Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1. Introduction to WLAN 1
2. Working principle of WLAN 1
3. Configuration of WLAN 2
Installation of WLAN 2
Without Base station (Ad- hoc) 2
With base Station (Infrastructure) 3
Types of WLAN 4
Peer-to-peer Connection 4
LAN and remote computer 5
Multiple Access point and extension point 5
Directional Antenna 7
4. Protocols 8
Protocol Stack 8
Physical Layer 9
Frequency Hoping Spread Spectrum (FHSS) 9
Direct Sequence Spread Spectrum (DSSS) 13
Infrared Frequency 15
Orthogonal Frequency Division Multiplexing (OFDM) 17
Data Link Layer 18
Medium Access Control (MAC) sub layer 18
Logical Link Control (LLC) sub layer 23
Frame format of WLAN 24
5. Service of WLAN 27
6. Deployment of WLAN 28
7. Security 30
8. Application 33
9. Advantage of WLAN 34
10. Disadvantage of WLAN 34
11. Conclusion 35
12. Bibliography 35
WORKING OF WLAN:-
Wireless LANs use electromagnetic airwaves (radio or infrared) to
communicate information from one point to another without relying on any physical
connection. Radio waves are often referred to as radio carriers because they simply
perform the function of delivering energy to a remote receiver. The data being
transmitted is superimposed on the radio carrier so that it can be accurately extracted at
the receiving end. This is generally referred to as modulation of the carrier by the
information being transmitted. Once data is superimposed (modulated) onto the radio
carrier, the radio signal occupies more than a single frequency, since the frequency or bit
rate of the modulating information adds to the carrier.
Multiple radio carriers can exist in the same space at the same time without
interfering with each other if the radio waves are transmitted on different radio
frequencies. To extract data, a radio receiver tunes in one radio frequency while rejecting
all other frequencies.
In a typical wireless LAN configuration, a transmitter/receiver (transceiver)
device, called an access point, connects to the wired network from a fixed location using
standard cabling. At a minimum, the access point receives, buffers, and transmits data
between the wireless LAN and the wired network infrastructure. A single access point
can support a small group of users and can function within a range of less than one
hundred to several hundred feet. The access point (or the antenna attached to the access
point) is usually mounted high but may be mounted essentially anywhere that is practical
as long as the desired radio coverage is obtained.
End users access the wireless LAN through wireless-LAN adapters,
which are implemented as PC cards in notebook or palmtop computers, as cards in
desktop computers, or integrated within hand- held computers. wireless LAN adapters
CONFIGURATION OF WLAN :-
Installation of wireless LAN :-
An 802.11b wireless network can operate in two modes:
(i) Without base station (ad-hoc)
(ii) With base station (infrastructure).
In ad- hoc mode, your computers talk directly to each other and do not
need an access point. Access point is the device which can communicate to remote
computer directly. In infrastructure mode, data transmitted by the sender computer first
goes to the access point and then access point will send it to the destination computer.
I.e. in infrastructure mode, network traffic passes through a wireless access point. And
access point manages the traffic of the network. An infrastructure-mode wireless Ethernet
segment can be easily added to a traditional wired network to make an integrated wired
and wireless network.
TYPES OF WLAN :-
PROTOCOLS:-
PROTOCOL STACK:-
The protocols used by all 802 variants, including Ethernet, have a certain
commonality of structure. The physical layer is corresponds to that of OSI model fairly
well, but data link layer in all the 802 protocols is split into two or more sub layers. In
this, the Medium access control (MAC) sub layer determines how the channel is
allocated, that is, and who gets to transmit next. Above it is the Logical Link Co ntrol
(LLC) sub layer, whose job it is to hide the differences between the different 802 variants
and make them indistinguishable as far as the network layer is concerned. The 802.11
protocol defines one Media Access Control layer (MAC) that interacts with three
different Physical layers (PHYs). MAC sub layer of Data Link layer takes care of the
radio access independent procedures.The PHY of the OSI model brings an interface to
the network medium and provides the actual signalling function across the network.
Figure x.x shows lowest protocol layers of IEEE 802.11 and 802.11b comparing them to
other stacks.
CSMA/CA
Direct Sequence Frequency Hopping
Spread Spectrum Spread Spectrum Infrared
DSSS FHSS
Air
OPERATION:-
Fig. illustrates an example of frequency hopping spread spectrum
communications. Note that the code or algorithms that define the manner by which
frequencies change can be selected to avoid interference to or from other non-spread-
spectrum communications systems. For example, if frequency band f1 to fn is used for
frequency hopping but fx, where f1< fx < fn, cannot be used due to its assignment to
another use, the algorithm can be altered to preclude the use of fx.
In examining figure 11.1, note that the signal frequency remains constant for
a specified time duration. The actual duration or period of time the frequency remains
constant denotes whether the frequency hopping spread spectrum system is a fast-hop or
a slow-hop system. When frequency hopping occurs at a rate that is faster than the
message bit rate, it is a fast-hop system. Conversely, when frequency hopping occurs at a
hop rate slower than the message bit rate, it is a slow-hop system. As you might expect,
under a frequency hopping system, it is also possible for the hop rate message bit rate to
be equal.
Under the IEEE 802.11 standard, frequency hopping spread spread spectrum
communications represent one of three physical layers supported by standard. The IEEE
802.11 frequency hopping physical layer used 79 nonoverlapping frequency channels,
with each channel having a 1 MHz channel spacing. This enables up to 26 collocated
networks to operate, which can provide a reasonably high aggregate throughput.
FREQUENCY ALLOCATION :-
Although the standard specifies 79 nonoverlapped frequency channels, the actual
number of channels used and their power and frequency assignment depend on the
regulatory authority assignment of frequency usage in a particular country. Table 11-2
provides a comparison of a regulations in North America, Europe and Japan that govern
the operation of frequency hopping for wireless LANS.
HOPPING CHANNELS :-
In addition to the entries in above table, you should note that different
regulatory bodies restrict the number of hopping channels that can be used in other
locations of the world. For example, in Spain and France, the minimum number of
hopping channels is specified as 20; however, the number of hops defined for IEEE
802.11 standard operation in each country, referred to as the hopping set, is 27 Spain and
France.
MODULATION:
Under the IEEE 802.11 standard, frequency shift keying (FSK) is used for
FHSS b because of its low cost and easy operation. In actuality, two versions are FSK
specified, each more formally referred to as Gaussian-shaped FSK (GFSK). Under
GFSK, which operates at 1 M symbols/s, non-return to zero (NRZ) data are filtered result
is used to frequency modulate a carrier. To provide a 1-Mbps operating rate, which is
mandatory, a two- level GFSK modulation method is used, with binary 1s and 0s
modulated into one of two frequencies. To support the optional 2-Mbps data rate, four-
level GFSK modulation method is employed, with pairs of bits modulated using one of
four frequencies.
COMMUNICATION:
FHSS uses 79 channels each 1-MHz wide, starting at the low end of the
2.4_GHz ISM band. A pseudorandom number generator is used to produce the sequence
of frequencies hopped to. As long as all stations use the same seed to the pseudorandom
number generator and stay synchronized in time, they will hop to the same frequencies
simultaneously. The amount of time spent at each frequency, which is same for each hop
frequency, the dwell time, is an adjustable parameter, but must be less than 400 msec.
FHSS‘ randomization provides a fair way to allocate spectrum in the unregulated ISM
band. It also provides a modicum of security since an intruder who does not know t he
hopping sequence or dwell time cannot eavesdrop on transmissions. Over longer
distances, multipath fading can be an issue, and FHSS offers good resistance to it. It is
also relatively insensitive to radio interference, which makes it popular for building-to-
building links. Its main disadvantage is its low bandwidth.
FRAME FORMAT:
At the physical layer, FHSS transmits data using a predefined frame format.
Fig. below illustrates the IEEE 802.11 standard frequency hopping spread spectrum
frame format.
The FHSS preamble can be considered to include an 80-bit synchronization
pattern used to detect the presence of a signal, resolve antenna diversity, and acquire
symbol timing as well as a 16-bit start of frame delimiter (SFD) that provides symbol-
level frame synchronization. Concerning the latter, the SFD contains four distinct quad-
bit patterns that enable the results of all possible GFSK modulations to be verified. The
The second field in the header is a 4-bit Signaling field. One bi. Thus the
maximum length of the variable data field is 4095 bytes.t in this field indicates whether
the data rate is 1 or 2 Mbps, whereas the other three bits are reserved for future use.
Finally, the third field in the header is a 16-bit cyclic redundancy check (CRC), which
used the ITU-T generating polynomial as shown below:
G(X) = X^16 +X^12 + x^5 + 1
which is a shorthand representation for the bit sequence 1000100000010001.
Although FHSS can operate at either 1 or 2 Mbps, the preamble and header are
always transmitted at 1 Mbps. Then, if the Signaling field indicates a 2-Mbps operation,
the remainder of the frame is transmitted at that operating rate. Hopping Sequence To
minimize the effect of multipath reflections, the frequency used by FHSS was developed
to provide a minimum hop distance. By establishing a minimum frequency variation
between hops, reflections from one hop have minimal effect on the next hop because it
takes time for the reflections to arrive at a receiver, which will now hopefully be
―looking‖ to receive information at a different frequency. In the United States and
Canada, a predestinated sequence of 79 hop frequencies is used by FHSS, with a
minimum hop distance of 6 channels. The base frequency is 2402 MHz, and a
pseudorandom number in the range 0 to 78 is used to select the next frequency by adding
to the frequency used previously and performing a mod 79 operation on the result. For
example, you can represent the FHSS frequency used as 2402 + b(i), where b(i) is the
base sequence in the range 0 to 78. Then the jth sequence is formed from the base
sequence as follows:
OVERVIEW:-
The IEEE 802.11a standard operates at either 1 or 2 Mbps in the 2.4 GHz ISM
frequency band. At physical layer, each information bit is modulated by an 11-bit
sequence referred to as an 11-bit Barker sequence. The use of the Barker sequence
results in an 11-MHz chipping rate and spreads RF energy across a wider bandwidth than
would be required to transmit the original information bits. At the receiver, the 11-bit
Barker sequence is used to dispread the RF input, enabling the original data to be
recovered.
WORKING OF DSSS:-
To illustrate the operation of direct sequence spread spectrum
communications, let‘s assume that a 3-bit chip or chipping code is applied to each
information bit. Under direct sequence spread spectrum communications, each
information bit is module-2 added to each bit in mission of the information bits 101 based
on a chipping code of 010. Note that because a 3-bit chipping code is used, the three
information bits are transmitted as a sequence of 9 bits.
In examining the entries in Table 11.1, note that the chipping code is
modulo-2 added to each information bit. That is, the first information bit (1) is modulo-2
added to each bit in the chipping bit code (010). This modulo-2 addition process results in
generation of the bit sequence 101, which is transmitted to represent the information bit
of binary 1. Next, the second information bit (0) is modulo-2 added to each chipping
code bit (010) to generate the bit sequence 010, which is transmitted to represent the
second information bit, whose value is binary 0. Finally, the third information bit (1) is
modulo-2 added to the chipping bit code to generate the 3-bit sequence 101, which is
transmitted instead of the information bit value of binary 1.
If we use the +1s and -1s to represent binary 1s and 0s, we can better view the effect of a
chipping code for the generation of direct sequence spread spectrum communications.
Fig 11-2 illustrates the direct sequence spread spectrum transmission of the 3 information
bits contained in table 11.1 through the use of the chipping code contained in the table.
Although the original IEEE 802.11 standard, now referred to as the IEEE
802.11a specification, defined three physical layers, it should be noted that DSSS is the
only physical layer specified for the recently 802.11b standard, data rates of 5.5 and 11
Mbps are supported. Thus in this section we will describe and discuss the use of DSSS
with respect to both IEEE 802.11b standard uses the same 2.4- MHz bandwidth and
channelization scheme as the 1-Mbps version of the IEEE 802.11a standard. The only
difference between the two is the use of different chipping method, with the IEEE
802.11a standard using an 11-bit Barker chip and the IEEE 802.11b specification being
based on the use of an 8-bit complimentary code keying (CCK) algorithm.
MODULATION:-
Two different modulation methods are supported by the IEEE 802.11a
standard. At an operating rate of 1 Mbps, differential binary phase shift keying (DBPSK)
is used. At an operating rate of 2 Mbps, differential quadrature phase-shift keying
(DQPSK) is employed. Under DBPSK modulation, each bit is represented by one of two
possible phase changes. In comparison, under DQPSK, the modulation process operates
on pair of bits, modulating each bit pair into one of four possible phase changes.
FRAME FORMAT:
Bits
Fig illustrates the general DSSS frame format. The DSSS Preamble field
consists of 128 bits and provides a mechanism for the receiving station to adjust to the
incoming signal. This field is followed by the Start of Frame Delimiter (SFD) field. This
16-bit field is followed by an 8-bit Signal field. This field functions as a rate indication
method that allows the receiver to use the applicable modulation method commensurate
with the data rate of originator.
The fourth field in the DSS physical layer is the Service field. This 8-bit field
is currently assigned the value hex 00 to signify IEEE 802.11 compliance, however, is
actual use is presently reserved. The fifth field is the Length field. The function of this 16
bit field is to indicate the number of bytes in the Date field that follows the CRC field.
Data at
2 Mbit/s,
8 bits
Four
symbols
4-PPM
At higher 2 Mbps data rate each pair of bits is encoded into a single 4-PPM
symbol as shown in Figure 1.5. All four bit combinations are shown and we see that for
example ―11‖ is transmitted as a pulse at the last of the four pulse positions.
Correspondingly pulse at the first place represents bit pair ―00‖.
FRAME FORMAT:-
Preamble SFD Data Rate DC level Data
adjustment
The 802.11 Mac sub layer is protocol is quite different from that of Ethernet
due to the inherent complexity of the wireless environment compared to that of a wired
system. With Ethernet, a station just waits until the ether goes silent and starts
transmitting. If it does not receive a noise burst back within the first 64 bytes, the frame
has almost assuredly been delivered correctly. With wireless, this situation does not hold.
MAC is on the physical layer and the and it supports three technology in physical layer
those are Direct Sequence Spread Spectrum (DSSS), Frequency Hopping Spread
Spectrum (FHSS) and Infrared Frequency (IF).
The IEEE 802.11 standard uses a variation of the Carrier Sense Multiple
Access with Collision Avoidance (CSMA/CA) protocol to provide a wireless access
capability. The CSMA/CA protocol avoids collisions instead of detecting a collision, like
the CSMA/CD protocol used by the IEEE 802.3 (Ethernet) standard.
The variation of the CSMA/CA protocol used requires a station that has
information to transmit to first ―listen‖ to the medium. If the medium is busy, the station
will defer its transmission. If the medium is available for a specified time, referred to as
the distributed interframe space (DIFS), the station can transmit. Because it is possible
that another station could transmit at approximately the same time, the acknowledgement
that serves as an indicator to the originator that no collision occurred. Otherwise, if the
sender does not receive an acknowledgement it will retransmit until it either receives an
acknowledgement or a predefined number of retransmissions occur. Concerning the
latter, if the sender cannot receive an acknowledgment after a fixed number of tries, it
will abandon its effort, and the higher layer in the protocol stack will govern how the
inability to transfer data is handled.
The access method used by the IEEE 802.11 standard is referred to as the
distributed coordination function (DCF), which can be considered to represent a
CSMA/CA protocol. The reason for the selection of an access scheme with an
acknowledgment instead of the near-ubiquitous wired LANs Ethernet Carrier Sense
Multiple Access/Collision Detection (CSMA/CD) scheme is that the latter is impractical
for a wireless environment. This is so because a collision detection method would require
a full duplex RF or IR pair of channels, which would be costly. In addition, unlike a
wired LAN, where it is assumed that all stations can hear a collision, in a wireless
PROBLEMS: -
To start with, there is the hidden station problem mentioned earlier and
illustrated again in fig. Since not all station are within radio range of each other,
transmissions going on in one part of a cell may not be received elsewhere in the same
cell. In this example, station C is transmitting to station B. If A senses the channel, it
will not hear anything and falsely conclude that it may not start transmitting to B.
DIFS
EIFS
ForACK
Download Visit http://www.nectarkunj.byethost14.com/
Time
The shortest interval is SIFS (short interframe spacing). It is used to allow the parties in
single dialog the chance to go first. This includes letting the receiver send CTS to respond
to an RTS, letting the receiver send ACK for a fragment or full data frame, and letting the
sender of a fragment burst transmit the next fragment without having to send an RTS
again.
There is always exactly one station that is entitled to respond art a SOFS
interval. If it fails to make use of it chance and a time PIFS ( PCF Interframe Spacing)
elapses, the base station may send a beacon frame or poll frame. This mechanism allows
a station sending a data frame or fragment sequence to finish its fra me without anyone
else getting in the way, but gives the base station a chance to grab the channel when the
previous sender is done without having to complete with eager users.
If the base station has nothing to say and a time DIFS (DCF Inter frame
Spacing) elapses, any station may attempt to acquire the channel to send a new frame.
The contention rules apply, and binary exponential back off may be needed if a collision
occurs.
The last time interval EIFS (Extended Interframe Spacing), is used only bya
station that has just received ab bad or unknown frame to report the bad frame. The idea
of giving this event the lowest priority is that since the receiver may have no idea of what
is going on. It should wait a substantial time to avoid interfering with an ongoing dialog
between two stations.
Bits
Version Type Subtype To From MF Retry Pwr More W O
DS DS
to a maximum of 2312 bytes in length. Thus this provides the ability to transport a
maximum- length Ethernet frame, which has a 1500-byte Information field. Now let‘s see
each field and sub field of frame in detail.
CONTROL FIELD: The 16-bit Control field consists of 11 fields, with 8 being 1-bit
field that when set, indicate that a specific feature or function is enabled. This section
examines the use of each sub field within the Control field.
PROTOCOL VERSION SUB FILED: The 2-bit Protocol version sub field
provides a mechanism to identify the version of the IEEE 802.11 standard. In the init ial
version of the standard, the protocol version field value is set to 0.
SERVICES OF WLAN:-
The 802.11 standard states that each conformant wireless LAN must provide nine
services. These are dividing into two categories: five distribution services and four
station services. The distribution services relate to managing cell membership and
interacting with stations outside the cell. In contrast, the station services relate to
activity within a single cell.
The five distribution services are provided by the base stations and deal with
station mobility as they enter and leave cells, attaching themselves to and detaching
themselves from base stations. They are as follows:
ASSOCIATION: This service is used by mobile stations to connect themselves to
base stations. Typically, it is used just after a station moves within the radio range of the
base station. Upon arrival, it announces its identity and capabilities. The capabilities
include the data rates supported, need for PCF services (i.e. polling), and power
management requirements. The base station may accepted, it must then authenticate
itself.
DISASSOCIATION: Either the station or the base station may disassociate, thus
breaking the relationship. A station should use this service before shutting down or
leaving, but the base station may also use it before going down for maintenance.
REASSOCIATION: A station may change its preferred base station using this
service. This facility is useful for mobile stations moving from one cell to another. If it is
used correctly, no data will be lost as a consequence of the handover. (But 802.11, like
Ethernet, is just a best-efforts service.)
DISTRIBUTION: This services determines how to route frames sent to the base
station. If the destination is local to the base station, the frames can be sent out directly
over the air. Otherwise, they will have to be forwarded over the wired network.
INTEGRATION: If a frame needs to be sent through a non 802.11 network with a
different addressing scheme or frame format, this service handles the translation from the
802.11 format to the format required by the destination network.
DEPLOYMENT OF WLAN:-
WLAN installations offer companies a way to improve their business operations and
increase revenues. Approaching a WLAN deployment in steps or phases can help make
this process faster and more efficient. The best way to add wireless connectivity is to start
small and plan with an eye toward expansion.
Service set identifier (SSID): Configure clients with the correct SSID to access
their WLAN. The key should be shared only with those having legitimate need to
access the network.
Media access control (MAC): Filtering addresses restricts WLAN access to
computers that are on a list you create for each access point on your WLAN. This
should be enabled.
Wire d equivalent privacy (WEP): Encryption scheme that protects WLAN data
streams between clients and APs as specified by the 802.11 standard. This should
Rogue access point: Perform regular network audits to identify rogue access
points and disable or reconfigure them appropriately. Rogue access points are
those installed without the IT departments knowledge and are generally not
configured with any security settings, which leaves an open door for unauthorized
access.
Virtual private network (VPN): This technology offers additional security by
creating a tunnel that shields your data from the outside world. A common
security policy for many corporations is to require clients to use VPN to access
the corporate network through any wireless access point.
For more information on protecting your WLAN, visit our WLAN Security pages.
Set up the client side: Install network interface cards (NIC), or provide users with
Intel® Centrino™ mobile technology-based notebooks. Create auto- installers to
install all the WLAN drivers, VPN software, etc. in participants' notebook PCs. For
more information on deploying your WLAN.
Train: Set up a training session for the participants. Make it easy and mandatory
for users to get training on their new systems — preferably at the same time they
receive their wireless-enabled notebook PCs. Set appropriate user expectations for
support and how they should request it. Then train participants to actually call,
report, and get help.
Gather data: Gather user feedback from the beginning of the pilot. This can be even
more important than technical feedback. Consider an informal system in which IT
personnel roam the wireless zones for immediate input from users. You might also
schedule interviews or drop- in lunch meetings to gather comments and reactions.
Collect intermediate metrics for ROI reporting and address technical issues as needed
during the pilot. Make sure to closely monitor the WLAN access and be prepared to
react quickly to seal security leaks or handle other problems.
Evaluation: Gather and report findings and ROI values. Review ways you can
improve systems to meet needs that the pilot didn't address, such as additional
access points, smoother setup, or user support. Report the findings to stakeholders
to get approval for broader deployments. And communicate outcomes to all your
pilot users because they need to know what became of their efforts to help.
SECURITY:
APPLICATION OF WLAN:-
WLANs are most likely used in office, hospital of school environments. These provide
challenging environments for WLAN planners. WLAN is also used outdoors as city,
town, suburb or block wide networks.
Offices:
Small offices require one access point. The traveling workers find it easy to enter the
different offices since they only need to power up their laptops not needing even
unbreakable electricity that the desktops do. The internet connection of a small office is
nowadays normally up to 2 Mbps. The capacity of any access point is enough to satisfy
that. If the office moves no or little investments are lost because the LAN cable of the
computers is air, not a physical one. Taking the access point equals taking the network
with.
Larger offices need careful planning. Questions like how much of the computers are kept
in the physical network, who will have a laptop and for what purpose will rise. Not every
worker is willing to have a laptop, since it may indicate working at home. Whe re should
the WLAN network reach?
If the two offices are close by WLAN offers a possibility of connecting them with the air
interface. The offices across the street can be thus connected to each other without any
external, most likely hired and costly, cabling. The maximum distance for such a
connection n Europe is 6-8 km with polar antennas.
Hospitals:
Laptops with WLAN are being used in hospitals. The doctors carry laptops, not recording
cassette players. They type the orders directly at the patient to the hospital servers.
Previously this would have taken at least hours as the dictations of the doctors were typed
by assistants to the computers. This real time aspect is a benefit for the whole health care
organization and the patients.
Hospitals are full of electronic devices. Many of them are sensitive to radio frequencies
like from GSM phones. A GSM call witnessed by the author made the steady heart beat
on EKG analyzer look very different. WLAN, as described earlier, uses low amplitude
Training:
Another use for wireless LANs involves training at private organizations and colleges
training environment, the addition of new training classes when existing wired
classrooms are all in use or reserved can be easily supported by wireless LANs. Thus
wirelesses LANs add both flexibility and responsiveness to the networking requirements
of different applications.
Advantage of WLAN:-
The widespread reliance on networking in business and the meteoric growth of the
Internet and online services are strong testimonies to the benefits of shared data a nd
shared resources. With wireless LANs, users can access shared information without
looking for a place to plug in, and network managers can set up or augment networks
without installing or moving wires. Wireless LANs offer the following productivity,
convenience, and cost advantages over traditional wired networks:
Mobility: Wireless LAN systems can provide LAN users with access to real-time
information anywhere in their organization. This mobility supports productivity
and service opportunities not possible with wired networks.
Installation Speed and Simplicity: Installing a wireless LAN system can be fast
and easy and can eliminate the need to pull cable through walls and ceilings.
Installation Flexibility: Wireless technology allows the network to go where wire
cannot go.
Reduced Cost-of-Ownership: While the initial investment required for wireless
LAN hardware can be higher than the cost of wired LAN hardware, overall
installation expenses and life-cycle costs can be significantly lower. Long-term
cost benefits are greatest in dynamic environments requiring frequent moves and
changes.
Scalability: Wireless LAN systems can be configured in a variety of topologies to
meet the needs of specific applications and installations. Configurations are easily
Disadvantage of WLAN:-
The biggest disadvantages of WLAN are actually disadvantages of the laptop computers.
The laptops are still some what heavy to carry. The user interface with the mouse in the
middle with several different implementations is nothing good. They just twist the right
or left arm significantly. Using an external mouse requires a GSM phone size extra
equipment being carried with.
The biggest nuisance is the Windows operating system when moving from one
environment to another. There in no easy way to change the environment. The IP address
and related configuration is in the system file which is loaded into the memory. First all
changes would require a reboot. The changes would require an additional program like
TCP/IP Switcher or remembering a number of configuration data somehow.
The configuration of Netscape is easier. It is possible to configure user profiles and take
them into use one by one.
The prices of WLAN equipment are coming down all the time, but powerful laptops are
still quite expensive. Also equipping the laptops with cameras and microphones requires
investment.
So far to my knowledge there are no applications that really would benefit of WLAN or
be specially programmed to work over WLAN. The same applications would naturally
work with desktops too, because WLAN stackwise is only on the two first layers of OSI
stack. A special WLAN application would be for example a video stream that adapts to
the altering transmission rate.
CONCLUSION: -
Planning your network with wireless LAN and save a lost of expense and
inconvenience later, by consider following factors:
Security Requirements
Bandwidth Requirements
Environmental factors that may interfere with wireless transmission
Ease of installation
Total number of network users
Number of laptop users who will want wireless connection