1 / 23

IACC Professional Course Series

IACC Professional Course Series. Network Certification Preparation . Module - 6. Wireless LAN and its types Describe standards associated with wireless media Identify and describe the purpose of the components in a small wireless network.

nadda
Download Presentation

IACC Professional Course Series

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IACC Professional Course Series Network Certification Preparation

  2. Module - 6 • Wireless LAN and its types • Describe standards associated with wireless media • Identify and describe the purpose of the components in a small wireless network. • Identify the basic parameters to configure on a WLAN • Wireless security features and capabilities • Identify common issues with wireless networks • Variable Length Subnet Mask (VLSM)

  3. Wireless LAN • A wireless local area network (WLAN) links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio) • Usually providing a connection through an access point to the wider internet. • This gives users the mobility to move around within a local coverage area and still be connected to the network. • Most modern WLANs are based on IEEE 802.11 standards, marketed under the Wi-Fi brand name.

  4. Types of WLAN • There are two types • Peer-to-Peer or Ad-hoc WLAN • Bridged WLAN • Peer-to-Peer (P2P) • An ad-hoc network is a network where stations communicate only peer to peer (P2P). • A P2P) network allows wireless devices to directly communicate with each other. • Wireless devices within range of each other can discover and communicate directly without involving central access points. • This method is typically used by two computers so that they can connect to each other to form a network. • There is no base and no one gives permission to talk. This is accomplished using the Independent Basic Service Set (IBSS).

  5. Types of WLAN • Bridged WLAN • A bridge can be used to connect networks, typically of different types. • A wireless Ethernet bridge allows the connection of devices on a wired Ethernet network to a wireless network. • The bridge acts as the connection point to the Wireless LAN.

  6. Architectural component • Stations • All components that can connect into a wireless medium in a network are referred to as stations. • All stations are equipped with wireless network interface controllers (WNICs). • Wireless stations fall into one of two categories: access points, and clients. • Access points (APs), normally routers, are base stations for the wireless network. They transmit and receive radio frequencies for wireless enabled devices to communicate with. • Wireless clients can be mobile devices such as laptops, personal digital assistants, IP phones and other smart-phones, or fixed devices such as desktops and workstations that are equipped with a wireless network interface. • Basic service set • The basic service set (BSS) is a set of all stations that can communicate with each other. • There are two types of BSS: Independent BSS (also referred to as IBSS), and infrastructure BSS. • Every BSS has an identification (ID) called the BSSID, which is the MAC address of the access point servicing the BSS. • An independent BSS (IBSS) is an ad-hoc network that contains no access points, which means they can not connect to any other basic service set. • An infrastructure can communicate with other stations not in the same basic service set by communicating through access points.

  7. Architectural component • Extended service set • An extended service set (ESS) is a set of connected BSSs. • Access points in an ESS are connected by a distribution system. • Each ESS has an ID called the SSID which is a 32-byte (maximum) character string. • Distribution system • A distribution system (DS) connects access points in an extended service set. • The concept of a DS can be used to increase network coverage through roaming between cells. • DS can be wired or wireless. Current wireless distribution systems are mostly based on WDS or MESH protocols, though other systems are in use

  8. Standards • IEEE 802.11 is a set of standards for implementing (WLAN). • Computer communication in the 2.4, 3.6 and 5 GHz frequency bands. • They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). • The base version of the standard IEEE 802.11-1997has had subsequent amendments. • These standards provide the basis for wireless network products using the Wi-Fi brand name. • There are different sub-standard i.e. 802.11 a, 802.11b, 802.11g, 802.11n

  9. Standards • 802.11-1997 • The original version of the standard IEEE 802.11 was released in 1997 and clarified in 1999, it is obsolete today. • It specified two net bit rates of 1 or 2 megabits per second (Mbit/s), plus forward error correction code. • It specified three alternative physical layer technologies: diffuse infrared operating at 1 Mbit/s; frequency-hopping spread spectrum operating at 1 Mbit/s or 2 Mbit/s; and direct-sequence spread spectrum operating at 1 Mbit/s or 2 Mbit/s. • Legacy 802.11 with direct-sequence spread spectrum was rapidly supplanted and popularized by 802.11b.

  10. Standards • 802.11a • The 802.11a standard uses the same data link layer protocol and frame format as the original standard, but an OFDM based air interface (physical layer). • It operates in the 5 GHz band with a maximum net data rate of 54 Mbit/s, plus error correction code, which yields realistic net achievable throughput in the mid-20 Mbit/s. • Since the 2.4 GHz band is heavily used to the point of being crowded, using the relatively unused 5 GHz band gives 802.11a a significant advantage. • However, this high carrier frequency also brings a disadvantage: the effective overall range of 802.11a is less than that of 802.11b/g. • In theory, 802.11a signals are absorbed more readily by walls and other solid objects in their path due to their smaller wavelength and, as a result, cannot penetrate as far as those of 802.11b. • In practice, 802.11b typically has a higher range at low speeds (802.11b will reduce speed to 5 Mbit/s or even 1 Mbit/s at low signal strengths). • 802.11a too suffers from interference, but locally there may be fewer signals to interfere with, resulting in less interference and better throughput.

  11. Standards • 802.11b • 802.11b has a maximum raw data rate of 11 Mbit/s and uses the same media access method defined in the original standard. • 802.11b products appeared on the market in early 2000, since 802.11b is a direct extension of the modulation technique defined in the original standard. • The dramatic increase in throughput of 802.11b (compared to the original standard) along with simultaneous substantial price reductions led to the rapid acceptance of 802.11b as the definitive wireless LAN technology. • 802.11b devices suffer interference from other products operating in the 2.4 GHz band. Devices operating in the 2.4 GHz range include: microwave ovens, Bluetooth devices, baby monitors, and cordless telephones.

  12. Standards • 802.11g • In June 2003, a third modulation standard was ratified: 802.11g. • This works in the 2.4 GHz band (like 802.11b), but uses the same OFDM based transmission scheme as 802.11a. • It operates at a maximum physical layer bit rate of 54 Mbit/s withoutforward error correction codes, or about 22 Mbit/s average throughput. • 802.11g hardware is fully backwards compatible with 802.11b hardware and therefore is encumbered with legacy issues that reduce throughput when compared to 802.11a by ~21%. • 802.11g standard was rapidly adopted by consumers starting in January 2003, due to the desire for higher data rates as well as to reductions in manufacturing costs. • By summer 2003, most dual-band 802.11a/b products became dual-band/tri-mode, supporting a and b/g in a single mobile adapter card or access point. • In an 802.11g network, activity of an 802.11b participant will reduce the data rate of the overall 802.11g network. • Like 802.11b, 802.11g devices suffer interference from other products operating in the 2.4 GHz band, for example wireless keyboards.

  13. Standards • 802.11n • 802.11n is an amendment which improves upon the previous 802.11 standards by adding multiple-input multiple-output antennas (MIMO). • 802.11n operates on both the 2.4 GHz and the lesser used 5 GHz bands. • The IEEE has approved the amendment and it was published in October 2009.

  14. Basic parameters to configure on a WLAN The configuration parameters include these parameters: • The host name of the AP • IP address configuration of the AP, if the address is a static IP • Default gateway • Simple Network Management Protocol (SNMP) community string • Role in the radio network • SSID SSIDs are unique identifiers that identify a WLAN network. Wireless devices use SSIDs to establish and maintain wireless connectivity. SSIDs are case-sensitive and can contain up to 32 alphanumeric characters. Do not use any spaces or special characters in an SSID. • Lab exercise using WLAN router

  15. Variable Length Subnet Mask (VLSM) • VLSM -  is a technique that allows network administrators to divide an IP address space into subnets of different sizes. • It can also be called a classless IP addressing. • A classful addressing follows the general rule that has been proven to amount to IP address wastage. • Borrowing the bits from the host portion for networks, or from network portion for hosts. • 192.168.10.4/30 is an example of VLSM

  16. Variable Length Subnet Mask (VLSM) • Looking at the diagram, we have three LANs connected to each other with two WAN links.

  17. Variable Length Subnet Mask (VLSM) • The first thing to look out for is the number of subnets and number of hosts. In this case, an ISP allocated 192.168.1.0/24. Class C HQ = 50 host RO1 = 30 hosts RO2 = 10 hosts 2 WAN links • The first thing to look out for is the number of subnets and number of hosts. In this case, an ISP allocated 192.168.1.0/24. Class C • We will try and subnet 192.168.1.0 /24 to sooth this network which allows a total number of 254 hosts

  18. Variable Length Subnet Mask (VLSM) HQ - 192.168.1.0 /26 Network address HQ = 192.168.1.1 Gateway address 192.168.1.2, First usable address 192.168.1.62- Last usable address. Total address space -192.168.1.2 to 192.168.1.62 192.168.1.63 will be the broadcast address (remember to reserve the first and last address for the Network and Broadcast) HQ Network Mask 255.255.255.192  - we got the 192 by adding the bit value from the left to the value we borrowed = 128+64=192 HQ address will look like this 192.168.1.0 /26

  19. Variable Length Subnet Mask (VLSM) RO1 = 30 hosts We are borrowing 3 bits with value of 32; this again is the closest we can get to the number of host needed. RO1 address will start from 192.168.1.64 -  Network address Now we add the 32 to the 64 we borrowed earlier = 32+64 = 96 RO1 = 192.168.1.65 Gateway address 192.168.1.66 - First usable IP address 192.168.1.94 - Last usable IP address 192.168.1.95 Broadcast address – total address space – 192.168.1.66 –192.168.1. 94 Network Mask 255.255.255.224 I.e. 128+64+32=224 or  192.168.1.64/27

  20. Variable Length Subnet Mask (VLSM) RO2 = 192.168.1.96 Network address We borrow 4 bits with the value of 16. That’s the closest we can go. 96+16= 112 So, 192.168.1.97- Gateway address 192.168.1.98 - First usable address 192.168.1.110 - Last usable address 192.168.1.111 broadcast Total host address space – 192.168.1.98 to 192.168.1.110 Network Mask 255.255.255.240 or 192.168.1.96 /28

  21. Variable Length Subnet Mask (VLSM) RO2 = 192.168.1.96 Network address We borrow 4 bits with the value of 16. That’s the closest we can go. 96+16= 112 So, 192.168.1.97- Gateway address 192.168.1.98 - First usable address 192.168.1.110 - Last usable address 192.168.1.111 broadcast Total host address space – 192.168.1.98 to 192.168.1.110 Network Mask 255.255.255.240 or 192.168.1.96 /28

  22. Variable Length Subnet Mask (VLSM) WAN links = we are borrowing 6 bit with value of 4 =112 + 4 =116 WAN links from HQ to RO1 Network address will be 192.168.1.112 /30 : HQ se0/0 = 192.168.1.113 RO1se0/0= 192.168.1.114 Mask for both links=  255.255.255.252 ( we got 252 by adding the bits value we borrowed i.e 124 +64 +32 +16+ 8 +4=252

  23. Variable Length Subnet Mask (VLSM) WAN Link 2= 112+4=116 WAN Link from HQ to RO2 Network address = 192.168.1.116 /30 HQ = 192.168.1.117   subnet mask  255.255.255.252 RO2 = 192.168.1.118  Subnet mask 255.255.255.252

More Related