0% found this document useful (0 votes)
66 views16 pages

4.1 Components Mobile Computers, Pdas, and Barcode Readers

Mobile computers come in different sizes and shapes, and they use different operating systems. There are three basic types of handheld devices: key-based, pen-based, and vehicle-mount. Pen-based devices utilize a pen-like stylus and typically do not have a keyboard or keypad. Vehicle-mount mobile devices are intended for use on a motorized pallet jack, forklift, or mobile cart.

Uploaded by

fityh
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views16 pages

4.1 Components Mobile Computers, Pdas, and Barcode Readers

Mobile computers come in different sizes and shapes, and they use different operating systems. There are three basic types of handheld devices: key-based, pen-based, and vehicle-mount. Pen-based devices utilize a pen-like stylus and typically do not have a keyboard or keypad. Vehicle-mount mobile devices are intended for use on a motorized pallet jack, forklift, or mobile cart.

Uploaded by

fityh
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

4.

1 Components
Mobile
computers,
4.1.2 PDAs, and
barcode
readers

Mobile computers come in different sizes and shapes, and they use different operating
systems. The objective is to provide solutions for a variety of environments. Some of these
options are summarized in Figure .

Some devices use an integrated wireless NIC, whereas others use one that is PCMCIA or

CompactFlash card-based. There are three basic types of handheld


devices. They are key-based, pen-based, and vehicle-mount.
Handheld devices allow users to browse the web, access LAN resources, capture data real
time, scan, and print. These devices are typically constructed to withstand harsh
environments, unlike most laptop computers and PCs. Mobile computing is great for
collecting, processing, and communicating information and data when and where it is
needed. These devices also operate at all seven layers of the OSI model like laptops and
desktop PCs.

Key-based devices, are used for applications requiring manual


entry of character data. Such devices have a full alphanumeric keyboard, as well
as an LCD display. Key-based computers are found in many
businesses including retail, warehousing, and shipping.

Pen-based devices utilize a pen-like stylus and typically do not


have a keyboard or keypad. An example is shown in Figure . These devices are
specifically designed for information intensive applications. They are very rugged and can
go almost anywhere. These devices do not require typing on a tiny keypad.

Vehicle-mount mobile devices are intended for use on a


motorized pallet jack, forklift, or mobile cart. Many of these devices can
port to a bar code scanner. This enables operators to transmit and receive data to and from
a remote server. They come in several varieties, including those with keyboards, menu-
driven, and touch-screen displays.

Mobile Computing Operating Systems (OS)


Several operating systems are used on mobile computers. The primary ones, listed in
Figure , include MS DOS, Palm OS, Symbian OS, Windows Compact Edition (CE), and
Windows XP Embedded. DOS is a very basic and efficient OS that will run one program at
a time. The other OSs will run multiple programs at once. The Palm OS is an OS that was

developed especially for PDAs. Symbian OS is an open standard OS,


licensed for use in many mobile computing devices and easily customized with third-party
software. Windows CE and Windows XP embedded are simplified versions of Windows.
Windows XP Embedded is only for use on x86 CPUs. The look and feel are very similar to
that of the desktop Windows versions. An early version of Windows CE was called Pocket
PC. Remember that the mobile computer must be interoperable with the desktop PC
protocols, or additional software may be needed.

Other Mobile Computing Devices


The first phase of 802.11 compliant voice devices are now available. They include handheld
devices from Cisco and Symbol. The second phase will support both data and voice on one
handheld device, such as the Compaq iPaq. IEEE 802.11 voice products must be
integrated with a server-based voice management platform such as the Cisco Call
Manager. The Cisco Call Manager will be presented in the last section. The last section also
covers the Cisco Architecture for Voice, Video, and Integrated Data (AVVID).

Mobile devices can be based on different wireless standards. It is important to use only
802.11 compliant devices. The big advantages in doing this include interoperability, speed,
reliability, and real-time data communications. Equally important is choosing a software
application package that will be compatible with the devices used in a given environment.
Other considerations and concerns include battery life and durability. Some uses of mobile
devices with third party applications will be discussed later in the course.
4.1 Components
Access
points
4.1.4
and
bridges

The access point (AP) operates at Layers 1 and 2 of the OSI Reference Model. This is also
where the wireless bridge and workgroup bridge operate, as shown Figure .

Access Points

An access point (AP) is a WLAN device that can act as the center point of a
stand-alone wireless network. An AP can also be used as the connection
point between wireless and wired networks. In large installations, the
roaming functionality provided by multiple APs allows wireless users to move freely
throughout the facility, while maintaining seamless, uninterrupted access to the network.

Cisco APs come in several models. The 1100 Series supports IEEE 802.11b. The 1200
Series, shown in Figure , supports 802.11a and 802.11b in the same unit. It also supports
inline power injection, to save on AC wiring costs, and both RJ45 and 10/100 Ethernet
connectors.
Wireless Bridges

The Cisco Aironet 350 Series Wireless Bridge is designed to connect two or more
networks that are typically located in different buildings. It delivers
high data rates and superior throughput for data-intensive, line-of-sight applications. The
bridges connect hard-to-wire sites, noncontiguous floors, satellite offices, school or

corporate campus settings, temporary networks, and warehouses. They can be


configured for point-to-point or point-to-multipoint applications.
Cisco wireless bridges and workgroup bridges, along with their standard graphic icons, are
shown in Figure .

Workgroup Bridges

The Cisco Aironet 350 workgroup bridge (WGB) product connects to the
Ethernet port of a device that does not have a PCI or PCMCIA
slot available. It provides a single MAC address connection into
an AP, and onto the LAN backbone. The Aironet workgroup
bridge cannot be used in a peer-to-peer mode connection. It must
communicate with an AP.

One configuration of the workgroup bridge will connect up to eight wired machines to an AP.
It is ideal for connecting remote workgroups to a wired LAN, as shown in Figure .

In order to use a WGB with multiple MAC addresses, the WGB and all users must be
connected to a hub. The unit will automatically select the first eight MAC addresses that it
hears on the Ethernet. Alternatively, the addresses may be entered manually into a table.
The eight MAC addresses are static.
4.1 Components
4.1.5 Antennas

Cisco Aironet 2.4 GHz access points are available with either captive dipole antennas or
reverse Threaded Naval Connector (TNC) connectors, which enable a customer to attach
different types of antennas. Users can choose the right antenna for their application from a
broad selection of Cisco products, which are pictured in Figure .

Cisco Aironet AP 2.4 GHz antennas are compatible with all Cisco RP-TNC equipped APs.
The antennas are available with different gain and range capabilities, beam widths, and form
factors. Coupling the right antenna with the right AP allows for efficient coverage in any facility,
as well as better reliability at higher data rates. A detailed coverage of antennas will be
provided later in the course.

Cisco Aironet bridge 2.4 GHz antennas provide transmission between two or more buildings.
Cisco has a bridge antenna for every application. These antennas are available in directional
configurations for point-to-point transmission and omnidirectional configuration for point-to-

multi-point implementations. For distances of up to 1.6 km (1 mile), Cisco


offers an omnidirectional mast mount. For intermediate distances,
Cisco offers a Yagi mast mount and an omnidirectional mast mount.
The solid dish provides connections of up to 40 km (25 miles). Cisco
Aironet bridge antennas are shown in Figure .

Antennas operate at Layer 1 of the OSI Model, as shown in Figure .


Remember that the physical layer defines the electrical, mechanical, procedural, and functional
specifications for activating, maintaining, and deactivating the physical link between end
systems. Characteristics such as voltage levels, timing of voltage changes, physical data rates,
maximum transmission distances, physical connectors, and other, similar, attributes are defined
by physical layer specifications.
4.1 Components
Ethernet
and
4.1.6
wired
LANs

A WLAN topology can be an extension to an existing scalable LAN. The best-built and
managed scalable internetworks are typically designed in layers, following a hierarchical
model. By using hierarchical layers, the user can break a large network into smaller pieces,
which can each be dealt with separately. To understand the importance of layering,
consider the OSI Reference Model. The OSI Reference Model is a layered model for
understanding and implementing computer communications. By dividing up the total
network functionality into smaller pieces, or layers, the OSI model simplifies the tasks
required for two computers to communicate. Activity 4.1.6a shows many of the devices that
exist in a typical enterprise environment. The devices are shown at the highest layer of the
OSI Model, on which they operate.

Hierarchical models for internetwork design also use layers, to simplify the task required for
internetworking. Each layer can be focused on specific functions, thereby allowing the user
to choose the right systems and features for the layer. As a result, a hierarchical model
simplifies the management of the internetwork and allows the user to control the growth,
without overlooking the network requirements. The Cisco three-layer hierarchical model is
shown in Figure .

The traditional wired devices that are utilized include routers, switches, servers, and
printers. These devices are shown in Figures through , along with their graphical icons.
Developing technologies, such as voice over IP (VoIP), can add additional capabilities to
both wired and wireless LANs. IP phones and the graphical icon are shown in Figure .
Finally, network security devices such as firewalls, VPN devices, and intrusion detection
systems are becoming requirements for a secure LAN/WAN. A Cisco PIX Security
Appliance and its icon are pictured in Figure .

All of these devices must be considered when implementing a WLAN solution. This is
because the WLAN must seamlessly interoperate with the existing wired network. WLAN
security configuration will be covered later in the course. The wired LAN will continue as a
predominant portion of the complete and modern network system.
4.2 WLAN Topologies
WLAN
4.2.2
categories

WLANs are access layer elements or products. WLAN products fit into two main categories:

1. Wireless in-building LANs


2. Wireless building-to-building bridging

WLANs replace the Layer 1 transmission medium of a traditional wired network, which is
usually a Category 5 cable, with radio transmission over the air. WLANs also replace the Layer
2 MAC functionality, with wireless MAC drivers. WLAN products can plug into a wired network
and function as an overlay to traditional or wired LANs. WLANs can also be deployed as a
standalone LAN, when wired networking is not feasible. WLANs allow the use of desktops,
portable computers, and specialty devices in an environment where connection to the network
is essential. WLANs are typically within a building, and are used for distances up to 305 m
(1000 ft). Properly used WLANs can provide instant access to the network from anywhere in a
facility. Users will be able to roam without losing their network connections. The Cisco WLAN
provides complete flexibility.

Wireless bridges allow two or more networks that are physically separated to be connected on
one LAN, without the time or expense of dedicated cables or T1 lines. Examples of wireless
bridge applications are shown in Figures and .
4.2 WLAN Topologies
Local
area
4.2.3
networks
(LAN)

Wired LANs require users to stay in one location. WLANs are an extension to the wired LAN
network. WLANs can also be a complete substitute for traditional wired LAN networks. With
Cisco WLANs, mobile users can do the following:

• Move freely around a facility


• Enjoy real-time access to the wired LAN, at wired Ethernet speeds
• Access all resources of the wired LANs

The basic service set (BSS) is the area of RF coverage provided by one access point. It is also
referred to as a microcell. As shown in Figure , a BSS can be extended by adding another AP.
When more than one BSS is connected to a wired LAN, it is referred to as an extended service
set (ESS). Adding an AP is also a way to add wireless devices and extend the range of an
existing wired system.

The AP attaches to the Ethernet backbone and also communicates with all the wireless devices
in the cell area. The AP is the master for the cell. It controls traffic flow to and from the network.
The remote devices do not communicate directly with each other. Rather, the devices
communicate through the AP.

If a single cell does not provide enough coverage, any number of cells can be added to extend
the range. It is recommended that adjacent BSS cells have a 10 to 15 percent overlap, as
shown in Figure . This allows remote users to roam without losing RF connectivity. Bordering
cells should be set to different non-overlapping channels, or frequencies, for best performance.
4.2 WLAN Topologies
Wireless
4.2.4
repeater

In an environment where extended coverage is needed, but access to the backbone is not
practical or available, a wireless repeater can be used. A wireless repeater is simply an
access point that is not connected to the wired backbone. This setup requires a 50%
overlap of the AP on the backbone and the wireless repeater, as shown in Figure .

The user can set up a chain of several repeater access points. However, the
throughput for client devices at the end of the repeater chain will
be quite low. This is because each repeater must receive and then re-
transmit each packet on the same channel. For each repeater added to the
chain, throughput is cut in half. It is recommended that not more than two hops be used.

When configuring repeater access points use the following guidelines:

• Use repeaters to serve client devices that do not require high throughput.
Repeaters extend the coverage area of the WLAN, but they drastically reduce
throughput.
• Use repeaters when client devices that associate with the repeaters are Cisco
Aironet clients. Non-Cisco client devices sometimes have trouble communicating
with repeater access points.
• Use omnidirectional antennas, like the ones that ship with the access point, for
repeater access points.

Generally within buildings, the availability of Ethernet connections is fairly pervasive.


Repeaters can be used to extend APs from the building edge, to the surrounding outdoor
portions of the building, for temporary use. For example, one customer could use repeater-
mode APs to extend coverage into the parking lot during spring sales for a grocery store.

The client association is assigned to the wired/root AP and not to the AP acting like a
repeater.

4.2 WLAN Topologies


System
redundancy
4.2.5
and load
balancing

In a LAN where it is essential to have communications, some customers will require


redundancy. With the direct sequence spread spectrum (DSSS) products of a different
vendor, both AP units would be set to the same frequency and data rate, as pictured in

Figure . Since these units timeshare the frequency, only one unit can be talking at a time. If
that one unit goes down for some reason, the remote clients will
hand off to the other active unit. While this does provide
redundancy, it does not provide any more throughput than a single AP provides.

With the Cisco DS systems, the units are set to different channels. The remote clients will
load balance, when both units are active, as shown in Figure . If one unit goes down,
remote clients will hand off to the remaining unit and continue working. Load balancing can
be configured based on the number of users, the bit error rate, or signal strength.

Another option, when fault-tolerance and availability are critical, is a


hot-standby AP. In this case, there is no load balancing. For business-critical
deployments, a Cisco Aironet AP can be configured as a redundant hot standby to another

AP in the same coverage area. The hot-standby AP continually monitors


the primary AP on the same channel, and assumes its role in the
rare case of a failure of the primary AP. The standby will be ready to take
over, if the primary AP becomes unavailable. Note that both APs in Figure use the same
channel, or Channel X.
4.2 WLAN Topologies
4.2.6 Roaming

A WLAN designer must determine whether clients will require seamless roaming from
access point to access point, as depicted in Figure .

As a client roams across the wireless network, it must establish and maintain an association
with an Aironet access point.

The following steps are taken to ensure seamless roaming:

• The client sends out a request for association and immediately receives a response
from all access points within its coverage area.
• The client decides which access point to associate with based on signal quality,
strength, the number of users associated, and the required number of hops to reach
the backbone.
• After an association is established, the client's Media Access Control (MAC)
address drops into the table of the selected access point. If the client encounters
difficulty, it will roam for another access point. If no other access point is available,
the client will lower its data transmission rate and try to maintain connection.
• After the client roams to another access point, its MAC address drops into the table
of the new access point, which sends a broadcast message basically stating that it
received "MAC address X".
• The original access point forwards any data it had for the client to the other access
point, which responds by sending the same to the client.

The following two factors need to be considered when designing a WLAN with seamless
roaming capabilities for devices that are powered on while moving from one point to
another:

• Coverage must be sufficient for the entire path.


• A consistent IP address should be available throughout the
entire path. The IP subnet for each access point could be on different switches
and separated by Layer 3 devices. If so, consider using Layer 2 switching
technologies such as ATM-LANE, ISL, or 802.1q, to span the VLANs. This will help
ensure that there is a single broadcast domain for all access points. Figure
illustrates such a scenario.
Association process
When a client comes online, it will broadcast a probe request. An AP that hears this will
respond with information about the AP such as RF hops to the backbone, load, and so on. If
more than one AP replies, then the client will decide which AP to associate with, based on
the information returned from the AP. APs broadcast ‘beacons’ at periodic intervals. A
beacon contains details similar to that in the probe response. The client listens to all APs it
can hear and builds an information table about the APs. The association process is
illustrated in Figure .

Re-Association process
As the client is moving out of range of its associated AP, the signal strength will start to drop
off. At the same time, the strength of another AP will begin to increase. The re-association
process that occurs is shown in Figure . The same type of handoff can occur if the load on
one AP becomes too large as long as the client can communicate with another AP.
4.2 WLAN Topologies
4.2.7 Scalability

Scalability is the ability to locate more than one access point in the
same area. This will increase the available bandwidth of that area for all users local to
that access point. In the past, this scalability was limited to only frequency hopping spread
spectrum (FHSS) products. DSSS products could not change channels without some
reconfiguration. The current Cisco Aironet products are frequency agile. This means that
they can look for and use the best channel. There are three separate, 11-Mbps channels
available. These channels are completely non-overlapping and non-interfering. Up to a
theoretical 33 Mbps per cell can be achieved with 802.11b devices. However, users still
only operate at a maximum theoretical value of 11 Mbps, since they can only connect to
one AP at any given time.

In the case of 802.11a, there are eight non-overlapping channels, each up to a theoretical
bandwidth of 54 Mbps. This means that a maximum of eight discrete systems can reside in
the same area, with no interference. Therefore, the highest aggregate total data rate for an
802.11a system is a theoretical 432 Mbps, for a given cell area. Remember that any
connected user will still only receive up to 54 Mbps. With more APs, users will have a
greater chance of higher data rates.

You might also like