Вы находитесь на странице: 1из 67

Wi-Fi and multiPath Fading

Ppt. Made by Zohaib Jahan, fb.com/zohaibjahan, student at uettaxila.edu.pk

Introduction Limitations Purpose

Applications

Wi-Fi Alliance

Advantages

Wi-Fi Technology

Objectives
Antenna

Elements of a WI-FI Network

Wi-Fi Physical layer Wi-Fi Security Security Threats Wi-Fi Configurations

Working

Network Topologies

Wi-Fi is short for wireless fidelity. local area network which uses high frequency radio signals to send and receive data.

A wireless network uses radio waves, just like cell phones, televisions and radios do. Two-way radio communication.

Allow mobile devices, such as laptops and PDAs to connect to local area networks.

Vic Haye

known as the father of Wi-Fi for his invention While working for Agere systems. IEEE (Institute of Electrical and Electronics Engineers) established the 802.11 Group Wi-Fi was invented in 1991

1990
1991 1997

Specifications for standard ratified in 1997

1999
2000

IEEE modified the standard:802.11b,802.11a Wi-Fi certified testing begins on 802.11b-based products delivering 11Mbps raw data rates in 2.4GHz

2002

Wi-Fi alliance membership reaches 100 companies Wi-Fi certified testing begins for 802.11a-based,delivering 54Mbps raw data rates in 5GHz

2003

Wi-Fi certified testing begins for 802.11g-based, 54Mbps raw data rates in 2.4GHz Wi-Fi protected access certification launches

Future Wi-Fi evolution

2011

CERTIFIEDthe solution to deliver 1GB Wi-Fi certified lunches, solution for easier connection to Wi-Fi raw data rates Wi-Fi certified maracas lunches, for seamless display of HD video between 60GHz - the in 5GHz 2012 devices. solution to deliver multigigabit raw Wi-Fi Alliance continue to bring innovative solutions to the market, data rates programs in seamless connectivity. 2013 during 60GHz

Global Wi-Fi hotspots surpass 1million Wi-Fi Wi-Fi alliance membership reaches 500 companies

The purpose of Wi-Fi is to hide complexity by enabling wireless access to applications and data, media and streams.
make access to information easier

ensure compatibility and co-existence of devices

Main Purpose

eliminate complex cabling

eliminate switches, adapters, plugs, pins and connectors

Acts as base station to the Users Acts as bridge between wireless and wired networks Access Point (AP) 60 to 200 Users supports generally Transmitting and receiving Network Change data from parallel to series. interface Framing & make packets ready for sending cards Used to connect multiple LANs. Used in building to building connection. Coverage 25miles(40Km).

Bridge

Service provider place an access point at designated hot spot. The access point transmits a wireless signal to the adapter card in user device Users connect to the WLAN through a page in their internet browser.

Transmitter

Receiver

In 2001 Unlicensed 5GHz by using OFDM Support 6Mbps up to 54 Mbps

IEEE 802.11b
Late 1999 Supports 5.5Mbps and 11Mbps 2.4 GHz radio band

IEEE 802.11n
Provide required information to ensure proper bridge operations

IEEE 802.11d
Support widespread adoption For global harmonization

IEEE 802.11a

Ensure multivendor accesspoint interoperability through InterAccess Point Protocol. In 2003

IEEE 802.11f

Frequency = 5 GHz,2.4 IEEE 802.11c GHz Modulation = OFDM Addition of MIMO IEEE 802.11g End of 2003 Max. Speed = 150 Mbps 5-GHz band with radar and satellite First half of 2003 Range = 70 meters Communication Supports 54Mbps Using DFS and TPC 2.4 GHz within Encoding Scheme = using OFDM OFDM

This works on QoS. Optimization transmission of voice and video

IEEE 802.11e

IEEE 802.11i
In 2003 Effectively used for enhancement to MAC Layer for Enhanced Security

IEEE 802.11h

Independent Basic Service AD HOC network Set(IBSS)


Infrastructure Mode The Extended Service Set(ESS)

Independent Basic Service Set(IBSS)

Within an IBSS,STAs with each other on a peer-topeer level. this type of network is often formed an a temporary basis. AD HOC networks allow for flexible cost-effective arrangement. Temporary setups such as group of laptops in a conference room.

The Extended Service Set(ESS)

Consists of a series of BSSs(each containing an AP) connected together. Within an ESS, STAs can roam from one BSS to other, communicate with any mobile or fixed client. The ESS enables coverage to extend beyond the range of a WLAN radio. By using an ESS campus-wide coverage is possible

IEEE 802.11 operates in following 3 network configuration. Peer-to-Peer Network

Client & Access Point Network

Point-toMultipoint bridge Network

Networks

A peer-to-peer network is a WLAN in its most basic form. Two PCs equipped with wireless adapter cards are all that is needed to form a peer-to-peer network, enabling the PCs to share this type of network Peer-to-Peer requires no administration or pre-configuration.

Applications

Small/branch offices sharing resources Remote control of another PC Games for two or more players Demos

The stations must be arranged within the proper distance limits All stations must send and receive on the same transmission frequency Three main The hidden node problem avoided so that each station can communicate consideration with all other stations

Client & Access Point

In a client & Access Point network, users not only benefit from extended range capabilities, they are also able to benefit from server resources, as the AP is connected to the wired backbone.

Benefits

Generally they can support between 15 and 50 users. BSA-RF coverage provided by an AP. ESA-It consists of 2 or more BSA. ESA cell includes 10-15% overlap to allow roaming

Multiple Access Points

As APs have limited range, large facilities such as warehouses and college campuses often find it necessary to install multiple access points, creating large access zones.

Benefits

APs, like cell sites in cellular telephony applications, support roaming and AP to AP handoff Large facilities requiring multiple access points deploy them creating overlapping cells for constant connectivity to the network.

Benefits

Used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart. Line-of-sight range varies based on the type of wireless bridge and antenna used as well as the environmental conditions.

Wireless security is the prevention of unauthorized access or damage to computers using wireless networks.

Controlling Access

Categories
Wired Equivalent Privacy (WEP)

Device Authentication

An AP acts as the central base station for the wireless network. By restricting access to the AP, only those devices that are authorized are able to connect to the AP and become part of the wireless network.

All wireless AP implement access control through Media Access Control (MAC) address filtering. Access restrictions can limit a users access to the Internet, what days and times it can be accessed, which Web sites can be visited, or the type of traffic that passes through the AP.

Wired Equivalent Privacy (WEP) was designed to ensure that only authorized parties can view transmitted wireless information. Each wireless device can be use its default key to encrypt text. The access point must then use that same key in order to decrypt it.

There are two types of authentication supported by the 802.11 standard.

Open system authentication

Shared key authentication


Open system authentication is the default method, Shared key authentication in which the WEP default key is used.

Wireless security Personal wireless security WPA PSK TKIP WPA2 PSK AES Encryption Enterprise wireless security

Pre-shared key (PSK) authentication uses to generate the encryption key. Access points have a setting called Group Key Renewal. The Group Key Renewal is the number of seconds between generating a new key.

Temporal Key Integrity Protocol (TKIP), WPA replaces WEP. WEP uses a 40-bit encryption key and does not change.

TKIP uses a longer 128-bit key. Using TKIP, there are 280 trillion possible keys that can be generated for a given data packet.

TKIP new key for each packet that is created.

TKIP provides an even greater level of security.

PSK is intended for personal and small office home office users who do not have advanced server capabilities. PSK keys are automatically changed (called rekeying) and authenticated between devices after a specified period of time known as the rekey interval

It is recommended that AES encryption and decryption be performed in hardware because of encryption in software requires significant processing power.

128-bit group encryption with 128, 192 and 256-bit key lengths Data security for 20-30 years Worldwide access

Both WPA and WPA2 provide a higher level of security than the original IEEE 802.11b/a security protocols. WPA2 is preferred over WPA.

MAC Layer Physical Layer

concerned with rules for accessing the wireless medium how wireless media is accessed by the User.

FHSS
PMD Layer Sub-Layers

defines methods for transmitting and receiving data through the medium
PLCP Layer

OFDM

DSSS

reformats the data received from the MAC layer into packets listens to medium to determine whether data can be sent

Combines bandwidth advantages of a narrow-band signal with security and clarity advantages of a wide-band signal. Uses narrow-band signal as little i.e. 1 MHz, this rate places signal on a frequency for a very short period of time (dwell time) and then directs it to hop to next frequency in the sequence.

Advantage

More immune to interference Highly Scalable

Limitation

Speed < 2 Mbps

This Technique divides the 2.4 GHz band into 11 22-MHz channels. Adjacent channels overlap one another partially, with three of the 11being completely non-overlapping. Data is sent across one of these 22 MHz channels without hopping to other channels.

Advantage

Secure Speed up to 11 Mbps

Limitation

More susceptible to interference Limits number of overlapping cells

Sending device breaks transmission into pieces and sends it over channels in parallel Receiving device combines signals to re-create the transmission Enough bandwidth to handle

Usage of the 64 sub-carriers 12 zero sub-carriers on sides and center 48 data sub-carriers per symbol 4 pilot sub-carriers per symbol, for synchronizing / tracking

This layer is concerned whit the rules for accessing the wireless medium

Accessing Medium
DCF specifies the use of CSMA/CA algorithm as media access scheme.

Association
Wireless links between clients and access points Scanning the station first scans air to know APs then Association process begins.

Re-association
Concerned with the hand-off of clients as they roam in network.

Authentication
By default, standard is open system Secure network with WEP option by a configured shared key into APs.

Power Management
Two separate modes: Active mode: when client is transmitting or receiving Power save mode: when no communication

All WLAN equipment comes with a built-in Omni-directional antenna, but some select products will let you attach secondary antennas that will significantly boost range. Antennas come in all shapes and styles:

Omni directional
Vertical Whip

Directional
Yagi

Mast Radiator

Wall mounted panel Parabolic dish

Advantages

Wi-Fi Applications

Limitations

Multi-Path Fading

Fading is the weakening and slowing down of the signal In wireless telecommunications, signals are not only transmitted directly from source to destination but also through a lot of paths from source to destination.

Causes of FADING include: atmospheric ducting, ionosphere reflection refraction, and reflection from water bodies .

Line of sight (LOS) is the fastest component reaching to destination.

Reflection
occurs when signal encounters a surface that is large relative to the
wavelength of the signal Diffraction occurs at the edge of an impenetrable body that is large compared to wavelength of radio wave Scattering occurs when incoming signal hits an object whose size in the order of the wavelength of the signal or less

At destination, we receive all of signals components and cause constructive and destructive interference, and phase shifting of the signals. Radio signals that are received in phase reinforce each other and produce a stronger signal at the receiving site (Constructive). Signals that are received out of phase produce a fading signal (Destructive).

Large-scale fading (shadowing) Long term variation in the mean signal level caused by the mobile unit moving into the shadow of surrounding objects Small-scale fading (multipath fading) Short term fluctuation in the signal amplitude caused by the local multipaths.

Small scale fading is used to describe the rapid Fluctuation in the amplitude of radio signal over a short period of time or travel distance. The actual power received over a much smaller distance vary due to the destructive/constructive interference of multiple signals that follow multiple paths to the receiver

The direct ray is actually made up of many rays due to scattering multiple times by obstructions along its path, all travelling about the same distance Each of these rays appearing at the receiver will differ randomly in amplitude and phase due to the scattering

Small-scale fading can be further classified into flat(or non-selective) fading frequency selective fading Fast fading Slow fading

It is defined as: If the delay of the multipath components with respect to the main component is smaller than the symbols duration time, a channel is said to be subject to flat fading. Characteristics are: In a flat fading channel inter-symbol interference (ISI) is absent (ISI is a type of distortion)

The channel has a constant gain and a linear phase response over a bandwidth that is greater than the bandwidth of the transmitted signal.

The spectral characteristics of the transmitted signal are preserved at the receiver

The strength of the received signal generally changes slowly in time due to fluctuations caused by multipath.
S(f) C(f) R(f)

Typical values of delay spread are 0.2s (rural area), 0.5s (suburban area), 3-8s (urban area)

different frequencies across the channel to different degrees. It will mean that the phases and amplitudes of the signal will vary across the channel Sometimes relatively deep nulls may be experienced, and this can give rise to some reception problems. Simply maintaining the overall amplitude of the received signal will not overcome the effects of selective fading, and some form of equalization may be needed.

The spectral characteristics of the transmitted signal are not preserved at the receiver Certain frequency components have larger gains than others

The Rayleigh propagation model is most applicable to instances where there are many different signal paths(urban areas), none of which is dominant. In this way all the signal paths will vary and can have an impact on the overall signal at the receiver. There is no dominant propagation along a LOS between the transmitter and receiver. When the signals reach the receiver, As some will be in phase and others out of phase.

In many instances cellular telephones being used in a dense urban environment fall into this category.

If the environment is such that, in addition to the scattering, there is a strongly dominant signal seen at the receiver, usually caused by a LOS. Such a situation may be better modelled as Rician fading.

Doppler proposed The change in frequency of a wave for a receiver moving relative to the transmitter. How rapidly the channel fades will be affected by how fast the receiver and/or transmitter are moving Motion causes Doppler shift in the received signal components. The Doppler effect occurs due to the distance affects the time you need to receive sound wave

The terms slow and fast fading refer to the rate at which the magnitude and phase change imposed by the channel on the signal changes Slow fading

is a long-term fading effect changing the mean value of the received signal. Slow fading is usually associated with moving away from the transmitter and experiencing the expected reduction in signal strength.
Fast fading is also called multi-path fading,Rapid changes in the strength over half wavelength, the constructive and destructive phases create a variation in signal strength.

Multipath fading may be minimized by 1. Space Diversity 2. Frequency Diversity

Space

Diversity

In space diversity, two or more receiving antennas are spaced some distance apart. Fading does not occur simultaneously at both antennas. Therefore, enough output is almost always available from one of the antennas to provide a useful signal.

Therefore, enough output is almost always available from one of the antennas to provide a useful signal.

In frequency diversity Two transmitters and two receivers are used, each pair tuned to a different frequency, with the same information being transmitted simultaneously over both frequencies. One of the two receivers will almost always produce a useful signal.

Ppt. Made by Zohaib Jahan, fb.com/zohaibjahan, student at uettaxila.edu.pk

Вам также может понравиться