Professional Documents
Culture Documents
PROJECT
(WLAN WIFI)
PRESENTED BY:
1. M.USMAN BSIT51F21S076
2. MANAHIL FATIMA BSIT51F21R040
3. SUNBAL NAWAZ BSIT51F21R007
4. ARSLAN ALI BSIT51F21S092
5. SHUJA HAIDER BSIT51F21S080
PRESENTED TO:
UNIVERSITOF SARGHODHA
WLAN WIFI
WLAN-Wi-Fi
INTRODUCTION: -
WLAN stands for Wireless Local Area Network, and Wi-Fi, which stands for Wireless
Fidelity, is a common technology used to create WLANs. A WLAN is a type of network that
allows devices to communicate wirelessly within a limited area, typically within a home, office,
or public hotspot. Wi-Fi utilizes radio waves to transmit data between devices, such as
computers, smartphones, tablets, and other network-enabled devices.
Key components of a WLAN/WIFI setup include:-
Ubiquity Of Wi-Fi:-
Wi-Fi ubiquity spans homes, businesses, and public spaces, enabling seamless
connectivity worldwide. It powers our digital lifestyles, facilitating communication,
entertainment, and productivity. From streaming movies to conducting business meetings, Wi-Fi
has become indispensable. Its widespread availability revolutionizes how we live, work, and
interact in the modern age.
Essential Connectivity:-
Essential connectivity bridges distances, enabling instant communication and
information access globally. It empowers individuals, businesses, and communities, fostering
collaboration and innovation. From remote work to medicine, essential connectivity ensures
continuity and efficiency in various domains. As a fundamental component of modern life, it
underpins progress, resilience, and disconnectedness. Rich History:-
Wi-Fi rich history traces back to the 1990s when it emerged as a solution for wireless
networking. Its roots lie in research conducted by IEEE, leading to the development of the
802.11 standard. Over the years, Wi-Fi evolved from providing limited connectivity to becoming
a ubiquitous technology powering the digital age. Its journey reflects continuous innovation,
standards advancement, and widespread adoption, shaping the modern world's connectivity
landscape.
WLAN WIFI
Flexibility and Mobility: Ad hoc networks are highly flexible and adaptable to changing
conditions. Devices can join or leave the network at any time, and the network topology
adjusts dynamically to accommodate changes in device availability or connectivity. This
makes ad hoc networks particularly suitable for mobile or temporary deployments
where fixed infrastructure is impractical or unavailable.
Self-Configuration: Ad hoc networks typically employ distributed algorithms and
protocols to enable self-configuration and self-organization among network devices.
Devices cooperate to discover and establish connections, route data packets, and
maintain network stability without centralized control.
Applications: Wireless ad hoc mode finds applications in various scenarios, including
military communications, emergency response situations, collaborative environments,
WLAN WIFI
sensor networks, and Internet of Things (IoT) deployments. Ad hoc networks enable
communication and collaboration among devices in situations where traditional
infrastructure-based networks are unavailable or unreliable.
Challenges: Despite their advantages, ad hoc networks face challenges such as limited
scalability, network security concerns, susceptibility to interference and signal
degradation, and the need for efficient routing algorithms to ensure reliable
communication in dynamic and often resource-constrained environments.
Standards and Protocols: Several wireless networking standards, such as IEEE 802.11
(Wi-Fi) and IEEE 802.15 (Bluetooth), support ad hoc mode operation. Additionally, ad
hoc networking protocols such as Ad hoc On-Demand Distance Vector (AODV) and
Dynamic Source Routing (DSR) are commonly used to enable routing and
communication in ad hoc networks.
Wireless Local Area Network (WLAN) Wi-Fi ad hoc mode, also known as Independent Basic
Service Set (IBSS) mode, possesses several key characteristics that distinguish it from traditional
infrastructure-based WLANs. Here are the primary characteristics of WLAN Wi-Fi ad hoc mode:
Scalability Challenges: Ad hoc networks may face scalability challenges as the number of
devices increases. Routing and communication overheads can increase with network
size, potentially impacting performance and efficiency.
Security Considerations: Ad hoc networks are susceptible to security vulnerabilities such
as eavesdropping, spoofing, and unauthorized access due to the lack of a central
authority for authentication and encryption. Implementing robust security measures
such as encryption protocols (e.g., WPA2-PSK) and authentication mechanisms (e.g.,
pre-shared keys) is essential to mitigate security risks.
Resource Sharing: Ad hoc networks facilitate resource sharing among devices within the
network. Devices can share files, printers, internet access, and other resources without
the need for a centralized server or infrastructure.
Dynamic Routing: Ad hoc networks employ dynamic routing protocols such as Ad hoc
On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) to establish and
maintain communication paths between devices. These protocols adapt to changing
network conditions and route data packets efficiently.
Temporal Dynamics: Movement patterns may vary over time, reflecting changes
in user behavior, crowd dynamics, or environmental conditions within the indoor
space.
Applications:
Modes of Wi-Fi
The 802.11 standard defines two operating modes:
1. Infrastructure mode, in which wireless clients are connected to an access point. This
is generally the default mode for 802.11b cards.
2. Ad hoc mode, in which clients are connected to one another without any access
point.
Introduction
Infrastructure mode is one of the primary operational modes in wireless local area
networks (WLANs), such as Wi-Fi networks. In infrastructure mode, wireless
communication is facilitated through central devices called Access Points (APs). These
APs act as bridges between wireless client devices and the wired network infrastructure,
enabling seamless connectivity and communication between wireless devices and
resources on the wired network.
Basic Components
Access Points (APs) are central devices in infrastructure mode WLANs that
facilitate wireless communication between client devices and the wired network.
APs are typically connected to the wired network infrastructure via Ethernet
cables. They broadcast wireless signals, known as beacons, to announce the
presence of the WLAN and provide a means for client devices to connect. APs
manage the communication between client devices and the wired network,
including routing data packets to and from client devices and performing
authentication and encryption functions.
Clients refer to wireless devices that connect to the WLAN through Access
Points. Common client devices include laptops, smartphones, tablets, IOT
devices, and other Wi-Fi-enabled devices. Clients communicate with APs using
Wi-Fi radio signals, adhering to IEEE 802.11 standards. They send data packets to
APs for transmission over the wireless network and receive data packets from
APs destined for them. Clients may roam between different APs within the
WLAN WIFI
Roaming
When a roaming user goes from one BSS to another while moving within the ESS,
his or her machine's wireless network adapter is able to switch access points
depending on the quality of the signal it receives from different access points.
Access points communicate with one another using a distribution system in
order to trade information about the stations and, if necessary, to transmit data
from mobile stations. This feature which lets stations move "transparently" from
one access point to another is called roaming.
WLAN WIFI
Working of Wi-Fi
Association:
When a client device wants to join a WLAN in infrastructure mode, it performs a
process called association. During association, the client device scans for
available APs broadcasting the network's Service Set Identifier (SSID) and selects
an appropriate AP to connect to based on signal strength, security settings, and
other criteria. The client device then sends an association request to the selected
AP, requesting permission to join the WLAN.
Data Transmission:
After successful association and authentication, the client device can
communicate with other devices on the WLAN and access network resources.
Data transmitted by the client device is sent to the AP, which forwards it to the
appropriate destination on the wired network. Similarly, data from the wired
network destined for the client device is sent to the AP, which then forwards it
wirelessly to the client device.
Advantages
Scalability:
Infrastructure mode WLANs are highly scalable, allowing organizations to expand
their wireless network coverage by deploying additional Access Points (APs) as
needed. As the number of wireless devices and users grows, more APs can be
added to accommodate the increased demand for connectivity.
Scalability enables organizations to adapt their WLAN infrastructure to changing
requirements and ensure consistent coverage across larger areas without
sacrificing performance or reliability.
Centralized Management:
Infrastructure mode facilitates centralized management of WLAN infrastructure
through network management software or controllers.
Centralized management provides administrators with a unified interface to
configure, monitor, and troubleshoot all APs within the WLAN. Administrators
WLAN WIFI
can centrally manage AP settings, update firmware, enforce security policies, and
monitor network performance from a single dashboard, streamlining
administrative tasks and reducing management overhead.
Enhanced Security:
Infrastructure mode WLANs offer enhanced security features compared to ad-
hoc or peer-to-peer wireless networks. APs in infrastructure mode support
advanced security mechanisms such as Wi-Fi Protected Access (WPA/WPA2)
encryption, 802.1X/EAP authentication, and guest access controls.
Centralized authentication and encryption ensure that only authorized users and
devices can access the network, protecting against unauthorized access, data
interception, and other security threats.
Improved Performance:
Infrastructure mode WLANs typically deliver better performance compared to
ad-hoc networks due to centralized management and optimized network
configurations. APs in infrastructure mode coordinate channel assignments,
manage interference, and optimize data transmission to maximize throughput
and minimize latency.
Centralized management enables administrators to monitor network
performance metrics, identify performance bottlenecks, and implement
optimizations to improve overall WLAN performance and user experience.
Limitations
Limited Mobility:
In infrastructure mode WLANs, client devices are typically associated with a
specific AP within the network coverage area. While clients can roam between
WLAN WIFI
different APs within the coverage area, their mobility is limited to the range of
the APs.
Client devices may experience connectivity issues or signal degradation when
moving between coverage areas of different APs, especially in areas with
overlapping coverage or areas with physical obstacles.
Cost Considerations:
Deploying and maintaining infrastructure mode WLANs can incur significant
costs, including the purchase of APs, network switches, cabling infrastructure,
and network management software or controllers. Additional costs may be
incurred for site surveys, installation, configuration, and ongoing maintenance of
WLAN infrastructure.
The total cost of ownership (TCO) for infrastructure mode WLANs may be higher
compared to alternative wireless networking solutions, such as ad-hoc networks
or mesh networks, especially for large-scale deployments or organizations with
budget constraints.
Infrastructure mode
It is possible to link several access points together (or more precisely several
BSS's) using a connection called a distribution system (DS for short) in order to
form an extended service set or ESS. The distribution system can also be a wired
network, a cable between two access points or even a wireless network.
An ESS is identified with an ESSID (Extended Service Set Identifier), a 32-
character identifier (in ASCII format) which acts as its name on the network. The
ESSID, often shortened to SSID, shows the network's name, and in a way acts a
first-level security measure, since it is necessary for a station to know the SSID in
order to connect to the extended network.
When a station joins a cell, the cell sends a probe request on each channel. This
request contains the ESSID that the cell is configured to use, as well as the traffic
volume that its wireless adapter can support.
If no ESSID is set, the station listens to the network for an SSID.
WLAN WIFI
Each access point broadcasts at regular intervals (about ten times a second) a
signal called a beacon, which gives information on its BSSID, its characteristics,
and, if applicable, its ESSID.
The ESSID is automatically broadcast by default, but it is possible (and
recommended) to disable this option. Whenever a probe request is received, the
access point checks the ESSID and the traffic volume request found in the beacon.
If the given ESSID matches that of the access point, the acces point sends a
response containing synchronization data and information on its traffic load.
This way, the station that receives the response can check the quality of the
signal being sent by the access point in order to determine how far away it is.
Generally speaking, the closer an access point is, the higher its data transfer
capacity is.
So, a station within range of multiple access points (which have the same SSID)
may choose the access point offering the best balance of capacity and current
traffic load.
Examples:
Home Networks
Business and Office Environments
Public Wi-Fi Hotspots
Educational Institutions
Enterprise Networks
Authentication:
Authentication is the process of verifying the identity of devices attempting to
connect to a Wi-Fi network. In infrastructure mode, various authentication
methods are employed to ensure that only authorized users and devices gain
access to the network.
Ways of Authentication
Wi-Fi Protected Access (WPA/WPA2): WPA and WPA2 are Wi-Fi security
protocols that use stronger encryption and authentication mechanisms
compared to shared key authentication. They support various authentication
methods, including Pre-Shared Key (PSK) and 802.1X/EAP-based authentication.
WLAN WIFI
WPA2 is currently the most widely used Wi-Fi security protocol and provides
robust protection against unauthorized access and data interception.
enterprise environm
Security
potential attacks by isolating sensitive data and devices from the rest of the
network.
Regular Security Audits and Updates: Regular security audits and firmware
updates are essential to identify and patch vulnerabilities in network
infrastructure, ensuring that security measures remain effective against evolving
threats.
Wi-Fi 6 (802.11ax):
Wi-Fi 6, also known as 802.11ax, is the latest generation of Wi-Fi technology
designed to deliver higher data rates, improved performance, and better
efficiency compared to previous standards.
It introduces features such as orthogonal frequency-division multiple access
(OFDMA), multi-user multiple input, multiple output (MU-MIMO), and target
wake time (TWT) to enhance spectrum utilization and support more concurrent
users with higher throughput.
Wi-Fi 6 is particularly beneficial in dense environments like stadiums, airports,
and urban areas where multiple devices are competing for network access.
Mesh Networking
Mesh networking technology enables the creation of robust, self-healing
wireless networks by allowing APs to communicate with each other directly,
forming a mesh topology.
Mesh networks improve coverage and reliability by extending the wireless
network's reach and providing redundancy, making them suitable for large-scale
deployments and environments with challenging coverage requirements.
WLAN WIFI
IOT Integration
The proliferation of Internet of Things (IoT) devices is driving the integration of
Wi-Fi infrastructure with IoT ecosystems.
Wi-Fi networks are evolving to support the diverse connectivity needs of IoT
devices, including low-power devices, real-time communication, and secure data
transmission.
Advanced authentication mechanisms and network segmentation techniques are
being implemented to accommodate the security and scalability requirements of
IoT deployments.
Security Enhancements
WLAN WIFI
With the increasing prevalence of cyber threats and security breaches, there is a
growing emphasis on enhancing the security of Wi-Fi networks.
Future developments in Wi-Fi security include the adoption of stronger
encryption algorithms, improved authentication methods, and enhanced
intrusion detection and prevention mechanisms.
Technologies such as Wi-Fi Protected Access 3 (WPA3), certificate-based
authentication, and secure boot mechanisms are being introduced to address
emerging security challenges and protect sensitive data transmitted over Wi-Fi
networks.
Wi-Fi 1
Parameter (802.11b) Wi-Fi 2 (802.11a) Wi-Fi 3 (802.11g) Wi-Fi 4 (802.11n)
Compatibility 802.11b 802.11b/g
OFDM OFDM
DSSS (Direct (Orthogonal OFDM (Orthogonal (Orthogonal
Modulation Sequence Spread Frequency Division Frequency Division Frequency Division
Technique Spectrum) Multiplexing) Multiplexing) Multiplexing)
MU-MIMO Not supported Not supported Not supported Not supported
MIMO Not applicable Not applicable Not applicable Up to 4x4
802.11
Standards IEEE 802.11b IEEE 802.11a IEEE 802.11g IEEE 802.11n
QoS (Quality Standard QoS
of Service) Not standardized Not standardized Basic QoS support support
WEP (Wired
WEP (Wired Equivalent Privacy),
Equivalent WEP (Wired WPA2/WPA3 in
Security Privacy) Equivalent Privacy) some cases WPA2/WPA3
Widely supported Limited support,
in devices mainly in Widely supported in Widely supported
Device released after enterprise-grade devices released in devices released
Support 1999 devices after 2003 after 2009
WIFI-5 to Onward:
Parameter Wi-Fi 5 (802.11ac) Wi-Fi 6 (802.11ax) Wi-Fi 6E (802.11ax)
Maximum Up to 3.5 Gbps (with Up to 9.6 Gbps (with Up to 9.6 Gbps (with
Speed Wave 2) AX600) AX600)
Frequency 6 GHz (in addition to 2.4
Bands 5 GHz 2.4 GHz, 5 GHz GHz, 5 GHz)
Channel
Bandwidth Up to 160 MHz Up to 160 MHz Up to 160 MHz
Backward Compatible with Compatible with Compatible with
Compatibility 802.11a/n 802.11a/b/g/n 802.11a/b/g/n/ac
OFDM (Orthogonal OFDMA (Orthogonal OFDMA (Orthogonal
Modulation Frequency Division Frequency Division Frequency Division Multiple
Technique Multiplexing) Multiple Access) Access)
MU-MIMO Supported Supported Supported
MIMO Up to 8x8 Up to 8x8 Up to 8x8
WLAN WIFI
Important Defines:
Modulation Techniques:
1. Direct Sequence Spread Spectrum (DSSS):
- DSSS spreads the signal across a wider bandwidth using a spreading code.
- Purpose: It enhances the reliability of the communication by adding redundancy to
the transmitted signal, making it more resistant to interference and noise.
Security Standards
3. WPA3:
- WPA3 is the latest security protocol for Wi-Fi networks, offering improved security
features over WPA2.
- Definition: WPA3 introduces stronger encryption algorithms, enhanced protection
against brute-force attacks, and better security for open networks. It provides
individualized encryption for each device connected to the network, enhancing overall
security.
4. WPA3 Enterprise:
- WPA3 Enterprise is designed for use in corporate and enterprise environments.
- Definition: It provides additional security features such as mutual authentication,
which ensures that both the client device and the access point authenticate each other
before establishing a connection. WPA3 Enterprise also supports stronger encryption
protocols for enterprise-grade security.
WLAN WIFI
These modulation techniques and security standards play crucial roles in ensuring the
reliability, efficiency, and security of Wi-Fi networks, thereby enabling seamless wireless
communication.
Parameters
1. Maximum Speed:
- This refers to the theoretical maximum data transfer rate that the Wi-Fi standard can
support under ideal conditions.
- It indicates the peak speed at which data can be transmitted over the wireless
network.
2. Frequency Bands:
- Wi-Fi operates in two main frequency bands: 2.4 GHz and 5 GHz.
- The 2.4 GHz band offers better range and penetration through obstacles but may
suffer from more interference due to its widespread use by other devices like Bluetooth
devices, microwaves, and cordless phones.
- The 5 GHz band typically provides higher data rates and is less congested but has a
shorter range and may experience more attenuation through walls and other
obstructions.
3. Channel Bandwidth:
- Channel bandwidth refers to the width of the frequency range allocated to transmit
data.
- It determines how much data can be transmitted at once.
- Wider channel bandwidth allows for higher data rates but may suffer from more
interference.
4. Backward Compatibility:
- Backward compatibility indicates whether a newer Wi-Fi standard can communicate
with devices using older Wi-Fi standards.
- It ensures that newer devices can still connect and communicate with older devices
on the network.
WLAN WIFI
5. Modulation Technique:
- Modulation techniques define how data is encoded and transmitted over the
wireless channel.
- Different modulation techniques are used in different Wi-Fi standards to improve
data transmission efficiency and reliability.
8. 802.11 Standards:
- The IEEE 802.11 standards define the specifications for wireless LANs, including Wi-Fi.
- Each Wi-Fi standard is identified by a letter and number combination (e.g., 802.11n,
802.11ac) and specifies various aspects such as frequency bands, data rates, and
modulation techniques.
10. Security:
- Security mechanisms such as WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected
Access), and WPA3 are used to protect Wi-Fi networks from unauthorized access and
data interception.
- Each Wi-Fi standard may introduce improvements in security features to address
vulnerabilities discovered in previous standards.