Wireless LAN Overview - PowerPoint PPT Presentation

About This Presentation
Title:

Wireless LAN Overview

Description:

fashion as many switches and routers on the market today. ... It is this directory, along with the many white papers and case studies that ... – PowerPoint PPT presentation

Number of Views:86
Avg rating:3.0/5.0
Slides: 92
Provided by: wirele2
Category:
Tags: lan | overview | wireless

less

Transcript and Presenter's Notes

Title: Wireless LAN Overview


1
Wireless LAN Overview
  • Abdus Salam ICTP, February 2003
  • Presented by
  • Ermanno Pietrosemoli
  • Latin American Networking School - ULA

2
Wireless LAN Overview
  • Wireless networks where borne as LANs, but for
    developing countries applications they are more
    useful as MANs or even WANs
  • The enormous success of this technology has led
    to a dramatic price reduction of the equipment,
    from 750 in 1992 to 60 in 2002

3
Wireless LAN OverviewAgenda
  • DSSS Channel Allocation
  • Access Point Modes and Types
  • Clients Types
  • 802.11 Standards
  • 802.11 Terminology

4
Wireless LAN Overview
  • DSSS popularity has eclipsed FHSS, although the
    latter may be more resistant to interference
  • We will focus on DSSS

5
Channel Overlapping
6
(No Transcript)
7
(No Transcript)
8
(No Transcript)
9
(No Transcript)
10
Access Point Modes
  • Root Mode
  • Repeater Mode
  • Bridge Mode

11
(No Transcript)
12
(No Transcript)
13
(No Transcript)
14
(No Transcript)
15
(No Transcript)
16
(No Transcript)
17
(No Transcript)
18
  • Repeater and Bridging Functions

19
(No Transcript)
20
(No Transcript)
21
(No Transcript)
22
(No Transcript)
23
(No Transcript)
24
(No Transcript)
25
(No Transcript)
26
(No Transcript)
27
(No Transcript)
28
(No Transcript)
29
(No Transcript)
30
Chipset Manufacturers
31
Client Devices
32
Client Devices
33
Client Devices
34
(No Transcript)
35
(No Transcript)
36
(No Transcript)
37
(No Transcript)
38
Common options that most wirelessresidential
gateways include are
  • Point-to-Point Protocol over Ethernet (PPPoE)
  • Network Address Translation (NAT)
  • Port Address Translation (PAT)
  • Ethernet switching
  • Virtual Servers
  • Print Serving
  • Fail-over routing
  • Virtual Private Networks (VPNs)
  • Dynamic Host Configuration Protocol (DHCP)
    Server and Client
  • Configurable Firewall

39
(No Transcript)
40
Enterprise Gateway Features
  • Enterprise wireless gateways do have features,
    such as Role-Based Access Control (RBAC), that
    are not found in any access points. RBAC allows
    an administrator to assign a certain level of
    wireless network access to a particular job
    position in the company. If the person doing that
    job is replaced, the new person automatically
    gains the same network rights as the replaced
    person. Having the ability to limit a wireless
    user's access to corporate resources, as part of
    the "role", can be a useful security feature.

41
Enterprise Gateway Features
  • Class of service is typically supported, and
    an administrator can assign levels of service to
    a particular user or role. For example, a guest
    account might be able to use only 500 kbps on the
    wireless network whereas an administrator might
    be allowed 2 Mbps connectivity.

42
Configuration and Managementof EG
  • Enterprise wireless gateways are installed in the
    main the data path on the wired LAN segment just
    past the access point(s)
  • They are configured through console ports using
    telnet, internal HTTP or HTTPS servers, etc.
  • Centralized management of only a few devices is
    one big advantage of using enterprise wireless
    gateways. An administrator, from a single
    console, can easily manage a large wireless
    deployment using only a few central devices
    instead of a very large number of access points.

43
Configuration and Managementof EWG
  • Enterprise wireless gateways are normally
    upgraded through use of TFTP in the same
  • fashion as many switches and routers on the
    market today. Configuration backups can often be
    automated so that the administrator won't have to
    spend additional management time backing up or
    recovering from lost configuration files.
    Enterprise wireless gateways are mostly
    manufactured as rack-mountable 1U or 2U devices
    that can fit into your existing data center
    design.

44
(No Transcript)
45
UNII Bands
46
UNII Middle Band
  • The middle UNII band is bound by 5.25 GHz and
    5.35 GHz and is specified at 250 mW of output
    power by the FCC. The power output specified by
    IEEE for the middle UNII band is 200 mW. This
    power limit allows operation of devices either
    indoors or outdoors and is commonly used for
    short outdoor hops between closely spaced
    buildings. In the case of a home installation,
    such a configuration might include an RF link
    between the house and the garage, or the house
    and a neighbors house.
  • .

47
UNII Upper Band
  • The upper UNII band is reserved for outdoor
    links and is limited by the FCC to 1 Watt of
    output power. This band occupies the range of
    frequencies between 5.725 GHz and 5.825 GHz, and
    is often confused with the 5.8 GHz ISM band. The
    IEEE specifies the maximum output power for this
    band as 800 mW, which is plenty of power for
    almost any outdoor implementation, except for
    large campuses or long-distance RF links.

48
Power Limits
  • PtMP links have a central point of
    connection and two or more non-central connection
    points. PtMP links are typically configured in a
    star topology. The central connection point may
    or may not have an omnidirectional antenna It is
    important to note that when an omnidirectional
    antenna is used, the FCC automatically considers
    the link a PtMP link.
  • Regarding the setup of a PtMP link, the FCC
    limits the EIRP to 4 Watts in both the 2.4 GHz
    ISM band and upper 5 GHz UNII band. The power
    limit set for the intentional radiator (the
    device transmitting the RF signal) in each of
    these bands is 1 Watt. If the transmitting
    wireless LAN devices are adjustable with respect
    to their output power, then the system can be
    customized to the needs of the user.

49
Power Limits
  • Suppose a radio transmitting at 1 Watt (30
    dBm) is connected directly to a 12 dBi
    omnidirectional antenna. The total output power
    at the antenna is about 16 Watts, which is well
    above the 4 Watt limit. The FCC stipulates that
    for each 3 dBi above the antenna's initial 6 dBi
    of gain, the power at the intentional radiator
    must be reduced by 3 dB below the initial 30
    dBm. For our example, since the antenna gain is
    12 dBi, the power at the intentional radiator
    must be reduced by 6 dB. This reduction will
    result in an intentional radiator power of 24
    dBm (30 dBm 6 dB), or 250 mW and an EIRP of 36
    dBm (24 dBm 12 dBi), or 4 Watts. Clearly this
    rule can become confusing, but the end result
    must be that the power at the intentional
    radiator must never be more than 1 Watt and the
    EIRP must never be above 4 Watts for a PtMP
    connection.

50
Power Limits
51
Power Limits
52
Power Limits
53
Power Limits
54
(No Transcript)
55
(No Transcript)
56
(No Transcript)
57
IEEE 802.11g
  • 802.11g provides the same maximum speed of
    802.11a,coupled with backwards compatibility for
    802.11b devices. This backwards compatibility
    will make upgrading wireless LANs simple and
    inexpensive.
  • IEEE 802.11g specifies operation in the 2.4
    GHz ISM band. To achieve the higher data rates
    found in 802.11a, 802.11g compliant devices
    utilize Orthogonal Frequency Division
    Multiplexing (OFDM) modulation technology. These
    devices can automatically switch to QPSK
    modulation in order to communicate with the
    slower 802.11b- and 802.11- compatible devices.
    With all of the apparent advantages, 802.11gs
    use of the crowded 2.4 GHz band could prove to be
    a disadvantage.

58
Wireless Ethernet Compatibility Alliance
  • The Wireless Ethernet Compatibility Alliance
    (WECA) promotes and tests for wireless LAN
    interoperability of 802.11b devices and 802.11a
    devices. WECAs mission is to certify
    interoperability of Wi-Fi (IEEE 802.11) products
    and to promote Wi-Fi as the global wireless LAN
    standard across all market segments. As an
    administrator, you must resolve conflicts among
    wireless LAN devices that result from
    interference, incompatibility, or other problems.

59
Wireless Ethernet Compatibility Alliance
60
European Telecommunications Standards Institute
61
European Telecommunications Standards Institute
The website for ETSI is www.etsi.org
62
Wireless LAN Association
  • The Wireless LAN Association's mission is to
    educate and raise consumer awareness regarding
    the use and availability of wireless LANs and to
    promote the wireless LAN industry in general. The
    Wireless LAN Association (WLANA) is an
    educational resource for those seeking to learn
    more about wireless LANs. WLANA can also help if
    you are looking for a specific wireless LAN
    product or service.
  • WLANA has many partners within the industry that
    contribute content to the WLANA directory of
    information. It is this directory, along with the
    many white papers and case studies that WLANA
    provides, that offer you valuable information for
    making your own decisions about wireless LAN
    implementation.
  • The website for WLANA is www.wlana.org

63
(No Transcript)
64
(No Transcript)
65
Bluetooth
66
Bluetooth
67
Bluetooth
68
Bluetooth
69
The website for IrDA is www.irda.org
70
Locating a Wireless LAN
71
Service Set Identifier
72
Beacons
  • Beacons (short for beacon management frame) are
    short frames that are sent from the access point
    to stations (infrastructure mode) or
    station-to-station (ad hoc mode) in order to
    organize and synchronize wireless communication
    on the wireless LAN.
  • Beacons serve several functions, including the
    following

73
Time Synchronization Beacons synchronize clients
by way of a time-stamp at the exact moment of
transmission. When the client receives the
beacon, it changes its own clock to reflect the
clock of the access point. Once this change is
made, the two clocks are synchronized.
Synchronizing the clocks of communicating units
will ensure that all time-sensitive functions,
such as hopping in FHSS systems, are performed
without error. The beacon also contains
the beacon interval, which informs stations how
often to expect the beacon.
74
FH or DS Parameter Sets Beacons contain
information specifically geared to the spread
spectrum technology the system is using. For
example, in a FHSS system, hop and dwell time
parameters and hop sequence are included in the
beacon. In a DSSS system, the beacon contains
channel information.
75
SSID Information Stations look in beacons for the
SSID of the network they wish to join. When this
information is found, the station looks at the
MAC address of where the beacon originated and
sends an authentication request in hopes of
associating with that access point. If a station
is set to accept any SSID, then the station will
attempt to join the network through the first
access point that sends a beacon or the one with
the strongest signal strength if there are
multiple access points.
76
Traffic Indication Map (TIM) The TIM is used an
as indicator of which sleeping stations have
packets queued at the access point. This
information is passed in each beacon to all
associated stations. While sleeping, synchronized
stations power up their receivers, listen for the
beacon, check the TIM to see if they are listed,
then, if they are not listed, they power down
their receivers and continue sleeping. .
77
Supported Rates With wireless networks, there are
many supported speeds depending on the standard
of the hardware in use. For example, an 802.11b
compliant device supports 11, 5.5, 2, 1 Mbps
speeds. This capability information is passed in
the beacons to inform the stations what speeds
are supported on the access point.
78
Passive Scanning Passive scanning is the process
of listening for beacons on each channel for a
specific period of time after the station is
initialized. These beacons are sent by access
points (infrastructure mode) or client stations
(ad hoc mode), and the scanning station catalogs
characteristics about the access points or
stations based on these beacons. The station
searching for a network listens for beacons until
it hears a beacon listing the SSID of the network
it wishes to join. The station then attempts to
join the network through the access point that
sent the beacon.
79
Active Scanning Active scanning involves the
sending of a probe request frame from a wireless
station. Stations send this probe frame when they
are actively seeking a network to join. The probe
frame will contain either the SSID of the network
they wish to join or a broadcast SSID. If a probe
request is sent specifying an SSID, then only
access points that are servicing that SSID will
respond with a probe response frame. If a probe
request frame is sent with a broadcast SSID, then
all access points within reach will respond with
a probe response frame. The point of probing in
this manner is to locate access points through
which the station can attach to the network. Once
an access point with the proper SSID is found,
the station initiates the authentication and
association steps of joining the network through
that access point. .
80
(No Transcript)
81
Active Scanning
82
(No Transcript)
83
(No Transcript)
84
(No Transcript)
85
(No Transcript)
86
(No Transcript)
87
(No Transcript)
88
(No Transcript)
89
(No Transcript)
90
(No Transcript)
91
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com