TM255 - Block 1 Part 3
TM255 - Block 1 Part 3
Communication and
15
3.2.3 Transmission channels
• 802.11 specifies the 2.4 GHz
band in terms of 14 channels,
identified in terms of their
central frequency.
• For each channel, the
18
3.2.3 Transmission channels
• Figure below illustrates the 5 MHz guard band lying between
the frequency bands of channel 3 and channel 8.
20
3.2.3 Transmission channels
Activity 3.11
While setting up a wireless 802.11g wireless network (in the UK)
you note that another nearby network AP is set to use channel
11.
(a) Which of the other channel would be the best choice for your
new network?
23
3.3.1 Access control in wired and
wireless networks
• All LANs require mechanisms that define how a node makes a
connection to the network and how network resources are allocated
in a fair and orderly way.
• The two types of media access control are:
1. Control-based
2. Contention-based.
28
3.3.1 Access control in wired and
wireless networks
• Nodes A, B and C are all in range of the AP. Nodes A and B can hear
each other, as can B and C. But A and C cannot hear each other and
therefore there is the risk both will start transmitting at the same
time.
34
3.3.2 Segmentation of data
• 802.11 satisfies the demands by increasing the level of
management and control of the network. The standard
specifies three frame types:
1. Data frames carry application-level data.
2. Management frames manage access to the wired network.
43
3.4.2 Factors influencing the design of wireless
security measures
• Wired networks use security communications protocols to
establish a secure connection or to ensure the security of a
particular message.
• These protocols comprise a series of messages that are
exchanged in order to share authentication and encryption
information. This enables both parties to know that the other
person is actually who they say they are and allows the sender to
46
3.4.3 WLAN Security Measures
Wired equivalent privacy and Wi-Fi protected access
• WEP is part of the original 802.11 standard and provides an
optional encryption procedure.
• The main aim of WEP was to provide protection against
casual eavesdropping to make a wireless LAN equivalently
secure to a (non-encrypted) wired LAN.
47
3.4.3 WLAN Security Measures
• When WEP’s security flaws became apparent, work
began on an amendment ( ) ا لّتع ديلto the original 802.11
standard to rectify ( )ي صححthe problems.
• This amendment is 802.11i: it specifies security
mechanisms to replace the authentication and
50
3.4.3 WLAN Security Measures
802.1x and Enterprise Security
• Enterprise security uses a separate server to provide authentication
and is more appropriate for business environments where users are
required to have an individual login identifier and password.
• The approach is based on 802.1x, which is another IEEE standard
that defines a centralised authentication protocol for both wired
and wireless LANs.
• 802.1x defines three parties:
53
some of the approaches that have been implemented in recent
Wi-Fi standards to increase the capacity – the maximum data
rate. (802.11n employs the following strategies)
1. Transmission of multiple data streams using a single
channel
2. Channel bonding
54
3.5.1 Transmission Of Multiple Data
Streams Using A Single Channel
• APs conforming to the 802.11a, 802.11b and 802.11g
standards used a single transmitter and single receiver and
were known as Single-Input Single-output (SISO).
• When operating at their optimum capability, the channel
capacity of such systems can be increased only by
• increasing the transmit power, which would boost the
63
• Recent developments in the 802.11 standard are aiming to provide
different services than those we have looked at in this part. For
example:
1. There is an increased demand for providing communications
infrastructures that support the Internet of Things, and the
amendment 802.11ah is one such offering.
2. Another amendment 802.11af, also referred to as White-Fi and
Super Wi-Fi, was ratified in 2014 to define the use of Wi-Fi within
TV white space (TVWS), which is the unused TV spectrum in the