Professional Documents
Culture Documents
SEMINAR REPORT ON
SUBMITTED TO:
Dept. of INEORMATION TECHNOLOGY
Sankalchand Patel College Of Engineering.
Visnagar-384315.
[1 ]
Wireless Fidelity
Name Roll No
CHIRAG.H.PATEL 21
[2 ]
Wireless Fidelity
ACKNOWLEDGEMENTS
[3 ]
Wireless Fidelity
ABSTRACT
WiFi (short for "wireless fidelity") is a term for certain types of wireless
local area network (WLAN) that use specifications in the 802.11 family.
The term Wi-Fi was created by an organization called the Wi-Fi
Alliance, which oversees tests that certify product interoperability. A
product that passes the alliance tests is given the label "Wi-Fi certified"
(a registered trademark).
[4 ]
Wireless Fidelity
INDEX
INTRODUCTION
PROPRIETARY ENHANCEMENTS
SECURITY ENHANCEMENTS
ADVANTAGES OF Wi-Fi
DISADVANTAGES OF Wi-Fi
CONCLUSION
[5 ]
Wireless Fidelity
INTRODUCTION
While the focus of this paper is designed around the more casual or
non-technical computer or network user, many of the terms contained
within can still provide a degree of technical confusion. A glossary of
the terms as well as recommended reading list has been provided at
the end of the document to assist the reader in deciphering the more
cryptic acronyms and terminology contained within this text.
[6 ]
Wireless Fidelity
technology, as well as its current implementations and potential in
both the public and private markets.
It wasn’t until around the early nineteen eighties that the IEEE made
its first true foray into networking in general with its
information of an official 802 “working group” for general
networking. A working group is a collection of researchers,
academics, and industry professionals who work towards
development of an industry and its subsequent approval by the
IEEE members. After almost ten years of refinement the IEEE
finally approved its 802 network standard protocol and set the
stage for the latter development of wireless networking.
[8 ]
Wireless Fidelity
features, but check your requirements carefully. Figure 2: Hardware
Access Point.
Wireless connected computers using a Hardware Access Point.
[9 ]
Wireless Fidelity
[10 ]
Wireless Fidelity
If any one technical organization stands tall above the rest, it is the
IEEE. It is this body of academics and technology professionals who
help to carve the path through the often precarious and cumbersome
world of emerging high technology. The men and women of the IEEE
have been instrumental in helping to adopt and refine protocol and
operational standards for the countless forms of the computer and
communication technology. Typically they achieve such a great results
by forming working groups, whose sole mission is to resolve a
particular standard issue. Culminating almost ten years of discussion
and deliberation the IEEE finally adopted the 802 standards as their
official ground level networking standard in1990. From there on 802
continued to grow and develop into various standard specifications
such as the 802.3 for Ethernet networking in 1997.
After its initial validation by the IEEE, the 802.11 wireless networking
standards quietly exploded onto the market in many different
capacities, catching many IT departments by surprise. Over the last
couple years,802.11 standard itself has begun to see various
[11 ]
Wireless Fidelity
incremental enhancements and adaptations to the protocol as it grows
to meet the industry’s needs. Subgroups have begun to spring up,
each trying to cope with a different facet or improvement to the
original standard. Such revisions include 802.11a, 802.11b and
802.11g to name just few of the major enhancements and revisions.
Each of these 802.11 refinements will be discussed in further technical
detail regarding protocol transmission elements and functionality.
[12 ]
Wireless Fidelity
Layer 1. Physical This is the initial layer of the OSI model. It works
at a bit stream or binary level. Its focus is the electrical impulses and
radio signals which pass through and within the actual physical
network structure it self at the electrical and mechanical layer. It
specifically deals with hardware issues regarding the transmission and
reception of the data on a carrier. Components involved with this layer
include cables, network cards, and all other physical aspects of the
network at hand.
Layer 2. Data Link The data link layer is responsible for the packet
handling specifically regarding bit level packet encoding and decoding.
Layer 2 also deals with transmission protocol knowledge and aspects
of error checking regarding the physical layer. Additionally the data
link layer is divided into sub layers, the Media Access Layer (MAC)
layer which controls access and permission restriction to the date
traveling on the layer and the Logical Link Control layer which is
responsible for the frame synchronization, flow control and error
checking.
[13 ]
Wireless Fidelity
Essentially the presentation layer works to maintain effective
compatibility and syntax between the network and the applications
with which it interacts.
802.11 BASICS
Operating Frequency:
[14 ]
Wireless Fidelity
and 2 Mbps. While enthusiasm ran high about the prospects of wireless
networking, people were needless to say less than thrilled with the
relatively dismal transfer rates. This was particularly apparent when
faced with traditional 802.3-wired Ethernet networks supporting two
fast wired networks protocols of 10-Base-T (10Mbps) and 100-Base-T
(100Mbps) at considerably lower implementation costs.
802.11 Also employed two very distinct variations on the physical layer
regarding the mechanism of radio transmission; Direct Sequence
Spectrum (DSSS) and Frequency hopped Spread Spectrum (FHSS)
regulations (FCC 15.247) for operation on the 2.4Ghz ISM band. While
each mechanism allows for 1-2Mbps of data transmission, FCC
regulations stipulate FHSS be limited to speeds no greater than 2Mbps.
As a result standards such as 802.11b and other high-speed variations
by default may not use FHSS. Needless to say FHSS radio transmission
experienced a relatively short life span in the world or WiFi.
[15 ]
Wireless Fidelity
Overview: The first major revision of the basic 802.11 standards to
be approved and ratified by the IEEE in 1999. Heralded as a major
leap forward in WiFi technology both in regards to ease of use,
implementation flexibility and relative cost.
Cost Benefit Analysis: While the benefits of 11b are in its cost and
range, it does struggle with some rather serious limitations. One
[16 ]
Wireless Fidelity
glaring problem with 11b is its operation on 2.4GHz spectrum. Due to
its lack of FCC licensing restrictions, the 2.4GHz band has become
overcrowded. Wireless data transmissions utilizing 11b can suffer
severe signal impairment from devices such as microwave ovens,
cordless telephones and Bluetooth devices, which also make use of the
2.4GHz band.
While 802.11b still has much of its in the original 802.11 standard by
the IEEE, 11a represents a rather dramatic technological shift into new
[17 ]
Wireless Fidelity
territory. Not only is 11a fundamentally different regarding its use of
the physical layer, but also in its use of
Orthogonal Frequency Division Multiplexing (OFDM) as a transfer
mechanism. The greatest advancement regarding 11a is its incredibly
fast data transfer rate. While its theoretical maximum transfer is
54Mbps, user can only expect to achieve higher speed if their client is
within 60 feet of the access point with a relatively unobstructed path.
Typical users can expect an effective transfer range of 20 – 36Mbps in
a traditional office setting with proper access point placement. Due to
its utilization of the 5Ghz frequency range regarding its physical layer,
the issue of interface from other devices is virtually non-existent at
this time. This is a major advantage gained by 11a when compared to
11b, which is incredibly susceptible to all sorts of interface.
[18 ]
Wireless Fidelity
Operating Frequency: 2.4GHz
Transfer Rate (theoretical): 5.4Mbps
Transfer Rate (throughput): 20-30(average)
Mechanism: Complementary Code Keying (CCK), OFDM
Channels Available: 3(1,6,11)
Maximum Range: 175ft(average)
Despite its potential problems regarding interface 11g does provide for
some very enticing benefits to a wide variety of potential customers
and users. One of 11g’s biggest assets lays within its backward
compatibility with existing 11b WiFi networks. This is an obvious plus
as it allows for preexisting systems to be easily integrated and updated
with the faster 11g without having a scrap expensive and useful 11b
access points and wireless NIC’s. In addition to a high degree of
intersystem compatibility 11g is also a relatively cheap alternative to
the currently more expensive 11a. At the time of this publication the
average user can find 11g access points and wireless NIC’s for only
$10 or $15 dollars above that of 11b equipment. As a result 11g find
itself as a very cost effective high-speed alternative to 11a.
[19 ]
Wireless Fidelity
While the positive aspects of the 11g standard are quiet obvious, one
additional problem is that the IEEE has not formally ratified it as an
official standard. While such accreditation is unquestionably coming
soon, companies and individual users alike still risk the potential of
owing current 11g wireless equipment, which has the distinct
possibility of incompatibility with an impending standard. While the
802.11g WiFi network protocol will unquestionably find a very healthy
niche in the wireless market
Its yet uncertain future may discourage large installations. For the
small home or office looking for a cost effective high-speed wireless
alternative, 11g may be the perfect answer.
PROPRIETARY ENHANCEMENTS
SECURITY ENHANCEMENTS
[20 ]
Wireless Fidelity
The 802.11 standard provides various mechanisms such as service set
identification (SSID) and wired Equivalent Privacy (WEP) encryption to
enhance security, the level of protection currently provided by wireless
802.11 networks leaves much to be desired, particularly when
transmitting any type of financial data or sensitive information across
the airways. The IEEE in conjunction with various technical groups and
academic institution in hard work reviving and creating newer and
more effective security measures. Companies such as Cisco have
taken initiative and already introduced proprietary protocols of their
own in an attempt to add security within there Networking
components. One such example is Cisco’s recent introduction of their
Light Extensible Authentication Protocol (LEAP) security protection.
LEAP is essentially a port based access control protocol where security
keys change dramatically with every wireless communication session.
LEAP represents a dramatically enhanced security protocol when
compared to well document security shortcomings of the original WEP
encryption, which has shown to be easily compromised by determined
individuals.
I. Introduction
II Design Objectives
[21 ]
Wireless Fidelity
accountable for damages, a method of user authentication is needed
to ensure that the user takes responsibility for their actions and can be
tracked for security concerns. A trusted user can then gain access to
services and the commodity Internet from which unauthenticated
users are blocked.
Users of the wireless network are only required to have a web browser
if they wish to authenticate and dynamic host configuration (DHCP)
software, which comes standard on most operating systems. Minimal
configuration is required by the user, allowing support for a variety of
computer platforms with no additional software. The idea is to keep
the wireless network as user-friendly as possible while maintaining
security for everyone.
III Internals
[22 ]
Wireless Fidelity
The DHCP server is configured to only listen on the subnet interface of
the wireless network. This prevents anyone from the wired network to
obtain a wireless IP address from this server. As an added security
measure, packet filters prevent any DHCP requests coming in on any
other interfaces.
IP Filtering
The same script that authenticates a user over the web also enables
their access to the unrestricted environment. When a user connects to
the web server, their IP address is recorded and upon successful login,
gets pushed to the top of the firewall filter list, permitting all TCP and
UDP connections out of the wireless network for that IP address.
Web Authentication
[23 ]
Wireless Fidelity
sent in clear text. To further increase security, the SSL certificate is
signed by Verisign, a trusted Certificate Authority (CA), which assures
that an attacker is not imitating the web server to retrieve a user's
password information.
Security
Logs are kept for all systems, which gain access to both the restricted
and authorized network. The DHCP server keeps a record of what MAC
address (NIC address) requests an IP address and when it is released,
then passes that information to syslog. Syslog then identifies all
logging information from DHCP and writes it to /var/log/dhcpd.
Additionally, any user who attempts to authenticate via the web
[24 ]
Wireless Fidelity
interface has their typed username and source IP address logged with
the current time along with whether or not they were successful. When
a lease on an IP address expires and is removed from the firewall
filters, it is noted with the authentication information in
/var/log/wireless. These logs are maintained by the website script and
DHCP server software, not syslog. Combined, it is possible to identify
who is on the network at a given time - either by their userid, or by
their burned-in physical address, for auditing purposes.
With the DHCP server managing the firewall filters, it is possible for a
user to manually enter a static IP address and authenticate, with the
permit rule never being removed. To prevent this, the CGI script reads
in the dhcpd.leases file and determines if the source IP address,
obtained through the environment variable $ENV{'REMOTE_ADDR'},
has an active lease. If no lease is found, or if the lease is expired or
abandoned, authentication is denied.
[25 ]
Wireless Fidelity
network components. Proprietary enhancements such as these provide
users with enhanced functionality, minimal cost without any significant
deviation or risk taking regarding un-standardized IEEE or industry
protocols.
[26 ]
Wireless Fidelity
installations will be able to more effectively manage their personnel
and security communications. Corporations are rapidly switching to
WiFi networks as it not only reduces their intradepartmental
paperwork and workload, but also allows them to serve their
customers and employees in “real-time,” a talent which is virtually
beyond financial compensation. The possibilities with wireless
technologies are limitless and beyond the scope of our current
technological conventions. With only a few years of active utilization
wireless networking has already begun to spread and will most likely
continue to do so with incredible speed.
[27 ]
Wireless Fidelity
ADDITIONAL STANDARDS
While the major players in the world or wireless networking are the
IEEE standards 802.11a, 802.11b, and currently 802.11g, there are
various other standard task and working groups involved with
numerous components or wireless networking. Such standard
developments help to improve the transmission of its data and
promote the effective communication between its systems. The
following are current standards and task groups, which work to
continually enhance and expand the functionality of the overall 802.11
protocol.
[28 ]
Wireless Fidelity
802.11i: Security
After WEP encryption was effectively surpassed in August 2001, the
802.11i work group began to receive more attention, specifically since
its main focus is enhanced wireless security. 802.11i is a two layer
standard group which focuses both on issues concerning 802.1X (not a
part of the 802.11 standard) and network security, as well as a deeper
look into a specific WEP security fix called Temporal Key Integrity
(TKI).
[29 ]
Wireless Fidelity
ADVANTAGES OF Wi-Fi
Disadvantages of Wi-Fi
The 802.11b and 802.11g flavors of Wi-Fi use the 2.4 Ghz
spectrum, which is crowded with other devices such as
Bluetooth, microwave ovens, cordless phones, or video sender
devices, among many others. This may cause degradation in
performance. Other devices which use microwave frequencies
such as certain types of cell phones can also cause degradation
in performance.
[31 ]
Wireless Fidelity
CONCLUSION
The emerging world of wireless technology is still very much in its
infancy. Innovations occur on a daily basis as researchers and
engineers continue to develop faster, safer and cheaper methods of
wireless communication. From the smallest of home networks, to
largest enterprise installations, WiFi technology offers with it the
promise of a world free of cables and cords. It offers the ability to
move without constriction, to communicate efficiently, to learn faster
and easier. New standards will be created, old standards will die off;
confusion will unquestionably find itself a place in the wireless
marketplace. Fortunately confusion is a byproduct of choice; choice is
a luxury that novices and professionals alike will most certainly have in
the future world of wireless technology. it is the choices of today which
will inevitably help to shape the emerging world of wireless tomorrow.
[32 ]
Wireless Fidelity
BIBLIOGRAPHY
WEBSITE:
www.weca.net
www.nlectc.com
www.Wi-Fi.com
[33 ]