Chapter 5
Chapter 5
WIRELESS
NETWORKING
1
Outline
• Wireless networking
• Types of wireless networking
• Wireless LAN
• Extended Wireless LANs
• Wireless mobile networks
• Network architecture
2
Wireless Networking
• Most wireless networks consist of wireless components
communicating with a network that uses the cabling in
a mixed-component network called a hybrid network.
Wireless Network Capabilities
Wireless networks are attracting attention because
wireless components can:-
• Provide temporary connections to an existing, cabled
network.
• Provide some degree of portability.
• Extend networks beyond the limits of physical
connectivity.
3
Wireless connectivity can be especially useful for
networking:-
• Users who are constantly on the move.
• Isolated areas and buildings.
• Departments in which the physical setting changes
frequently and unpredictably.
• Structures, such as historic buildings, for which cabling
presents challenges.
Types of Wireless Networks
• Wireless networks can be divided into three categories
based on their technology:
- LANs
- Extended LANs
- Mobile computing
4
• Wireless LANs and extended LANs use transmitters
and receivers .
• Mobile computing uses public carriers, such as long
distance telephone companies, along with local
telephone companies and their public services, to
transmit and receive signals.
Wireless LANs
• Except for the media used, a typical wireless network
operates almost like a cabled network.
• Wireless network interface card with a transceiver is
installed in each computer.
• Users communicate with the network just as if they
were using cabled computers.
5
Access Points
• The transceiver, sometimes called an access point.
• It broadcasts and receives signals to and from the surrounding
computers.
• wireless LANs use small wall-mounted transceivers to connect
to the wired network.
6
Transmission Techniques
• Wireless LANs use four techniques for transmitting
data:-
I. Infrared transmission
II. Laser transmission
III. Narrowband (single-frequency) radio transmission
IV. Spread-spectrum radio transmission
8
There are three types of infrared networks:-
Line-of-sight networks: It transmits only if the
transmitter and receiver have a clear line of sight b/n
them.
Scatter infrared networks: broadcast transmissions
are bounced off walls and ceilings and hit the receiver.
• They are effective within an area limited to about 30.5
meters (100 feet).
Reflective networks: Optical transceivers are placed
near the computers.
Optical transceivers redirects the transmissions to the
appropriate computer.
9
Laser Transmission –It is similar to infrared
technology .
• It requires a direct line of sight.
• Any person or thing that breaks the laser beam
will block the transmission.
Narrowband (Single-Frequency) Radio Transmission
• It is similar to broadcasting from a radio station.
• The user tunes both the transmitter and the receiver to
a certain frequency.
• The broadcast range is 3000 meters.
• Transmission is in the 4.8 Mbps range.
10
Spread-Spectrum Radio Transmission
• It broadcasts signals over a range of frequencies.
• This helps it avoid narrowband communication
problems.
• The available frequencies are divided into channels,
known as hops.
11
Extended Wireless LANs
• It uses wireless LAN bridge to connect networks up to
4.8 kilometers apart.
• A wireless bridge is a component that offers an easy
way to link buildings without using cable.
12
Wireless mobile networks
Wireless mobile networks use telephone carriers and
public services to transmit and receive signals using:-
– Packet-radio communication.
– Cellular networks.
– Satellite stations.
• Transmission rates range from 8 Kbps to 19.2 Kbps.
• It uses wireless adapters that use cellular-telephone
technology to connect portable computers with the
cabled network.
• Portable computers use small antennas to
communicate with radio towers in the surrounding
area.
13
• Satellites in the earth orbit pick up low-powered signals
from portable and mobile networked devices.
• This system breaks transmission into packets .
• A packet is a unit of information transmitted as a whole
from one device to another on a network.
• The packets are similar to other network packets. They
include:-
- The source address.
- The destination address.
- Error-correction information
14
Frequency spectrum
15
Satellite Stations
• Microwave systems are a good choice for
interconnecting buildings in small, short-distance
systems such as those on a campus or in an industrial
park.
16
A microwave system consists of the following:-
• Two radio transceivers: one to generate (transmitting
station) and one to receive (receiving station) the
broadcast.
• Two directional antennas: pointed at each other to
implement communication of the signals broadcast by
the transceivers.
• These antennas are often installed on towers to give
them more range and to raise them above anything
that might block their signals.
17
• Physical appearance of Satellite and Satellite Dish
18
Wireless advantage
• Can be used in situations where it is difficult or
impossible to install cable.
Wireless disadvantages
• Typically, such systems are not able to meet the
performance demands of large or busy networks.
• Transmission can only occur over limited
distances and at limited bit rates.
19
UNDERSTANDING NETWORK
ARCHITECTURE
Access Methods
• How a computer puts data onto the network cable and
takes data from the cable is called an access method.
• Once data is moving on the network, access methods
help to regulate the flow of network traffic.
• Multiple computers must share access to the cable that
connects them.
• If two computers put data in the cable at the same
time, collision will be occurred.
20
•Collision occurs if two computers put data on the cable at
the same time
• By making sure that only one computer at a time can
put data on the network cable, access methods
ensure that the sending and receiving of network
data is an orderly process.
21
Major Access Methods
The three methods designed to prevent simultaneous
use of the network media include:-
1. Carrier-sense multiple access methods with collision
detection.
2. Carrier-sense multiple access methods with collision
avoidance.
3. Token-passing methods that allow only a single
opportunity to send data.
22
1 - Carrier-Sense Multiple Access with Collision
Detection (CSMA/CD).
• Using the method known as (CSMA/CD), each computer on the
network, checks the cable for network traffic.
• The following fig. illustrates when a computer can and cannot
transmit data.
23
• Only when a computer "senses" that the cable is free
and that there is no traffic on the cable can it send data.
• Once the computer has transmitted data on the cable,
no other computer can transmit data until the original
data has reached its destination and the cable is free
again.
• If two or more computers happen to send data at
exactly the same time, there will be a data collision.
• When that happens, the two computers stop
transmitting for a random period of time and then
attempt to retransmit.
• Each computer determines its own waiting period.
24
(CSMA/CD) means:-
• Computers listen to or "sense" the cable (carrier-sense).
• Commonly, many computers on the network attempt to
transmit data (multiple access).
• Each one first listens to detect any possible collisions.
• If a computer detects a possible collision, it waits for a
random period of time before retransmitting (collision
detection).
• The collision-detection capability is the parameter that
imposes a distance limitation on CSMA/CD.
• Due to attenuation, the collision detection mechanism is
not effective beyond 2500 meters.
25
CSMA/CD Considerations
• The more computers there are on the network, the
more network traffic there will be.
• With more traffic, collision avoidance and collisions
tend to increase, which slows the network down, so
CSMA/CD can be a slow-access method.
28
How Networks Send Data
• Data is broken down into small, manageable packets.
• Each wrapped with the essential information needed to
get it from its source to the correct destination.
• As you see below, a computer sending large amounts of
data causes other computers to wait while the data is
being moved.
29
There are two reasons why putting large chunks of data
on the cable at one time slows down the network:-
• It monopolizes the network and make timely interaction
and communications impossible because one computer
is flooding the cable with data.
• The impact of retransmitting large units of data further
multiplies network traffic.
30
Packet Structure
Packets can contain several types of data including:
• Data to be sent.
• A source address that identifies the sending computer.
• A destination address that identifies the recipient.
• Flow, congestion control information.
• Error-checking information to ensure that the data
arrives correctly.
31
Packet components grouped into three sections: header, data,
and trailer.
The header includes:-
• An alert signal to indicate that the packet is being transmitted.
• The source address.
• The destination address.
• Clock information to synchronize transmission.
The actual data being sent.
• It varies in size (from 0.5 kilobytes (KB)—to 4 KB).
The Trailer includes cyclical redundancy check (CRC).
32
Example: Packets in Printing
• The following example illustrates, step-by-step, how
packets are used in network communications.
• A large print job must be sent from a computer to a print
server.
1 - In Figure-a, the sending computer establishes a
connection with the print server.
33
2 - In Figure-b, the computer next breaks the large print job
into packets.
• Each packet contains the destination address, the
source address, the data, and control information.
34
3- In Figure-c, the network interface card (NIC) in each
computer examines the receiver's address on all packets
sent on its segment of the network.
35
4 - In Figure-d, the destination computer is the print
server.
• The packets enter through the cable into the NIC.
36
5 - The network software processes the frame stored in
the NIC's receive buffer.
6- In Figure-e, the network operating system in the
receiving computer reassembles the packets back into
the original text file and moves the file into the
computer's memory.
• From there the file is sent to the printer.
37
THANK U
?
38