Sei sulla pagina 1di 10

URDANETA CITY UNIVERSITY

tMODULE 6:

CONNECTING THROUGH A WIRELESS NETWORK

COLLEGE OF COMPUTER STUDIES

Objectives:

This module aims to: Explain current wireless networking technologies Discuss the history of wireless networks and their advantages Describe radio wave technologies Explain 802.11 radio wave networking Describe alternative radio wave technologies, such as Bluetooth, HiperLAN, and HomeRF Shared Wireless Access Protocol Discuss infrared wireless technologies Describe wireless MAN networking Describe terrestrial and satellite microwave technologies Consider design options for wireless networks 5 hours

Duration:

Chapter 6 CONNECTING THROUGH A WIRELESS NETWORK Current Wireless Networking Technologies Two drawbacks of wire-based networking Tangle of wires connecting computer and peripherals Cost of pulling wires through walls, ceilings, floors Wireless technology resolves many wire-based issues Wireless media are forms of electromagnetic radiation Three major current wireless networking technologies Radio wave technologies (short range) Infrared technologies (short range) Terrestrial and satellite microwave technologies (long range) A Short History of Wireless Networks Packet radio: early PC networking over radio waves Developed by amateur (ham) radio operators Built around TNC (terminal node controller) Wireless standards develop in parallel with ham radio 1985: Industrial, Scientific, Medical (ISM) band opened Telecommunications Act of 1996 IEEE 802.11 standard set in 1997 A few of the entities influencing standards IEEE (Institute of Electrical and Electronics Engineers) IETF (International Engineering Task Force) ISO (International Organization for Standardization) Advantages of Wireless Networks Needs accommodated by wireless networks Enabling communications in remote areas Reducing installation costs Providing anywhere access Simplifying small office and home office networking Enabling data access to fit the application Providing an Alternative to Wired Networks Scenario 1: link two buildings separated by highway Option 1: Dig out trench, lay cable, fill in trench Option 2: Create MAN using T-lines or Optical Ethernet Option 3: Install wireless network Likely to be more cost effective than option 1 or option 2 Scenario 2: network for 77 employees in rented office Installation of cable plant prohibited by owner
MODULE 6 -1 BY: JERMINE G. VALEN

URDANETA CITY UNIVERSITY

COLLEGE OF COMPUTER STUDIES

Solve problem by setting up wireless network Scenario 3: network library restricted by covenants Install wireless network to upgrade facility Wireless option maintains compliance with covenants Saving Money and Time Factors favoring choice of wireless over cable Expense, speed, safety, low impact Scenario: network supporting university fundraiser Extra network connections needed for new staff Installation of new cables not practical Expensive proposition Not possible within time frame Solution: install wireless network Saves time and money Reduces likelihood of sustaining injury Preserves historic character of structures

Providing Access Anywhere Computer users requiring "anywhere" access Auto parts warehouse Uses networked bar code scanners to update inventory Scanners not restricted by dragging along cables Hospital physician Utilizes wireless laptop computer Updates patient records, orders tests, arranges surgery Simplifying Networks for Novices Drawbacks of running cable in small office or home Wrong cable might be used Cables might be run through areas of EFI or RFI Cables might be unintentionally damaged Productive hours lost in troubleshooting The viable wireless option for small office and home Easier to install Easier to maintain Costs of wireless devices are reasonable Enhancing Data Access Access to data and software significantly enhanced Scenario 1: large company employing 10 auditors Auditors visit different departments each day Auditors need information from other locations Financial data accessible via laptop with wireless NIC Scenario 2: chemical engineer in large plant Needs to access data in three locations Data generated while reaction takes place in production Inventories of chemicals required to start a process Information available in the online research library Wireless access simplifies multitasking Wireless Network Support Organizations Several organizations promote wireless networking Wireless LAN Association (WLANA) Valuable source of wireless network information Supported by device manufacturers and promoters Partial company list: Alvarion, Cisco Systems, ELAN, Intermec, Intersil, Raylink, Wireless Central Radio Wave Technologies Frequency ranges of various transmission types AM: 5351605 kilohertz (kHz) FM: 88108 megahertz (MHz)
MODULE 6 -2 BY: JERMINE G. VALEN

URDANETA CITY UNIVERSITY

COLLEGE OF COMPUTER STUDIES

Network: 902-928 MHz, 2.4-2.4835 GHz, 5-5.825 GHz Directional signal transmitted between buildings Transmission involves sending and receiving antennas Wave is short in length and low-power (1-10 watts) Suitable for line-of-sight transmission Signal goes from point to point on earth's surface Limitations due to interruptions, such as hills Data capacity range: 1 Mbps to 54 Mbps

Spread spectrum technology for packet transmissions Spreads transmission over adjoining frequencies Frequency range: 902928 MHz range Data transfer range: 154 Mbps Advantages to radio wave communications Useful in situations where portable computers deployed Relatively easy and inexpensive to install Disadvantages to radio wave communications Some networks cannot match high-speed (100 Mbps) Interference from other operators and natural obstacles Inadequate security IEEE 802.11 Radio Wave Networking IEEE 802.11 group: most influential wireless standards Includes 802.11, 802.11a, 802.11b, 802.11g Communication with 802.11 devices is non-proprietary Features of 802.11 standards Encompass either fixed or mobile wireless stations Involve two kinds of communications Asynchronous: discrete units with start and stop bit Synchronous: signal has timing restrictions Support SNMP protocol and network authentication Operate at two lower OSI layers: Data Link and Physical Recognize indoor and outdoor wireless communication Wireless Components Three components: transceiver, access point, antenna Wireless NIC (WNIC): transceiver card Functions as transmitter and receiver Operates at Physical and Data Link layers of OSI model May be internal (PCI card) or external (USB key fob) Compatible with NDIS and ODI specifications Enable multiple protocols Interface computer with WNIC Access point: interfaces WNIC and cable network Examples: bridge, switch, or router Antenna: device radiates and receives radio waves Directional Antenna

Sends radio waves in one main direction Amplifies signal better than omnidirectional antenna
MODULE 6 -3 BY: JERMINE G. VALEN

URDANETA CITY UNIVERSITY

COLLEGE OF COMPUTER STUDIES

Gain: amplification of radiated signal Application: transmitting signals between buildings Each building has an antenna Antennas connected to access points Signal has more gain in one direction Small portion of signal is radiated outward

Omnidirectional Antenna

Radiates radio waves in all directions Diffused signal likely has less gain than directional type Application: indoor network Mobile users need to send and receive in all directions Signals moving over shorter distances require less gain Omnidirectional antenna deployed varies with device WNIC on portable devices use snap-on antenna Access point for indoor network May have a snap-on antenna May connect to antenna using cable Outdoor access point connects to antenna via cable Wireless Networking Access Methods Two access methods: priority-based and CSMA/CA Priority-based access (or point coordination function) Intended for time-sensitive communications Access point functions as point coordinator Point coordinator establishes contention-free period Method revolves around contention-free period Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Also called the distributed coordination function CSMA/CA works to avoid collisions Coordinate nodes using DIFS delay and backoff time Handling Data Errors Interference may corrupt data transmission Many sources of interference Natural: weather, solar flares, mountains Artificial: other wireless communications, buildings Automatic repeat request (ARQ) characteristic Part of 802.11 standard accounting for interference ARQ based on acknowledgement (ACK) Sender retransmits packet if ACK not received Delivery attempts limited by packet size (short or long) Two values for short and long packet sizes Two limits for transmission attempts Transmission Speeds Related to certain frequencies Correspond to Physical layer of OSI model Defined by three standards: 802.11a, 802.11b, 802.11g Standards group will soon include 802.11n Offers transmission speeds over 100 Mbps Operates over greater distances than 802.11a, 802.11b, and 802.11g
MODULE 6 -4 BY: JERMINE G. VALEN

URDANETA CITY UNIVERSITY

COLLEGE OF COMPUTER STUDIES

802.11a

Outlines speeds in 5 GHz frequency range Minimum speed: 6 Mbps Maximum speed: 54 Mbps Uses Orthogonal Frequency Division Multiplexing (OFDM) How OFDM radiates data signal over radio waves Divides 5 GHz range into 52 subcarriers (subchannels) Four subcarriers used for control 48 subcarriers host data Splits data over 52 subcarriers Transmits data in parallel over 52 subcarriers

802.11b Outlines speeds in the 2.4 GHz frequency range Minimum speed: 1 Mbps Maximum speed: 11 Mbps Uses Direct Sequence Spread Spectrum (DSSS) How DSSS radiates data signal over radio waves DSSS spreads data across any of up to 14 channels Each channel up to 22 MHz in width Number and frequency of channels based on country Data signal sequenced over channels Data signal amplified for gain Barker Code/CCK enhance DSSS over 5.5 Mbps 802.11g Allows three transmission methods on 2.4 GHz band OFDM (native mode) Similar to OFDM under 802.11a (different bands) Minimum speed: 6 Mbps Maximum speed: 54 Mbps Complementary Code Keying (CCK) Used with DSSS for backward compatibility with 802.11b Minimum speed: 1 Mbps Maximum speed: 11 Mbps Packet Binary Convolution Code (PBCC) Unofficial extension for 802.11b Offers speeds of 22 Mbps and 33 Mbps Restrictions and considerations using 802.11g Devices must support minimum speeds by standard Speed values: 1, 2, 5.5, 6, 11, 12, and 24 Mbps Slightly shorter range than 802.11b More access points may be needed Smaller bandwidth (90 MHz) than 802.11a or 802.11b No more than three access points in given area
MODULE 6 -5 BY: JERMINE G. VALEN

URDANETA CITY UNIVERSITY

COLLEGE OF COMPUTER STUDIES

Devices combine with 802.11b devices on one LAN Advantage: retain earlier investment in 802.11b Disadvantage: lowers network performance 802.11a, 802.11b, and 802.11g Compared 802.11a and 80211g standards offer greater speed 802.11b generally offers greater range 802.11a devices transmit up to 18 meters 802.11g devices transmit between 30 and 100 meters 802.11b devices reach over 91 meters Uses for 802.11a and 802.11g devices Applications requiring high bandwidth (voice and video) In small areas with high concentration of users (lab) 802.11b devices used when bandwidth not critical 802.11 Security Techniques First step: identify wireless network targets Four elements used by an attacker Antenna: vary by directionality and gain Wireless NIC: connects to antenna Global positioning system (GPS): locates target War-driving software: passes data from antenna to GPS Second step: use network sniffer to capture packets Purpose: capture ids or passwords, conduct espionage Man-in-the-middle attack: interception of message 802.11 standards offers several security approaches Open System Authentication Allows any two stations to authenticate each other Used by default by many vendor devices Simple method Sender requests authentication from destination Authentication complete when receiver verifies request Security value of open system authentication is low Shared Key Authentication and Wired Privacy (WEP) Employs Wired Equivalent Privacy (WEP) WEP encryption key Consists of key, checksum, initialization information Total key length is 64- or 128-bits 128-bit key supports superior 128-bit encryption Up to four WEP keys can be stored in key index Authenticating using shared key and WEP Sender requests authentication from another station Contacted station sends back challenge text Sender encrypts challenge text, returns to challenger If returned text properly decoded, verification sent Wi-Fi Protected Access (WPA) Uses WEP-like features, but encrypted keys change Key changes make WPA more secure than WEP WPA2 is latest version Preshared key (PSK): WPA enhancement Targeted for home and small networks Setting up PSK network security Ensure option supported on WNIC and devices Enter password (master key when installing access point) After password entered, WPA automatically activated All wireless devices must use the same password Service Set Identifier
MODULE 6 -6 BY: JERMINE G. VALEN

URDANETA CITY UNIVERSITY

COLLEGE OF COMPUTER STUDIES

SSID: identification value up to 32-bits in length Value defines logical network for all member devices Examples of SSIDs Series of random characters String identifying network purpose, such as "Atmospheric Research" SSID often configured by default Ensure that vendor default is replaced Use SSID value difficult to guess 802.1x and 802.11i Security 802.1x: wireless and wired authentication approach Port-based form of authentication Ports over which connection made act in two roles Uncontrolled: allows unauthenticated communications Controlled: allows only authenticated communications Node roles: supplicant and authenticator Disadvantage: authentication process not encrypted 802.11i adds three features to enhance 802.1x Temporal Key Integrity Protocol (TKIP) Advanced Encryption Standard (AES) Robust Secure Network (RSN) Using Authentication to Disconnect How to disconnect two stations Either sends deauthentication notice Deauthentication notice results in instant termination No role for nonauthenticated stations Not permitted to disconnect authenticated stations 802.11 Topologies Independent basic service set (IBSS) topology Consist of two or more stations in direct communication Peer-to-peer communication between WNICs on nodes Stations often added on impromptu basis Extended service set (ESS) topology Deploys one or more access points Enables more extensive area of service than the IBSS Network sizes range from small to large IBSS network easily expanded to ESS network Caveat: avoid combining networks in same proximity Multiple Cell Wireless LANs ESS topology employing two or more access points Cell: broadcast area around single access point Roaming: ability to move wireless device across cells Cells configured with same frequency, speed, security Example: law school deploys wireless network Utilizes five access points associated with cells I V Network accessible from wireless device in any cell Inter-Access Point Protocol (IAPP) Enables mobile station to move among cells Encapsulates UDP and IP for roaming communications Alternative Radio Wave Technologies Three popular alternatives to 802.11 group Bluetooth HiperLAN HomeRF SWAP Alternative standards supported by specific vendors
MODULE 6 -7 BY: JERMINE G. VALEN

URDANETA CITY UNIVERSITY

COLLEGE OF COMPUTER STUDIES

Bluetooth Defined through the Bluetooth Special Interest Group Characteristics Uses Frequency Hopping Spread Spectrum (FHSS) Frequency hopping: packets hop among 79 frequencies Occurs in 2.4 GHz range (2.42.4835 GHz) High wattage transmission from 10 to 100 meters Can use asynchronous or synchronous communication Uses time division duplexing (TDD) Packets sent in alternating directions using time slots Many kinds of wireless products use Bluetooth Examples: PDAs, keyboards, mice, printers, others HiperLAN High-performance radio local area network Features of second version, HiperLAN2 Transmits at up to 54 Mbps in the 5 GHz range Compatible with Ethernet and ATM Supports Data Encryption Standard (DES) Supports Quality of Service (QoS) HiperLAN2 operates in two modes Direct: peer-to-peer similar to 802.11 IBSS topology Centralized: certain access points centralize control Both HiperLAN2 modes use TDD HomeRF Shared Wireless Access Protocol (SWAP) Operates in 2.4 GHz range Uses CSMA/CA similar to 802.11 Designed for home networks Does not have broad-based support Infrared Technologies

Broadcasts in single direction or all directions Advantages of infrared medium Inexpensive Difficult to intercept Not prone to RFI or EMI Disadvantages of infrared medium Slow data transmissions Does not penetrate walls Experiences interference from strong visible light Diffused infrared: reflects infrared light from ceiling Defined by IEEE 802.11R standard Communication with pulse position modulation (PPM) Wireless MANs Based on IEEE 802.16 standard (WiMAX) Provides connectivity up to 75 Mbps Has a reach of up to 30 miles WiMAX called connection for "last mile" Connects home or office to wired network provider Implementing WiMAX for rural office
MODULE 6 -8 BY: JERMINE G. VALEN

URDANETA CITY UNIVERSITY

COLLEGE OF COMPUTER STUDIES

Install wireless communication at network provider Include a directional or omnidirectional antenna Connect directional antenna to wireless router in office Point office antenna to provider's antenna Microwave Technologies Work in one of two ways: terrestrial and satellite Have theoretical bandwidth up to 720 Mbps Terrestrial Microwave Characteristics of transmission Between two directional parabolic antennas (dishes) Performed in ranges of 46 GHz and 2123 GHz Require the operator to obtain an FCC license Uses of terrestrial microwave transmission Where cabling costs are too high Where cabling and wireless options not possible Example: between two large buildings in a city Satellite Microwave

Transmits signal between antennas One antenna on a satellite in Connection speed at 1.5 Mbps May be "throttled" down for uploading large files Also vary due to weather, signal strength, usage User equipment needed for satellite communication Satellite dish about 2 or 3 in diameter Digital modems to transmit receive signals Coaxial (TV-like) cables the modems to dish Serial/USB cable from modems to serial/USB ports Software from provider to enable computer setup Geosynchronous satellites Orbit at 22,300 miles above the Earth Orbital position stationary with respect to earth Extreme distance can cause transmission delays Low Earth orbiting (LEO) satellites Orbit between 435 and 1000 miles above the Earth Facilitate faster transmission of two-way signals Uses of satellite networks Broadband (high-speed) Internet communications Around-the-world video conferencing Classroom and educational communications Other communications involving voice, video, data Wireless Hotspots Locations that provide a public access point to users Examples: student union, library, airport, hotel Considerations when setting up hotspot Implementing WEP or WPA
MODULE 6 -9 BY: JERMINE G. VALEN

three space

feet and from

URDANETA CITY UNIVERSITY

COLLEGE OF COMPUTER STUDIES

Directing public users to instructional Web pages Learning about acceptable uses of hotspots Learning how to configure security

Designing a Wireless Network Guidelines For home/office installations consider using 802.11g Choose router as access point Router manages traffic and acts as firewall Increase speed of network Use more access points to speed up network Shorten distances between nodes for faster network Avoid combining 802.11b and 802.11g (reduces speed) Use WiMAX for applications spanning several miles Use WEP or WPA and 802.1x/802.11i for security Always configure the SSID for a little extra security Designing for a Home or Small Office Scenario 1: home with one desktop and two laptops Option 1(uses IBSS topology) Equip all computers with WNICs Connect cable modem for Internet access to desktop Desktop shares connection via ICS Option 2 (uses ESS topology) Equip all computers with WNICs Buy 802.11g router with connection for cable modem Connect cable modem to router for Internet connection Scenario 2: Eight architects with eight laptops Similar to Option 2 for home scenario Router acts also acts as firewall Designing for a Large Organization Scenario: outfitting company with campus and outlet Wireless network design choices Install 802.11g networks to coexist in cabled areas Use 802.11g network via access points in outlet store Enable employees with laptops to roam Use 802.16 to communicate between campus and outlet SUMMARY Wireless network technologies: radio wave, infrared, microwave Wireless networks rooted in ham radio and standards Wireless networks accommodate multiple needs Radio wave technologies typically use line-of-sight communications Radio wave technologies also use spread spectrum communications IEEE 802.11 parts: WNIC, access points, antennas Antennas may be directional or omnidirectional 802.11 group: 802.11a, 802.11b, and 802.11g 802.11 security: WEP, WPA, SSID, 802.1x/802.11i Wireless network topologies: IBSS or ESS Summary (continued) Alternatives to 802.11: Bluetooth, HiperLAN2, HomerRF SWAP 802.11R: standard for diffused infrared light transmission 802.16 (WiMAX) standard relates to wireless MANs Terrestrial microwave transmits with directional dishes Satellite microwave uses three antennas, one in space

MODULE 6 - 10 BY: JERMINE G. VALEN

Potrebbero piacerti anche