Presentation is loading. Please wait.

Presentation is loading. Please wait.

Pietrosemoli, ICTP Feb. 20031 Wireless LAN Overview Abdus Salam ICTP, February 2003 Presented by Ermanno Pietrosemoli Latin American Networking School.

Similar presentations


Presentation on theme: "Pietrosemoli, ICTP Feb. 20031 Wireless LAN Overview Abdus Salam ICTP, February 2003 Presented by Ermanno Pietrosemoli Latin American Networking School."— Presentation transcript:

1 Pietrosemoli, ICTP Feb. 20031 Wireless LAN Overview Abdus Salam ICTP, February 2003 Presented by Ermanno Pietrosemoli Latin American Networking School - ULA

2 Pietrosemoli, ICTP Feb. 20032 Wireless LAN Overview Wireless networks where borne as LANs, but for developing countries applications they are more useful as MANs or even WANs The enormous success of this technology has led to a dramatic price reduction of the equipment, from $750 in 1992 to $60 in 2002

3 Pietrosemoli, ICTP Feb. 20033 Wireless LAN Overview Agenda DSSS Channel Allocation Access Point Modes and Types Clients Types 802.11 Standards 802.11 Terminology

4 Pietrosemoli, ICTP Feb. 20034 Wireless LAN Overview DSSS popularity has eclipsed FHSS, although the latter may be more resistant to interference We will focus on DSSS

5 Pietrosemoli, ICTP Feb. 20035 Channel Overlapping

6 Pietrosemoli, ICTP Feb. 20036

7 7

8 8

9 9

10 10 Access Point Modes Root Mode Repeater Mode Bridge Mode

11 Pietrosemoli, ICTP Feb. 200311

12 Pietrosemoli, ICTP Feb. 200312

13 Pietrosemoli, ICTP Feb. 200313

14 Pietrosemoli, ICTP Feb. 200314

15 Pietrosemoli, ICTP Feb. 200315

16 Pietrosemoli, ICTP Feb. 200316

17 Pietrosemoli, ICTP Feb. 200317

18 Pietrosemoli, ICTP Feb. 200318 Repeater and Bridging Functions

19 Pietrosemoli, ICTP Feb. 200319

20 Pietrosemoli, ICTP Feb. 200320

21 Pietrosemoli, ICTP Feb. 200321

22 Pietrosemoli, ICTP Feb. 200322

23 Pietrosemoli, ICTP Feb. 200323

24 Pietrosemoli, ICTP Feb. 200324

25 Pietrosemoli, ICTP Feb. 200325

26 Pietrosemoli, ICTP Feb. 200326

27 Pietrosemoli, ICTP Feb. 200327

28 Pietrosemoli, ICTP Feb. 200328

29 Pietrosemoli, ICTP Feb. 200329

30 Pietrosemoli, ICTP Feb. 200330 Chipset Manufacturers

31 Pietrosemoli, ICTP Feb. 200331 Client Devices

32 Pietrosemoli, ICTP Feb. 200332 Client Devices

33 Pietrosemoli, ICTP Feb. 200333 Client Devices

34 Pietrosemoli, ICTP Feb. 200334

35 Pietrosemoli, ICTP Feb. 200335

36 Pietrosemoli, ICTP Feb. 200336

37 Pietrosemoli, ICTP Feb. 200337

38 Pietrosemoli, ICTP Feb. 200338 Common options that most wireless residential gateways include are: Point-to-Point Protocol over Ethernet (PPPoE) Network Address Translation (NAT) Port Address Translation (PAT) Ethernet switching Virtual Servers Print Serving Fail-over routing Virtual Private Networks (VPNs) Dynamic Host Configuration Protocol (DHCP) Server and Client Configurable Firewall

39 Pietrosemoli, ICTP Feb. 200339

40 Pietrosemoli, ICTP Feb. 200340 Enterprise Gateway Features Enterprise wireless gateways do have features, such as Role-Based Access Control (RBAC), that are not found in any access points. RBAC allows an administrator to assign a certain level of wireless network access to a particular job position in the company. If the person doing that job is replaced, the new person automatically gains the same network rights as the replaced person. Having the ability to limit a wireless user's access to corporate resources, as part of the "role", can be a useful security feature.

41 Pietrosemoli, ICTP Feb. 200341 Enterprise Gateway Features Class of service is typically supported, and an administrator can assign levels of service to a particular user or role. For example, a guest account might be able to use only 500 kbps on the wireless network whereas an administrator might be allowed 2 Mbps connectivity.

42 Pietrosemoli, ICTP Feb. 200342 Configuration and Management of EG Enterprise wireless gateways are installed in the main the data path on the wired LAN segment just past the access point(s) They are configured through console ports using telnet, internal HTTP or HTTPS servers, etc. Centralized management of only a few devices is one big advantage of using enterprise wireless gateways. An administrator, from a single console, can easily manage a large wireless deployment using only a few central devices instead of a very large number of access points.

43 Pietrosemoli, ICTP Feb. 200343 Configuration and Management of EWG Enterprise wireless gateways are normally upgraded through use of TFTP in the same fashion as many switches and routers on the market today. Configuration backups can often be automated so that the administrator won't have to spend additional management time backing up or recovering from lost configuration files. Enterprise wireless gateways are mostly manufactured as rack-mountable 1U or 2U devices that can fit into your existing data center design.

44 Pietrosemoli, ICTP Feb. 200344

45 Pietrosemoli, ICTP Feb. 200345 UNII Bands

46 Pietrosemoli, ICTP Feb. 200346 UNII Middle Band The middle UNII band is bound by 5.25 GHz and 5.35 GHz and is specified at 250 mW of output power by the FCC. The power output specified by IEEE for the middle UNII band is 200 mW. This power limit allows operation of devices either indoors or outdoors and is commonly used for short outdoor hops between closely spaced buildings. In the case of a home installation, such a configuration might include an RF link between the house and the garage, or the house and a neighbor’s house..

47 Pietrosemoli, ICTP Feb. 200347 UNII Upper Band The upper UNII band is reserved for outdoor links and is limited by the FCC to 1 Watt of output power. This band occupies the range of frequencies between 5.725 GHz and 5.825 GHz, and is often confused with the 5.8 GHz ISM band. The IEEE specifies the maximum output power for this band as 800 mW, which is plenty of power for almost any outdoor implementation, except for large campuses or long-distance RF links.

48 Pietrosemoli, ICTP Feb. 200348 Power Limits PtMP links have a central point of connection and two or more non-central connection points. PtMP links are typically configured in a star topology. The central connection point may or may not have an omnidirectional antenna It is important to note that when an omnidirectional antenna is used, the FCC automatically considers the link a PtMP link. Regarding the setup of a PtMP link, the FCC limits the EIRP to 4 Watts in both the 2.4 GHz ISM band and upper 5 GHz UNII band. The power limit set for the intentional radiator (the device transmitting the RF signal) in each of these bands is 1 Watt. If the transmitting wireless LAN devices are adjustable with respect to their output power, then the system can be customized to the needs of the user.

49 Pietrosemoli, ICTP Feb. 200349 Power Limits Suppose a radio transmitting at 1 Watt (+30 dBm) is connected directly to a 12 dBi omnidirectional antenna. The total output power at the antenna is about 16 Watts, which is well above the 4 Watt limit. The FCC stipulates that for each 3 dBi above the antenna's initial 6 dBi of gain, the power at the intentional radiator must be reduced by 3 dB below the initial +30 dBm. For our example, since the antenna gain is 12 dBi, the power at the intentional radiator must be reduced by 6 dB. This reduction will result in an intentional radiator power of +24 dBm (30 dBm – 6 dB), or 250 mW and an EIRP of 36 dBm (24 dBm + 12 dBi), or 4 Watts. Clearly this rule can become confusing, but the end result must be that the power at the intentional radiator must never be more than 1 Watt and the EIRP must never be above 4 Watts for a PtMP connection.

50 Pietrosemoli, ICTP Feb. 200350 Power Limits

51 Pietrosemoli, ICTP Feb. 200351 Power Limits

52 Pietrosemoli, ICTP Feb. 200352 Power Limits

53 Pietrosemoli, ICTP Feb. 200353 Power Limits

54 Pietrosemoli, ICTP Feb. 200354

55 Pietrosemoli, ICTP Feb. 200355

56 Pietrosemoli, ICTP Feb. 200356

57 Pietrosemoli, ICTP Feb. 200357 IEEE 802.11g 802.11g provides the same maximum speed of 802.11a,coupled with backwards compatibility for 802.11b devices. This backwards compatibility will make upgrading wireless LANs simple and inexpensive. IEEE 802.11g specifies operation in the 2.4 GHz ISM band. To achieve the higher data rates found in 802.11a, 802.11g compliant devices utilize Orthogonal Frequency Division Multiplexing (OFDM) modulation technology. These devices can automatically switch to QPSK modulation in order to communicate with the slower 802.11b- and 802.11- compatible devices. With all of the apparent advantages, 802.11g’s use of the crowded 2.4 GHz band could prove to be a disadvantage.

58 Pietrosemoli, ICTP Feb. 200358 Wireless Ethernet Compatibility Alliance The Wireless Ethernet Compatibility Alliance (WECA) promotes and tests for wireless LAN interoperability of 802.11b devices and 802.11a devices. WECA’s mission is to certify interoperability of Wi-Fi™ (IEEE 802.11) products and to promote Wi-Fi as the global wireless LAN standard across all market segments. As an administrator, you must resolve conflicts among wireless LAN devices that result from interference, incompatibility, or other problems.

59 Pietrosemoli, ICTP Feb. 200359 Wireless Ethernet Compatibility Alliance

60 Pietrosemoli, ICTP Feb. 200360 European Telecommunications Standards Institute

61 Pietrosemoli, ICTP Feb. 200361 European Telecommunications Standards Institute The website for ETSI is www.etsi.org

62 Pietrosemoli, ICTP Feb. 200362 Wireless LAN Association The Wireless LAN Association's mission is to educate and raise consumer awareness regarding the use and availability of wireless LANs and to promote the wireless LAN industry in general. The Wireless LAN Association (WLANA) is an educational resource for those seeking to learn more about wireless LANs. WLANA can also help if you are looking for a specific wireless LAN product or service. WLANA has many partners within the industry that contribute content to the WLANA directory of information. It is this directory, along with the many white papers and case studies that WLANA provides, that offer you valuable information for making your own decisions about wireless LAN implementation. The website for WLANA is www.wlana.org

63 Pietrosemoli, ICTP Feb. 200363

64 Pietrosemoli, ICTP Feb. 200364

65 Pietrosemoli, ICTP Feb. 200365 Bluetooth

66 Pietrosemoli, ICTP Feb. 200366 Bluetooth

67 Pietrosemoli, ICTP Feb. 200367 Bluetooth

68 Pietrosemoli, ICTP Feb. 200368 Bluetooth

69 Pietrosemoli, ICTP Feb. 200369 The website for IrDA is www.irda.org

70 Pietrosemoli, ICTP Feb. 200370 Locating a Wireless LAN

71 Pietrosemoli, ICTP Feb. 200371 Service Set Identifier

72 Pietrosemoli, ICTP Feb. 200372 Beacons Beacons (short for beacon management frame) are short frames that are sent from the access point to stations (infrastructure mode) or station-to-station (ad hoc mode) in order to organize and synchronize wireless communication on the wireless LAN. Beacons serve several functions, including the following:

73 Pietrosemoli, ICTP Feb. 200373 Time Synchronization Beacons synchronize clients by way of a time-stamp at the exact moment of transmission. When the client receives the beacon, it changes its own clock to reflect the clock of the access point. Once this change is made, the two clocks are synchronized. Synchronizing the clocks of communicating units will ensure that all time- sensitive functions, such as hopping in FHSS systems, are performed without error. The beacon also contains the beacon interval, which informs stations how often to expect the beacon.

74 Pietrosemoli, ICTP Feb. 200374 FH or DS Parameter Sets Beacons contain information specifically geared to the spread spectrum technology the system is using. For example, in a FHSS system, hop and dwell time parameters and hop sequence are included in the beacon. In a DSSS system, the beacon contains channel information.

75 Pietrosemoli, ICTP Feb. 200375 SSID Information Stations look in beacons for the SSID of the network they wish to join. When this information is found, the station looks at the MAC address of where the beacon originated and sends an authentication request in hopes of associating with that access point. If a station is set to accept any SSID, then the station will attempt to join the network through the first access point that sends a beacon or the one with the strongest signal strength if there are multiple access points.

76 Pietrosemoli, ICTP Feb. 200376 Traffic Indication Map (TIM) The TIM is used an as indicator of which sleeping stations have packets queued at the access point. This information is passed in each beacon to all associated stations. While sleeping, synchronized stations power up their receivers, listen for the beacon, check the TIM to see if they are listed, then, if they are not listed, they power down their receivers and continue sleeping..

77 Pietrosemoli, ICTP Feb. 200377 Supported Rates With wireless networks, there are many supported speeds depending on the standard of the hardware in use. For example, an 802.11b compliant device supports 11, 5.5, 2, & 1 Mbps speeds. This capability information is passed in the beacons to inform the stations what speeds are supported on the access point.

78 Pietrosemoli, ICTP Feb. 200378 Passive Scanning Passive scanning is the process of listening for beacons on each channel for a specific period of time after the station is initialized. These beacons are sent by access points (infrastructure mode) or client stations (ad hoc mode), and the scanning station catalogs characteristics about the access points or stations based on these beacons. The station searching for a network listens for beacons until it hears a beacon listing the SSID of the network it wishes to join. The station then attempts to join the network through the access point that sent the beacon.

79 Pietrosemoli, ICTP Feb. 200379 Active Scanning Active scanning involves the sending of a probe request frame from a wireless station. Stations send this probe frame when they are actively seeking a network to join. The probe frame will contain either the SSID of the network they wish to join or a broadcast SSID. If a probe request is sent specifying an SSID, then only access points that are servicing that SSID will respond with a probe response frame. If a probe request frame is sent with a broadcast SSID, then all access points within reach will respond with a probe response frame. The point of probing in this manner is to locate access points through which the station can attach to the network. Once an access point with the proper SSID is found, the station initiates the authentication and association steps of joining the network through that access point..

80 Pietrosemoli, ICTP Feb. 200380

81 Pietrosemoli, ICTP Feb. 200381 Active Scanning

82 Pietrosemoli, ICTP Feb. 200382

83 Pietrosemoli, ICTP Feb. 200383

84 Pietrosemoli, ICTP Feb. 200384

85 Pietrosemoli, ICTP Feb. 200385

86 Pietrosemoli, ICTP Feb. 200386

87 Pietrosemoli, ICTP Feb. 200387

88 Pietrosemoli, ICTP Feb. 200388

89 Pietrosemoli, ICTP Feb. 200389

90 Pietrosemoli, ICTP Feb. 200390

91 Pietrosemoli, ICTP Feb. 200391


Download ppt "Pietrosemoli, ICTP Feb. 20031 Wireless LAN Overview Abdus Salam ICTP, February 2003 Presented by Ermanno Pietrosemoli Latin American Networking School."

Similar presentations


Ads by Google