Sei sulla pagina 1di 16

QUESTION 1(A)

A. 3G

Obviously, 3G or third generation refers to the third generation of mobile telephony or


cellular technology. In 3G, the mobile telephony standards – IMT-2000 – to facilitate
growth, increase bandwidth, and support more diverse applications. For example, GSM
could deliver not only voice, but also circuit-switched data at speeds up to 14.4 Kbps.
But to support mobile multimedia applications, 3G had to deliver packet-switched data
with better spectral efficiency, at far greater speeds.

Basically, the 3G opens the door to anything the people can imagine. User will be able to
do a multitude of things while going through the daily schedule, whether at work or at
leisure. As for the first example of the used of 3G is during the executive at a client
meeting and when the user realizes that he or she has brought an outdated version of
his / her presentation. It’s no problem though because one of his/her colleagues back at
the office emails the updated PowerPoint file directly to his 3G terminal. He/she can
transfers it to the laptop and is in no time ready to start the presentation.

Besides that, the 3G also can be very useful when the user need to search for the
information and data. For the example, the user can use the 3G to surf through the web
site that generates gift suggestions based on personality profiles. On the other hand, the
user also can use the technology of 3G to know the exact location of certain venue such
as they use a map and positioning service to find it. The map is displayed on their 3G
terminal and shows them the shop location and their current position. Therefore, the
user need not spend lots of time to search for the respective data and their daily duties
as well as tasks can be completed much earlier than before.

Lastly, the user also can use the 3G application as their e-wallet (electronic wallet)
whereby the user actually can use their 3G terminal to pay for the groceries. It
automatically debits her bank account, and gives them an updated balance on request.
B. WIMAX

WIMAX is a wireless digital communications system, also known as IEEE 802.16 that is
intended for wireless "metropolitan area networks". WIMAX can provide broadband
wireless access (BWA) up to 30 miles (50 km) for fixed stations, and 3 - 10 miles (5 - 15
km) for mobile stations. In contrast, the WiFi/802.11 wireless local area network
standard is limited in most cases to only 100 - 300 feet (30 - 100m).

With WIMAX, WiFi-like data rates are easily supported, but the issue of interference is
lessened. WIMAX operates on both licensed and non-licensed frequencies, providing a
regulated environment and viable economic model for wireless carriers.

WIMAX can be used for wireless networking in much the same way as the more
common WiFi protocol. WIMAX is a second-generation protocol that allows for more
efficient bandwidth use, interference avoidance, and is intended to allow higher data
rates over longer distances.

The IEEE 802.16 standard defines the technical features of the communications
protocol. The WIMAX Forum offers a means of testing manufacturer's equipment for
compatibility, as well as an industry group dedicated to fostering the development and
commercialization of the technology.

WiMax.com provides a focal point for consumers, service providers, manufacturers,


analysts, and researchers who are interested in WIMAX technology, services, and
products. Soon, WIMAX will be a very well recognized term to describe wireless Internet
access throughout the world
C. Wireless LAN

A wireless LAN (WLAN) is a wireless local area network that links two or more
computers or devices using spread-spectrum or OFDM modulation technology based to
enable communication between devices in a limited area. This gives users the mobility
to move around within a broad coverage area and still be connected to the network.

As for today world, wireless LAN is used or adopted in various kinds of field and area.
There are many examples whereby the wireless LAN play an important role in
determines the success of the respective daily operation. For the example, the doctors
and nurses in the general hospital are more productive because hand-held or notebook
computers with wireless LAN capability to deliver the related patient information
instantly. Therefore, the respective wireless LAN can help the doctor and nurses to
improve their effectiveness during the process of decision making.

Besides that, Wireless LAN also used by students or University management to hold the
class on a campus greensward access the Internet to consult the catalog of the Library
of Congress. It will make the respective students easier in searching for the needed
information such as journal, conferences papers and articles. This is absolutely
important for the students in the process of learning in University.

Lastly, the network managers in dynamic environments can minimize the overhead
caused by moves, extensions to network, and other changes in wireless LANs. It is
because the respective network managers can move anywhere they like and it will not
affect their connection to the Local Area Network for configuring the respective Local
Area Network (LAN). Thus, it will make their daily works as well as operation become
more and more effective and sufficient.
QUESTION 1(B)

The first method to ensure the security of the Wireless LAN is encryption, which encodes
the data transmitted between the local PC and the wireless router. Unfortunately, most
routers ship with encryption turned off, and many users don't turn it on, leaving
themselves completely exposed. If the user haven't already, enable the router's
encryption, and use the strongest form supported by the network. The Wireless
Protected Access (WPA) protocol and more recent WPA2 have supplanted the older and
less-secure Wireless Encryption Protocol (WEP). The keys used by WPA and WPA2
change dynamically, which make them nearly impossible to hack. The users need to use
a strong password for the encryption key, such as a combination of letter and number
(alphanumeric) of 14 characters or more.

Besides that, the firewall which built into the router also can prevent hackers on the
Internet from getting access to the PC. But it does nothing to stop people in range of the
Wi-Fi signal from getting onto the network--and with the latest high-performance
equipment, the Wi-Fi signal could reach clear down the block. Without encryption and
other protective measures, anyone can use readily available tools to see all the Wi-Fi
traffic as well. Therefore, for extra protection, the user should run software firewalls on
the individual PCs on the network. Some good options are Zone Labs' ZoneAlarm, and
Agnitum's Outpost Firewall Free. At the mean time, the respective protection software
also can ensure the unauthorized parties can’t easy access to the Wireless LAN.

On the other hand, the network administrator also can Combined with an authentication
protocol, such as EAP-TLS, LEAP, or EAP-TTLS, IEEE 802.1X provides port-based
access control and mutual authentication between clients and access points via an
authentication server. The use of digital certificates makes this process very effective.
802.1X also provides a method for distributing encryption keys dynamically to wireless
LAN devices, which solves the key reuse problem found in the current version of 802.11
Initial 802.1X communications begins with an unauthenticated supplicant (i.e., client
device) attempting to connect with an authenticator (i.e., 802.11 access point). The
access point responds by enabling a port for passing only EAP packets from the client to
an authentication server located on the wired side of the access point. The access point
blocks all other traffic, such as HTTP, DHCP, and POP3 packets, until the access point
can verify the client's identity using an authentication server (e.g., RADIUS). Once
authenticated, the access point opens the client's port for other types of traffic.

Lastly, the user also can establish the Virtual Private Network (VPN) to protect the
wireless LAN. VPNs keep the communications safe by creating secure "tunnels" through
which encrypted data travels. Many companies provide VPN service to their mobile and
offsite workers, so check with the IT department for connection instructions. The user
can also use a paid service such as Boingo's Personel VPN, JiWire Hotspot Helper and
Witopia Personal VPN. The respective Virtual Private Network (VPN) will ensure the
whole wireless LAN is saved and protected in an isolated network which is invisible from
the outsiders.
QUESTION 1(C)

The requirements of the respective wireless network as listed down below:

Coverage and mobility


It is a specifying the coverage, or area where the end users will operate the wireless
devices, helps the designer determine the number and location of wireless LAN access
points. Mobility requirements derive from the movement of users through the coverage
areas. It's generally best to illustrate the coverage areas on drawings of the facility or
building.

Application requirements
These specify the transmission needs of the software that will operate over the wireless
LAN. For example, warehouse-management system software requires the transmission
of relatively low-bandwidth bar-code information between wireless handheld bar-code
scanners and a host computer. A desktop video application, however, requires the
transmission of real-time video signals. How frequently user expects to use these
different information types helps determine the design specifications for the data
transmission rate and throughput.

Number of users
It refers to the number of devices that require access to the wireless LAN. Be sure to
allow for future expansion.

End-user device types


It will be Included in this category are laptop computers, bar-code data collectors, and
mobile patient monitors. The developer should identify the available physical interfaces
—such as PC card, PCI, ISA, or USB—for each device.

Battery longevity
For mobile and portable applications, specify the length of time that the end-user devices
need to operate on a set of batteries. This information indicates whether wireless LAN
components need to support power-management functions.
System interfaces
Most likely, the wireless LAN will have to interface with existing systems such as
Ethernet networks, applications, and databases. The system interface requirements
describe the architectures and communications protocols of these systems.

Information security requirements or the level of protection that user data needs
from particular threats
The degree of needed security depends on the severity of the consequences that the
organization faces if data is lost. These requirements determine whether the developer
should include mechanisms such as encryption.

Environment
The requirement of the conditions such as room temperature and humidity, construction
materials, floor space, and presence and intensity of electromagnetic waves could affect
the operation of the system. In most cases, the developer should perform a site survey
to inspect the facility and evaluate the presence of potential radio-frequency
interference.

Schedule
Identify any circumstances that will affect the schedule, such as the availability of funds,
an urgency to see a return on investment, the availability of project team members, and
the interdependency between this project and others. Spell out the schedule
requirements so that the team knows the time frames it must work within.

Budget
An organization may have a limited amount of money to spend on the wireless LAN. If
the know the budget constraints, it's best to identify them in the requirements
Equipment

In order to implement a complete wireless LAN, there two main components need to be
considered, namely:
• Wireless LAN-enabled client
• An access point

Wireless LAN-enabled Client


A wireless LAN-enabled client is a notebook computer, printer, handheld, or any other
device capable of communicating over a wireless LAN. Wireless-enabled devices come
in two flavors: those that are built with wireless networking functionality embedded in
them and those that have it added to them later. A variety of notebook PCs, PDAs,
printers and other devices from HP come with wireless functionality built right in.

Devices that aren't already wireless-enabled can quickly be made so with the simple
addition of a wireless LAN card. A wireless LAN card is a PC card for a notebook
computer, or PC card and a PCI adapter, or a Universal Serial Bus (USB) device for
your desktop computer. Printers and PDAs use similar cards for their wireless
communications.

Access Point
The center of the wireless to wired LAN connectivity is the wireless access point. These
points aggregate wireless radio signals and then connect the two LANs. The access
point is generally book-sized. It contains a radio transceiver, communications and
encryption software, and an Ethernet port for a cable connection to a hub or switch on
the wired LAN

Access Point Installation


As for the better receiving purpose, the access point will be installed in a central location
because there is a limited wireless sphere around it in which wireless devices can
access the LAN. Then, it also want to make sure that the access point is installed in as
open an environment as possible, so that there are not many obstacles between the
access point and usage points. This maximizes the access point's wireless range. To
install the access point simply plug in an Ethernet cable that is connected to the wired
LAN and use the software that ships with the access point to assign a network name and
an encryption key.

User Access

The user can access to the wireless LAN when the respective users are in the area
which wireless signal covered. However, the user must key in the password before they
can access to the respective wireless LAN. When signal from the workstation
(notebook) will be received by the access point which been fixed in the coverage area.
Then, the access point will transfer the signal to the LAN server to request for the access
of the respective user. If the password entered by the user match with the database,
then the user will be able to access to the respective wireless LAN.

Schematic Diagram for Wireless LAN


QUESTION 1(D)

The available standards and speeds of Wireless LAN technology are:


(a) IEEE 802.11
(b) IEEE 802.11-b
(c) HiperLan
(d) HiperLan II
(e) OpenAir
(f) HomeRF & SWAP
(g) BlueTooth
QUESTION 2(A)

Network equipments which required are:

(a) Repeater

Ethernet hubs are repeaters. The IEEE specification for Ethernet is very clear about
the use of repeaters. There can only be five segments and four repeaters between
any two hosts on a segment. In addition, only three of those segments can have host
connections, the rest must be linking segments. The segments must be within the
length restrictions appropriate for the physical media: 500 meters for 10base5 (thick
coax), 500 meters for 10baseFL (fiber) and 100 meters for 10baseT (UTP) cable.
This is commonly known as the "repeater rule. This ensures that two hosts that
transmit packets at the same time will detect the collision within the first 64 bytes of
the packet. If the segment is out of specification by having too many segments or
segments that are too long, collision detection will not occur and network
performance will severely degrade. User installed hubs can, and frequently do, take
a network out of Ethernet specification

(b) Bridge or Switch

An OSI network Layer 2 device that forwards Ethernet frames based on datalink
layer or MAC addresses. Each port on a bridge is in a different collision domain. The
term “bridge” usually applies to a device with a small number of ports connecting
shared Ethernet segments. Bridges with many ports connected primarily to
individual hosts are generally called “switches”. This document will use the terms
“bridge” and “switch” interchangeably
(c) Router

A network device that operates at Layer 3; that forwards packets based on their
network layer address. It may or may not participate in a Routing Protocol, e.g., RIP,
OSPF. It may use Network Address Translation (NAT) to allow many hosts on an
“inside” interface to share a single or small number of IP addresses visible to the
“outside” network
QUESTION 2(B)

Four network cabling technologies are commonly in use. These are "thick", "thin", "Cat
5E twisted-pair copper" and “single- and multi-mode fiber optic” Ethernet wiring plants.
First at all, using CAT 5E to connect devices to wiring closets and single- and multi-
mode fiber optic cabling between wiring closets and for the campus backbone. The
dominant physical layer access protocol in LAN environments is Ethernet, although
some limited use of Token Ring signaling is in use.

Physical connectivity is provided to the school buildings on campus via a broadband


coaxial cable trunk system for which the "head-end" is located in one of the major
administration building. This system consists of a few separate legs (segments) serving
distinct geographical regions of the campus. Physical layer networking services are
provided on the trunk segments using the MAP (Manufacturing Application Protocol).
Each campus broadband trunk segment supports three shared 100 Mbps MAP
channels. Bridged connection of the trunk MAP channels to building Ethernet segments
is provided through Hughes LAN bridges. The multiple campus trunk channels are
combined into a common networking addressing space using a high performance
CISCO router located at the head-end

Connectivity for the vast majority of buildings consists of a 1000BaseLX (Gigabit) single-
mode fiber connection to one of the building core locations, each containing a Foundry
BigIron “layer-three” switch. The Foundry core switches are interconnected in a meshed
topology, with three to five connections from a core switch. Logical host addressing and
transport management services for inter-networking across the campus backbones are
provided by the TCP/IP protocols. IP packet routing is provided centrally. Wide area
connectivity is provided by PeachNet which provides both commodities Internet 1 as well
as.Internet 2 (I2) services for research and education between I2 members and
sponsored entities.
QUESTION 2(C)

As for campus network, the best and suitable network protocol is:

(a) Internet Group Management Protocol (IGMP)

The reason why using Internet Group Management Protocol (IGMP) as the network
protocol in campus network because IGMP snooping allows the switch to discover which
ports have hosts that want to receive multicast traffic especially during many students
download the lectures notes, as well as to send switch-wide requests to the router (or
the next hop switch) so that the upstream devices know that there are hosts that want to
get a specific multicast group. This is much more than just passive "snooping" and is
quite complex to get right.

Furthermore, Prior to IGMP-L2, the only way to get selective IP video multicast traffic
management was to use the long-established standard IGMP. Industry-standard IGMP
takes advantage of what is typically called the “IP Layer” or “Layer 3” of the OSI Basic
Reference Model to define a multicast structure that enables multicast traffic streams to
be selectively managed. Layer 3, and IGMP operating at Layer 3, defines network
addressing and routing protocols that support data delivery between any two nodes in a
network. IGMP utilizes a class of addresses (Class D) with routing information that can
be decoded by a Layer 3 device, such as an office-grade router. A multicast packet is
sent. Once, but can go to multiple users, significantly reducing traffic on the LAN. Three
other classes of addresses (Class A, B, and C) are used to send IP packets with a
specific address to a single remote user, called a unicast address. Under IGMP a Layer
2 switch must pass multicast streams up to a Layer 3 router for decoding and routing of
the particular streams needed to go to their desired destinations. With IGMP, Layer 2
switches have to “snoop” on the decisions made up at Layer 3 in order to understand
how to handle multicast video streams passing through.

Besides that, the respective protocol having a single logical connection per subscriber is
often consistent with the deployed method of delivering high-speed Internet service to
subscribers, minimizing retraining costs. The management also can forward all IGMP
requests to the BSR allows it to dynamically adjust the amount of unicast (best-efforts)
traffic being sent to each subscriber, ensuring that the access link is not over-committed.
The other reason why choose the IGMP as the campus network protocol is the IGMP
Passthrough can supports all types of Access Nodes, whether old or new. Existing
access notes which do not support IGMP do not need to be replaced, and IGMP
awareness does not need to be enabled at the access note.

Due to the campus network, the uses of IGMP will enable the BSR sees all IGMP
requests and can reject requests which would over-subscribe bandwidth to the
subscriber or to the AN. This is the equivalent of a “fast busy” signal in voice networks.
Because there is no need for queues or IGMP functionality in the AN or access
aggregation switches, the operator can select the lowest cost AN today, and even switch
to a different AN later with minimal operational impact.

At the mean time, moving to a pure unicast model in the access network simplifies
Access Notes configuration and eliminates the challenge of troubleshooting IPTV
transmission issues. Lastly, since all IGMP requests are forwarded upstream by the
Access Notes, the BSR can dynamically adjust the bandwidth available to other
applications and can also aggregate information about what channels subscribers are
watching.
QUESTION 2(D)

The best LAN standard for the respective campus network is IEEE 802.11g wireless
LAN. It is because The IEEE 802.11g access points can deliver a network bandwidth of
up to 54Mbps versus 11Mbps of the 802.11b. Furthermore, the 802.11g WLAN access
points can support 802.11b WLAN cards. The deployment of the IEEE 802.11g wireless
LAN standard also enable those notebook users with 802.11g WLAN cards to enjoy
higher bandwidth, whereas existing users can still rely on their 802.11b WLAN cards to
connect to the campus network as before. It is very important and vital as we know that
most of the lecturer and students will usually using the notebook to online in order to
search for information and data at their campus area. Therefore, the deployment of IEEE
802.11g will just perfect for the respective lecturer and students.

At the mean time, the latest IEEE 802.11g will be advanced enough to deliver maximum
and better speed especially in senses of bandwidth. Lastly, the respective IEEE 802.11g
will also be able to compatible with other standards like 802.11b standards. Therefore, it
will become easier for the campus management to integrated the different standards in a
same local area network.

Potrebbero piacerti anche