Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
PROJECT OVERVIEW
1.1 INTRODUCTION:
Increased use of laptop computers within the enterprise, and increase in worker mobility has fuelled the demand for wireless networks. Up until recently, wireless technology was a patchwork of incompatible systems from a variety of vendors. The technology was slow, expensive and reserved for mobile situations or hostile environments where cabling was impractical or impossible. With the maturing of industry standards and the deployment of lightweight wireless networking hardware across a broad market section, wireless technology has come of age. 1.2 SCOPE: Wi-Fi devices "connect" to each other by transmitting and receiving signals on a specific frequency of the radio band. Your components can connect to each other directly (this is called "peer-to-peer") or through a gateway or access point. When you create your Wi-Fi network it will consist of two basic components: Wi-Fi radios and access points or gateways. Wi-Fi radios are embedded or attached to the desktop computers, laptops and mobile devices in your network. The access points or gateways act as "base stations" they send and receive signals from the Wi-Fi radios to connect the various components to each other as well as to the Internet. All computers in your Wi-Fi network can then share resources, exchange files and use a single Internet connection Wi-Fi(ada IEEE802.11b) is a wireless LAN technology that promises much more bandwidth than blue tooth . If you think blue tooth is the latest technology you are mistaken. There is now another candidate in the running that goes by name 802.11b, also called Wi-Fi(wireless fidelity), which promises to be the real big thing. Once limited to the domain of vertical market application like inventory management , wireless LAN or WAN (often represented by the name Wi-fi which refers to the products based on IEEE 802.11b) is now rapidly expanding into horizontal markets. Example abound-large corporation such as Microsoft as well as many universities, now use Wi-Fi extensively to provide notebook connectivity across multiside campuses.
CHAPTER -2 INTRODUCTION
2.1 HISTORY:
When the IEEE ratified the 802.11a and 802.11b wireless networking communications standards in 1999, its goal was to create a standards-based technology that could span multiple physical encoding types, frequencies and applications in the same way the 802.3 Ethernet standard has been successfully applied to 10-, 100- and 1,000-Gbps technology over fiber and various kinds of copper. One year later, we have at our disposal a wide selection of 11-Mbps 802.11b products from a multitude of vendors. But what about 802.11a?
The 802.11b group was driven largely by Lucent Technologies and Intersil Corp. (the former Harris Semiconductor unit spun out of Harris Corp. in July 1999). The 802.11b standard was designed to operate in the 2.4-GHz ISM (Industrial, Scientific and Medical) band using direct-sequence spread-spectrum technology. The 802.11a standard, on the other hand, was designed to operate in the more recently allocated 5-GHz UNII (Unlicensed National Information Infrastructure) band. And unlike 802.11b, the 802.11a standard departs from the traditional spread-spectrum technology, instead using a frequency division-multiplexing scheme that's intended to be friendlier to office environments to 54 Mbps, is the Fast Ethernet analog to 802.11b, which supports data rates of up to 11 Mbps. Like Ethernet and Fast Ethernet, 802.11b and 802.11a use an identical MAC (Media Access Control). However, while Fast Ethernet uses the same physical-layer encoding scheme as Ethernet (only faster), 802.11a uses an entirely different encoding scheme, called OFDM (orthogonal frequency division multiplexing).The 802.11a standard is designed to operate in the 5-GHz frequency range. Specifically, the FCC has allocated 300 MHz of spectrum for unlicensed operation in the 5-GHz block, 200 MHz of which is at 5.15 MHz to 5.35 MHz, with the other 100 MHz at 5.725 MHz to 5.825 MHz.
CHAPTER -3
3.1 OVERVIEW:
A wireless network can also use an access point, or base station. In this type of network the access point acts like a hub, providing connectivity for the wireless computers. It can connect (or "bridge") the wireless LAN to a wired LAN, allowing wireless computer access to LAN resources, such as file servers or existing Internet Connectivity. There are two types of access points:
i. Dedicated hardware access points (HAP) such as Lucent's Wave LAN, Apple's
Airport Base Station or Web Gear's Aviator. (HYPERLINK \l "Figure2"See Figure 2). Hardware access points offer comprehensive support of most wireless features, but check your requirements carefully.
ii. Software Access Points which run on a computer equipped with a wireless
network interface card as used in an ad-hoc or peer-to-peer wireless network. (HYPERLINK \l "Figure3"See Figure 3) The Vicomsoft InterGate suites are software routers that can be used as a basic Software Access Point, and include features not commonly found in hardware solutions, such as Direct PPPoE support and extensive configuration flexibility, but may not offer the full range of wireless features defined in the 802.11 standard. With appropriate networking software support, users on the wireless LAN can share files and printers located on the wired LAN and vice versa. Vicomsoft's solutions support file sharing using TCP/IP. Figure 2: Hardware Access Point. Wireless connected computers using a Hardware Access Point.
number of slots or interfaces in the computer used for this task. Further to this the software access point may include significant additional features such as shared Internet access, web caching or content filtering, providing significant benefits to users and administrators.
6. There are ways to extend the basic operating range of Wireless communications, by using more
than a single access point or using a wireless relay /extension point. See Question 8 for further information.
7. How many wireless networked computers can use a single access point?
This depends upon the manufacturer. Some hardware access points have a recommended limit of 10, with other more expensive access points supporting up to 100 wireless connections. Using more computers than recommended will cause performance and reliability to suffer. Software access points may also impose user limitations, but this depends upon the specific software, and the host computer's ability to process the required information.
If a single area is too large to be covered by a single access point, then multiple access points or extension points can be used. -- Note that an "extension point" is not defined in the wireless standard, but have been developed by some manufacturers. When using multiple access points, each access point wireless area should overlap its neighbors. This provides a seamless area for users to move around in using a feature called "roaming. " (See the next question for an explanation of Roaming) Some manufacturers produce extension points, which act as wireless relays, extending the range of a single access point. Multiple extension points can be strung together to provide wireless access to far away locations from the central access point. (See Figure 5)
9.What is Roaming?
A wireless computer can "roam" from one access point to another, with the software and hardware maintaining a steady network connection by monitoring the signal strength from inrange access points and locking on to the one with the best quality. Usually this is completely transparent to the user; they are not aware that a different access point is being used from area to area. Some access point configurations require security authentication when swapping access points, usually in the form of a password dialog box. Access points are required to have overlapping wireless areas to achieve this as can be seen in the following diagram:
Figure6:Roaming: A user can move from Area 1 to Area 2 transparently. The Wireless
networking hardware automatically swaps to the Access Point with the best signal. Not all access points are capable of being configured to support roaming. Also of note is that any access points for a single vendor should be used when implementing roaming, as there is no official standard for this feature.
Figure 7: LAN to LAN Wireless Communications A Hardware Access Point providing wireless connectivity to local computers and a software
access point. The software access point provides Wired Ethernet network 2 computers access to
Wired Network 1.
Note that not all hardware access points have the ability to directly interconnect to another hardware access point, and that the subject of interconnecting LAN's over wireless connections is a large and complex one, and is beyond the scope of this introduction. See the reference links at the end of this section if you require further information.
11.Is it true that wireless networking is only good for laptop computers?
Although wireless networking offers obvious benefits to users of laptops who move from location to location throughout the day, there are benefits for users of fixed position computers as well:
Many schools and businesses have unsuitable building layouts or walls that cannot be wired for various reasons making it difficult or impossible to build a wired network. Wireless networking in these environments is a very cost effective alternative also providing future flexibility. In cases where a small number of computers are separated from a main network a wireless link may be more cost effective than network cabling although the latter is perfectly feasible. Temporary wireless LANs can easily be created for exhibitions, school or business projects, all without any trailing cabling. To protect against any potential security issues, 802.11 wireless communications have a function called WEP (Wired Equivalent Privacy), a form of encryption which provides privacy comparable to that of a traditional wired network. If the wireless network has information that should be secure then WEP should be used, ensuring the data is protected at traditional wired network levels. Also it should be noted that traditional Virtual Private Networking (VPN) techniques will work over wireless networks in the same way as traditional wired networks. Section Two - Wireless Networking and the Internet
Figure 9: Hardware Access Point. Wireless connected computers using a Hardware Access Point for shared Internet access.
11. If I have more than one hardware access point, how can I share a single
Internet connection? If an existing wired LAN already has an Internet connection, then the hardware access points simply connect to your LAN and allow wireless computers to access the existing Internet connection in the same way as wired LAN computers.
You can use a variety of high-speed Internet connections with a Wi-Fi network, including cable modems, different types of DSL, satellite broadband, ISDN, etc. Your broadband Internet connection will connect to your gateway or access point, and its Internet connection will be distributed to all the computers on your network. And don't worry about Wi-Fi slowing down your connection speed: it's at least four times faster than the fastest of any of these connections. If there's an Ethernet cable attached to your Internet device, you can connect it to your base station to distribute your Internet connection throughout your home or small office Wi-Fi network.
11
Figure 10: Multiple Access Points. Wireless connected computers using Multiple Access Points.
If there is no existing Internet connection, then this depends on the access point: Figure 11: Software Access Point sharing one Internet connection. Wireless connected computers using Multiple Access Points. All wired and wireless computers access the Internet through a single software access point.
If an access point provides some form of Internet sharing itself, then having multiple such access points connected to a wired LAN may require some special configuration, or possibly may require an additional Internet sharing device or software program.
12. If I use a wireless network to connect to the Internet does my ISP need a
wireless network too? If you use a wireless network to connect to the Internet, the wireless part only concerns your LAN. The communications link from your LAN to your Internet service provider (ISP) would be identical whether or not you had a wireless network. For example, if you connected an ethernet network to the Internet via a 56K modem, when you upgraded your network to use wireless, you would still use the same 56K modem to connect to the Internet.
13. Can networking software identify a wireless computer in the same way it can
identify an ethernet computer on the network? Wireless cards look just like ethernet cards to your network drivers. In fact, wireless networking cards have unique MAC hardware addresses that are formatted like ethernet hardware addresses allocated from the same standards organization.
12
Firewalls
Firewalls can make your network appear invisible to the Internet, and they can block unauthorized and unwanted users from accessing your files and systems. Hardware and software firewall systems monitor and control the flow of data in and out of computers in both wired and wireless enterprise, business and home networks. They can be set to intercept, analyze and stop a wide range of Internet intruders and hackers
CHAPTER- 4
13
14
Kerberos
Another way to protect your wireless data is by using a technology called Kerberos. Created by MIT, Kerberos is a network authentication system based on key distribution. It allows entities to communicate over a wired or wireless network to prove their identity to each other while preventing eavesdropping or replay attacks. It also provides for data stream integrity (detection of modification) and secrecy (preventing unauthorized reading) using cryptography systems such as DES. After a client and server have used Kerberos to prove their identity, they can also encrypt all of their communications to assure privacy and data integrity as they go about their business. Kerberos works by providing principals (users or services) with digital tickets that they can use to identify themselves to the network and secret cryptographic keys for secure communications. A ticket is a sequence of a few hundred bytes that can be embedded in virtually any other network protocol, thereby allowing the processes implementing that protocol to be sure about the identity of the principals involved. Kerberos is available free from MIT and as a product from many different vendors
15
16
FUTURE PROSPECTS:
Devices using 802.11b enjoy international acceptance because the 2.4-GHz band is almost universally available. Where there are conflicts, the vendor can implement frequency-selection software that prevents a radio from operating at illegal frequencies. However, the 5-GHz spectrum does not share this luxury. In the United States, 802.11a enjoys relatively clear-channel operation. But in Europe and Asia, the case is a little different. The Japanese market shares only the lower 100 MHz of the frequency spectrum, which means 802.11a applications in Japan will face more contention. In Europe, the lower 200 MHz are common with the FCC's 5-GHz allotment, but the higher 100 MHz, reserved for outdoor applications, are taken. 802.11a needs about 20 MHz of spectrum to operate at 54 Mbps. Thus, users in the United States and Europe will have up to 10 channels from which to choose, while users in Japan will be restricted to five channels. To complicate matters, in Europe, the HiperLAN/2 standard, led by the ETSI (European Telecommunications Standards Institute)'s BRAN (Broadband Radio Access Networks) group, has wide acceptance as the 5-GHz technology of choice. HiperLAN/2 and 802.11a share some similarities at the physical layer: Both use OFDM technology to achieve their data rates, for instance. However, HiperLAN/2 is much more akin to ATM than to Ethernet. In fact, the HiperLAN/2 standard grew out of the effort to develop wireless ATM. HiperLAN/2 shares the 20-MHz channels in the 5-GHz spectrum in time, using TDMA (time division multiple access) to provide QoS (Quality of Service) through ATM-like mechanisms. In contrast, 802.11a shares the 20-MHz channel in time using CSMA/ CA (carrier sense multiple access with collision avoidance). Logically, HiperLAN/2 uses a different MAC from the one that 802.11a uses. The HiperLAN/2 MAC design has proven to be problematic and controversial, and the HiperLAN/2 standard is nowhere close to complete. In contrast, 802.11a uses the same MAC as 802.11b, which gives developers only one task to complete: a 5-GHz IEEE 802.11a-compliant radio. No simple task, but easier than redesigning the radio and the MAC controller. What's more, the 802.11a technology will not be readily accepted overseas as certain military and government installations use portions of the 5-GHz space for ground tracking stations and satellite communications. To ensure that unlicensed applications don't interfere with existing 5-GHz applications, the ETSI has specified that two additional protocols must be implemented before distribution is granted in Europe. These protocols, DFS (Dynamic Frequency Selection) and TPC (Transmit Power Control), allow the wireless client/application to dynamically respond to radio interference by changing channels, using lower power modulation or both. This ensures that the "incumbent" signal gets first priority when a new signal is introduced in a given area. DFS and TPC implementations for 802.11a are being discussed, and we expect an addendum to the 802.11a standard to allow these features as options.
17
have arisen in the 2.4-GHz space. Atheros has submitted the 5-UP standard to the IEEE for consideration, but no decision has been made as to whether anyone other than Atheros will support it. For implementers, 802.11a's use of the same MAC as 802.11b means one less component to design. For adopters, this means that upgrading from 802.11b to 802.11a technology will not have significant impact on network operations. 802.11b's MAC uses CSMA/CA technology and implements a number of options to improve throughput, especially in congested areas. The only drawback to using the 802.11b MAC is that 802.11a inherits the same inefficiencies hampering 802.11b wireless solutions. The 802.11b MAC is only about 70 percent efficient, so even at 54 Mbps, maximum throughput is closer to 38 Mbps. Factor in driver inefficiencies and some additional overhead at the physical layer, and you can expect actual throughput to be about 30 Mbps. We estimate this throughput based on the average throughput of 802.11b networks, which is now about 6 Mbps of a possible 11 Mbps for optimal implementations. Unlike 802.11b, 802.11a does not have to transmit its headers at 1 Mbps, so 802.11a will gain some theoretical efficiency over 802.11b; still, it's safe to speculate that throughput won't exceed 35 Mbps.
18