, storage, and deployed applications, along with some networking
components (for example, host firewalls).
 The company owns the deployed applications and data, and it is therefore responsible for the security of those
applications and data.

By :Mohamed Abo Sehly 26


Cloud computing deployment models:

 Public.
 A cloud infrastructure that is open to use by the general public. It’s owned, managed, and operated by a third
party (or parties), and it exists on the cloud provider’s premises.
 Community.
 A cloud infrastructure that is used exclusively by a specific group of organizations.
 Private.
 A cloud infrastructure that is used exclusively by a single organization. It may be owned, managed, and operated
by the organization or a third party (or a combination of both), and it may exist on premises or off premises.
 Hybrid.
 A cloud infrastructure that comprises two or more of the aforementioned deployment models, bound by
standardized or proprietary technology that enables data and application portability (for example, fail over to a
secondary data center for disaster recovery or content delivery networks across multiple clouds).

By :Mohamed Abo Sehly 27


THANK YOU

BY :MOHAMED ABO SEHLY 28

You might also like