JARINGAN KOMPUTER 2 WIRELESS LAN

Post on 11-Jan-2017

228 Views

Category:

Documents

4 Downloads

Preview:

Click to see full reader

Transcript

JARINGAN KOMPUTER 2JARINGAN KOMPUTER 2

WIRELESS LANWIRELESS LAN

Muhammad Zen S. Hadi, ST. MSc.

1

Course OutlineCourse Outline• Introduction of Wireless Network• IEEE 802.11 Architecture• IEEE 802.11 Physical Layer• Data Encryption Wireless• Site Survey

2

Wireless?Wireless?• A wireless LAN or WLAN is a wireless local area

t k th t di it inetwork that uses radio waves as its carrier.• The last link with the users is wireless, to give a

net o k onne tion to ll e in b ilding onetwork connection to all users in a building or campus.

• The backbone network usually uses cables• The backbone network usually uses cables

3

How do wireless LANs work?How do wireless LANs work?Wireless LANs operate in almost the same way aswired LANs, using the same networking protocolsand supporting the most of the sameapplications.

4

How are WLANs Different?How are WLANs Different?• They use specialized physical and data link

protocolsprotocols• They integrate into existing networks through

access points which provide a bridging f n tionfunction

• They let you stay connected as you roam from one coverage area to anotherg

• They have unique security considerations • They have specific interoperability

i trequirements • They require different hardware• They offer performance that differs from wired• They offer performance that differs from wired

LANs. 5

Physical and Data Link LayersPhysical and Data Link LayersPhysical Layer:

Th i l NIC t k f f d t f• The wireless NIC takes frames of data from the link layer, scrambles the data in a predetermined way, then uses the modified datapredetermined way, then uses the modified data stream to modulate a radio carrier signal.

Data Link Layer:• Uses Carriers-Sense-Multiple-Access with

Collision Avoidance (CSMA/CA).

6

Integration With Existing NetworksNetworks• Wireless Access Points (APs) - a small device

th t b id i l t ffi t t kthat bridges wireless traffic to your network. • Most access points bridge wireless LANs into

Ethe net net o kEthernet networks.

7

Integration With Existing NetworksNetworks

8

IEEE 802.11 Network ArchitectureWireless network architecture :1. Basic Service Set (BSS)( )2. Extended Service Set (ESS)

9

Ad Hoc NetworkingAd Hoc Networking• Peer-to-peer network• Set up temporarily to meet some immediate

need• E.g. group of employees, each with laptop or

palmtop, in business or classroom meetingN t k f d ti f ti• Network for duration of meeting

10

Add Hoc LANAdd Hoc LAN

• A group of stations using the same radio frequency –Basic Service Set

11

Infrastructure Wireless LANInfrastructure Wireless LAN

12

Multi-Cell Wireless LAN Configuration (Infrastructure Network)(Infrastructure Network)

13

Access Point in “Root Mode”Access Point in Root Mode

14

Access Point in “Repeater Mode”Mode

15

IEEE 802.11 Protocol ArchitectureArchitecture

16

17

18

19

802 11 Physical Layer802.11 Physical Layer• Issued in four stages• First part in 1997• First part in 1997

— IEEE 802.11 — Includes MAC layer and three physical layer specifications

T i 2 4 GH b d d i f d— Two in 2.4-GHz band and one infrared— All operating at 1 and 2 Mbps

• Two additional parts in 1999— IEEE 802.11a

• 5-GHz band up to 54 Mbps— IEEE 802.11b

• 2.4-GHz band at 5.5 and 11 Mbps

• Most recent in 2002— IEEE 802.g extends IEEE 802.11b to higher data ratesg g

20

802.11 Physical Layer80 ys ca aye

21

Spread SpectrumSpread Spectrum

22

Frequency Hopping Spread Spectrum

23

Direct Sequencing Spread Spectrum

24

Graphical representation of Wi-Fi channels in 2 4 GHz bandFi channels in 2.4 GHz band

25

Channel ReuseChannel Reuse

26

Current Standards a b gCurrent Standards – a, b, g860 Kbps 1 and 2 Mbps

Proprietary

1 and 2 Mbps 11 Mbps 54 Mbps

Standards-basedNetwork

Speed

900 MHz 2.4 GHz802.11 Ratified

802.11a,b Ratified

2.4 GHz 5 GHzRadio

IEEE 802.11Begins Drafting

802.11g Ratified

• 802.11a— Up to 54 Mbps

1986 1988 1990 1992 1994 1996 1998 2000 2003g

Up to 54 Mbps— 5 GHz— Not compatible with either 802.11b or 802.11g

• 802 11b• 802.11b— Up to 11 Mbps— 2.4 GHz

• 802 11g

802.11g is backwards compatible with 802.11b, but with a drawback (later)• 802.11g

— Up to 54 Mbps— 2.4 GHz

(later)

27

802.11 PHY (Physical Layer) TechnologiesTechnologies

860 Kbps 1 and 2 Mbps

Proprietary

1 and 2 Mbps 11 Mbps 54 Mbps

Standards-basedNetwork

Speed

900 MHz 2.4 GHz802.11 Ratified

802.11a,b Ratified

802.11g Ratified

2.4 GHz 5 GHzRadio

IEEE 802.11Begins Drafting

• Three types of radio transmission within the unlicensed 2.4-GHz frequency bands:

1986 1988 1990 1992 1994 1996 1998 2000 2003g

frequency bands: — Frequency hopping spread spectrum (FHSS) 802.11b (not used)— Direct sequence spread spectrum (DSSS) 802.11b

O th l f di i i lti l i (OFDM) 802 11— Orthogonal frequency-division multiplexing (OFDM) 802.11g • One type of radio transmission within the unlicensed 5-GHz frequency

bands: — Orthogonal frequency-division multiplexing (OFDM) 802.11a

28

WLAN Devices: Access Points

In-building Infrastructureg• 1200 Series (802.11a and 802.11b)• 1100 Series (802.11b)

29

Wireless LAN Devices: Client AdaptersAdapters

Clients (NICs)• 350 Series (802.11b)( )• 5 GHz client adapter (802.11a)

Drivers are supported for all popular operating systems, including Windows 95, 98, NT 4.0, Windows 2000, Windows ME, Windows XP, Mac OS Version 9.x, and Linux.

30

Wireless LAN Devices: AntennasAntennasAntenna

•2 4GHz Antennas2.4GHz Antennas•5 GHz AntennasIndoor Vs Outdoor

31

AntennasAntennas• Indoor and Outdoor • Outdoor

• 2.4 GHz • 5 GHz

• WLAN and Bridging • Bridging

32

Dipole / Omni AntennaDipole / Omni Antenna

33

Point to Multipoint LinkPoint to Multipoint Link

34

Point-to-point Wireless LinkPoint-to-point Wireless Link

35

AntennaAntenna

36

Packet AnalysisPacket Analysis

37

Data EncryptionData EncryptionSecure Transmission of Information• Physical layer• Physical layer

– Physical security of data transmission is gained by usingspread spectrum technology which makes it less vulnerable tointerference

• MAC (Medium Access Control) layer– Encryption algorithm is called Wired Equivalent Privacy (WEP)g

Use static encryption key. – Wi-Fi Protected Access (WPA)

WPA uses a Temporal Key Integrity Protocol (TKIP)WPA uses a Temporal Key Integrity Protocol (TKIP), which changes keys with every data packet.

38

The Site SurveyThe Site Survey• Helps define the coverage areas, data rates, the

i l t f i tprecise placement of access point.• Gather information: diagramming the coverage

e nd me ing the ign l t ength SNRarea and measuring the signal strength, SNR (signal to noise ratio), RF interference levels

39

Site SurveySite Survey

40

top related