0% found this document useful (0 votes)
27 views112 pages

Wireless LANs

Wireless LANs use radio waves to connect devices in a local area network, avoiding the need for wired connections. They have become more popular as prices have decreased and performance has increased. Wireless LANs can extend existing wired LANs, connect buildings nearby, and provide mobile access to laptops and other devices. Key technologies include infrared and various radio technologies like spread spectrum. Wireless LANs require addressing interference and providing reliable connectivity and security for multiple mobile devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views112 pages

Wireless LANs

Wireless LANs use radio waves to connect devices in a local area network, avoiding the need for wired connections. They have become more popular as prices have decreased and performance has increased. Wireless LANs can extend existing wired LANs, connect buildings nearby, and provide mobile access to laptops and other devices. Key technologies include infrared and various radio technologies like spread spectrum. Wireless LANs require addressing interference and providing reliable connectivity and security for multiple mobile devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 112

Wireless Networks

Wireless LANs Implementations


Overview
• A wireless LAN uses wireless transmission
medium
• Used to have high prices, low data rates,
occupational safety concerns, and licensing
requirements
• Problems have been addressed
• Popularity of wireless LANs has grown rapidly
Applications - LAN Extension
• Saves installation of LAN cabling
• Eases relocation and other modifications to network structure
• However, increasing reliance on twisted pair cabling for LANs
— Most older buildings already wired with Cat 3 cable
— Newer buildings are prewired with Cat 5
• Wireless LAN to replace wired LANs has not happened
• In some environments, role for the wireless LAN
— Buildings with large open areas
• Manufacturing plants, stock exchange trading floors, warehouses
• Historical buildings
• Small offices where wired LANs not economical
• May also have wired LAN
— Servers and stationary workstations
Single Cell Wireless LAN
Configuration
Multi-Cell Wireless LAN
Configuration
Applications –
Cross-Building Interconnect
• Connect LANs in nearby buildings
• Point-to-point wireless link
• Connect bridges or routers
• Not a LAN per se
—Usual to include this application under heading of
wireless LAN
•  
Applications - Nomadic Access
• Link between LAN hub and mobile data terminal
—Laptop or notepad computer
—Enable employee returning from trip to transfer data
from portable computer to server
• Also useful in extended environment such as
campus or cluster of buildings
—Users move around with portable computers
—May wish access to servers on wired LAN
Infrastructure Wireless LAN
Applications –
Ad Hoc Networking
• Peer-to-peer network
• Set up temporarily to meet some immediate
need
• E.g. group of employees, each with laptop or
palmtop, in business or classroom meeting
• Network for duration of meeting
Add Hoc LAN
Wireless LAN Requirements
• Same as any LAN
— High capacity, short distances, full connectivity, broadcast capability
• Throughput: efficient use wireless medium
• Number of nodes:Hundreds of nodes across multiple cells
• Connection to backbone LAN: Use control modules to connect to both types
of LANs
• Service area: 100 to 300 m
• Low power consumption:Need long battery life on mobile stations
— Mustn't require nodes to monitor access points or frequent handshakes
• Transmission robustness and security:Interference prone and easily
eavesdropped
• Collocated network operation:Two or more wireless LANs in same area
• License-free operation
• Handoff/roaming: Move from one cell to another
• Dynamic configuration: Addition, deletion, and relocation of end systems
without disruption to users
Technology
• Infrared (IR) LANs: Individual cell of IR LAN
limited to single room
—IR light does not penetrate opaque walls
• Spread spectrum LANs: Mostly operate in
ISM (industrial, scientific, and medical) bands
—No Federal Communications Commission (FCC)
licensing is required in USA
• Narrowband microwave: Microwave
frequencies but not use spread spectrum
—Some require FCC licensing
Infrared LANs
Strengths and Weaknesses
• Spectrum virtually unlimited
— Infrared spectrum is unregulated worldwide
— Extremely high data rates
• Infrared shares some properties of visible light
— Diffusely reflected by light-colored objects
• Use ceiling reflection to cover entire room
— Does not penetrate walls or other opaque objects
• More easily secured against eavesdropping than microwave
• Separate installation in every room without interference
• Inexpensive and simple
— Uses intensity modulation, so receivers need to detect only amplitude
• Background radiation
— Sunlight, indoor lighting
— Noise, requiring higher power and limiting range
— Power limited by concerns of eye safety and power consumption
Infrared LANs
Transmission Techniques
• Directed-beam IR
— Point-to-point links
— Range depends on power and focusing
• Can be kilometers
• Used for building interconnect within line of sight
— Indoor use to set up token ring LAN
— IR transceivers positioned so that data circulate in ring
• Omnidirectional
— Single base station within line of sight of all other stations
• Typically, mounted on ceiling
— Acts as a multiport repeater
— Other transceivers use directional beam aimed at ceiling unit
• Diffused configuration
— Transmitters are focused and aimed at diffusely reflecting ceiling
Spread Spectrum LANs
Hub Configuration
• Usually use multiple-cell arrangement
• Adjacent cells use different center frequencies
• Hub is typically mounted on ceiling
— Connected to wired LAN
— Connect to stations attached to wired LAN and in other cells
— May also control access
• IEEE 802.11 point coordination function
— May also act as multiport repeater
• Stations transmit to hub and receive from hub
— Stations may broadcast using an omnidirectional antenna
• Logical bus configuration
• Hub may do automatic handoff
— Weakening signal, hand off
Spread Spectrum LANs
Peer-to-Peer Configuration
• No hub
• MAC algorithm such as CSMA used to control
access
• Ad hoc LANs
•  
Spread Spectrum LANs
Transmission Issues
• Licensing regulations differ from one country to another
• USA FCC authorized two unlicensed applications within the ISM
band:
— Spread spectrum - up to 1 watt
— Very low power systems- up to 0.5 watts
— 902 - 928 MHz (915-MHz band)
— 2.4 - 2.4835 GHz (2.4-GHz band)
— 5.725 - 5.825 GHz (5.8-GHz band)
— 2.4 GHz also in Europe and Japan
— Higher frequency means higher potential bandwidth
• Interference
— Devices at around 900 MHz, including cordless telephones, wireless
microphones, and amateur radio
— Fewer devices at 2.4 GHz; microwave oven
— Little competition at 5.8 GHz
• Higher frequency band, more expensive equipment
Narrow Band Microwave LANs
• Just wide enough to accommodate signal
• Until recently, all products used licensed band
• At least one vendor has produced LAN product
in ISM band
Licensed Narrowband RF
• Microwave frequencies usable for voice, data, and video licensed
within specific geographic areas to avoid interference
— Radium 28 km
— Can contain five licenses
— Each covering two frequencies
— Motorola holds 600 licenses (1200 frequencies) in the 18-GHz range
— Cover all metropolitan areas with populations of 30,000 or more in USA
• Use of cell configuration
• Adjacent cells use nonoverlapping frequency bands
• Motorola controls frequency band
— Can assure nearby independent LANs do not interfere
• All transmissions are encrypted
• Licensed narrowband LAN guarantees interference-free
communication
• License holder has legal right tointerference-free data channel
Unlicensed Narrowband RF
• 1995, RadioLAN introduced narrowband wireless LAN using
unlicensed ISM spectrum
— Used for narrowband transmission at low power
• 0.5 watts or less
— Operates at 10 Mbps
— 5.8-GHz band
— 50 m in semiopen office and 100 m in open office
• Peer-to-peer configuration
• Elects one node as dynamic master
— Based on location, interference, and signal strength
• Master can change automatically as conditions change
• Includes dynamic relay function
• Stations can act as repeater to move data between stations
that are out of range of each other
IEEE 802.11 - BSS
• MAC protocol and physical medium specification for
wireless LANs
• Smallest building block is basic service set (BSS)
— Number of stations
— Same MAC protocol
— Competing for access to same shared wireless medium
• May be isolated or connect to backbone distribution
system (DS) through access point (AP)
— AP functions as bridge
• MAC protocol may be distributed or controlled by central
coordination function in AP
• BSS generally corresponds to cell
• DS can be switch, wired network, or wireless network
BSS Configuration
• Simplest: each station belongs to single BSS
—Within range only of other stations within BSS
• Can have two BSSs overlap
—Station could participate in more than one BSS
• Association between station and BSS dynamic
—Stations may turn off, come within range, and go out
of range
Extended Service Set (ESS)
• Two or more BSS interconnected by DS
—Typically, DS is wired backbone but can be any
network
• Appears as single logical LAN to LLC
Access Point (AP)
• Logic within station that provides access to DS
—Provides DS services in addition to acting as station
• To integrate IEEE 802.11 architecture with
wired LAN, portal used
• Portal logic implemented in device that is part of
wired LAN and attached to DS
—E.g. Bridge or router
Wireless Network Access Point
• On wireless
networks, a
wireless
access point
handles
these duties
IEEE 802.11 Architecture
Services
Service Provider Category
Association Distribution system MSDU delivery
Authentication Station LAN access and security

Deauthentication Station LAN access and security


Dissassociation Distribution system MSDU delivery
Distribution Distribution system MSDU delivery
Integration Distribution system MSDU delivery
MSDU delivery Station MSDU delivery
Privacy Station LAN access and security
Reassocation Distribution system MSDU delivery
Categorizing Services
• Station services implemented in every 802.11 station
— Including AP stations
• Distribution services provided between BSSs
— May be implemented in AP or special-purpose device
• Three services used to control access and confidentiality
• Six services used to support delivery of MAC service
data units (MSDUs) between stations
— Block of data passed down from MAC user to MAC layer
— Typically LLC PDU
— If MSDU too large for MAC frame, fragment and transmit in
series of frames (see later)
Distribution of Messages
Within a DS
• Distribution is primary service used by stations to
exchange MAC frames when frame must traverse DS
— From station in one BSS to station in another BSS
— Transport of message through DS is beyond scope of 802.11
— If stations within same BSS, distribution service logically goes
through single AP of that BSS
• Integration service enables transfer of data between
station on 802.11 LAN and one on an integrated 802.x
LAN
— Integrated refers to wired LAN physically connected to DS
• Stations may be logically connected to 802.11 LAN via integration
service
— Integration service takes care of address translation and media
conversion
Association Related Services
• Purpose of MAC layer transfer MSDUs between MAC entities
• Fulfilled by distribution service (DS)
• DS requires information about stations within ESS
— Provided by association-related services
— Station must be associated before communicating
• Three transition types of based on mobility
— No transition: Stationary or moves within range of single BSS
— BSS transition: From one BSS to another within same ESS
• Requires addressing capability be able to recognize new location
• ESS transition: From BSS in one ESS to BSS in another ESS
— Only supported in sense that the station can move
— Maintenance of upper-layer connections not guaranteed
— Disruption of service likely
Station Location
• DS needs to know where destination station is
— Identity of AP to which message should be delivered
— Station must maintain association with AP within current BSS
• Three services relate to this requirement: 
— Association: Establishes initial association between station and AP
• To make identity and address known
• Station must establish association with AP within particular BSS
• AP then communicates information to other APs within ESS
— Reassociation: Transfer established association to another AP
• Allows station to move from one BSS to another
— Disassociation: From either station or AP that association is
terminated
— Given before station leaves ESS or shuts
• MAC management facility protects itself against stations that disappear
without notification
Access and Privacy Services -
Authentication
• On wireless LAN, any station within radio range other devices can
transmit
• Any station within radio range can receive
• Authentication: Used to establish identity of stations to each other
— Wired LANs assume access to physical connection conveys authority to
connect to LAN
— Not valid assumption for wireless LANs
• Connectivity achieved by having properly tuned antenna
— Authentication service used to establish station identity
— 802.11 supports several authentication schemes
• Allows expansion of these schemes
— Does not mandate any particular scheme
— Range from relatively insecure handshaking to public-key encryption
schemes
— 802.11 requires mutually acceptable, successful authentication before
association
Access and Privacy Services -
Deauthentication and Privacy
• Deauthentication: Invoked whenever an existing
authentication is to be terminated
• Privacy: Used to prevent messages being read
by others
• 802.11 provides for optional use of encryption
Medium Access Control
• MAC layer covers three functional areas
• Reliable data delivery
• Access control
• Security
– Beyond our scope
Reliable Data Delivery
• 802.11 physical and MAC layers subject to unreliability
• Noise, interference, and other propagation effects result in
loss of frames
• Even with error-correction codes, frames may not
successfully be received
• Can be dealt with at a higher layer, such as TCP
— However, retransmission timers at higher layers typically order of
seconds
— More efficient to deal with errors at the MAC level
• 802.11 includes frame exchange protocol
— Station receiving frame returns acknowledgment (ACK) frame
— Exchange treated as atomic unit
• Not interrupted by any other station
— If noACK within short period of time, retransmit
Four Frame Exchange
• Basic data transfer involves exchange of two frames
• To further enhance reliability, four-frame exchange may
be used
— Source issues a Request to Send (RTS) frame to destination
— Destination responds with Clear to Send (CTS)
— After receiving CTS, source transmits data
— Destination responds with ACK
• RTS alerts all stations within range of source that
exchange is under way
• CTS alerts all stations within range of destination
• Stations refrain from transmission to avoid collision
• RTS/CTS exchange is required function of MAC but may
be disabled
Media Access Control
• Distributed wireless foundation MAC (DWFMAC)
—Distributed access control mechanism
—Optional centralized control on top
• Lower sublayer is distributed coordination
function (DCF)
—Contention algorithm to provide access to all traffic
—Asynchronous traffic
• Point coordination function (PCF)
—Centralized MAC algorithm
—Contention free
—Built on top of DCF
IEEE 802.11 Protocol
Architecture
Distributed Coordination
Function
• DCF sublayer uses CSMA
• If station has frame to transmit, it listens to medium
• If medium idle, station may transmit
• Otherwise must wait until current transmission complete
• No collision detection
— Not practical on wireless network
— Dynamic range of signals very large
— Transmitting station cannot distinguish incoming weak signals
from noise and effects of own transmission
• DCF includes delays
— Amounts to priority scheme
• Interframe space
Interframe Space
• Single delay known as interframe space (IFS)
• Using IFS, rules for CSMA:
1. Station with frame senses medium
• If idle, wait to see if remains idle for one IFS. If so, may transmit
immediately
2. If busy (either initially or becomes busy during IFS) station
defers transmission
• Continue to monitor until current transmission is over
3. Once current transmission over, delay another IFS
• If remains idle, back off random time and again sense
• If medium still idle, station may transmit
• During backoff time, if becomes busy, backoff timer is halted and
resumes when medium becomes idle
• To ensure stability, binary exponential backoff used
Priority
• Use three values for IFS
• SIFS (short IFS):
— Shortest IFS
— For all immediate response actions (see later)
• PIFS (point coordination function IFS):
— Midlength IFS
— Used by the centralized controller in PCF scheme when issuing
polls
• DIFS (distributed coordination function IFS):
— Longest IFS
— Used as minimum delay for asynchronous frames contending for
access
SIFS Use - ACK
• Station using SIFS to determine transmission opportunity has
highest priority
— In preference to station waiting PIFS or DIFS time
• SIFS used in following circumstances:
• Acknowledgment (ACK): Station responds with ACK after
waiting SIFS gap
— No collision detection so likelihood of collisions greater than CSMA/CD
• MAC-level ACK gives efficient collision recovery
— SIFS provide efficient delivery of multiple frame LLC PDU
• Station with multiframe LLC PDU to transmit sends out MAC frames one at a
time
• Each frame acknowledged after SIFS by recipient
• When source receives ACK, immediately (after SIFS) sends next frame in
sequence
• Once station has contended for channel, it maintains control of all fragments
sent
SIFS Use – CTS
• Clear to Send (CTS): Station can ensure data
frame will get through by issuing RTS
—Destination station should immediately respond with
CTS if ready to receive
—All other stations hear RTS and defer
• Poll response: See Point coordination Function
(PCF)
PIFS and DIFS
• PIFS used by centralized controller
—Issuing polls
—Takes precedence over normal contention traffic
—Frames using SIFS have precedence over PCF poll
• DIFS used for all ordinary asynchronous traffic
IEEE 802.11 MAC Timing
Basic Access Method
Point Coordination Function
(PCF)
• Alternative access method implemented on top of DCF
• Polling by centralized polling master (point coordinator)
• Uses PIFS when issuing polls
— PIFS smaller than DIFS
— Can seize medium and lock out all asynchronous traffic while it issues polls
and receives responses
• E.g. wireless network configured so number of stations with time-
sensitive traffic controlled by point coordinator
— Remaining traffic contends for access using CSMA
• Point coordinator polls in round-robin to stations configured for polling
• When poll issued, polled station may respond using SIFS
• If point coordinator receives response, it issues another poll using PIFS
• If no response during expected turnaround time, coordinator issues
poll
Superframe
• Point coordinator would lock out asynchronous traffic by issuing polls
• Superframe interval defined
— During first part of superframe interval, point coordinator polls round-robin to
all stations configured for polling
— Point coordinator then idles for remainder of superframe
— Allowing contention period for asynchronous access
• At beginning of superframe, point coordinator may seize control and
issue polls for given period
— Time varies because of variable frame size issued by responding stations
• Rest of superframe available for contention-based access
• At end of superframe interval, point coordinator contends for access
using PIFS
• If idle, point coordinator gains immediate access
— Full superframe period follows
— If busy, point coordinator must wait for idle to gain access
— Results in foreshortened superframe period for next cycle
IEEE 802.11 MAC Timing
PCF Superframe Construction
IEEE 802.11 MAC Frame Format
MAC Frame Fields (1)
• Frame Control:
— Type of frame
— Control, management, or data
— Provides control information
• Includes whether frame is to or from DS, fragmentation information,
and privacy information
• Duration/Connection ID:
— If used as duration field, indicates time (in s) channel will be
allocated for successful transmission of MAC frame
— In some control frames, contains association or connection identifier
• Addresses:
— Number and meaning of address fields depend on context
— Types include source, destination, transmitting station, and receiving
station
MAC Frame Fields (2)
• Sequence Control:
—4-bit fragment number subfield
• For fragmentation and reassembly
—12-bit sequence number
—Number frames between given transmitter and
receiver
• Frame Body:
—MSDU (or a fragment of)
• LLC PDU or MAC control information
• Frame Check Sequence:
—32-bit cyclic redundancy check
Control Frames
• Assist in reliable data delivery 
• Power Save-Poll (PS-Poll)
— Sent by any station to station that includes AP
— Request AP transmit frame buffered for this station while station in power-
saving mode
• Request to Send (RTS)
— First frame in four-way frame exchange
• Clear to Send (CTS)
— Second frame in four-way exchange
• Acknowledgment (ACK)
• Contention-Free (CF)-end
— Announces end of contention-free period part of PCF
• CF-End + CF-Ack:
— Acknowledges CF-end
— Ends contention-free period and releases stations from associated restrictions
Data Frames – Data Carrying
• Eight data frame subtypes, in two groups
• First four carry upper-level data from source station to
destination station
• Data
— Simplest data frame
— May be used in contention or contention-free period
• Data + CF-Ack
— Only sent during contention-free period
— Carries data and acknowledges previously received data
• Data + CF-Poll
— Used by point coordinator to deliver data
— Also to request station send data frame it may have buffered
• Data + CF-Ack + CF-Poll
— Combines Data + CF-Ack and Data + CF-Poll
Data Frames –
Not Data Carrying
• Remaining four data frames do not carry user
data
• Null Function
—Carries no data, polls, or acknowledgments
—Carries power management bit in frame control field
to AP
—Indicates station is changing to low-power state
• Other three frames (CF-Ack, CF-Poll, CF-Ack +
CF-Poll) same as corresponding frame in
preceding list (Data + CF-Ack, Data + CF-Poll,
Data + CF-Ack + CF-Poll) but without data
Management Frames
• Used to manage communications between
stations and Aps
• E.g. management of associations
—Requests, response, reassociation, dissociation, and
authentication
802.11 Physical Layer
• Issued in four stages
• First part in 1997
— IEEE 802.11
— Includes MAC layer and three physical layer specifications
— Two in 2.4-GHz band and one infrared
— All operating at 1 and 2 Mbps
• Two additional parts in 1999
— IEEE 802.11a
• 5-GHz band up to 54 Mbps
— IEEE 802.11b
• 2.4-GHz band at 5.5 and 11 Mbps
• Most recent in 2002
— IEEE 802.g extends IEEE 802.11b to higher data rates
Original 802.11 Physical Layer -

DSSS
• Three physical media 
• Direct-sequence spread spectrum
—2.4 GHz ISM band at 1 Mbps and 2 Mbps
—Up to seven channels, each 1 Mbps or 2 Mbps, can
be used
—Depends on bandwidth allocated by various national
regulations
• 13 in most European countries
• One in Japan
—Each channel bandwidth 5 MHz
—Encoding scheme DBPSK for 1-Mbps and DQPSK for
2-Mbps
Original 802.11 Physical Layer -
FHSS
• Frequency-hopping spread spectrum
— 2.4 GHz ISM band at 1 Mbps and 2 Mbps
— Uses multiple channels
— Signal hopping from one channel to another based on a pseudonoise
sequence
— 1-MHz channels are used
— 23 channels in Japan
— 70 in USA
• Hopping scheme adjustable
— E.g. Minimum hop rate forUSA is 2.5 hops per second
— Minimum hop distance 6 MHz in North America and most of Europe and 5
MHz in Japan
• Two-level Gaussian FSK modulation for 1-Mbps
— Bits encoded as deviations from current carrier frequency
• For 2 Mbps, four-level GFSK used
— Four different deviations from center frequency define four 2-bit combinations
Original 802.11 Physical Layer –
Infrared
• Omnidirectional
• Range up to 20 m
• 1 Mbps used 16-PPM (pulse position modulation)
— Each group of 4 data bits mapped into one of 16-PPM symbols
— Each symbol a string of 16 bits
— Each 16-bit string consists of fifteen 0s and one binary 1
• For 2-Mbps, each group of 2 data bits is mapped into
one of four 4-bit sequences
— Each sequence consists of three 0s and one binary 1
— Intensity modulation
• Presence of signal corresponds to 1 
802.11a
• 5-GHz band
• Uses orthogonal frequency division multiplexing (OFDM)
— Not spread spectrum
• Also called multicarrier modulation
• Multiple carrier signals at different frequencies
• Some bits on each channel
— Similar to FDM but all subchannels dedicated to single source
• Data rates 6, 9, 12, 18, 24, 36, 48, and 54 Mbps
• Up to 52 subcarriers modulated using BPSK, QPSK, 16-QAM,
or 64-QAM
— Depending on rate
— Subcarrier frequency spacing 0.3125 MHz
— Convolutional code at rate of 1/2, 2/3, or 3/4 provides forward error
correction
802.11b
• Extension of 802.11 DS-SS scheme
• 5.5 and 11 Mbps
• Chipping rate 11 MHz
— Same as original DS-SS scheme
— Same occupied bandwidth
— Complementary code keying (CCK) modulation to achieve higher
data rate in same bandwidth at same chipping rate
— CCK modulation complex
• Overview on next slide
— Input data treated in blocks of 8 bits at 1.375 MHz
• 8 bits/symbol  1.375 MHz = 11 Mbps
• Six of these bits mapped into one of 64 code sequences
• Output of mapping, plus two additional bits, forms input to QPSK
modulator
802.11g
• Higher-speed extension to 802.11b
• Combines physical layer encoding techniques
used in 802.11a and 802.11b to provide service
at a variety of data rates
802.11b
• DSSS (direct-sequence spread spectrum)
signaling
• 2.4-GHz band
—Separated into 22-MHz channels
• Throughput
—11 Mbps theoretical
—5 Mbps actual throughput
• 100 meters distance limit
—Node to Access Point
• Oldest, least expensive
• Being replaced by 802.11g
Wireless Network Implementation 64
802.11a
• Released after 802.11b
• 5-GHz band
—Not congested like 2.4-GHz band
• Lower interference, requires more transmit power
• Throughput
—54 Mbps theoretical
—11 and 18 Mbps effective
• Attributable to higher frequencies, unique modulating data
method, more available bandwidth
• 20 meter distance limit
• More expensive, least popular

Wireless Network Implementation 65


802.11g
• Affordable as 802.11b
• Throughput
—54 Mbps theoretical
—20 to 25 Mbps effective
• 100 meter node range
• 2.4-GHz frequency band
—Compatible with 802.11b networks

Wireless Network Implementation 66


802.11n
—Draft: expected ratification in late 2009
—Manufacturers
• Selling 802.11n-compatible transceivers
—Primary goal
• Wireless standard providing much higher effective
throughput
—Maximum throughput: 600 Mbps
• Threat to Fast Ethernet
—Backward compatible with 802.11a, b, g
standards
Wireless Network Implementation 67
802.11n (cont’d.)
• 2.4-GHz or 5-GHz frequency range
• Compared with 802.11a, 802.11g
—Same data modulation techniques
• Compared with three 802.11 standards
—Manages frames, channels, encoding
differently
• Allows high throughput

Wireless Network Implementation 68


802.11n (cont’d.)
• MIMO (multiple
input-multiple
output)
—Multiple access
point antennas may
issue signal to one
or more receivers
—Receivers combine
signal together
—Increases network’s Figure 8-10 802.11n access point
throughput, access with three antennas
point’s range

Wireless Network Implementation 69


802.11n (cont’d.)
• Channel bonding
—Two adjacent 20-MHz channels bonded to make 40-
MHz channel
• More than doubles the bandwidth available in single 20-MHz
channel
• Because less bandwidth is used to buffer between channels
• Higher modulation rates
—More efficient use of channels

Wireless Network Implementation 70


802.11n (cont’d.)

Figure 8-11 Aggregated 802.11n


frame

• Frame aggregation
—Combine multiple frames into one larger frame
—Advantage: reduces overhead

Wireless Network Implementation 71


802.11n (cont’d.)
• Maximum throughput depends on the strategies
used
—2.4-GHz or 5-GHz band
—Actual throughput: 65 to 600 Mbps
• Backward compatible, can be mixed with
802.11a, 802.11b, or 802.11 g
—Not all 802.11n features work in mixed-mode WLANs
• Recommendation
—Use 802.11n-compatible devices

Wireless Network Implementation 72


Bluetooth Networks
Bluetooth Networks
• Ericson’s original goals
—Wireless technology compatible with multiple devices
—Require little power
—Cover short ranges
• Aim of Bluetooth Special Interest Group (SIG)
—Refine and standardize technology
—Result: Bluetooth
• Mobile wireless networking standard using FHSS (frequency
hopping spread spectrum) RF signaling in 2.4-GHz band

Wireless Network Implementation 74


Bluetooth Networks (cont’d.)
• Version 1.1
—Maximum theoretical throughput: 1 Mbps
—Effective throughput: 723 Kbps
—10 meter node distance
—Designed for PANs (personal area networks)
• Version 2.0 (2004)
—Different encoding schemes
• 2.1-Mbps throughput
—30 meters node distance
—Usage: cellular telephones, phone headsets,
computer peripherals, PDAs

Wireless Network Implementation 75


Summary of WLAN Standards

Table 8-1 Wireless


standards

Wireless Network Implementation 76


Implementing a WLAN
Implementing a WLAN
• Designing a small WLAN
—Home, small office
• Formation of larger, enterprise-wide WANs
• Installing and configuring access points and
clients
• Implementation pitfalls
—Avoidance
• Material applies to 802.11b and 802.11g
—Most popular

Wireless Network Implementation 78


Determining the Design
• One access point
—Combine with switching, routing functions
—Connects wireless clients to LAN
—Acts as Internet gateway
• Access point WLAN placement considerations
—Typical distances between access point and client
—Obstacles
• Type, number between access point and clients

Wireless Network Implementation 79


Determining the Design
(cont’d.)

Figure 8-12 Home or small office WLAN


arrangement
Wireless Network Implementation 80
Determining the Design
(cont’d.)
• Larger WLANs
—Systematic approach to access point placement
• Site survey
—Assesses client requirements, facility characteristics,
coverage areas
—Determines access point arrangement ensuring
reliable wireless connectivity
• Within given area
—Proposes access point testing
• Testing wireless access from farthest corners

Wireless Network Implementation 81


Determining the Design
(cont’d.)
• Install access points
—Must belong to same ESS, share ESSID
• Enterprise-wide WLAN design considerations
—How wireless LAN portions will integrate with wired
portions

Wireless Network Implementation 82


Determining the Design
(cont’d.)

Figure 8-13 Enterprise-wide


WLAN
Wireless Network Implementation 83
Configuring Wireless Clients
• Configuration varies from one client type to
another
• Windows XP client WLAN configuration
—Use graphical interface
• Linux and UNIX clients wireless interface
configuration
—Use graphical interface
— iwconfig command-line function
• View, set wireless interface parameters

Wireless Network Implementation 84


Configuring Wireless Clients
(cont’d.)

Figure 8-19 Windows XP Wireless Network


Connection Properties dialog box
Wireless Network Implementation 85
Configuring Wireless Clients
(cont’d.)

Figure 8-20 Windows XP Wireless network


properties dialog box
Wireless Network Implementation 86
Configuring Wireless Clients
(cont’d.)

Figure 8-21 Output from iwconfig


command

Wireless Network Implementation 87


Avoiding Pitfalls
• Access point versus client configurations
—SSID mismatch
—Incorrect encryption
—Incorrect channel, frequency
—Standard mismatch (802.11 a/b/g/n)
• Incorrect antenna placement
—Verify client within 330 feet
• Interference
—Check for EMI sources

Wireless Network Implementation 88


Wireless WANs and Internet
Access
Wireless WANs and Internet
Access
• Wireless broadband
—Latest wireless WAN technologies
—Specifically designed for:
• High-throughput, long-distance digital data exchange

Wireless Network Implementation 90


802.11 Internet Access
• Access points: 802.11b or 802.11g access methods
• Hot spots
— Places with publicly available wireless Internet access
— Free or subscription
• Hot spot subscription Internet access
— Log on via Web page
— Client software managing client’s connection
• Network log on, secure data exchange
• Added security: accept connection based on MAC address
• Accept user’s connection based on MAC address

Wireless Network Implementation 91


802.16 (WiMAX) Internet
Access
• WiMAX (Worldwide Interoperability for Microwave
Access)
— Current version: 802.16e (2005)
• Improved mobility, QoS characteristics
• Digital voice signals, mobile phone users
• Functions in 2 and 66 GHz range
— Licensed, nonlicensed frequencies
• Line-of-sight paths between antennas
— Throughput potential maximized
• Non-line-of-sight paths
— Exchange signals with multiple stations at once

Wireless Network Implementation 92


802.16 (WiMAX) Internet Access
(cont’d.)
• Two distinct advantages over Wi-Fi
— Much greater throughput (70 Mbps)
— Much farther range (30 miles)
• Appropriate for MANs and WANs
• Highest throughput achieved over shortest distances
between transceivers
• Possible uses
— Alternative to DSL, broadband cable
— Well suited to rural users
— Internet access to mobile computerized devices
— Residential homes

Wireless Network Implementation 93


802.16 (WiMAX) Internet Access
(cont’d.)

Figure 8-22 WiMAX residential service


installation
Wireless Network Implementation 94
802.16 (WiMAX) Internet Access
(cont’d.)

Figure 8-23 WiMAX Figure 8-24 WiMAX


residential antenna service provider’s
antenna
Wireless Network Implementation 95
802.16 (WiMAX) Internet Access
(cont’d.)
• Metropolitan area installation
—No need for home antenna
• WiMAX MANs
—Extensive connectivity
—Download data rates faster than home broadband
connection
—Shared service
• Apportioned bandwidth
• Drawback
—Expensive

Wireless Network Implementation 96


Clear
• WIMAX provider
• Available in ten cities
so far, including
Portland and Las
Vegas, but not San
Francisco yet
—Links: Ch 8f, 8g

Wireless Network Implementation 97


Satellite Internet Access
• Used to deliver:
—Digital television and radio signals
—Voice and video signals
—Cellular and paging signals
• Provides homes and businesses with Internet
access

Wireless Network Implementation 98


Satellite Orbits
• Geosynchronous orbit
—Satellites orbit the Earth at the same rate as the
Earth turns
—Downlink
• Satellite transponder transmits signal to Earth-based
receiver
—Typical satellite
• 24 to 32 transponders
• Unique downlink frequencies
• LEO (low Earth orbiting) satellites
—Orbit Earth with altitude 100 miles to 1240 miles
—Not positioned over equator

Wireless Network Implementation 99


Satellite Orbits (cont’d.)

Figure 8-25 Satellite


communication
Wireless Network Implementation 100
Satellite Orbits (cont’d.)
• MEO (medium Earth orbiting) satellites
—Orbit Earth 6000 to 12,000 miles above surface
—Not positioned over equator
• Latitude between equator and poles
—Advantage
• Cover larger Earth surface area than LEO satellites
• Less power, less signal delay than GEO satellites
• Geosynchronous orbiting satellites most popular
for satellite Internet access

Wireless Network Implementation 101


Satellite Frequencies
• Five frequency bands
—L-band—1.5–2.7 GHz
—S-band—2.7–3.5 GHz
—C-band—3.4–6.7 GHz
—Ku-band—12–18 GHz
—Ka-band—18–40 GHz
• Within bands
—Uplink, downlink transmissions differ
• Satellite Internet access providers
—Use C- or Ku-bands and Ka-band (future)

Wireless Network Implementation 102


Satellite Internet Services
• Subscriber
—Small satellite dish antenna, receiver
—Exchanges signals with provider’s satellite network
• Satellite Internet access service
—Dial return arrangement (asymmetrical)
• Receives Internet data via downlink transmission
• Sends data to satellite via analog modem connection
—Satellite return arrangement (symmetrical)
• Send, receive data to and from Internet using satellite uplink
and downlink

Wireless Network Implementation 103


Satellite Internet Services
(cont’d.)

Figure 8-26 Dial return satellite


Internet service
Wireless Network Implementation 104
Understanding Security for
Wireless Networks
• Risks:
—Theft of service
—Denial of service
• Overwhelming your connection with traffic
—Privacy violations
• Listening to traffic through your connection
—Theft or destruction of data
• Entering shared folders
—Network takeover
• Installing a Trojan to allow remote control of your systems

Wireless Network Implementation 105


Wireless Security Options
• Wired Equivalent Privacy (WEP)
—Old and broken, has mathematical flaws
—Hackers can break into a WEP network easily
• Wi-Fi Protected Access (WPA)
—Much safer than WEP
—Uses a pre-shared key from 8 to 63 bytes long
• Wi-Fi Protected Access 2 (WPA2)
—Strongest protection

Wireless Network Implementation 106


Open Wi-Fi Network
• If you just buy Wi-Fi devices and turn them on,
you get an "open" network
• Completely insecure
• Anyone nearby can use it
• Convenient, but risky

Wireless Network Implementation 107


Security at the Wi-Fi Access
Point
• Change the administrator password to a non-
default value
• Use a non-default network name (SSID)
• Disable remote administration
• Upgrade the firmware
• Restrict access to computers with known MAC
addresses
• Use virtual private networks for wireless
connections

Wireless Network Implementation 108


RADIUS
• On larger networks with one or more domain
servers available
• Set up a Remote Authentication Dial-In User
Service (RADIUS) server
• This allows the most secure option of all: 802 1x
authentication
• In addition, consider enabling Internet Protocol
Security (IPsec)

Wireless Network Implementation 109


Connecting to a Hidden
Network
• Some wireless networks don’t broadcast their
SSID
• This does not make your network more secure,
because the SSID is still sent in the data packets
and hackers can easily capture it
• You can still connect, by entering the SSID
manually

Wireless Network Implementation 110


Sharing an Internet Connection
• To share an Internet connection safely on a
small network, you have two options:
—Install a router or residential gateway
• The simplest and most secure method
—Use Internet Connection Sharing (ICS)
• Uses a Windows computer as a router
• Rarely done for wired connections these days, routers are
cheap and more efficient

Wireless Network Implementation 111


Virtual Router
• Allows clients to share a Windows 7's wired
connection through the wireless card
• This is a popular idea, there are several
products and pages about how to do it

Wireless Network Implementation 112

You might also like