Wireless Networks First-Step - Jim Geier - Pearson Education Limited (US Titles), (N - P - ), 2004 - Cisco Press - 9781587054211 - Anna's Archive
Wireless Networks First-Step - Jim Geier - Pearson Education Limited (US Titles), (N - P - ), 2004 - Cisco Press - 9781587054211 - Anna's Archive
FIRST-STEP SERIES
Wireless Networks
No wireless networking
experience required
Jim Geier
ciscopress.com Author and independent consultant
Digitized by the Internet Archive
in 2018 with funding from
Kahle/Austin Foundation
https://archive.org/details/wirelessnetworksOOgeie
Wireless Networks
Cisco Press
800 East 96th Street
Indianapolis, IN 46240
II
Publisher
Wireless Networks
John Wait
first-step Eclitor-in-Chief
John Kane
Editorial Assistant
Warning and Disclaimer Tammi Barnett
This book is designed to provide information about the basics Book and Cover Designer
of wireless networking. Every effort has been made to make Louisa Adair
this book as complete and as accurate as possible, but no war¬
Compositor
ranty or fitness is implied.
Mark Shirar
The information is provided on an “as is” basis. The authors,
Indexer
Cisco Press, and Cisco Systems, Inc. shall have neither liabil¬ Brad Herriman
ity nor responsibility to any person or entity with respect to
Proofreader
any loss or damages arising from the information contained in
Tonya Cupp
this book or from the use of the discs or programs that may
accompany it.
The opinions expressed in this book belong to the author and
are not necessarily those of Cisco Systems, Inc.
Ill
Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest quality and value.
Each book is crafted with care and precision, undergoing rigorous development that involves
the unique expertise of members from the professional technical community.
Readers’ feedback is a natural continuation of this process. If you have any comments regard¬
ing how we could improve the quality of this book, or otherwise alter it to better suit your
needs, you can contact us through email at [email protected]. Please make sure to
include the book title and ISBN in your message.
We greatly appreciate your assistance.
Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service marks have been
appropriately capitalized. Cisco Press or Cisco Systems, Inc. cannot attest to the accuracy of
this information. Use of a term in this book should not be regarded as affecting the validity of
any trademark or service mark.
For more information please contact: U.S. Corporate and Government Sales 1-800-382-3419
corpsales @ pearsontechgroup .com
For sales outside the U.S. please contact: International Sales [email protected]
Cisco Systems
Cisco Systems has more than 200 offices in the following countries and regions. Addresses, phone numbers, and fax numbers are listed on the
Cisco.com Web site at www.cisco.com/go/offices.
Argentina • Australia • Austria • Belgium • Brazil • Bulgaria • Canada • Chile • China PRC • Colombia • Costa Rica • Croatia • Czech Republic
Denmark • Dubai, UAE • Finland • France • Germany • Greece • Hong Kong SAR • Hungary • India • Indonesia • Ireland • Israel • Italy
Japan • Korea • Luxembourg • Malaysia • Mexico • The Netherlands • New Zealand • Norway • Peru • Philippines • Poland • Portugal
Puerto Rico • Romania • Russia • Saudi Arabia • Scotland • Singapore • Slovakia • Slovenia • South Africa • Spain • Sweden
Switzerland • Taiwan • Thailand • Turkey • Ukraine • United Kingdom • United States • Venezuela • Vietnam • Zimbabwe
Copyright © 2003 Cisco Systems, Inc. All rights reserved. CCIP, CCSP, the Cisco Arrow logo, the Cisco Powered Network mark, the Cisco Systems Verified logo, Cisco Unity, Follow Me Browsing,
FormShare, iQ Net Readiness Scorecard, Networking Academy, and ScriptShare are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, The Fastest Way to Increase
Your Internet Quotient, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch,
Fast Step, GigaStack, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, LightStream, MGX, MICA, the Networkers logo, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX,
Registrar, SlideCast, SMARTnet, Strata View Plus, Stratm, SwitchProbe, TeleRouter, TransPath, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other
countries.
All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any
other company. (0303R)
Jim is a voting member within the Wi-Fi Alliance, responsible for certifying
interoperability of 802.11 (Wi-Fi) wireless LANs. He served as chairman of the
IEEE Computer Society, Dayton Section, and chairman of the IEEE International
Conference on Wireless LAN Implementation. He has been an active member of
the IEEE 802.11 Working Group, responsible for developing international stan¬
dards for wireless LANs. Jim is an advisory board member of several leading
wireless LAN companies.
Jim is the author of several books including Wireless LANs (SAMS, ISBN:
0672320584), Wireless Networking Handbook (MTP, ISBN: 15620563IX), and
Network Reengineering (McGraw-Hill, ISBN: 007023034X), as well as numer¬
ous articles. He is also editor-in-chief of MobilizedSoftware.com, an online publi¬
cation assisting developers with implementing mobile applications.
Joel and his wife, Barbara Kurth, live near Atlanta, Georgia with their two daugh¬
ters and son. His personal website is http://www.brainslap.com/joel.
Ed lives with his wife, Michelle, and his son, Colin, in Dayton, Ohio. When not
tinkering with PCs and networks at home, he enjoys model railroading, railroad
memorabilia collecting, golfing, traveling, and spending time with his family.
Acknowledgments
I’d like to offer thanks to my son, Eric Geier, for assisting me with the research for
this book. Eric is a member of the technical staff of my consulting company,
Wireless-Nets, Ltd., where he researches and analyzes wireless network technolo¬
gies, performs wireless LAN analysis, and develops computer-based training
courses.
Glossary 215
Index 225
Contents
Introduction xvii
Printing 93
Internet Connections 94
Enterprise 94
Wireless PAN Technologies 95
802.15 95
Bluetooth 96
Basic Features 96
Could Bluetooth Replace Wireless LANs? 97
Could Wireless LANs Replace Bluetooth? 97
Minimizing Bluetooth Interference 98
IrDA 101
Basic Features 101
Chapter Summary 102
Chapter Review Questions 103
802.lx 188
802.lx Operation 188
Authentication Types 190
Security Policies 190
Assessment Steps 191
Review Existing Security Policies 191
Review the Existing System 192
Interview Users 192
Verify Configurations of Wireless Devices 192
Identify Rogue Base Stations 193
Perform Penetration Tests 194
Analyze Security Gaps 194
Recommend Improvements 194
Common Security Policies 195
Place Wireless Users Outside a Firewall 195
Use Effective Encryption 195
Ensure Firmware Is Up-to-Date 196
Physically Secure Base Stations 196
Assign Strong Passwords to Base Stations 197
Don’t Broadcast SSIDs 197
Reduce Propagation of Radio Waves 197
Implement Personal Firewalls 198
Monitor Base Station Configuration 198
Control Deployments 198
Chapter Summary 199
Chapter Review Questions 199
Glossary 215
Index 225
Introduction
For several decades, people have been using computer networks to interconnect
personal computers and servers in companies, colleges, and cities. An evolution
has been taking place, however, toward using networks wirelessly. In fact, today
wireless interfaces are available to utilize network services that allow us to use
e-mail and access applications, and browse the Internet from just about anywhere.
a Glossary—The glossary is a tool that you can easily reference as you come
across key terms throughout the book.
a What You Will Learn—Every chapter begins with a list of objectives that
are addressed in the chapter. The objectives summarize what you will learn
in the chapter.
a Key terms and Glossary—Throughout this book, you will see key terms
formatted with bold and italics. These terms are particularly significant in
wireless networking. So, if you find you aren’t familiar with the term or at
any point need a refresher, just look up the term in the Glossary toward the
end of the book to find a full definition.
The illustrations in this book use the following icons for networking devices and
connections:
/ /
Wireless networks have been around for many years. In fact, early forms of wire¬
less communications include Native Americans waving buffalo skins over a fire to
send smoke signals to others over great distances. Also, the use of pulsing lights
carrying information through Morse code between ships has been and still is an
important form of communications. Of course, cell phones are also a type of wire¬
less communication and are popular today for people talking to each other world¬
wide.
4 Chapter 1: The Wireless World: An Introduction to Concepts
As with networks based on wire, or optical fiber, wireless networks convey infor¬
mation between computer devices. The information can take the form of e-mail
messages, web pages, database records, streaming video or voice. In most cases,
wireless networks transfer data, such as e-mail messages and files, but advance¬
ments in the performance of wireless networks is enabling support for video and
voice communications as well.
Wireless networks fall into several categories, depending on the size of the physi¬
cal area that they are capable of covering. The following types of wireless net¬
works satisfy diverse user requirements:
These terms are merely an extension of the more basic forms of wired networks
(such as LAN or WAN) that have been in use for years before wireless networks
came about.
Table 1-1 shows a brief comparison of these forms of wireless networks. Each
type of wireless network has complementary attributes that satisfy different
requirements. The subsequent sections briefly explore each wireless network.
Wireless PAIMs
As Figure 1-1 illustrates, wireless PANs have relatively short range (up to 50 feet)
and are most effective for fulfilling requirements within a small room or personal
area. The performance of wireless PANs is moderate, with data rates up to 2 Mbps.
These attributes satisfy needs for replacing cables in many situations.
6 Chapter 1: The Wireless World: An Introduction to Concepts
The low power consumption and small footprint of most wireless PAN transceivers
make it possible to effectively support small user devices equipped with computer
processors. The lower power consumption allows the computer device to operate
over long periods of time without draining its battery. This, of course, avoids the
need for the user to charge batteries often.
In addition, some wireless PANs can interconnect laptops and desktop PCs for the
purpose of sharing Internet connections and applications. This might be suitable
for a network within the confines of a room. Wireless LANs, however, consist of
attributes that better support building-wide wireless connectivity.
Most wireless PANs use radio waves for carrying information through air. For
example, the Bluetooth specification defines the operation of a wireless PAN
operating in the 2.4-GHz frequency band with a range of 50 feet and data rates up
to 2 Mbps. Furthermore, the Institute of Electrical and Electronic Engineers
(IEEE) 802.15 standard incorporates the Bluetooth specification for wireless
PANs. These technologies offer a reliable, long-term solution for connecting com¬
puter devices within a small area.
Some wireless PANs employ infrared light to carry information from one point to
another. The Infrared Data Association (IrDA) specification defines the use of
direct infrared beams to provide ranges of up to three feet and data rates as high as
4 Mbps. The advantage of infrared light is freedom from radio frequency interfer¬
ence, but the line-of-sight requirement between computer devices limits the place¬
ment of wireless components. An office partition, for example, blocks the path of
the infrared light signal, which reduces the usability of the wireless device to a
small area.
note
Refer to Chapter 4, “Wireless PANs: Networks for Small Places,” for
details on wireless PAN technologies and products.
Wireless LANs
Wireless LANs supply high performance within and around office buildings, fac¬
tories, and homes. (See Figure 1-2.) Users in these areas typically have laptops,
PCs, and PDAs with large screens and processors that support higher-end applica¬
tions. Wireless LANs efficiently satisfy connectivity requirements for these types
of computer devices.
8 Chapter 1: The Wireless World: An Introduction to Concepts
A business, for example, can install a wireless LAN to offer mobile access to cor¬
porate applications from laptops. With this type of system, a user can utilize net¬
work services from conference rooms and other places while away from their
office. This allows employees to be more efficient while working away from their
desks and collaborating with others.
Wireless LANs easily provide levels of performance that enable the higher-end
applications to run smoothly. For example, wireless LAN users can easily view a
large e-mail attachment or stream video from a server. With data rates of up to 54 Mbps,
a wireless LAN can satisfy just about any office or home network application.
Wireless LANs are similar to traditional wired Ethernet LANs in their perfor¬
mance, components, costs, and operation.
Wireless Networks Defined 9
IEEE 802.11 is the most prevalent standard for wireless LANs, with versions
operating in the 2.4-GHz and 5-GHz frequency bands. A problem with 802.11 is
that there is limited interoperability among various versions of the standard. For
example, a wireless LAN computer device using 802.1 la adapters will not con¬
nect with another computer device that implements 802.1 lb. In addition, there are
other issues with the 802.11 standard, such as limited security, which is discussed
in later chapters of this book.
In order to solve issues with the 802.11 standard, the Wi-Fi Alliance incorporates
assorted functions of 802.11 into a standard they refer to as Wireless Fidelity
(Wi-Fi). If a wireless LAN product complies with Wi-Fi, there are assurances that
the product is interoperable with other Wi-Fi products. The additional openness of
Wi-Fi ensures that diverse users can operate on the same wireless LAN. This is
extremely important with public wireless LANs.
note
Refer to Chapter 5, “Wireless LANs: Networks for Buildings and
Campuses,” for details on wireless LAN technologies and products.
Wireless MANs
Wireless MANs encompass areas the size of cities. In most cases, applications
involve fixed connectivity, but some implementations enable mobility. For exam¬
ple, a hospital can deploy a wireless MAN to provide data communications
between the main hospital facility and a remote clinic. Or, a power utility com¬
pany can install a wireless MAN throughout a city to supply access to work orders
10 Chapter 1: The Wireless World: An Introduction to Concepts
from various sites. As a result, wireless MANs can connect existing network
infrastructures together or allow mobile users to communicate with an existing
network infrastructure.
Wireless Internet Service Providers (WISPs) provide wireless MANs in cities and
rural areas, as Figure 1-3 illustrates, to provide fixed wireless connections for
homes and companies. A wireless MAN offers significant advantages when tradi¬
tional wired connections (such as Digital Subscriber Line [DSL] and cable
modem) are not feasible to install. Wireless MANs are effective when right-of-
way restrictions make wired systems impossible or too expensive.
might provide only 100 kbps. The actual performance depends on the choice from
a wide assortment of technologies and components.
Many proprietary wireless MAN solutions are on the market, but the industry is
beginning to settle on the use of standards. Some vendors utilize the IEEE 802.11
standard as the basis for wireless MANs. While the use of 802.11 systems is opti¬
mum for satisfying requirements within buildings, 802.11 solutions can connect
buildings over metropolitan distances using antennae that focus transmission and
reception of the signals in one direction.
A greater number of companies are now beginning to deploy IEEE 802.16 sys¬
tems, a relatively new standard with products just becoming available. 802.16
offers a standardized solution for deploying effective wireless MANs with perfor¬
mance in the megabits-per-second range over appreciable ranges. As a result,
802.16 will likely become a common standard for wireless MANs.
note
Refer to Chapter 6, “Wireless MANs: Networks for Connecting Buildings
and Remote Areas,” for details on wireless MAN technologies and products.
Wireless WANs
Wireless WANs offer mobile applications covering a large area, such as a country
or continent. Because of economies of scale, a telecommunications operator can
feasibly deploy the relatively expensive wireless WAN infrastructure to provide
long-range connectivity for a large customer base. The costs such as deployment
can be spread across many users, resulting in low subscriber fees.
Wireless WANs, as Figure 1-4 indicates, have nearly worldwide coverage through
the cooperation of multiple telecommunications companies. Well-established
roaming agreements among telecommunications operators enable continuous
connections for instant mobile data communications. By paying one telecommu¬
nications service provider, a user can access limited Internet services over a wire¬
less WAN from almost anywhere in the world.
12 Chapter 1: The Wireless World: An Introduction to Concepts
Web
Server
*0* NO5
„Aft( m:nAx
v,^000000000^^
metmc f Vaci^ it:
OC£A* ^ ' /;• J§ill* T V, M at / a
tr A&TRBtA*
I2C
M> ■. URIC A '
~~t
#fj| '^IKM 1<T
. savin' 1 If
OCEANIA 'AMLRif ,4 : iSttiAX • ti C E A * IA
10
X
I? ATIAXWC
miAK
r : M .
FACflli 'M
CM £A »V C 2,000
80 s ,v, ...
Performance of wireless WANs is relatively low, with data rates of up to 170 kbps
and typical rates of 56 kbps. This level of performance is similar to dial-up tele¬
phone modems. Special web portals, however, made to streamline information
content work efficiently with smaller devices and lower performance networks.
This makes the most from the limited bandwidth of wireless WANs.
The per-user data rates of wireless WANs are relatively low, but that is generally
acceptable because of the small devices (for example, cell phones and PDAs) that
people carry with them in situations where they need wireless WAN connectivity.
The smaller screen sizes and limited processing power of cell phones do not
require high performance. The transmission of video to a small cell phone or PDA
screen can be done with lower data rates.
Wireless WAN applications involve users accessing the Internet, sending and
receiving e-mails, and accessing corporate applications while away from the
home and office. Subscribers to wireless WAN services, for example, can stay
connected while traveling in taxis or walking throughout a city. A wireless WAN
Wireless Networks Defined 13
can reach more places than other types of wireless networks, enabling users to
carry on business and leisure activities from many different locations.
Wireless WANs include several competing standards that are slowly evolving. For
example, Cellular Digital Packet Data (CDPD) is an older technology that
enables the transmission of data over analog cell phone systems with data rates of
19.2 kbps. Some companies still offer CDPD in the U.S., but it is becoming obso¬
lete as telecommunication operators move toward Third Generation (3G) telecom¬
munications systems, with data rates possible in the megabit-per-second range.
An issue with the deployment of wireless WAN technology is it does not lend
itself to coverage inside facilities, such as homes, offices, airports, and convention
centers. Because wireless WAN infrastructure is outdoors, the radio signals of
wireless WANs lose most of their strength when penetrating a facility. As a result,
wireless WAN users within buildings might have poor performance and possibly
no connectivity at all. Some telecommunications companies install wireless WAN
systems within buildings, but this is expensive and is not feasible in most situa¬
tions.
note
Refer to Chapter 7, “Wireless WANs: Networks for Worldwide
Connections,” for details on wireless WAN technologies and products.
In terms of the user perspective, wireless networks are blending together. NICs for
computer devices that support multiple wireless networks are becoming available.
A traveler, for example, might have an advanced cell phone that interfaces with
both wireless LANs and wireless WANs. This enables a seamless, wireless con¬
nection as the person interfaces with e-mail while roaming inside an airport using
a public wireless LAN or travels in a taxi to a hotel while interfacing with one of
the cellular-based data services.
Basic Configurations
In most cases, the wireless network is merely an extension of an existing wired
network. In this case, a user is able to perform a particular task at an optimum
location instead of somewhere that is less than ideal. A clerk unloading a truck,
for example, can use a wireless handheld unit to scan items that the clerk removes
from the truck. This is much more effective than writing down the item numbers
and later entering them at a desktop terminal located somewhere inside the facility
and far away from the loading dock.
Public applications, on the other hand, provide open access to anyone. A business
traveler, for example, can use a public wireless LAN at an airport to access the
Internet while waiting for a flight. These public hotspots are becoming widely
available in airports and other areas, such as hotels, convention centers, and coffee
shops where there are large concentrations of people toting computer devices.
Internet Access
One of the most compelling reasons to install a wireless network is to enable the
sharing of a single high-speed Internet connection. With this type of configura¬
tion, every member of a family or small business can easily share a single high¬
speed connection that a cable or DSL modem offers. This is convenient and saves
money because everybody can simultaneously have access to the Internet and
roam anywhere in the house or office.
The wireless network in this scenario also increases the flexibility of the network
because it’s easy to add new workstations at any time without having to run cable.
The relocation of wireless PCs, along with any printers and servers, is also painless.
For example, employees within a retail store can locate certain clothes for a cus¬
tomer or check inventory by using special wireless LAN phones. The wireless
LAN in the retail store can also support the transmission of bar codes when per¬
forming inventory or pricing using a wireless, handheld bar code scanner. Cost
savings result because the company needs only to install and support a single
communications system that carries both voice and data.
Likewise, a business can deploy their entire telephone system over a wireless
LAN. This enables employees to carry their phone with them at all times, similar
to a standard cell phone. Employees can accept calls within the facility at any time
using a single phone.
Wireless Network Applications 17
Inventory Control
Many businesses profit from using wireless LANs when managing their manufac¬
turing processes. This lowers operating costs. Because the connections between
the manufacturing equipment and main control systems are wireless, the company
can reconfigure the assembly process at any time from anywhere, saving time and
money.
Through the use of a wireless LAN, a company can track and update inventory in
real time, enabling efficiency and accuracy to increase dramatically. In a retail
environment, as soon as a clerk purchases or stocks a product, a wireless manage¬
ment solution can update the inventory. In a manufacturing setting, the company
can keep the raw materials and finished product statistics up-to-date. Employees
equipped with wireless-enabled bar code scanners can check or change product
prices or check the number in stock.
Health Care
More and more hospitals are deploying wireless networks to improve operational
efficiency and convenience. In most cases, hospitals deploy wireless LANs in
high patient-traffic areas including emergency rooms, critical care wards, nursing
stations, as well as in doctor’s offices and patient waiting areas. Hospital staff can
use mobile computer devices to increase efficiency and accuracy when caring for
patients.
Health-care centers must maintain accurate records to ensure quality patient care.
A simple mistake can cost someone’s life. As a result, doctors and nurses must
18 Chapter 1: The Wireless World: An Introduction to Concepts
carefully record test results, physical data, pharmaceutical orders, and surgical
procedures. This paperwork often overwhelms health-care staff, taking 50-70 per¬
cent of their time. The use of a mobile data collection device that wirelessly trans¬
mits the data to a centralized database significantly increases accuracy and raises
the visibility of the data to those who need the information.
Doctors and nurses are also extremely mobile, going from room to room caring
for patients. The use of electronic patient records, with the ability to input, view,
and update patient data from anywhere in the hospital, increases the accuracy and
speed of health care. This improvement is possible by providing each nurse and
doctor with a wireless pen-based computer, such as a tablet or PDA, coupled with
a wireless network to databases that store critical medical information about the
patients.
A doctor caring for someone in the hospital, for example, can place an order for a
blood test by keying the request into a handheld computer. The laboratory
receives the order electronically and dispatches a lab technician to draw blood
from the patient. The laboratory runs the tests requested by the doctor and enter
the results into the patient’s electronic medical record. The doctor can then check
the results via the handheld appliance from anywhere in the hospital.
Education
Many colleges and elementary schools are finding beneficial reasons to install
wireless LANs, mostly to provide mobile network applications to their students.
In fact, schools have begun using the existence of wireless LAN access as a
Wireless Network Applications 19
competitive advantage. These schools are targeting the growing number of stu¬
dents with laptops and expectations of accessing the Internet and school resources
from anywhere on campus, such as classrooms, libraries, quads, and dormitories.
Students are able to readily check e-mail, surf the Web, access specialized school
applications, check grades, and view transcripts. As a result, students make better
use of their time.
It’s expensive to establish and maintain computer labs for students to utilize for
accessing the Internet and completing assignments. Students must often wait in
line for using a computer in a lab, which cuts into other activities. A wireless
LAN, however, gives students access to needed resources using their own laptop
from anywhere on campus at any time, even after the traditional computer lab
closes. This more evenly distributes network access to all students, enhancing stu¬
dent efficiency. Of course, the school can also save the costs of running the com¬
puter lab.
Real Estate
Real estate salespeople perform a great deal of their work away from the office,
usually talking with customers at the property being sold or rented. Before leaving
the office, salespeople normally identify a few sites to show a customer, print the
Multiple Listing Service (MLS) information that describes the property, and then
drive to each location with the potential buyer. If the customer is unhappy with
that round of sites, the real estate agent must drive back to the office and run more
listings. Even if the customer decides to purchase the property, they must both go
back to the real estate office to finish paperwork that completes the sale.
Wireless networking makes the sale of real estate much more efficient. The real
estate agent can use a computer away from the office to access a wireless MLS
record. An agent can also use a portable computer and printer to produce contracts
and loan applications for signing at the point of sale.
20 Chapter 1: The Wireless World: An Introduction to Concepts
Utility companies operate and maintain a highly distributed system that delivers
power and natural gas to industries and residences. Utility companies must con¬
tinually monitor the operation of the electrical distribution system, gas lines, and
water consumption, and must check usage meters at least monthly to calculate
bills. Traditionally, this means a person must travel from location to location, visit
residences and company facilities, record information, and then enter the data at a
service or computing center.
Field Service
Field service personnel spend most of their time on the road installing and main¬
taining systems or inspecting facilities under construction. To complete their jobs,
these individuals need access to product documentation and procedures. Tradi¬
tionally, field service employees have had to carry several binders of documenta¬
tion with them to sites that often lacked a phone and even electricity.
In some cases, the field person might not be able to take all the documents to a job
site, causing delay while obtaining the proper information. On long trips, this
information might also become outdated. Updates require delivery that might take
days to reach the person in the field. Wireless WAN access to documentation can
definitely enhance field service. A field service employee, for example, can carry
a portable computer that connects to the office LAN that contains accurate docu¬
mentation of all applicable information.
Wireless Network Applications 21
Field Sales
Sales professionals are always on the move and meeting with customers. While on
site with a customer, a salesperson needs access to vast information that describes
products and services. Salespeople must also place orders, provide status —such
as meeting schedules —to the home office, and maintain inventories.
With wireless access to the main office network, a salesperson can view central¬
ized contact information, retrieve product information, produce proposals, create
contracts, and stay in touch with office staff and other salespeople. This contact
permits salespeople to complete the entire sale directly from the customer site,
which increases the potential for a successful sale and shortens the sales cycle.
Vending
Beverage and snack companies place vending machines in hotels, airports, and
office buildings to enhance the sales of their products. Vending machines elimi¬
nate the need for a human salesclerk. These companies, however, must send
employees around to stock the machines periodically. In some cases, machines
might become empty before the restocking occurs because the company has no
way of knowing when the machine runs out of a particular product.
A wireless WAN can support the monitoring of stock levels by transporting appli¬
cable data from each of the vending machines to a central database that can be
easily viewed by company personnel from a single location. Such monitoring
allows companies to be proactive in stocking their machines, because they always
know the stock levels at each machine. This enables the vending company to
schedule appropriate stops for people who refill the machines.
Public Networks
Because of the significant proliferation of laptops, PDAs, and cell phones, a grow¬
ing need exists for mobile interfaces to the Internet and corporate applications.
Users want and expect seamless, constant mobile connectivity to all information
sources with high levels of performance and availability. Wireless networks pro¬
vide the infrastructure to support these needs in public areas that are away from
the home or office.
22 Chapter 1: The Wireless World: An Introduction to Concepts
A public wireless network offers a means for people on the go to connect with the
Internet. In general, the places that have large groups of people that need or want
network connections have wireless LAN access. Wireless MANs and WANs, on
the other hand, provide coverage over larger areas having sparsely distributed
populations.
Public wireless LANs are in common places such as hotels and restaurants, but all
kinds of places are installing wireless LANs for public access. For example,
approximately 90 percent of all boaters use the Internet regularly while at home or
in the office. Many still want access to the Internet while relaxing on their boats,
especially when parked overnight at a marina. As a result, marinas around the
globe are installing wireless LANs to enable boaters to have access to Internet
applications.
note
Refer to the following website for an extensive list of public wireless
LANs: http://www.wi-fihotspotlist.com/.
To use a public wireless LAN, users must have a computer device, such as a lap¬
top, with a wireless LAN NIC. IEEE 802.1 lb (Wi-Fi) is the most common type of
wireless LAN today that public wireless network providers install. The computer
device’s NIC automatically senses the presence of the wireless LAN and associ¬
ates with the network. Before accessing the Internet, the user must subscribe to
the service, generally through a website accessible from the wireless LAN. Some
public wireless LANs are free, but most providers charge a nominal price for
using the service.
Another form of public wireless network uses wireless MAN technologies to pro¬
vide wireless communications links between subscribers (homes and offices) and
the Internet. The provider mounts a small antenna dish on the home or small office
and points it to a centralized hub. This point-to-multipoint system provides the
last-mile connection necessary to supply Internet access to locations where DSL
and cable modem connections are not available or feasible.
Wireless Network Applications 23
Location-Based Services
With wireless networks, you can make the location of a particular person or item
available to a central location. The ability to track the position of moving objects
brings about some interesting applications. The coordinates of users can feed into
a server-based application that implements a location-based service.
For example, a public wireless LAN provider can use this concept to display pertinent
information to travelers as they walk through an airport or train station. Information
might include their location on a moving map, in a way that the passenger can use
to find the way to the next departure gate or the nearest restaurant. The value of this
location-based service could entice passengers to use the particular venue.
A hospital might use location-based services to track the positions of doctors and
nurses. This enables hospital administrators to dispatch the right person to an
emergency. Patients end up receiving more rapid and effective care.
The usage of location-aware systems over wireless LANs is also moving to the
consumer market. For example, the ability to track children is extremely valuable.
Imagine being in a theme park and a toddler wandering off without the knowledge
of the parent. With a location system, the parent can easily find the toddler among
a large crowd. With a concealed wireless tracking tag located on the child, this
type of system can aid tremendously if someone kidnaps a child.
A shopping mall might deploy a location system and send electronic flyers and
advertisements to customers carrying PDAs. The system takes into consideration
the physical location of shoppers within the facility and customizes actual content
appropriately. Shoppers then make better use of their time, and stores make more
money.
Office Example
As the basis for increasing productivity, consider purchasing 802.11-equipped
laptops. This enables employees to read and respond to e-mail and browse the
Internet during office meetings, assuming the users can be responsive when
needed at the meeting while plunking away at their laptop. Even though this
seems trivial, the productivity gains can be significant.
If a user attends meetings for 3 hours each day and spends approximately 15 min¬
utes per hour responding to e-mail and performing other Internet-related tasks
during each meeting, the user has 45 minutes more each day to do other tasks.
This seems pretty reasonable, considering the average person and office setting.
factoring in the cost of new laptops for everyone, a company should still see a
positive return in less than one year in this simple example.
■ Users can continue networking when the company moves walls during facil¬
ity remodeling, which frequently occurs in corporations.
■ Visiting employees can easily network with company servers and applica¬
tions from anywhere within the facility.
Warehouse Example
Mobility provides the basis for getting jobs done faster and with fewer people.
Imagine a shipment of auto parts arriving at a distribution center. As clerks unload
the trucks, they scan a bar code on each box with a wireless, handheld data collec¬
tor. The bar code contains a unique tracking number that is automatically and
immediately sent to a warehouse management system (WMS) to indicate the
reception of the part. The WMS then instructs the clerks, through the data collec¬
tor’s display, whether to place the item in the warehouse or ship the item directly
to a particular customer.
If the part is bound for the warehouse, the system prints a label for placement on
the box identifying the intended storage position in the warehouse. The system
prints route and shipping information on a label, which the clerks affix to the box
for parts requiring shipment to a customer. The clerks can then deliver the box to
the correct location, whether it’s the warehouse or an outgoing delivery truck.
The use of this receiving system enables the company to reduce inventories by
immediately redirecting received orders to customers. It also eliminates paper
records and manual data entry. Most importantly, the company delivers orders to
customers sooner. In general, the system enables a company to realize incredible
gains in efficiency and accuracy over error-prone, paper-based processes. The
26 Chapter 1: The Wireless World: An Introduction to Concepts
tracking of items by paper and the entry of data to the WMS through a desktop
terminal significantly increase the likelihood of errors and require larger staffs to
accomplish.
Hospital Example
In a hospital, a wireless network can help save lives by improving the speed and
accuracy of delivering drugs to patients. Because of government regulations, hos¬
pitals must maintain accurate records of narcotics, which prompts administrators
to implement stringent, often paper-based, methods to account for the exact num¬
bers of each narcotic. A wireless network, however, enables the use of handheld
bar code scanners that make the picking and inventory process up to 300 percent
faster and much more accurate.
In addition, a nurse can verify that the correct patient receives the medication by
scanning both the drug and the patient’s identification bracelet. This significantly
reduces the chance of giving the drug to the wrong patient. In addition, the system
can verify that the patient doesn’t have any adverse allergies for the type of drug
that she is receiving. The wireless network makes this application possible in a
highly mobile hospital environment.
Improving Reliability
Cables are inherently unreliable because of corrosion and misuse. Improper
installation and damage of cables are primary reasons that wired networks fail. A
telephone technician, for example, might be repairing a problem with the tele¬
phone system and inadvertently cut network cables. This causes system downtime
for a relatively long period while network administrators troubleshoot.
Adverse weather, such as hurricanes and tornadoes, can offer major harm to both
aerial and underground copper connections between buildings. This type of
Chapter Summary 27
Chapter Summary
A wireless network eliminates wiring among computer devices, such as PDAs and
laptops, and existing networks. This permits computer devices and users to be
highly mobile while still interfacing with the Internet and corporate applications.
Whether someone is within an airport, home, or office, the person can stay con¬
nected.
The various types of wireless networks offer solutions for a variety of applications
in homes, offices, hospitals, and public areas, where users can benefit from having
mobile access to network services. The ability to merely enable mobile applica¬
tions is often enough justification for a wireless network. In some cases, however,
a company might need to carefully analyze potential gains in efficiency, accuracy,
and reliability to show that the costs of the system will be worthwhile.
28 Chapter 1: The Wireless World: An Introduction to Concepts
5. True or false: A wireless PAN consumes little power from small handheld
computer devices.
Wireless System
Architecture: How Wireless
Wforics
Wireless networks utilize components similar to wired networks; however, wire¬
less networks must convert information signals into a form suitable for transmis¬
sion through the air medium. Even though wireless networks directly contribute
only to a portion of the overall network infrastructure, attention to all network
functions is necessary to counter impairments resulting from the wireless
medium. This chapter discusses concepts common to all types of wireless net¬
works, with emphasis on components and information signals.
000000000000
00000000)000 Base Station
Computer
Devices Wireless
Infrastructure
000000000000
Base Station
32 Chapter 2: Wireless System Architecture: How Wireless Works
Users
A user can be anything that directly utilizes the wireless network. One of the most
common types of user is a person. For example, a business traveler accessing the
Internet from a public wireless LAN at an airport is a user. In some cases, how¬
ever, the user might not be human. A robot, for example, might receive instruc¬
tions over a wireless network from a central computer that controls a manu¬
facturing process. Because the wireless network exists to serve the user, the user is
the component that receives the benefits of a wireless network. As a result, users
are an important part of the wireless network.
The user initiates and terminates use of a wireless network, making the term end-
user appropriate. Typically, a user operates a computer device, which often per¬
forms a variety of application-specific functions in addition to offering an inter¬
face to the wireless network.
Some users might require only portability; whereby, they stay at a particular loca¬
tion while using the wireless network for a specific period of time. An example of
this type of usage is someone operating a laptop wirelessly from a conference
room. The user will turn on the laptop after sitting down in the conference room
and shut off the laptop before leaving. As a result, the wireless network doesn’t
need to support continual movement.
Other users might actually be stationary, which means that they operate from one
place for an indefinite period of time. An example of this type of user is someone
working from a wireless computer in an office. The biggest difference between a
stationary and portable user is that the stationary user will not require any form of
roaming functions. Roaming functions are difficult to implement in some situations.
Wireless Network System Components 33
Computer Devices
Many types of computer devices, sometimes referred to as clients, operate on a
wireless network. Some computer devices might be specifically designed for
users, whereas some computer devices are end systems. In generally, any com¬
puter device might communicate with any other computer device on the same
wireless network. Figure 2-2 illustrates an assortment of computer devices for
wireless networks.
To support mobile applications, computer devices are often small, making them
practical for people to carry with them at all times. These devices generally have
small screens, limited keyboards, and small batteries. The devices are mobile, but
they can support only certain applications.
With portable and stationary applications, however, the computer devices are
much larger. These devices generally have larger displays and keyboards, making
them more suitable to use when browsing the Internet and other applications
requiring relatively high performance. The problem, however, is that these devices
weigh more and are difficult to carry from one place to another.
34 Chapter 2: Wireless System Architecture: How Wireless Works
Computer devices within a wireless network also include end systems such as
servers, databases, and websites. For example, the http://www.cnn.com website
includes news that someone can view from a public wireless LAN connection
from a hotel room. Similarly, a clerk can wirelessly interface with a warehouse
management system, which acts as an end-system computer device.
Users can adapt many existing computer devices to operate on a wireless network.
A user, for example, can purchase and install a wireless network interface card
(NIC) within his laptop to enable operation on a particular type of wireless net¬
work. Some devices, such as a wireless bar code scanner, operate only on a wire¬
less network.
A computer device also has an operating system, such as Windows XP, LINUX,
or MAC OS. The operating system runs software needed to realize the wireless
network application. In some cases, the operating system has built-in features that
enhance wireless networks. For example, Windows XP has the ability to automat¬
ically identify and associate with wireless LANs.
NICs
The network interface card provides the interface between the computer device
and the wireless network infrastructure. The NIC fits inside the computer device,
but external network adaptors are available that plug in and remain outside the
computer device. Figure 2-3 shows examples of several types of wireless NICs.
PC Card
Wireless Network System Components 35
Wireless network standards define how a wireless NIC operates. For example, a
wireless LAN NIC might implement the IEEE 802.1 lb standard. In this case, the
wireless NIC will only be able to interface with a wireless network infrastructure
that complies with the 802.1 lb standard. As a result, users must be careful to
ensure that the wireless NIC they choose matches the type of wireless network
infrastructure they want to access.
Wireless NICs also comply with a specific form factor, which defines the physical
and electrical bus interface that enables the card to communicate with the com¬
puter device. Again, the user must consider this to ensure that the chosen wireless
NIC will fit within their computer device. The following is a summary of the dif¬
ferent internal form factors available for wireless networks:
widely available NICs available. They are more popular than ISA or PCI
cards because of use in a growing number of laptops and PDAs.
Mini-PCI cards, however, might have an antenna that resides inside the outer edge
of a laptop monitor. Some NICs have antennaes that are permanent, which have
one particular propagation pattern. Other NICs allow the replacement of the
antenna, which increases flexibility in choosing an antenna that best satisfies
requirements.
Air Medium
Air serves many purposes, such as providing a basis for speech, enabling air
travel, and sustaining life. Air also provides a medium for the propagation of wire¬
less communications signals, which is the heart of wireless networking. Air is the
conduit by which information flows between computer devices and the wireless
infrastructure. Think of communication through a wireless network as similar to
talking to someone. As you move farther apart, it’s more difficult to hear each
other, especially when a loud noise is present.
Wireless information signals also travel through the air, but they have special
properties that enable propagation over relatively long distances. Wireless infor¬
mation signals cannot be heard by humans, so it's possible to amplify the signals
to a higher level without disturbing human ears. The quality of transmission, how¬
ever, depends on obstructions in the air that either lessen or scatter the strength
and range of the signals.
38 Chapter 2: Wireless System Architecture: How Wireless Works
Rain, snow, smog, and smoke are examples of elements that impair propagation of
wireless communications signals. In fact, a heavy downpour of rain can limit sig¬
nal range by 50 percent while the rain is occurring. Other obstacles, such as trees
and buildings, can impact the propagation and performance of the wireless net¬
work. These issues become most important when planning the installation of a
wireless MAN or WAN.
With wireless networks, the air medium supports the propagation of radio and
light waves that travel from one point to another. These types of signals have been
in use for more than 100 years, but they are still somewhat mysterious and not
well understood by most computer professionals. Chapter 3 provides details on
signal characteristics and impairments that relate to the air medium.
Base Stations
The base station is a common infrastructure component that interfaces the wire¬
less communications signals traveling through the air medium to a wired net¬
work—often referred to as a distribution system. Therefore, a base station enables
users to access a wide range of network services, such as web browsing, e-mail
access, and database applications. A base station often contains a wireless NIC
that implements the same technology in operation by the user’s wireless NIC.
point, which provides an interface with systems within the infrastructure and
users associated with other access points. As the user moves to a part of the facil¬
ity that’s closer to another access point, the NIC automatically reconnects with the
closest access point to maintain reliable communications.
Residential gateways and routers are more advanced forms of base stations that
enable additional network functions. The gateway might have functions, such as
access control and application connectivity, that better serve distributed, public
networks. On the other hand, a router would enable operation of multiple comput¬
ers on a single broadband connection.
OOOOOOOOOCXX)
Point-to-Multipoint
oooooooooooo
40 Chapter 2: Wireless System Architecture: How Wireless Works
Access Controllers
In the absence of adequate security, quality of service (QoS), and roaming mecha¬
nisms in wireless network standards, companies offer access-control solutions to
strengthen wireless systems. The key component to these solutions is an access
controller, which is typically hardware that resides on the wired portion of the net¬
work between the access points and the protected side of the network. Access con¬
trollers provide centralized intelligence behind the access points to regulate traffic
between the open wireless network and important resources. In some cases, the
access point contains the access control function.
The use of an access controller reduces the need for smart access points, which
are relatively expensive and include many non-802.11 features. Generally, ven¬
dors refer to these smarter access points as being enterprise-grade components.
Proponents of access controllers, however, argue that 802.11 access points should
focus on RF excellence and low cost. Proponents also argue that access points
should centralize access control functions in an access controller that serves all
access points. These thin access points primarily implement the basic wireless
network standard (such as IEEE 802.11), and not much more.
Wireless Network System Components 41
The users of access controllers realize the following benefits when deployed with
thin access points:
■ Lower Costs —Access points with limited functionality cost less, which
generally results in lower overall system costs. This is especially true for
networks requiring a larger number of access points, such as an enterprise
system. The use of thin access points results in cost savings of approxi¬
mately $400 per access point. In larger networks, this savings far outweighs
the additional cost of an access controller, which costs $5000 on the average.
wireless connection from time to time, but the protocols in use for these relatively
simple applications are resilient under most conditions.
The advantage of using terminal emulation is its low initial cost and changes
made to the application automatically take affect when the user logs in.
Wireless systems using terminal emulation, however, might not be able to
maintain continuous connections with legacy applications, which have time¬
outs set for more reliable wired networks. Timeouts will automatically dis¬
connect a session if they don’t sense activity within a given time period. As a
result, IT groups might spend a lot of time responding to end-user com¬
plaints of dropped connections and incomplete data transactions. Therefore,
implementing terminal emulation can have a disastrous effect on long-term
support costs.
44 Chapter 2: Wireless System Architecture: How Wireless Works
t > k
t
Wireless Wired
Connection Connection
Wireless Network System Components 45
Distribution System
A wireless network is seldom entirely free of wires. The distribution system,
which often includes wiring, is generally necessary to tie together the access
points, access controllers, and servers. In most cases, the common Ethernet com¬
prises the distribution system.
The IEEE 802.3 standard is the basis for Ethernet and specifies the use of the car¬
rier sense multiple access (CSMA) protocol to provide access to a shared
medium, such as twisted-pair wiring, coaxial cable, and optical fiber. CSMA is
the predominant medium access standard in use today by both wired and wireless
networks.
CSMA enables sharing of a common medium by allowing only one NIC to trans¬
mit information at any particular time. This is similar to a meeting environment
where people (like NICs) speak only when no one else is talking. This gives each
person responsibility in a way that distributes speaking decisions to each person.
If more than one person talks at the same time, a collision occurs, and each person
needs to take turns repeating what he said.
All computer devices on the network must take turns using the medium with
Ethernet hubs. An Ethernet switch, however, enables multiple collision domains
that can allow simultaneous transmission among users to improve performance.
For larger networks beyond the size of a home or small office application, be sure
to use switches for optimum performance.
Ethernet employs twisted-pair wiring, coaxial cable, and optical fiber for intercon¬
necting network devices, such as access points and other distribution equipment.
The use of coaxial cables in older wired LANs was common 10 years ago, but
today most companies use twisted-pair wiring and optical fiber. The Electronic
Industries Association (EIA) and Telecommunications Industry Association (TIA)
specifies Category 5 (referred to as Cat 5) twisted-pair wiring, the most popular of
all twisted-pair cables in use today with Ethernet.
Cat 5 consists of four unshielded twisted pairs of 24-gauge wires that support
Ethernet signals over 100 meters (m)— about 300 feet— of cabling. Ethernet
repeaters increase this range if necessary, which is one method of reaching a wire¬
less network base station that’s beyond 100 m from a communications closet.
Wireless Network System Components 47
There are also other variations of twisted-pair wiring. Enhanced Cat 5 (referred to
as Cat5e) makes use of all four pairs of wires to support short-range Gigabit
Ethernet (1000 Mbps) connectivity. It is also backward compatible with regular
Cat 5. Cat 6 and Cat 7 cable are now available, bringing more bandwidth and
range to copper-based Gigabit Ethernet networks. Cat 7 cable features individu¬
ally shielded twisted pairs (STP) of wires, making it ideal for installation in loca¬
tions where there is a high potential for electromagnetic interference.
The following are specific types of twisted-pair options for Ethernet common to
wireless LAN distribution systems:
The advantage of having extra pairs of wires open is support for other uses,
such as Power-over-Ethernet (PoE). This is a mechanism in which a module
injects DC current into the Cat 5 cable, enabling you to*supply power to the
access point from the communications closet. PoE often eliminates the need
for having an electrician install new electrical outlets at every access point.
For larger networks, definitely consider the use of PoE.
■ Optical Fiber—Optical fiber is more expensive than twisted pair, but fiber
can be cost effective because it supports gigabit speeds and has a range of up
to two kilometers. Instead of using the traditional electrical-signal-over¬
copper-wire approach, optical fiber cable uses pulses of light over tiny strips
of glass or plastic. This makes optical fiber cable resistant to electromagnetic
interference, making it valuable in situations where electronic emissions are
a concern. In addition, it’s nearly impossible to passively monitor the trans¬
mission of data through optical fiber cable, making it more secure than
twisted-pair wiring.
Management Systems
As with other types of networks, enterprise wireless networks require effective
management that ensures user needs are met over the life of the network. A network
management system, which involves both people and software tools, satisfies this
need. The following are functions that management systems should provide.
Security
The security element involves mechanisms that avoid the compromise or damage
of network resources, such as databases and e-mail messages. This includes
enforcing security policies for the configuration of the wireless network in a way
that counters issues related to the propagation of wireless signals. For example,
policies could specify the use of a particular type of encryption to ensure a mis¬
chievous person can’t receive and decode e-mail messages being sent between a
user and an access point.
Wireless Network System Components 49
For more details on wireless network security methods, refer to Chapter 8, “Wire¬
less Network Security: Protecting Information Resources.”
Help Desk
The help desk provides the first level of support for users. A user having difficul¬
ties with a wireless connection should know how to reach the help desk. Users
often have problems with association or experience erratic performance.
Help desk personnel are capable of solving simple connection problems, such as
assisting the user configure a radio card and operating system to comply with spe¬
cific wireless network policies. The help desk should have a communications
interface with more advanced support functions, such as maintenance and engi¬
neering, to solve more complex problems that arise from contact with users.
Configuration Management
Configuration management consists of controlling changes made to the wireless
network architecture and installed system. Changes might consist of installing or
moving access points, changing access point parameters, and updating firmware.
Because of the dynamic nature of wireless networks, changes are more common
than with wired networks.
Network Monitoring
Network monitoring includes continuously measuring various attributes of the
wireless network, including access point utilization and user traffic routes through
the distribution system. This plays a key role in proactively managing the wireless
network to support a growth of users and solve issues before they hamper the per¬
formance and security of the network.
In most cases, coverage from base stations overlaps, and users will likely associ¬
ate with another base station at lower performance if the primary access point is
not available. Network monitoring tools, however, will notice the outage immedi¬
ately and alert the appropriate support person. If possible, a company should inte¬
grate the wireless network monitoring function with tools already in use in the
existing corporate network. This simplifies operational support.
Reporting
The reporting element offers information regarding various aspects of the wireless
network, including usage statistics, security alarm notifications, and performance.
These reports are necessary for managers to effectively gauge the operation of the
network and make decisions on changes. This reporting should, at a minimum,
indicate potential breaches of security, inoperable access points, and utilization.
This type of information should be available to all operational support functions,
such as the help desk, maintenance, and engineering.
Wireless Network System Components 51
Engineering
The engineering element provides advanced technical support for reengineering
the wireless network to include newer technologies and solve problems to ensure
effective performance and security. Ordinarily, the company or group that designs
the initial wireless network will perform the engineering functions. The engineer¬
ing function should review and verify compliance of designs with the common
architectural design. In addition, the engineering group should continually moni¬
tor the evolution of wireless network technologies and products to ensure effective
migration in a manner that meets growing network utilization.
Maintenance
The maintenance element repairs and configures the wireless network, including
replacing broken antennae, setting channels on access points, and re-evaluating
radio wave propagation. Some maintenance tasks might result from the engineer¬
ing support function. For example, engineers might find the need to install an
additional access point in an area where new coverage is necessary. In this case,
maintenance personnel would install the access point at a location that the
engineer identifies.
The maintenance group should also periodically perform coverage tests to ensure
that the access points are properly covering the facilities at applicable levels of
performance. This is necessary as the company modifies the structure of the facil¬
ities, which changes the radio wave propagation characteristics. If discrepancies
are found, the maintenance group should report findings to the engineering group
for resolution.
52 Chapter 2: Wireless System Architecture: How Wireless Works
Network Architecture
The architecture of a network defines the protocols and components necessary to
satisfy application requirements. One popular standard for illustrating the archi¬
tecture is the seven-layer Open System Interconnect (OSI) Reference Model,
developed by the International Standards Organization (ISO). OSI specifies a
complete set of network functions, grouped into layers (see Figure 2-6), which
reside within each network component. The OSI Reference Model is also a handy
model for representing the various standards and interoperability of a wireless net¬
work.
Application Application
Presentation Presentation
Session Session
Transport Transport
Network Network
Physical Physical
■ Layer 6—Presentation layer: Negotiates data transfer syntax for the appli¬
cation layer and performs translations between different data formats, if nec¬
essary. For example, this layer can translate the coding that represents the
data when communicating with a remote system made by a different vendor.
Network Architecture 53
Each layer of the OSI model supports the layers above it. In fact, the lower layers
often appear transparent to the layers above. For example, TCP operating at the
transport layer establishes connections with applications at a distant host com¬
puter, without awareness that lower layers are taking care of synchronization and
signaling.
As shown in Figure 2-6, protocols at each layer communicate across the network
to the respective peer layer. The actual transmission of data, however, occurs at
the physical layer. As a result, the architecture allows for a layering process where
a particular layer embeds its protocol information into frames that are placed
within frames at lower layers. The frame that is sent by the physical layer actually
contains frames from all higher layers. At the destination, each layer passes appli¬
cable frames to higher layers to facilitate the protocol between peer layers.
Information Signals
Data is a type of information that the network stores in a computer or retrieves
from it. As a result, wireless networks transfer data from one computer to another.
This data can include e-mail messages, files, web pages, video, music, and voice
conversations.
Digital Signals
Digital signals, which are found inside computers, vary in amplitude steps as time
advances. (See Figure 2-7.) Digital signals are usually binary (two-state); there¬
fore, it is common to refer to the signal as a string of binary digits (bits) or binary
data. Digital circuitry inside the computer easily stores and processes these digital
signals in binary form.
Information Signals 55
> Time
Binary is a system that only uses Os and Is to represent the numbers. Conversions
are easy from the more familiar decimal numbering system to binary, and comput¬
ers can readily store binary numbers. With some protocols, the binary values
within a data frame represent specific protocol information.
For security purposes, it is often necessary to encrypt and later decode a signal at
the destination. This process is simple with digital signals because all that is nec¬
essary is to rearrange the bits using some type of secret keying process. When the
destination receives the data, a device can use the same key and decrypt the data.
■ Data rate—The data rate corresponds to the speed that a digital signal trans¬
fers data across a wireless network. As a result, the data rate of a digital sig¬
nal gives some insight on how long it will take to send data from one point to
another, as well as identify the amount of bandwidth that the medium must
supply to effectively support the signal.
56 Chapter 2: Wireless System Architecture: How Wireless Works
The data rate of a signal is equal to the total number of bits transmitted in
relation to the time it takes to send them. The common unit of measure for
bit rate is bits per second (bps). As an example, consider a signal that moves
1,000,000 bits in 1 second. The data rate is 1,000,000/1 = 1,000,000 bps (or
1 Mbps).
The data rate of a wireless LAN, for example, might be 11 Mbps, but the
throughput might be only 5 Mbps. After removing the overhead—frame
headers, error checking fields, acknowledgement frames, and retransmis¬
sions because of errors—the resulting information transfer is considerably
lower. As the number of users increases, contention for the shared medium
increases, which drives throughput even lower because computer devices
(wireless NICs, to be more precise) must wait longer before sending data.
This delay, which is a form of overhead, can significantly lower the throughput.
With wireless networks, it is common to say that the system sends data bits. In
reality, a wireless network converts the binary digital signals into analog before
transmitting the signal through the air medium.
Analog Signals
An analog signal, shown in Figure 2-8, is one where the amplitude of the signal
varies continuously as time progresses. Much of the natural environment produces
signals that are analog in form. Examples of this are light and the human voice.
Man-made signals, such as radio waves, are also analog in form.
Flow of Information Through a Wireless Network 57
Figure 2-8 Analog Signals Carry Information Through the Air Medium
Amplitude
medical record from a wireless PDA, or a warehouse clerk might enter the number
of items in a bin as part of inventory management. When users communicate
information, they might use text, images, voice, or video through a computer
device.
Initially, this information might simply be thoughts within a person’s brain, which
the user enters into a form of information, such as text or voice, and which the
computer device stores as data. In the case of human users, the information is gen¬
erally in an analog form; the information might be a digital signal when going
between a nonhuman user, such as a robot, and a computer device.
Before the computer device is capable of storing the information, however, the
system must convert analog information signals into a digital form that is suitable
for the computer device. Analog-to-digital (A/D) converters make this possible.
Special circuitry samples the analog signal, resulting in pulses with amplitudes
that binary numbers can represent. Likewise, digital-to-analog (D/A) converters
translate digital signals into analog ones as part of presenting the information to users.
Inside a computer device, special codes represent information as data. The Amer¬
ican Standard Code for Information Interchange (ASCII) code, for example, rep¬
resents English characters as numbers. A computer stores these numbers as data.
As examples, the ASCII code (in hexadecimal format) for the uppercase letter A is
41 and the lowercase h is 68. Most computers use ASCII encoding to represent
textual information by representing the number in binary form, which includes
only Is and Os. Other coding techniques symbolize video and audio information.
Flow of Information Through a Wireless Network 59
The sending wireless NIC converts the data to an analog radio frequency or light
wave signal before transmission through the antenna. This conversion requires
modulation, which involves conversion of the signal from digital to analog. Chap¬
ter 3 discusses particulars on how this is done. After modulation, the signal propa¬
gates through the air medium to the receiving wireless NIC, which demodulates
and processes the received signal before handing the data up to higher network
architectural layers.
Medium Access ‘
An important aspect of the transmission of data over a wireless network includes
medium access, a data link layer function that comprises protocols that all wire¬
less NICs must follow. These protocols ensure that wireless NICs coordinate the
transmission of data, especially when only one can transmit at any particular time.
Without this mechanism, several collisions would occur.
As with wired networks, CSMA is a common medium access protocol for wire¬
less networks. CSMA implements a listen-before-talk protocol for regulating dis¬
tributed access to a common medium. With CSMA, each wireless NIC has the
capability of sensing transmissions from other devices.
If Node A has data to send, Node A first checks —senses —if any other nodes are
transmitting data. (See Figure 2-9.) If the medium is clear—no transmission is
heard —Node A will transmit one frame of data. If Node A senses transmissions
from another node, Node A holds off transmitting and waits a period of time
before sensing the channel again. The sensing operation continues until the node
sends the data frame.
60 Chapter 2: Wireless System Architecture: How Wireless Works
Collisions can occur with CSMA even though the transmitting node senses the
channel first before sending data. The reason for this is the non-zero propagation
delay between the nodes. The transmission coming from a particular node does
not block all nodes from transmitting until the signal reaches all other nodes.
Node B, for example, starts to send a signal. Node A also needs to transmit a
frame. It senses the medium and finds it clear because the signal from Node B has
not arrived at Node A due to the propagation delay. As a result, Node A senses an
idle medium and begins transmitting. Moments later, a collision between the two
frames occurs, which causes significant errors in both data frames. Both nodes
must retransmit the frames.
This poses a problem for the transmission of real-time information, such as voice
and video, because the network might not deliver pieces of information regularly
enough to meet quality needs. In this case, QoS functions and higher throughput
are necessary to improve performance.
Error Control
Information signals might encounter bit errors when propagating through the air
medium. Noise and interference within the area of the wireless network causes
these errors. As a result, wireless NICs implement error control mechanisms that
detect and correct bit errors.
Noise from the sun’s radiation and man-made devices cause damage to wireless
information signals and is always present. The noise floor, however, is often low
enough so that receivers are capable of distinguishing the information signal from
the noise. At longer ranges, however, attenuation might reduce the information
signal to a level that falls below the noise floor, and bit errors begin to occur.
The noise causing altered bits within wireless networks is usually Gaussian, or
impulse noise. Theoretically, the amplitude of Gaussian noise is uniform across
the frequency spectrum, and it normally triggers random errors that are indepen¬
dent of each other. Impulse noise, the most disastrous, is characterized by long
quiet intervals of time followed by high-amplitude bursts. This noise results from
natural causes— such as lightning— as well as man-made causes. Impulse noise
is responsible for most errors in digital communication systems and generally
provokes errors to occur dependently in groups. This distortion is referred to as
burst errors.
Error control techniques highly reduce the number of transmission errors. Bit
errors might still occur while data frames travel through the air medium, but error
control mechanisms correct the errors. As a result, the transmission of information
through medium appears error-free to higher-layer protocols and the users.
The two primary types of error control are automatic repeat-request (ARQ) and
forward error correction (FEC). With ARQ, which operates at the data link layer,
the receiving wireless NIC detects errors and uses a feedback path to the sending
wireless NIC for requesting the retransmission of frames having bit errors. There
62 Chapter 2: Wireless System Architecture: How Wireless Works
are two main events that must occur to correct errors with ARQ. First, a received
frame must be checked at the receiver for possible errors, and then the sender
must be notified to retransmit the frames received in error. In some protocols, such
as 802.11, the receiver sends an acknowledgement to the sender if the received
frame has no errors. The absence of an acknowledgement indicates to the sender
to retransmit the frame.
m Stop-and-wait ARQ
■ Continuous ARQ
Stop-and-Wait ARQ
In the stop-and-wait method of transmission, the sending NIC transmits a block of
data, then stops and waits for an acknowledgment from the receiving NIC on
whether a particular frame was acceptable or not. If the sending side receives a
negative acknowledgment, the previous frame will be sent again. The sending
NIC will send the next frame after it receives a positive acknowledgment from the
receiving NIC. The IEEE 802.11 standard specifies this form of error control.
One advantage of stop-and-wait ARQ is it does not require much memory space at
the sending or receiving NIC. The outstanding transmitted frame needs only to be
stored at the sender (in case of retransmission). On the other hand, stop-and-wait
ARQ becomes inefficient as the propagation delay between the source and desti¬
nation becomes large. For example, data sent on satellite links normally experi¬
ence a round-trip delay of several hundred milliseconds; therefore, long block
lengths are necessary to maintain a reasonably effective data rate. The trouble is
that with longer data blocks the probability of an error occurring in a particular
block is greater. Therefore, retransmission will occur often, and the resulting
throughput will be lower.
Continuous ARQ
One way of improving the throughput on longer links is to use the continuous
ARQ method. With this type of ARQ, the transmitter sends data blocks continu¬
ously until the receiving NIC detects an error. The sending NIC is usually capable
Flow of Information Through a Wireless Network 63
of transmitting a certain number of frames and keeps a log of which frames have
been sent. Once the receiving side detects a bad block, it will send a signal back to
the sending NIC requesting that the bad frame be sent over again. When the
receiver gets the signal to retransmit a certain frame, several subsequent frames
might have already been sent because of propagation delays between the sender
and receiver.
The sending NIC can retransmit frames with continuous ARQ in several ways.
One method is for the source to retrieve the erred frame from the transmit memory
and send the bad frame as well as the subsequent frames. This is called the go-
back-n technique, and it can be more effective than the stop-and-wait ARQ
because it makes better use of the channel bandwidth. One problem though is
when n—the number of frames the transmitter sent after the erred frame plus
one—becomes large, the method becomes inefficient. This is because the retrans¬
mission of just one frame means that a large number of good frames will also be
resent, which decreases throughput.
The go-back-n technique is useful in applications where the receiver has little
memory space because all that is needed is a receiver window^size of one (ability
to store one frame), assuming frames do not need to be delivered in order. When
the receiving NIC rejects an erred frame —sends a negative acknowledgment—it
does not need to store any subsequent frames for possible reordering while it is
waiting for the retransmission. It need not wait because all subsequent frames will
also be resent.
All ARQ types depend on the detection of errors and the retransmission of the
faulty data. Overall , ARQ is best for the correction of burst errors because this
type of distortion normally occurs in a small percentage of frames, and does not
invoke many retransmissions. Because of the feedback inherent in ARQ protocols,
half-duplex or full-duplex lines must be in use since ARQ communication occurs
in both directions. If only simplex links are available, it is impossible to use the
ARQ technique because the receiver would not be able to notify the sending NIC
of bad data blocks.
For example, consider sending data wirelessly to control a space probe orbiting
Pluto. By the time the sending NIC receives a negative acknowledgement from
the probe and the corresponding retransmission of data reaches the probe, the
probe would likely crash because of the significant propagation delay. Most wire¬
less networks exist on Earth, but propagation delays can still be significant enough
to warrant the use of FEC.
Despite the ability of FEC to correct errors without referring to the sending NIC,
ARQ is still the most common method of error control. This is mainly because
errors usually occur in clusters because of impulse noise. This places a require¬
ment to correct large numbers of errors, which FEC typically cannot accomplish
without excessive amounts of redundancy.
Upon receiving a data frame, the wireless NIC within the base station converts the
analog radio wave or light signal into a digital signal and performs error detection
to ensure that the resulting data frame does not have any bit errors. The error con¬
trol mechanism will cause the sending wireless NIC to retransmit the data frame if
errors are present. After taking care of erred frames, the wireless NIC within the
base station will either resend the frame or forward the frame to the wired side of
the base station.
The wired NIC generally implements Ethernet, which interfaces directly with
enterprise systems. The base station usually connects the wireless and wired net¬
works at the physical layer and data link layer. Some base stations also include
routing, which is a network layer function.
66 Chapter 2: Wireless System Architecture: How Wireless Works
When traversing wire, the information signal remains in digital form, but different
types of systems might convert the digital signal to a form suitable for transmis¬
sion over the particular medium in use. The signal might undergo conversion to an
analog form again if transmission over another wireless link, such as satellite, is
necessary to reach the destination.
Chapter Summary
Wireless networks include components that make mobile and portable application
possible. Users are end points of the wireless network and utilize computer
devices designed for a particular application. Wireless NICs and base stations are
key components that communicate over the air medium. To provide roaming
throughout a facility or city, a distribution system such as Ethernet interconnects
base stations and interfaces users to servers and applications located on the wired
network.
The seven-layer OSI reference model depicts functions necessary for a network,
but wireless networks implement only functions defined by the bottom two
layers—the physical and data link layer. These functions include medium access,
error control, and formation of radio and light signals for propagation through the
medium. When deploying wireless networks, however, it’s important to ensure
that protocols operating at higher layers have features that counter impairments
found in wireless networks.
Chapter Review Questions 67
1. Which wireless NIC form factors are best for small wireless computer
devices?
2. What are examples of elements that impair the propagation of wireless com¬
munications signals through the air medium?
8. A wireless NIC must convert the information into what type of signal before
transmission through the air medium? •
✓ Understand the general attributes of radio and light signals that affect
propagation through the air medium
Wireless Transceivers
A wireless transceiver consists of a transmitter and a receiver. In the transmitter, a
process known as modulation converts electrical digital signals inside a computer
into either RF or light, which are analog signals. Amplifiers then increase the
magnitude of the signals prior to departing an antenna. At the destination, a
receiver detects the relatively weak signals and demodulates them into data types
applicable to the destination computer. These elements, which Figure 3-1 illustrate,
are found in what’s referred to as the transceiver. The transceiver is generally com¬
posed of hardware that is part of the wireless NIC.
70 Chapter 3: Radio Frequency and Light Signal Fundamentals: The Invisible Medium
rLTLTL
rLTLTL
Understanding RF Signals
An RF signal is an electromagnetic wave that communications systems use to
transport information through air from one point to another. RF signals have been
in use for many years. They provide the means for carrying music to FM radios
and video to televisions. In fact, RF signals are the most common means for carry¬
ing data over a wireless network.
RF Signal Attributes
The RF signal propagates between the sending and receiving stations’ antennae.
As shown in Figure 3-2, the signal that feeds the antenna has an amplitude, fre¬
quency, and phase. These attributes vary in time in order to represent information.
The amplitude indicates the strength of the RF signal. The measure for amplitude
is generally power, which is analogous to the amount of effort a person needs to
exert to ride a bicycle over a specific distance. Power, in terms of electromagnetic
signals, represents the amount of energy necessary to push the signal over a par¬
ticular distance. As the power increases, so does the range.
Understanding RF Signals 71
The ability of the receiver to make sense of the signal, however, depends on the
presence of other nearby RF signals. For illustration, imagine two people, Eric
and Sierra, whom are 20 feet apart and trying to carry on a conversation. Sierra,
acting as the transmitter, is speaking just loud enough for Eric, the receiver, to
hear every word. If their baby, Madison, is crying loudly, Eric might miss a few
words. In this case, the interference of the baby has made it impossible to effec¬
tively support communications. Either Eric and Sierra need to move closer
together, or Sierra needs to speak louder. This is no different than the transmitters
and receivers in wireless systems using RF signals for communications.
72 Chapter 3: Radio Frequency and Light Signal Fundamentals: The Invisible Medium
The frequency describes how many times per second that the signal repeats itself.
The unit for frequency is Hertz (Hz), which is the number of cycles occurring
each second. For example, an 802.1 lb wireless LAN operates at a frequency of
2.4 GHz, which means that the signal includes 2,400,000,000 cycles per second.
The phase corresponds to how far the signal is offset from a reference point. As a
convention, each cycle of the signal spans 360 degrees. For example, a signal
might have a phase shift of 90 degrees, which means that the offset amount is one
quarter (90/360 = 1/4) of the signal. A variation in phase is often useful for con¬
veying information. For example, a signal can represent a binary 1 as a phase shift
of 30 degrees and a binary 0 with a shift of 60 degrees. A strong advantage of rep¬
resenting data as phase shifts is that impairments resulting from the propagation
of the signal through the air don’t have much impact. Impairments generally
affect amplitude, not the signal phase.
Good operation in haze and foggy con¬ High potential for RF interference from
ditions, except heavy rain causes poor other external RF-based systems
performance
These pros make the use of RF signals effective for the bulk of wireless network
applications. Most wireless network standards, such as 802.11 and Bluetooth,
specify the use of RF signals.
Understanding RF Signals 73
RF Signal Impairments
RF signals encounter impairments, such as interference and multipath propaga¬
tion. This impacts communications between the sender and receiver, often causing
lower performance and unhappy users.
Interference
Interference occurs when the two signals are present at the receiving station at the
same time, assuming that they have the same frequency and phase. This is similar
to one person trying to listen to two others talking at the same time. In this situa¬
tion, wireless NIC receivers make errors when decoding the meaning of the infor¬
mation being sent.
The Federal Communications Commission (FCC) regulates the use of most fre¬
quency bands and modulation types to avoid the possibility of signal interference
between systems. However, radio interference can still occur, especially with sys¬
tems operating in license-free bands. Users are free to install and utilize license-free
equipment such as wireless LANs without coordinating usage and interference.
Interference Interference
74 Chapter 3: Radio Frequency and Light Signal Fundamentals: The Invisible Medium
Other sources of inward interference are cordless phones, microwave ovens, and
Bluetooth devices. When these types of RF devices are in use, the performance of
a wireless network can significantly decrease because of retransmissions and com¬
petition on the network for use of the medium. This requires careful planning and con¬
sideration of other radio devices that might interfere with the wireless network.
Outward interference happens when the signals from the radio signal system
interfere with other systems. As with inward interference, significant outward
interference can occur if a wireless network is in close proximity with another
system. Because wireless network transmit power is relatively low, outward inter¬
ference rarely causes significant problems.
Multipath
Multipath propagation occurs when portions of an RF signal take different paths
when propagating from a source —such as a radio NIC —to a destination node,
such as an access point. (See Figure 3-4.) A portion of the signal might go directly
to the destination; and another part might bounce from a desk to the ceiling, and
then to the destination. As a result, some of the signal encounters delay and travel
longer paths to the receiver.
Access
1 Point
Desk
Understanding RF Signals 75
Multipath delays cause the information symbols represented in the radio signal to
smear. (See Figure 3-5.) Because the shape of the signal conveys the information
being transmitted, the receiver makes mistakes when demodulating the signal’s
information. If the delays are great enough, bit errors in the packet occur, espe¬
cially when data rates are high. The receiver won’t be able to distinguish the sym¬
bols and interpret the corresponding bits correctly. When multipath strikes in this
way, the receiving station detects the errors through an error-checking process. In
response to bit errors, the sending station eventually retransmits the data frame.
What can you do if multipath is causing problems? Aside from clearing desks and
chairs from your building, diversity seems to be the best solution to combat the
76 Chapter 3: Radio Frequency and Light Signal Fundamentals: The Invisible Medium
perils of multipath. Diversity is the use of two antennae for each radio NIC to
increase the odds of receiving a better signal on either of the antennae.
Diversity antennae have physical separation from the radio to ensure that one will
encounter fewer multipath propagation affects than the other. In other words, the
composite signal that one antenna receives might be closer to the original than
what’s found at the other antenna. The receiver uses signal-filtering and decision¬
making software to choose the better signal for demodulation. In fact, the reverse
is also true: The transmitter chooses the better antenna for transmitting in the
opposite direction.
Wireless networks that utilize light signals, however, are not as common as these
that use radio signals. Light signals generally satisfy needs for special applications,
such as building-to-building links and short-range personal-area networks. Some
wireless LANs and inter-building products use laser light to carry information
between computers.
Diffused and direct infrared are two main types of light transmission. Figure 3-6
illustrates these two concepts. Diffused laser light is normally reflected off a wall
or ceiling, and direct laser is directly focused in a line-of-sight fashion. Most laser
LANs utilize diffused infrared; inter-building modems and PDAs use the direct
infrared technique.
Figure 3-© Both Diffused and Directed Light Signals Offer a Basis for
Wireless Networks
Diffused
Light Signals
Directed
Light Signals
Infrared light has very high bandwidth; however, the diffusing technique severely
attenuates the signal and requires slow data transmissions (less than 1 Mbps) to
avoid significant transmission errors. In addition, this technique limits wireless
component spacing to around 40 feet, mainly because of the lower ceilings
indoors and resulting signal path geometry. The advantage is relatively easy
installation with inexpensive components.
As with RF signals, the amplitude of light also decreases as distance between the
sending and receiving stations increase. The range of an infrared light system can
vary from a few feet with PDA applications to 1 mile with direct infrared systems.
This is significantly less range than with RF systems.
78 Chapter 3: Radio Frequency and Light Signal Fundamentals: The Invisible Medium
These characteristics make the use of light signals most effective for specialized
applications where extremely high performance is necessary. For example, a com¬
pany can install an infrared communications link between two nearby buildings in
order to facilitate high-speed server backups over a wireless network.
Interference
Light signals are free from RF sources of interference such as cordless phones,
and microwave ovens. In fact, the FCC doesn’t regulate light signals because of
extremely limited potential interference among systems. Light signals have such a
high frequency that their emissions are well outside the spectrum of RF systems,
which means that the FCC doesn’t regulate light signals.
Interference from other sources of light, however, can still be a problem for sys¬
tems that use light signals. For example, the installation of a point-to-point infra¬
red transmission system aimed in an easterly or westerly direction can receive
substantial interference from infrared light found within sunlight because the sun
is low to the horizon. This interference can be high enough in some cases to com¬
pletely disrupt transmission of data on the infrared link. When installing these
types of systems, be certain to follow the manufacturer’s recommendations when
orienting the antennae.
Even if the communications path is open, weather can still impress large amounts
of attenuation to light signals. The problem with weather is that it varies. For
example, heavy fog might be present, and then the skies might be completely
clear the following hour. This makes planning link budgets for light-based sys¬
tems, especially those operating near the range limits, extremely difficult. Plan¬
ners must be certain that the attenuation imposed by weather will not disrupt
communications.
80 Chapter 3: Radio Frequency and Light Signal Fundamentals: The Invisible Medium
This is done because it’s generally not practical to transmit the information signal
in its native form. For example, consider Brian, who wants to transmit his voice
wirelessly from Dayton to Cincinnati, which is about 65 miles. One approach is
for Brian to use a really high-powered audio amplifier system. The problem with
this is that the intense volume would probably deafen everyone in Dayton.
Instead, a better approach is to modulate Brian’s voice with a radio frequency or
light carrier signal that’s out of range of human hearing and suitable for propaga¬
tion through the air. The information signal can vary the amplitude, frequency, or
phase of the carrier signal, and amplification of the carrier will not bother humans
because it’s well beyond the hearing range.
The latter is precisely what modulation does. A modulator mixes the source infor¬
mation signal, such as voice or data, with a carrier signal. The transceiver couples
the resulting modulated and amplified signals to an antenna. The modulated signal
departs the antenna and propagates through the air. The receiving station antenna
couples the modulated signal into a demodulator, which derives the information
signal from the radio signal carrier.
lar to giving flashlights to people in a dark room and having them communicate
with each other by flicking the flashlight on and off to send coded information.
Frequency Shift-Keying
Frequency shift-keying (FSK) makes slight changes to the frequency of the car¬
rier signal in order to represent information in a way that’s suitable for propaga¬
tion through the air. For example, as shown in Figure 3-7, modulation can
represent a 1 or 0 data bit with either a positive or negative shift in frequency of
the carrier. If the shift in frequency is negative, that is a shift of the carrier to a
lower frequency; the result is a Logic 0. The receiver can detect this shift in fre¬
quency and demodulate the results as a 0 data bit.
Logic
1
Logic
0
^Time
82 Chapter 3: Radio Frequency and Light Signal Fundamentals: The Invisible Medium
Phase Shift-Keying
Similar to FSK, some systems utilize phase shift-keying (PSK) for modulation
purposes. With PSK, data causes changes in the signal’s phase while the fre¬
quency remains constant. The phase shift, as Figure 3-8 depicts, can correspond to
a specific positive or negative amount relative to a reference. A receiver is able to
detect these phase shifts and realize the corresponding data bits.
Spread Spectrum
In addition to modulating the digital signal into an analog carrier signal using
FSK, PSK, or QAM, some wireless networks also spread the modulated carrier
over a wider spectrum in order to comply with regulatory rules. This process,
called spread spectrum, significantly reduces the possibility of outward and
inward interference. As a result, regulatory bodies generally don’t require users of
spread spectrum systems to obtain licenses.
Spread Spectrum
Signal
/ \
/
\
-^-►Time
Data Stream: 1 6 f
4 D
Frequency
Most spread spectrum systems operate within the Industrial, Scientific, and Medi¬
cine (ISM) bands, which the FCC authorized for wireless LANs in 1975. The ISM
bands are located at 902 MHz, 2.400 GHz, and 5.7 GHz. RF systems operating in
the ISM band must use spread spectrum modulation and operate below 1 watt
Modulation: Preparing Signals for Propagation 85
transmitter output power. Commercial users who purchase ISM band products do
not need to obtain or manage FCC licenses. This makes it easy to install and relo¬
cate wireless networks because the hassle of managing licenses is eliminated.
Because the ISM bands are open to the public, however, care must be taken to
avoid RF interference with other devices operating in the same ISM bands.
Multiple subchannels
provide parallel transmission.
Ultrawideband Modulation
Ultrawideband (UWB) modulation is beginning to take a stronger foothold
instead of spread spectrum or OFDM in the wireless networking industry. While it
has been used for a while by the military, UWB is now going through the neces¬
sary authorizations and developments for public and commercial use. Even
though the advancement of UWB has been somewhat slow, UWB becoming a
superior technology for many types of wireless networks is a possibility.
UWB uses low-powered, short-pulse radio signals in order to transfer data over a
wide range of frequencies. A UWB transmission involves billions of pulses spread
over several gigahertz. The corresponding receiver then translates the pulses into
data by listening for a familiar pulse sequence sent by the transmitter.
UWB should initially deliver bandwidths from about 40 to 600 Mbps, and eventu¬
ally data rates could be up to (with higher power). UWB systems also consume
little power, around one ten-thousandth of cell phones. This makes UWB practical
for use in smaller devices, such as cell phones, PDAs, and even watches that users
can carry at all times.
Because UWB operates at such low power, it has little interference impact on
other systems. UWB causes less interference than conventional RF systems. In
addition, the relatively wide spectrum that UWB utilizes significantly minimizes
the impact of interference from other systems.
Concerns still remain, however, about the interference of higher-power UWB sys¬
tems. The FCC plans to reevaluate UWB in the near future, and they will take a
closer look at the issue of higher-power systems. Until then, you’re limited to
UWB products with short-range propagation.
Chapter Review Questions 87
Chapter Summary
RF and light signals are the heart of wireless networks. They offer a means of
transmitting information invisibly through air. Interference offers the most critical
form of transmission impairment, requiring careful planning when deploying a
wireless network. The various modulation techniques—FSK, PSK, or QAM —
combine with spread spectrum or OFDM to realize a transceiver, which is a criti¬
cal element of the wireless NIC.
5. Multipath affects higher data rates more than lower data rates for 2.4 GHz
systems. True or false?
This chapter defines each of the primary wireless PAN components, describes
how these components interconnect to form a variety of systems, and explores
several radio and infrared light technologies.
User Devices
Wireless PANs don’t require much battery power to operate, making them ideal
for small user devices, such as audio headsets, cell phones, PDAs, game controls,
GPS units, digital cameras, and laptops. Figure 4-1 illustrates several of these
types of devices. For example, a wireless PAN enables someone to listen to music
on headsets wirelessly from their PDA. Or a person can transfer his phone book
90 Chapter 4: Wireless PANs: Networks for Small Places
from his laptop to a cell phone. As with these cases, wireless PANs eliminate
wires that often frustrate users.
Radio IMICs
Radio NICs are available for wireless PANs in PC Card and Compact Flash (CF)
form factors. If you have a laptop, for example, it’s easy to add wireless PAN con¬
nectivity by installing a PC Card. These products are available from different ven¬
dors. Many of the newer PDAs and laptops come equipped with one or more
wireless PAN interfaces. This makes these wireless devices ready to connect with
other devices, such as printers, PDAs, and cell phones that also have wireless PAN
interfaces. The larger PC Cards are uncommon for wireless PANs, mainly because
wireless PAN technologies are ideal for small devices.
USB Adapters
Several companies offer a wireless PAN USB adapter (see Figure 4-2), which is
also called a wireless dongle. For example, you can purchase a USB Bluetooth
adapter and connect it to a USB port on your PC. This makes the PC able to syn¬
chronize with other devices having Bluetooth connectivity. Bluetooth —which is
discussed later—is a specification developed for short-range, radio-based trans¬
ceivers.
Wireless PAN Systems 91
Routers
Most wireless PAN applications simply involve cable replacement, but some ven¬
dors sell Bluetooth-equipped routers to support wireless connections to the Inter¬
net. Because of limited range, though, these wireless PAN routers are primarily
for home and small office use. In order to satisfy more connectivity needs, some
wireless PAN routers also support wireless LAN interfaces, such as 802.11.
Synchronization
One of the most common uses of wireless PANs is PDA and cell phone synchroni¬
zation with a laptop or PC. Figure 4-3 illustrates the interconnection of compo¬
nents for this type of system. When the user presses a sync button on the handheld
device, the radio NIC within the handheld device sends the corresponding data to
the radio NIC in the laptop or PC. Likewise, the laptop or PC will send data to the
handheld device. In most cases, the wireless connection extends the serial RS-232
port wirelessly to the handheld device.
000000000000
000000000000
Streaming Multimedia
A large number of wireless PAN applications involve streaming audio and video.
For example, a user can easily listen to streaming MP3 files stored on an MP3
player. (See Figure 4-4.) Many PDAs have the capability of playing MP3 audio
files by installing one of the popular media players, such as the RealOne media
player from RealNetworks, Inc. With a wireless PAN, the user doesn’t need to
carry around the MP3 player and mess with wires or stay within the same area to
listen to music. A similar configuration involves the use of a wireless audio ear¬
piece and microphone for a hands-free operation of a cell phone. A drawback to
this approach, however, is that batteries will not last as long when using the wire¬
less connections.
Wireless PAN Systems 93
Control
Wireless PANs eliminate wires for computer peripherals, such as a wireless
mouse, keyboard, and telephone connection, making it easier to move and set up
PCs. A user, for example, can use a full-sized keyboard wirelessly with a laptop or
PDA. In addition, wireless PANs reduce the tangle of cables surrounding a desk¬
top computer. Reliability is higher because of less cable breakage and less risk of
someone inadvertently kicking a cable loose.
Printing
Wireless connections between your PC and printer are made possible within the
same room through a wireless PAN connection. (See Figure 4-5.) Printer cables
are often too short, and you’re stuck setting the printer in a less than ideal loca¬
tion. The wireless PAN connection allows the movement of the printer to a better
location.
94 Chapter 4: Wireless PANs: Networks for Small Places
0000)0000000
-►
Internet Connections
A user can access e-mail and browse the web from anywhere within the room
with a wireless PAN interface to the Internet. Instead of sitting at a desk, for
example, a person can relax in a lounge chair or couch. This freedom makes com¬
puting much more enjoyable. Figure 4-6 shows the system configuration that
makes this possible.
Enterprise
The use of wireless PANs in enterprise is common; however, the applications and
system configurations are similar to homes and small offices. Employees use
wireless PANs to synchronize PDAs with desktop computers and take advantage
of wireless peripherals. Instead of using a wireless PAN router for connecting
users to the Internet however, an enterprise makes use of wireless LANs for Inter¬
net connectivity. Enterprises span too large of an area to make wireless PANs
practical because of the rather large number of required base stations.
Wireless PAN Technologies 95
802.15
The IEEE 802.15 standards working group focuses on the development of stan¬
dards for wireless PANs and coordinates with other standards, such as 802.11
wireless LANs.
note
For more information and updates regarding the 802.15 standard, refer to
http: //grouper.ieee .org/groups/802/15/.
Bluetooth
The introduction of Bluetooth in 1998 was the result of several companies, includ¬
ing Ericsson, IBM, Intel, Nokia, and Toshiba, working together to create a solu¬
tion for wireless access among computing devices. Bluetooth, which is a
specification and not a standard, is ideal for small devices with short-range,
low-power, and inexpensive radio links. This makes Bluetooth a good solution for
connecting small devices within range of a person in a small working area. That’s
why the 802.15 chose Bluetooth as the basis of the 802.15.1 standard.
Basic Features
The Bluetooth Special Interest Group (SIG) published the initial version of the
specification in mid-1999. There have been updates since then, but the technical
attributes are essentially the same. Bluetooth transceivers operate at up to 1 Mbps
data rate in the 2.4GHz band, using FHSS technology. It constantly hops over the
entire spectrum at a rate of 1,600 hops per second, which is much faster than the
802.11 version of frequency hopping.
Bluetooth modules have relatively small form factors. Typical measurements are
10.2 x 14 x 1.6 millimeters, which is small enough to fit in a variety of user
devices.
Bluetooth enables automatic connection among Bluetooth devices that fall within
range of each other, but a user has the ability to accept and disallow connections
with specific users. Users, however, should always be aware of whether their
Wireless PAN Technologies 97
The place where Bluetooth falls behind 802.11 is performance and range. 802.11
components can reach data rates of up to 54 Mbps, while Bluetooth lags way
behind at around 1 Mbps. This might be good enough for most cable replacement
applications— such as an interface between headphones and a PDA— but higher
performance is necessary when surfing the web through a broadband connection
or participating on a corporate network. Also, the range of 8Q2.11 is typically
300 feet inside offices, which is much greater than Bluetooth. Bluetooth would
require many access points to fully cover larger areas.
As a result, it’s highly unlikely that Bluetooth products will win over 802.11. This
is certainly apparent because electronics stores primarily sell 802.11 (Wi-Fi) solu¬
tions for wireless LAN applications, not Bluetooth.
Some modifications would need to be made, however. The size of 802.11 compo¬
nents needs to be smaller, but that is becoming more of a reality as semiconductor
companies strive for miniaturization of their 802.11 chipsets. These smaller com¬
ponents require less power, making them more competitive for devices, such as
mobile phones, that have smaller batteries. With the 802.15 group defining stan¬
dards for wireless PANs based on Bluetooth— and the 802.11 group focusing on
wireless LANs— it’s likely that both Bluetooth and 802.11 will continue to coex¬
ist and complement each other.
Because of the potential for collisions, 802.11 and Bluetooth networks suffer from
lower performance. An 802.11 station automatically lowers its data rate and
retransmits a frame when collisions occur. Consequently, the 802.11 protocol
introduces delays in the presence of Bluetooth interference.
/
/
/
/
/
/
/
/
/ Wireless Bluetooth
t
i
LAN User User
£ ] 00000000
Wireless LAN
i Access Point
%
\
\
\
\
\
\
\
\
\
\
\
Here are some tips on how to avoid interference from Bluetooth devices:
■ Manage the use of RF devices—One way to reduce the potential for inter¬
ference is to regulate the types of RF devices within your home or office. In
other words, establish your own private regulatory body for managing unli¬
censed RF devices. The extreme measure would be to completely ban the
use of Bluetooth; however, that is not practical or even possible in all cases.
For example, you can’t feasibly prohibit the use of Bluetooth in public areas
of large offices. For private applications, you could set company policies to
limit the use of Bluetooth to specific applications, such as synchronizing
PDAs to desktops.
■ Move to the 5 GHz band—If none of the preceding steps solve the prob¬
lem, consider using a 5 GHz wireless LAN such as 802.1 la. You can com¬
pletely avoid RF interference in this band— at least for the foreseeable
future.
note
For more information about the Bluetooth specification and related prod¬
ucts, refer to http://www.bluetooth.com.
IrDA
Bluetooth’s primary competitor is Infrared Data Association (IrDA), which has
been defining and publishing since 1993. The IrDA has a charter to create an
interoperable, low-cost, low-power, serial data communications standard for
short-range applications. IrDA has been around for much longer than Bluetooth.
In fact, many laptops and cell phones have been coming equipped with an IrDA
interface for years.
Basic Features
The basis for IrDA is infrared light, which doesn’t go through walls and other
obstacles. This strictly limits the range of IrDA devices to within an obstacle-free
room. This makes IrDA useful only for point-to-point applications, such as syn¬
chronizing PDAs to PCs. An advantage of IrDA, however, is that there’s no worry
about RF interference.
The IrDA data standard, which is best for devices such as an MP3 player needing
to stream information, offers up to 4 Mbps data rates. This version of the standard
102 Chapter 4: Wireless PANs: Networks for Small Places
note
For more information regarding the IrDA specification and related
products, refer to http://www.irda.org.
Chapter Summary
Wireless PANs are meant to provide wireless network connections in small areas,
such as within a room. Devices equipped with Bluetooth or IrDA significantly
reduce cables, which increases the flexibility of applications— such as hands-free
operation of cell phones, listening to streaming audio players, and synchronizing
a PDA to a computer. Many of the types of applications fall within both home and
enterprise.
Bluetooth and IrDA are the primary technologies that wireless PANs implement.
The 802.15 group elected the use of Bluetooth as the basis for the 802.15.1 stan-
Chapter Review Questions 103
dard for wireless PANs. Because of limited range and performance of Bluetooth,
it’s not likely that wireless PANs will replace 802.11 wireless LANs.
1. What form factors are common for wireless PAN radio cards?
2. What application can strongly benefit through the use of a wireless USB
adapter (also referred to as a wireless dongle)?
5. Which IEEE standards group uses Bluetooth as the basis for the standard?
This chapter defines each of the primary wireless LAN components, describes
how these components interconnect to form a variety of systems, and explores the
802.11 standards.
User Devices
Users of wireless LANs operate a multitude of devices, such as PCs, laptops, and
PDAs. The use of wireless LANs to network stationary PCs is beneficial because
of limited needs for wiring. Laptops and PDAs, however, are commonly equipped
with wireless LAN connectivity because of their portable nature. User devices
might consist of specialized hardware as well. For example, bar code scanners and
patient monitoring devices often have wireless LAN connectivity.
106 Chapter 5: Wireless LANs: Networks for Buildings and Campuses
Hadici iiCs
A major part of a wireless LAN includes a radio NIC that operates within the com¬
puter device and provides wireless connectivity. A wireless LAN radio NIC, some¬
times referred to as a radio card, often implements the 802.11 standard. The cards
generally implement one particular physical layer, such as 802.1 la or 802.1 lb/g. As a
result, the radio card must utilize a version of the standard that is compatible with the
wireless LAN. Wireless LAN radio cards that implement multiple versions of the
standard and provide better interoperability are becoming more common.
Radio cards come in a variety of form factors, including: ISA, PCI, PC card, mini-
PCI, and CF. PCs generally utilize ISA and PCI cards; but PDAs and laptops use
PC cards, mini-PCI, and CF adapters.
Access Points
An access point contains a radio card that communicates with individual user devices
on the wireless LAN, as well as a wired NIC that interfaces to a distribution system,
such as Ethernet. System software within the access point bridges together the wire¬
less LAN and distribution sides of the access point. The system software differentiates
access points by providing varying degrees of management, installation, and security
functions. Figure 5-1 shows an example of access-point hardware.
In most cases, the access point provides an http interface that enables configura¬
tion changes to the access point through an end-user device that is equipped with a
network interface and a web browser. Some access points also have a serial RS-
232 interface for configuring the access point through a serial cable as well as a
user device running terminal emulation and Telnet software, such as hyper terminal.
Look at the basic radio configuration settings for a Cisco 350 access point.
These types of settings are common for other access points as well.
One parameter that you should set is the service set identifier (SSID). The SSID
provides a name for the specific wireless LAN that users will associate with.
For security purposes, it’s a good idea to set the SSID to something other than
the default value.
For most applications, set the transmit power of the access point to the highest
value, which is typically 100 milliwatt (mW) in the United States. This will
maximize the range of the wireless LAN. The actual maxjmum effective power
output is 1 watt, but the lower transmit power allows enough margin to allow
the use of a higher-gain antenna and still remain within limitations.
In the United States, set the access point to operate on any one of the channels
in the range from 1 through 11. When installing only one access point, it
doesn’t matter which channel you choose. If you install multiple access points,
or you know of a nearby wireless LAN within range of yours, you need to
select different non-overlapping channels (such as channels 1,6, and 11) for
each access point within range of one another.
Routers
By definition, a router transfers packets between networks. The router chooses the
next best link to send packets on to get closer to the destination. Routers use
Internet Protocol (IP) packet headers and routing tables, as well as internal proto¬
cols, to determine the best path for each packet.
A wireless LAN router adds a built-in access point function to a multiport Ether¬
net router. This combines multiple Ethernet networks with wireless connections.
A typical wireless LAN router includes four Ethernet ports, an 802.11 access
point, and sometimes a parallel port so it can be a print server. This gives wireless
users the same ability as wired users to send and receive packets over multiple
networks.
Figure 5-2 NAT and DHCP Are Essential Protocols That Routers
Implement
Wireless LAN Components 109
Wireless LAN routers offer strong benefits in the home and small office setting.
For example, you can subscribe to a cable modem service that provides a single IP
address through DHCP to the router, and the router then provides IP addresses
through DHCP to clients on your local network. NAT then maps a particular client
on the local network to the ISP-assigned IP address whenever that client needs to
access the Internet. As a result, you need a router if you plan to have more than
one networked device on a local network sharing a single ISP-assigned address.
Instead of having one box for the router and another box for the access point, a
wireless LAN router provides both in the same box. Routers, however, are seldom
used in larger implementations, such as hospitals and company headquarters. In
these cases, access points are best because the network will have existing wired
components that deal with IP addresses.
Repeaters
Access points, which require interconnecting cabling, generally play a dominant
role for providing coverage in most wireless LAN deployments. Wireless repeat¬
ers , however, are a way to extend the range of an existing wireless LAN instead of
adding more access points. There are few standalone wireless LAN repeaters on
the market, but some access points have a built-in repeater mode.
A repeater simply regenerates a network signal to extend the range of the existing
network infrastructure. (See Figure 5-3.) A wireless LAN repeater does not physi¬
cally connect by wire to any part of the network. Instead, it receives radio signals
from an access point, end-user device, or another repeater; it retransmits the
frames. This makes it possible for a repeater located between an access point and
distant user to act as a relay for frames traveling back and forth between the user
and the access point.
J njTJTrm
Transmit
110 Chapter 5: Wireless LANs: Networks for Buildings and Campuses
Atnlennae
Most antennae for wireless LANs are omnidirectional and have low gain. Nearly
all access points, routers, and repeaters come standard with omnidirectional
antennae. Omnidirectional antennae satisfy most coverage requirements; how¬
ever, consider the use of optional directive antennae to cover a long, narrow area.
In some cases, the antenna is integrated within a radio card or access point and
there is no choice to make. If a need exists to use a directive antenna (higher gain),
ensure that the radio card or access point has an external antenna connector.
As shown in Figure 5-4, a home or small office wireless LAN generally includes a
single wireless LAN router that connects to a broadband Internet connection, such
as DSL or cable modem. The typical range of a wireless LAN router is adequate
to cover a house, apartment, or small office. A router is necessary if there is more
than one network device. For example, a home consisting of one wireless PC, a
laptop, and a printer requires NAT and DHCP to satisfy the addressing needs of
all devices.
Cable
or DSL
Broadband
Modem
An access point alone will also work in a home or small office, but it will allow
only one network device to obtain an IP address and access the Internet. This
occurs because most access points do not implement DHCP and NAT. The combi¬
nation of an access point and wired router (see Figure 5-5), however, will suffice
for a wireless LAN router. This might be a less expensive solution than purchas¬
ing a wireless LAN router if you already own an access point or wired router (or
both).
Figure 5-5
Combining a Wireless LAN Access Point and an Ethernet
Router ^ Same Functional'ty of a Wireless LAN
—s*
tip
Wireless LAN access points and routers have default security settings
such as WEP, initially turned off. To prevent someone outside your home
or office from accessing files on your network, activate security controls
when setting up the wireless LAN.
oflTces1™eLAN fOT a" enteiPnSe ^ mUCh m°re COm',llCated tha" ^ homes and small
offices. The main reason ts that enterprise wireless LANs require mult,pie access
potnts with the need of a substantial distribution system that interconnects the access
potn s. As show in Figure 5-6, the access pornts offer overlapping radro cells that
6113 16 ^ t0 — ^ a facility and access resources on a wtred neto* Vhts
wirelessLAN ^ ‘° “ lnfraStructure mod®, is the most common for any
LAN needing to cover an area greater than 20,000 square feet.
\ Access Points
Wireless LAN Systems 113
For example, a wireless LAN for a hospital might consist of hundreds of access
points located throughout the hospital. A large array of Ethernet switches and
associated cabling would be necessary to tie everything together. As with other
enterprise wireless LANs, a hospital will likely have existing hardware that pro¬
vides DHCP services. As a result, an enterprise wireless LAN utilizes access
points, not wireless LAN routers.
tip
When deploying an enterprise or public wireless LAN, be certain to have a
wireless LAN specialist perform an RF site survey to assess the presence
of RF interference sources an and determine the optimum placement of
access points and RF channel assignments.
Health-care centers, such as hospitals and doctors’ offices, must maintain accu¬
rate records to ensure effective patient care. A simple mistake can cost some¬
one’s life. As a result, doctors and nurses must carefully record test results,
physical data, pharmaceutical orders, and surgical procedures. This paperwork
often overwhelms health-care staff, taking 50 to 70 percent of their time. The
use of a mobile data collection device that wirelessly transmits the data to a
centralized database significantly increases accuracy and raises the visibility of
the data to those who need the information. This results in better care given to
patients.
Doctors and nurses are also extremely mobile, going from room to room caring
for patients. The use of electronic patient records, with the ability to input,
view, and update patient data from anywhere in the hospital, increases the accu¬
racy and speed of health care. This improvement is possible by providing each
114^Chapter5^W,reless LANs: Networks for Buildings and Campuses
nurse and doctor with a wtreless pen-based computer, such as a tablet or PDA
::iz:- -»
A doctor caring for someone in the hospital, for example, can place an order for
th" ^ T IT lnt° the Pat,ent’S dectronic medical record. The doctor can
then check the results through the handheld appliance from anywhere m the
.Sr":da,es-Mosi •• -»Cr
This would no, be possible wi.bon, to SZ^.T’'
centralized database and mobile data collection devices suPPort a
Wireless LANs
A public wireless LAN enables anyone with a wireless LAN Ntr a
device to access the Internet Pnhii • , /NIC-equipped user
note
Locate a nearby public wireless LAN hotspot at
http://www.wi-tihotspotIist.com/.
Wireless LAN Systems 115
A public wireless LAN is one that anyone can use. This provides a source of reve¬
nue because the hotspot owner can bill subscribers. In some situations, though,
hotspot owners offer free access in order to increase the use of their establishment.
Wireless LANs for small hotspots are simple. For example, a coffee shop owner
can install a single wireless LAN router that interfaces to a broadband Internet
connection. This configuration is similar to one needed for a home or small office.
Free access encourages patrons to purchase coffee and other goodies as they surf
the web and correspond with e-mail.
In cases where the hotspot owner wants to charge for access, then the wireless
LAN system needs to include an access controller and billing function as shown
in Figure 5-7. When a user runs her web browser, the access controller automati¬
cally redirects her to a web page that prompts the user to log in or sign up for ser¬
vice. Billing options include per-minute, per-day, or per-month plans. The billing
system keeps track of usage and automatically charges credit cards.
Figure 5-7 Public Wireless LANs Require Components That Fall Out¬
side the Scope of Wireless Networking Technologies
Billing
1 I
1 1
Cable d^
or DSL
Broadband Access
Modem Controller
To offer wireless coverage for their patrons, hotels have been installing access points in
convention centers, ballrooms, meeting rooms, lobbies, swimming pool areas, and guest
rooms.
A hotel wireless LAN can enable guests to do all of the following during their stay:
■ Remotely and securely access their corporate networks from their room.
The staff and management of hotels can also reap huge benefits from wireless LANs. For
example, the deployment of a wireless LAN makes the following tasks much easier and
efficient:
a Conduct room inspections to see if everything is in order and no damage was done
to the room after guests check out of the hotel. The staff can check the room and
send feedback to the main computer through an 802.11-enabled PDA.
a Perform security and safety inspections to make sure doors are locked, fire extin¬
guishers are charged, emergency lights are in working order, and so on. All of the
information is updated in real time, saving time and the possibility of error.
■ Keep in contact with maintenance workers by using wireless LAN phones. Manage¬
ment can contact maintenance whenever needed, resulting in quicker response
times.
Wireless LAN Technologies 117
Figure 5-8 Ad Hoc Wireless LANs Offer Simple Setup and Operation
0000000000000
For example, an ad hoc wireless LAN makes it easy for someone to transfer a
large file to an associate in a conference room where an infrastructure wireless
LAN is not available. Each user simply configures his radio NIC to operate in ad
hoc mode, and connections are made automatically. In some cases, the users need
to ensure that their IP addresses are set within the same subnet.
Ad hoc mode is also beneficial for supporting emergency services where opera¬
tions might take place in areas where a wired distribution system for interconnect¬
ing access points is not practical. A disaster relief group, for example, can quickly
set up network connections among staff working in areas afflicted by hurricanes,
floods, and terrorist attacks.
802.11
The IEEE 802.11 standard specifies a common medium access control (MAC)
and several physical layers for wireless LANs. The initial 802.11 standard became
available in 1997, but wireless LANs didn’t begin to proliferate on a large scale
until 2001, when prices fell dramatically. The IEEE 802.11 working group
actively continues to enhance the standard to improve the performance and secu¬
rity of wireless LANs.
note
The 802.11 standard specifies use of an infrared light physical layer;
however, no products on the market today comply with this version
of the standard.
Before transmitting frames, a station must first gain access to the medium, which
is a radio channel that stations share. The 802.11 standard defines two forms of
medium access: distributed coordination function (DCF) and point coordination
function (PCL). DCL is mandatory and based on the CSMA/CA («carrier sense
multiple access with collision avoidance) protocol. With DCL, 802.11 stations
contend for access and attempt to send frames when there is no other station trans¬
mitting. (See Ligure 5-9.) If another station is sending a frame, stations wait until
the channel is free.
Wireless LAN Technologies 119
Successful
Transmission
As a condition to accessing the medium (see Figure 5-9), the MAC Layer checks
the value of its network allocation vector (NAV), which is a counter resident at
each station that represents the amount of time that the previous frame needs to be
sent. The NAV must be 0 before a station can attempt to send a frame. Prior to
transmitting a frame, a station calculates the amount of time necessary to send the
frame based on the its length and data rate. The station places a value representing
this time in the duration field in the header of the frame. When stations receive the
frame, they examine this duration field value and use it as the basis for setting
their corresponding NAVs. This process reserves the medium for the sending sta¬
tion.
An important aspect of the DCF is a random back-off timer that a station uses if it
detects a busy medium. If the channel is in use, the station must wait a random
period of time before attempting to access the medium again. This ensures that
multiple stations wanting to send data don’t transmit at the same time. The ran-
120 Chapter 5: Wireless LANs: Networks for Buildings and Campuses
dom delay causes stations to wait different periods of time and avoids all of them
sensing the medium at exactly the same time, finding the channel idle, transmit¬
ting, and colliding with each other. The back-off timer significantly reduces the
number of collisions and corresponding retransmissions, especially when the
number of active users increases.
With radio-based LANs, a transmitting station can’t listen for collisions while
sending data, mainly because the station can’t have its receiver on while transmit¬
ting the frame. As a result, the receiving station needs to send an acknowledge¬
ment (ACK) if it detects no errors in the received frame. If the sending station
doesn’t receive an ACK after a specified period of time, the sending station
assumes that there was a collision (or RF interference) and retransmits the frame.
For supporting time-bounded delivery of data frames such as video, the 802.11
standard defines the optional PCF where the access point grants access to an indi¬
vidual station to the medium by polling the station during the contention-free
period. Stations can’t transmit frames unless the access point polls them first. The
period of time for PCF-based data traffic (if enabled) occurs alternately between
contention periods.
An access point polls stations according to a polling list, then switches to a con¬
tention period when stations use DCF. This process enables support for both syn¬
chronous and asynchronous modes of operation. No known wireless NICs or
access points on the market today, however, implement PCF.
An issue with PCF is that not many vendors support it in their products. As a
result, it s generally not an option available to users. Future products, however,
might support PCF in order to offer quality of service (QoS) mechanisms.
Scanning
The 802.11 standard defines both passive and active scanning, whereby a radio
NIC searches for access points. Passive scanning is mandatory where each NIC
scans individual channels to find the best access-point signal. Periodically, access
Wireless LAN Technologies 121
points broadcast a beacon, and the radio NIC receives these beacons while scan¬
ning and takes note of the corresponding signal strengths. The beacons contain
information about the access point, including SSID and supported data rates. The
radio NIC can use this information along with the signal strength to compare
access points and decide on which one to use.
Optional active scanning is similar, except the radio NIC initiates the process by
broadcasting a probe frame, and all access points within range respond with a
probe response. Active scanning enables a radio NIC to receive immediate
response from access points, without waiting for a beacon transmission. The
issue, however, is that active scanning imposes additional overhead on the net¬
work because of the transmission of probe and corresponding response frames.
Stations set to ad hoc mode form are what the 802.11 standard refers to as an inde¬
pendent basic service set. In this mode, one of the stations always sends a beacon,
which alerts new stations of the network presence. The responsibility of transmit¬
ting the beacon is based upon each station waiting for a beacon interval to expire
and an additional random time. A station transmits a beacon if after*the beacon
interval and random time the station does not receive a beacon from another sta¬
tion. This distributes the responsibility for sending beacons among all stations.
Authentication
Authentication is the process of proving identity, and the 802.11 standard speci¬
fies two forms: open system authentication and shared key authentication. Open
system authentication is mandatory, and it’s a two-step process. A radio NIC ini¬
tiates the process by sending an authentication request frame to the access point.
The access point replies with an authentication response frame containing
approval or disapproval of authentication indicated in the status code field in the
frame body.
it to the radio NIC. The radio NIC uses its WEP key to encrypt the challenge text
and then sends it back to the access point in another authentication frame. The
access point decrypts the challenge text and compares it to the initial text. If the
text is equivalent, the access point assumes that the radio NIC has the correct key.
The access point finishes the sequence by sending an authentication frame to the
radio NIC with the approval or disapproval. Many hackers know how to break
through shared key authentication, however, so it’s not a good idea to depend on it
for a high level of security.
Association
When authenticated, the radio NIC must associate with the access point before
sending data frames. Association is necessary to synchronize the radio NIC and
access point with important information, such as supported data rates. The radio
NIC initiates the association by sending an association request frame containing
elements such as SSID and supported data rates. The access point responds by
sending an association response frame containing an association ID along with
other information regarding the access point. Once the radio NIC and access point
complete the association process, they can send data frames to each other.
WEP
With the optional WEP enabled, the wireless NIC encrypts the body (not the
header) of each frame before transmission using a common key; and the receiving
station decrypts the frame upon receipt using the common key. The 802.11 standard
does not specify a key distribution method, which makes 802.11 wireless LANs vul¬
nerable to eavesdroppers. The 802.1 li version of the standard, however, is improv¬
ing 802.11 security by incorporating 802.lx and stronger encryption into the
standard.
RTS/CTS
RTS/CTS for all frames larger than 1,000 bytes. The use of RTS/CTS alleviates
hidden node problems (where two or more radio NICs can’t hear each other and
they are associated with the same access point).
If the radio NIC activates RTS/CTS, it first sends an RTS frame to an access point
before sending a data frame. The access point then responds with a CTS frame,
indicating that the radio NIC can send the data frame. With the CTS frame, the
access point provides a value in the duration field of the frame header that holds
off other stations from transmitting until after the radio NIC initiating the RTS can
send its data frame. This avoids collisions between hidden nodes. The RTS/CTS
handshake continues for each frame, as long as the frame size exceeds the thresh¬
old set in the corresponding radio NIC.
In order to still receive data frames, the sleeping NIC must wake up periodically
(at the right time) to receive regular beacon transmissions coming from the access
point. These beacons identify whether sleeping stations have frames buffered at
the access point and are waiting for delivery to their respective destinations. The
radio NICs having awaiting frames will request them from the access point. After
receiving the frames, the radio NIC can go back to sleep.
Fragmentation
The optional fragmentation function enables an 802.11 station to divide data
packets into smaller frames. This is to avoid needing to retransmit large frames in
the presence of RF interference. The bit errors resulting from RF interference are
likely to affect a single frame, and it requires less overhead to retransmit a smaller
frame rather than a larger one. As with RTS/CTS, users can set a maximum frame-
124 Chapter 5: Wireless LANs: Networks for Buildings and Campuses
length threshold for when the radio NIC activates fragmentation. If the frame size
is larger than the threshold, the radio NIC breaks the packet into multiple frames,
with each frame no larger than the threshold value.
Initial 802.11
The initial 802.11 standard ratified in 1997 includes frequency hopping spread spec¬
trum (FHSS) and direct sequence spread spectrum (DSSS) physical layers operating
in the 2.4-GHz band with data rates of up to 2 Mbps. FHSS transmits a wideband sig¬
nal that spans the entire 2.4-GHz band. It’s possible to tune FHSS access points to as
many as 15 different hopping patterns that don’t interfere with each other, which
enables up to 15 FHSS access points to effectively operate in the same area.
Because the current version of 802.11 FHSS has only a maximum data rate of
2 Mbps, not many companies sell FHSS solutions for an indoor wireless LAN.
Much faster 802.1 la, 802.1 lb, and 802.1 lg wireless LANs are now available.
Also, FHSS doesn’t interoperate with any of the other 802.11 physical layers.
FHSS does, however, provide a very solution for outdoor, point-to-multipoint sys¬
tems. This is because FHSS is more resilient to the RF interference that might be
present in outdoor environments.
802.11 DSSS also operates only up to 2 Mbps, but it interoperates with the newer
802.1 lb physical layer. As a result, a user having an 802.11 DSSS radio NIC in
her laptop can interface with an 802.1 lb access point. This situation is unlikely,
however, because 802.11 DSSS radio NICs are not sold anymore.
802.11a
Toward the end of 1999, the IEEE released 802.1 la, which defines operation in
the 5-GHz band using Orthogonal Frequency Division Multiplexing (OFDM)
with data rates up to 54 Mbps. Products, however, didn’t become available until 2000,
primalily because of the difficulties in developing circuitry in the 5-GHz band.
Wireless LAN Technologies 125
802.1 la operates up to 54 Mbps in the 5-GHz band using OFDM with a range up to
100 feet depending on the actual data rate. 802.1 la access points and radio NICs just
became available in late 2001; therefore, the installed base of 802.1 la wireless LANs
today is relatively small as compared to 802.1 lb. Because of this, carefully consider
interoperability issues that might result if you choose to deploy 802.1 la networks.
If you compare the operation of 802.1 lb and 802.1 la, however, an 802.1 la user
has a higher data rate at the same range as an 802.1 lb user until the 802.1 la user
loses connectivity. The 802.1 lb user, however, can continue operating at lower
data rates — 1 or 2 Mbps, for example—at longer ranges than 802.1 la.
A definite problem is that 802.1 la and 802.1 lb/g are not compatible. For exam¬
ple, a user equipped with an 802.1 lb radio card can’t associate with an 802.1 la
access point. The opposite scenario also applies. Vendors are solving this problem
by introducing multimode radio cards that implement both 802.1 la and 802.1 lb.
sent different data bit patterns. The higher data rates, such as 54 Mbps, employ
quadrature amplitude modulation (QAM) to represent data bits by varying the
transmit center frequency with different amplitude levels in addition to phase
shifts.
802.11b
Along with 802.1 la, IEEE ratified 802.1 lb, which is a higher-rate extension to the
initial direct sequence standard in the 2.4-GHz band—with data rates up to
11 Mbps. 802.1 lb access points and radio NICs have been available since 1999;
therefore, most wireless LANs installed today are 802.1 lb compliant.
802.1 lb uses DSSS to disperse the data frame signal over a 22-MHz portion of
the 2.4-GHz frequency band. This results in greater immunity to RF interference
as compared to narrowband signaling, which is why the FCC deems the operation
of spread spectrum systems license free.
Wireless LAN Technologies 127
The 802.1 lb modulator converts the spread binary signal into an analog waveform
through the use of different modulation types, depending on which data rate is
chosen. For example with 1-Mbps operation, the PMD uses differential binary
phase shift keying (DBPSK). This isn’t really as complex as it sounds. The modu¬
lator merely shifts the phase of the center transmit frequency to distinguish a
binary 1 from a binary 0 within the data stream.
For 2-Mbps transmission, the PMD uses differential quadrature phase shift keying
(DQPSK), which is similar to DBPSK except four possible phase shifts that repre¬
sents every two data bits. This is a clever process that enables the data stream to be
sent at 2 Mbps while using the same amount of bandwidth as the one sent at 1
Mbps. The modulator uses similar methods for the higher 5.5-Mbps and 11-Mbps
data rates.
802.11g
IEEE ratified the 802.1 lg standard in 2003, which is compatible with 802.1 lb and
increases performance up to 54 Mbps in the 2.4-GHz band using OFDM.
«
A strong advantage of 802.1 lg is that it’s backward compatible with 802.1 lb.
Companies with existing 802.1 lb networks can generally upgrade their access
points to become 802.1 lg compliant through simple firmware upgrades. This pro¬
vides an effective migration path for wireless LANs. An issue, however, is that the
presence of 802.1 lb client devices within an 802.1 lg environment requires pro¬
tection mechanisms that limit the performance of the overall wireless LAN. The
problem is that 802.1 lb devices can’t understand when 802.1 lg devices are trans¬
mitting because of a difference in modulation types. As a result, both types of
devices must announce their impending use of the medium using a commonly
understood modulation type.
The disadvantages of 802.1 lb, such as potential for RF interference and limit of
three non-overlapping channels, still apply to 802.1 lg because of operation in the
2.4-GHz band. As a result, 802.1 lg networks have capacity constraints as com¬
pared to 802.1 la.
128 Chapter 5: Wireless LANs: Networks for Buildings and Campuses
When deploying a wireless LAN, companies must make a decision on whether to use
NICs and access points designed to operate in the 2.4-GHz or 5-GHz band —or both.
Not too long ago, the choice of frequency band was easy, when only 2.4-GHz (802.1 lb)
products were available. Now, 802.1 lb and 802.1 lg products are both available that
operate in the 2.4-GHz band, while 802.1 la uses the 5-GHz band. This can cause confu¬
sion when designing a wireless LAN, so take a look at what is necessary to consider
when making this critical decision.
When assessing the pros and cons of 2.4-GHz and 5-GHz systems, be sure to first define
requirements. This provides a solid basis for defining all design elements. Without firm
requirements, you’ll be making the choice on flimsy ground.
The following are requirements for consideration when deciding between 2.4-GHz or
5-GHz solutions:
Vendors, however, offer dual-band radio NICs and access points, which reduces
interoperability problems. Someone equipped with a dual-band radio NIC can asso¬
ciate with either a 2.4-GHz (802.1 lb/g) or 5-GHz (802.1 la) access point. As a
greater number of users begin equipping their devices with the dual-band radio NICs,
the interoperability issue will diminish. «
In most cases, you’ll probably determine that 2.4 GHz is the way to go for common
office applications. 2.4-GHz products are certainly inexpensive and capable of sup¬
porting most application requirements. Some situations, however, benefit from the
use of 5 GHz, such as densely populated environments and multimedia applications.
130 Chapter 5: Wireless LANs: Networks for Buildings and Campuses
Wi-Fi
The Wi-Fi Alliance, which began its work known as the Wireless Ethernet Com¬
patibility Alliance (WECA), is an international nonprofit organization focusing on
the marketing and interoperability of 802.11 wireless LAN products. The Wi-Fi
Alliance is the group that pushes the term Wi-Fi to cover all forms of 802.11-based
wireless networking, such as 802.1 la, 802.1 lb, 802.1 lg, or whatever becomes
available in the future. Wi-Fi Alliance is also behind Wi-Fi Protected Access
(WPA), the stepping stone between the much-criticized WEP and the 802.1 li
security standard.
■ Market Wi-Fi certified products to consumers in the home, small office, and
enterprise markets.
The Wi-Fi Alliance follows an established testing program to certify that products
are interoperable with other Wi-Fi certified products. After a product successfully
passes every test, the manufacturer is granted the right to use the Wi-Fi Certified
logo on that particular product and its corresponding packaging and manuals.
Wi-Fi certification is meant to give consumers confidence that they are purchasing
wireless LAN products that have met multivendor interoperability requirements. A
W,;-Pi logo on the product means that it has met interoperability testing requirements
and definitely works with other vendors’ Wi-Fi—certified products.
Wireless LAN Technologies 131
The problem to date, however, is that these enhanced security mechanisms are
proprietary, making it difficult to support multivendor client devices. As a result,
the Wi-Fi Alliance took a bold step forward to expedite the availability of effective
standardized wireless LAN security by defining WPA while promoting interoper¬
ability. With WPA, an environment having many different types of 802.11 radio
NICs —such as public hotspots—can benefit from enhanced forms of encryption.
WPA 1.0 is a snapshot of the initial, unratified version of 802.1 li, which includes
Temporal Key Integrity Protocol (TKIP) and 802.lx mechanisms. The combina¬
tion of these two mechanisms provides dynamic key encryption and mutual
authentication, something much needed in wireless LANs.
For authentication, WPA 1.0 uses a combination of open system and 802.lx
authentication. Initially, the wireless client authenticates with the access points,
which authorizes the client to send frames to the access point. Next, WPA per¬
forms user-level authentication with 802.lx. During this, WPA 1.0 interfaces to an
authentication server in an enterprise environment. WPA 1.0 is also capable of
operating in what’s known as pre-shared key mode, if no external authentication
server is available, such as in homes and small offices.
The 802.1 li standard is backward compatible with WPA 1.0; however, 802.1 li
also includes an optional Advanced Encryption Standard (AES) encryption. AES
requires coprocessors not found in most access points today, which makes AES more
suitable for new wireless LAN installations. The newer WPA 2.0 includes AES.
HiperLAIM/2
HiperLAN/2, which stands for High Performance Radio LAN, is a wireless LAN
standard developed by the Broadband Radio Access Networks (BRAN) division
of the European Telecommunications Standards Institute (ETSI). HiperLAN/2
132 Chapter 5: Wireless LANs: Networks for Buildings and Campuses
defines an efficient, high-speed wireless LAN technology that fully meets the
requirements of Europe’s spectrum regulations.
HiperLAN/2 has a physical layer that is similar to IEEE’s 802.1 la, which oper¬
ates at up to 54 Mbps in the 5-GHz band using OFDM. A major difference with
HiperLAN/2 is the use of a connection-oriented protocol with time division multi¬
plexing as the basis for supporting data transfer between users. This method of
transmission is efficient for multimedia applications including voice and video.
HiperLAN/2 Enhancements
The similarities between 802.1 la and HiperLAN/2, however, stop at the MAC
Layer. While 802.1 la uses CSMA/CA to transmit packets, HiperLAN/2 uses
Time Division Multiple Access (TDMA). A problem is that CSMA/CA causes
stations to wait for an indefinite period of time, which is referred to as asynchro¬
nous access. With this mode of operation, there are not any regular time relation¬
ships associated with medium access. As a result, there’s no guarantee of when a
particular station will be able to send a packet. The lack of regular access to the
medium draws down the efficiency of the system, which is not good for support¬
ing voice and video information.
The use of TDM A in HiperLAN/2, however, offers a regular time relationship for
network access. TDM A systems dynamically assign each station a time slot based
on the station’s need for throughput. The stations then transmit at regular intervals
during their respective time slots, making more efficient use of the medium and
improving support of voice and video applications.
The true usable maximum throughput of HiperLAN/2 is 42 Mbps, while the max¬
imum usable throughput of 802.1 la is only around 18 Mbps. This puts HiperLAN/2
well ahead of 802.1 la in terms of performance of each access point.
Wireless LAN Technologies 133
Much of this has to do with regulatory issues and big supporters pulling out of the
HiperLAN/2 movement. In addition, the 802.1 lh Task Group has been working
on revisions to 802.11 that make it more suitable for deployment in Europe, which
is where HiperLAN/2 could dominate if anywhere.
Essentially 802.1 lh is 802.1 la with two additional European features. The first of
these is Transmit Power Control (TPC), which enables automatic controls for
keeping transmissions from interfering with other nearby systems. The second
feature is Dynamic Frequency Selection (DFS), which allows the station to listen
to the airspace before picking a channel. This is also an interference avoidance
mechanism that the ETSI requires for operation within Europe.
802.11 currently has a definite lead in the worldwide market as the top choice for
wireless LAN deployments. This makes 802.11 the only alternative for wireless
LAN deployments today. Combined with the absence of HiperLAN/2 products,
it’s doubtful that HiperLAN/2 will catch up and become the dominant player in
the wireless LAN market.
134 Chapter 5: Wireless LANs: Networks for Buildings and Campuses
Chapter Summary
Wireless LAN components include radio NICs, access points, routers, repeaters,
and antennae that enable wireless applications in buildings and campus areas.
These components are building blocks for implementing wireless LANs in
homes, small offices, enterprises, and public hotspots. These networks can range
from having a single access point in a home or small office to hundreds of access
points covering a large facility. Or, the wireless LAN might include only two
users communicating directly with each other using ad hoc mode.
802.11 is by far the most prominent standard worldwide, with data rates up to
54 Mbps and operation in either the 2.4-GHz or 5-GHz frequency bands. Wi-Fi
offers assurance of interoperability among manufacturers of 802.11-compliant
wireless LAN components, and HiperLAN/2 is a European-based standard that is
unlikely to compete heavily with 802.11.
1. Which wireless LAN component is most commonly used in home and small
offices?
2. What is the primary difference between an access point and a wireless LAN
router?
4. How does a wireless LAN radio NIC identify with which access point to
associate?
Chapter Review Questions 135
Wireless MANs offer a high return on investment because companies can avoid
leasing or installing expensive copper circuits or optical fiber links. In fact, it’s
sometimes impossible to install a wired network between two points when right-
of-way restrictions prohibit the installation of wires. For example, a company
might use wireless MAN components for data communications between the cor¬
porate headquarters and a nearby distribution center.
In many cases, companies can realize enough savings from a wireless MAN to
pay for the equipment within one to two years. This certainly gives incentive to
any company needing to establish communications between buildings spread
throughout a metropolitan area.
This chapter offers examples of wireless MAN components, describes how these
components interconnect to form a variety of systems, and explores the various
standards.
138 Chapter 6: Wireless MANs: Networks for Connecting Buildings and Remote Areas
Bridges
The industry definition of a bridge is a device that connects two networks that
might use the same or a different data-link layer protocol (Layer 2 of the OSI ref¬
erence model). Figure 6-1 illustrates this concept.
Wireless bridges are generally at each end of a point-to-point link, such as those
that interconnect two buildings. A bridge has a wired port that connects to the net¬
work and a wireless port that interfaces with a transceiver. The bridge receives
packets on one port and retransmits them on another port. A bridge will not start
retransmission until it receives a complete packet. Because of this, stations on
either side of a bridge can transmit packets simultaneously without causing collisions.
Some bridges retransmit every packet on the opposite port regardless if the packet
is heading to a station located on the opposite network. A learning bridge, which
is more common, examines the destination address of every packet to determine
whethei it should forward the packet based on a decision table that the bridge
builds ovei time. This increases efficiency because the bridge will not retransmit a
packet if it knows that the destination address is on the same side of the bridge as
the sending address. Learning bridges also age address-table entries by deleting
addresses that have been inactive for a specified amount of time.
Wireless MAN Components 139
The bridges within the network are transparent to users. Packets are sent through
the bridge automatically. In fact, users have no idea that their packets are travers¬
ing a link leading to a different location.
It’s possible to use a wireless bridge indoors. For example, a wireless LAN bridge
can interface an Ethernet network directly to a particular access point. This might
be necessary if few devices, possibly in a far-reaching part of the facility, are
interconnected through Ethernet. A wireless LAN bridge plugs into this Ethernet
network and uses the 802.11 protocol to communicate with an access point that is
within range. In this manner, a bridge enables the wireless connection of a cluster
of users (actually a network) to an access point.
Workgroup Bridges
Workgroup bridges are the answer for connecting wireless networks to larger,
wired Ethernet networks. A workgroup bridge acts as a wireless client on the
wireless network, and then interfaces to a wired network. The wired side connects
to an Ethernet switch that connects multiple devices. A workgroup bridge offers
more robust and higher-end management and security utilities —with higher
prices—as compared to a basic bridge.
Other
Devices
OirectionaB Antennae
The antenna is an important element of a wireless MAN. Unlike other types of
wireless networks, most antennae for wireless MANs use directional antennae,
mainly because they operate over wider areas. Figure 6-4 illustrates the propaga¬
tion of radio waves from a directional antenna. This contrasts with an omnidirec¬
tional antenna, which transmits radio waves in all directions.
OOOOOOOOOCOO
oooooocooooo
0000°OOOOCOO
Directional
Antenna >
Different types of antennae have different vertical and horizontal beamwidths. For
example, an omnidirectional antenna has a horizontal beamwidth of 360 degrees
Wireless MAN Components 141
Semidirectional Antennae
There are several different types of antennae that have semidirectional radiation
patterns. For example, a directional patch antenna will have at least double the
range as compared to an omnidirectional antenna. You can easily mount a patch
antenna on a wall on one side of a facility and effectively cover a large area. A
Yagi antenna, a common antenna invented by Japanese inventor Hidetsugu Yagi,
is the semidirectional antenna best for long-range applications.
A highly directional antenna has an extremely narrow beamwidth, with long radi¬
ation patterns and corresponding range. To achieve this degree of directivity, you
need to use dish antennae that focus the radio energy mostly in one direction.
These types of antennae are expensive compared to omni- and semidirectional
antennae; however, the costs may be feasible if the solution requires long range.
Many of the higher-gain directional antennae use a parabolic dish to focus the
radio frequency (RF) power in one direction. A parabolic dish, for example, has
a narrower horizontal and vertical beamwidth of 4 to 25 degrees. This extreme
focusing of the RF power increases range significantly.
A problem, however, is that the dish antennae are subject to damage from weather
because of excessive wind loading, especially if the antenna is not mounted cor¬
rectly. As a result, highly directional grids that have plenty of holes in the dish are
generally safer to deploy.
142 Chapter 6: Wireless MANs: Networks for Connecting Buildings and Remote Areas
Effect of Polarization
Point-tci-Point Systems
A point-to-point solution uses RF or infrared signals that utilize either semidirec¬
tional or highly directional antennae to extend range across metropolitan areas,
such as college campuses and cities. Range can be as high as 30 miles for RF sys¬
tems using highly directional antennae. Figure 6-5 illustrates a point-to-point
wireless MAN system.
Wireless MAN Systems 143
Point-to-Point
000000000000
A medical center, for example, can use a point-to-point wireless MAN to provide
a communications link betv/een the main hospital and a remote clinic within the
same city. This resulting system, however, does not provide as much flexibility as
point-to-multipoint solutions. However, if there is a need to connect only a couple
sites, the cost of implementing a point-to-point system is less compared to a
point-to-multipoint system.
Point-to-IWIultipoint System
A typical point-to-multipoint link (see Figure 6-6) utilizes a centralized omnidi¬
rectional antenna that provides a single transceiver point for tying together multi¬
ple remote stations. For example, a building within the center of a city can host
the omnidirectional antenna, and other nearby metropolitan-area buildings can
point directional antennae at the centralized location. The central transceiver
receives and retransmits the signals.
Figure 6-7 Packet Radio System Hops Data Packets from the Source
to Destination
Packet Radio Routers
A city government might want to deploy a packet radio system to offer wireless
connectivity for supporting applications through the entire city area. The installa¬
tion ol routers in strategic places through the city provides the necessary infra-
Wireless MAN Technologies 145
structure. There’s no need for wires for interconnecting the routers. Each router is
capable of receiving and retransmitting—hopping— the packets to their destination.
802.16
The IEEE 802 group initiated the IEEE 802.16 working group to create standards
for broadband wireless access in order to offer a high-speed, high-capacity, low-
cost, scalable solution to extend fiber-optic backbones. The first IEEE 802.16
standard, published in April 2002, defines the Wireless MAN Air Interface for
wireless MANs. These systems are meant to provide network access to homes,
small businesses, and commercial buildings as an alternative to traditional wired
connections.
With wireless base station equipment targeted at under $20,000, 802.16 can eco¬
nomically serve up to 60 customers with T-l (1.5 Mbps) speed connections.
That’s really attractive to the typical WISP that’s short on cash. In addition,
802.16 can provide a feasible backhaul for connecting wireless LAN hotspots
together.
The 802.16 MAC layer supports many different physical layer specifications, both
licensed and unlicensed. Through the 802.16 MAC, every base station dynami¬
cally distributes uplink and downlink bandwidth to subscriber stations using time-
division multiple access (TDMA). This is a dramatic difference from the 802.11
MAC, with current implementations operating through the use of carrier sensing
mechanisms that don’t provide effective bandwidth control over the radio link.
The next step for the IEEE 802.16 working group is to add portability and mobil¬
ity to the standard. In March 2002, the group began the 802.16e study group on
Mobile Broadband Wireless Access. This group will address many different
mobility issues, including providing connectivity to moving vehicles within a
base station’s sector.
Chapter Summary
Wireless MANs primarily use bridges with directional antennae to interconnect
two or more networks over a metropolitan area. Point-to-point systems directly
connect two sites; and point-to-multipoint enables multiple sites to connect
through a central transceiver. Many companies utilize proprietary technologies for
wireless MANs. Standards such as 802.11 and Wi-Fi enable less-expensive solu¬
tions, but potential RF interference persists. The 802.16 standard, however, prom¬
ises to offer effective standards-based wireless MANs.
148 Chapter 6: Wireless MANs: Networks for Connecting Buildings and Remote Areas
9. What are the advantages of using packet radio for wireless MANs?
For example, a wireless WAN enables someone to check her e-mail on her PDA
while visiting a customer in a different city. This allows users to react quicker to
situations, rather than wait to check their e-mail from the hotel room. The rela¬
tively low performance of wireless WANs adequately supports this type of appli¬
cation.
Wireless WANs can also provide Internet access from a stationary location. A
camper, for example, can aim a satellite dish mounted on a recreational vehicle
and have access to the Internet. This makes it possible to stay in touch with family,
and enjoy the benefits of the web, while staying in remote areas.
This chapter offers examples of wireless WAN components, describes how these
components interconnect to form a variety of systems, and explores the various
technologies.
152 Chapter 7: Wireless WANs: Networks for Worldwide Connections
Figure 7-1 Wireless WAN User Devices Are Small for Easy Mobility
The use of wireless WANs to network stationary PCs is not common; however,
some applications do exist. The need to set up a portable point-of-sale (POS) reg¬
ister at a remote area, such as a makeshift concert site, could prompt the use of a
wireless WAN. A vendor selling t-shirts can process credit cards over the wireless
WAN to an Internet-based processing center.
Wireless WAN Components 153
Radio NICs
Some mobile phones have integrated wireless WAN radios. Telecommunication
companies, such as Verizon and Sprint, offer wireless WAN connections with
voice services. The problem, however, is that several different types of wireless
WANs exist, making it a challenge for users to find a mobile phone that interfaces
with the type of wireless WAN they want to use.
Figure 7-2 Wireless Radio NICs Exist for Laptops and PDAs
Along with the purchase of hardware, the vendor generally sells access to the ser¬
vice that the card is designed to interface with. Telecommunications companies
spend significant amounts of money to secure frequency spectrum and install
hardware over vast areas. As a result, all wireless WAN providers charge for the
service. This is different than wireless LAN hotspots, where many hotels and air¬
ports are finding it advantageous to offer free Internet access to wireless LAN
users. This is made possible because wireless LAN deployment doesn’t require
much capital.
154 Chapter 7: Wireless WANs: Networks for Worldwide Connections
note
Be certain to purchase a wireless WAN radio NIC that interfaces with a
type of wireless WAN that’s available in the areas you need. Consider the
coverage area, just as you would with a mobile phone, before deciding on
which NIC and service to use.
In the case of using a satellite-based wireless WAN, the purchase of satellite ter¬
minal hardware becomes necessary. Mobile versions of satellite terminals have a
small-parabolic (dish) reflector antenna and electronics that can fit within a
medium-sized briefcase. This type of wireless WAN interface is relatively expen¬
sive. Satellite terminals are also available for more permanent installations, such
as home or recreational vehicles.
Base Stations
Base stations for wireless WANs typically appear outdoors. In fact, the familiar
cell towers shown in Figure 7-3 are seen scattered around cities and country areas.
Similar to wireless LANs, these base stations rely on wires to connect to a distri¬
bution system that provides switching and an interface to the Internet. In most
cases, the towers reside outdoors to provide maximum coverage. However, some
large public facilities —such as shopping malls and airports— install cellular base
stations indoors to handle larger numbers of subscribers.
Another form of wireless WAN base station is a satellite in orbit, which is actually
a repeater in the sky. On the ground, a user aims a dish antenna at the satellite, and
the satellite receives the signal and retransmits the signal back to an Earth station.
(See Figure 7-4.) A strong advantage of this approach is that less infrastructure is
necessary on the ground. The problem, however, is that operators must spend mil¬
lions of dollars to establish a satellite system for computer traffic. This equates to
expensive service charges for users.
Wireless WAN Components 155
Figure 7-3 Cell Towers Are Common Wireless WAN Base Stations
Repeater
Uplink Downlink
Antennae
Wireless WAN base stations and user devices use a variety of antennae depending
on the type of wireless LAN. For cellular systems, the antenna on the user device
is generally omnidirectional. Cell towers generally have multiple directional
antennae, however, that cover vast distances.
156 Chapter 7: Wireless WANs: Networks for Worldwide Connections
A satellite user has a dish antenna with characteristics as shown in Figure 7-5. The
transceiver, located at the focal point, transmits and receives the radio frequency
(RF) signal. For example, the RF signal leaves the transmitter side of the trans¬
ceiver, and the shape of the dish focuses the RF signals in one direction.
Figure 7-5 Dish antennae Have Parabolic Reflectors That Focus the
Signal Power in a Beneficial Way
No matter how the RF signal hits the dish, the signals leave the dish in the same
direction because of its parabolic shape. In fact, the opposite is also true. When
the dish receives RF signals, the shape of the dish focuses the RF signals at the
receiver, which is at the focal point.
note
A snow sled disk is the shape of a parabolic reflector.
Towers
The component that makes the system a wireless WAN is the data gateway. In this
case, the gateway is able to interface with data protocols in a way that makes it
possible for users to surf the Internet, send and receive e-mails, and utilize corpo¬
rate applications.
First-Generation Cellular
When mobile phones first became available, wireless communications used only
analog signals. This initial cell phone system is known as first-generation cellular
(1G cellular). When someone speaks through a 1G system, his voice is sent using
frequency modulation (FM), which merely changes the frequency of carrier wave
according to the audio signal. 1G systems make use of a limited number of chan¬
nels that use FSK to send control signals necessary to set up and maintain the
calls.
1G systems work well for voice phone calls, despite occasional crackles and pops,
but they are not sufficient for sending computer data. As with the voice, analog
signals must represent data. Users must interface PCs to the cellular system using
a modem that converts the digital signals from the computing device into an ana¬
log form (such as FSK or PSK) that is suitable for transmission through a small,
4-KFIz voice channel. This results in slow 20- to 30-kbps data rates.
1G systems at one time covered most of the U.S. Today, however, they exist only
in areas having low population density, where it’s not feasible to upgrade the
infrastructure to newer digital systems.
Second-Generation Cellular
Not too long ago, digital cellular became available, allowing both the voice and
control channels to make use of digital signing. The first phase of this totally digi¬
tal system is referred to as second-generation cellular (2G cellular). Most of the
telecommunications operators today have 2G systems, with various enhancements
occurring periodically.
Wireless WAN Systems 159
The use of digital signaling for the voice channels allows for more efficient modu¬
lation. This makes it possible to support more phone calls and data over a lower
frequency spectrum. In fact, 2G systems enable enhanced services —such as short
messaging, authentication, and phone software updates—to be accessed wire¬
lessly.
Third-Generation Cellular
Many of the telecommunications operators are now beginning to offer what’s
known as third-generation cellular (3G cellular), with even betteV support for data
communications. The Universal Mobile Telecommunications System (UMTS) is
capable of 2-Mbps data rates for in-building implementations, up to 384 kbps in
urban areas, and 144 kbps in rural areas. As a result, 3G is able to support multi-
media applications.
There has been considerable argument in the wireless industry on whether 3G will
replace 802.11 (Wi-Fi) wireless LAN technology. With higher data rates for
indoor use, 3G is an alternative to wireless LANs. 802.11 continues, however, to
have performance upgrades that significantly exceed 3G. For example, the
802.1 la standard specifies data rates of 54 Mbps, which is much higher than 3G.
Also, wireless LANs are much less expensive to deploy.
Wireless LANs, however, are not practical for providing coverage over wide
areas. There would be too much infrastructure. 3G makes use of existing cell
tower sites and distribution systems. Expenses of modifying 1G and 2G cellular
systems to 3G are still high, but it’s the most feasible method for providing wire¬
less networking over wide areas.
160 Chapter 7: Wireless WANs: Networks for Worldwide Connections
Thus, both 3G and wireless LAN systems complement each other. This has
prompted standards groups and manufacturers to find ways to seamlessly inte¬
grate 3G and wireless LANs. In fact, mobile phones and PDAs are available today
that implement both technologies. With this capability, a user can roam outside
the range of a wireless LAN and automatically associate with a cellular system.
The problem is that standards that define this form of roaming are not yet avail¬
able, which requires the user to carefully choose service providers that support the
phone or PDA of choice.
One of the most common services for wireless WANs is short message service
(SMS), which is a text messaging system capable of sending a couple hundred
characters at a time. SMS is a wireless form of the familiar instant messaging
that is available from many of the ISPs. The following are additional applica¬
tions of SMS for use with wireless WANs:
Many web sites use Wireless Markup Language (WML) to transform regular
web pages into a format that is more easily read on a small device, such as a
PDA or cell phone. WML also reduces the graphics on the page to compensate
for the slower data rates of wireless WAN technologies.
note
For more information on instant messaging applications, check out the
Instant Messaging Planet at http://www.instantmessagingplanet.com.
Satellites
«
The use of satellites for broadcasting television and other communications has
been around for several decades. Not until recently, however, did satellite systems
provide users with connections to the Internet. (See Figure 7-7.) Data rates are
appreciable, with up to 1.5-Mbps downloads.
Some satellite systems support two-way exchange of data, allowing a user to send
data up to the satellite (and vice versa). For example, a user’s mobile device can
transmit a web page request up to the satellite, and the satellite retransmits it down
to the appropriate Earth station. The Earth station then sends the web page
through the satellite and back down to the user. Other satellite systems, however,
only support a downlink. A user’s device must request the web page through
another network, such as a telephone link, and the satellite broadcasts the page
to the user.
162 Chapter 7: Wireless WANs: Networks for Worldwide Connections
Satellites are located at various points in the geostationary orbit depending on the
system mission requirement. To obtain global coverage, a minimum of three satel¬
lites is required. To obtain reasonably constant RF signal levels, however, four sat¬
ellites are employed. This also provides some freedom in positioning.
The band of frequencies between 450 MHz and 20 GHz is the most suitable for an
Earth-space-Earth radio link. It is not practical to establish links to an Earth termi¬
nal located in a climatic region of heavy rainfall at frequencies higher than
20 GHz if consistent availability is expected.
Wireless WAN Systems 163
For all operating bands, the lowest-frequency spectrum is used for the downlink
because it has the most severe power constraints. Lower frequencies are less sen¬
sitive to free-space attenuation when compared to the higher-uplink frequencies.
Losses are easier to overcome in the uplink with the higher transmit power avail¬
able at the Earth station.
The satellite acts as a signal repeater. Signals sent to it on the uplink are rebroad¬
cast back to Earth on the downlink. The device that handles this action is referred
as a transponder. The satellite transponder is analogous to a repeater in a terres¬
trial communications link; it must receive, amplify, and retransmit signals from
Earth terminals. A satellite transponder is capable of acting as a transponder for
one or more RF communications links.
Low-altitude satellites, which can have circular, polar, or inclined orbits, have
orbital periods of fewer than 24 hours. Therefore, they appear to move when seen
from the Earth’s surface. These orbits are useful for surveillance purposes, and
can be used to provide communications at extreme north and south latitudes.
Actually, the satellite does not remain truly fixed. Even if the orbit were perfectly
circular and at precisely the right altitude, natural phenomena (because of low-level
lunar and planetary-gravitational fields and solar-radiation pressure) introduce
slight drifts in the orbit. This slow and minor drift is corrected from time-to-time
by small onboard thrusters activated by ground stations.
Because of the long RF path involved (approximately 22,300 statute miles from
an Earth terminal to a satellite in geostationary orbit), a transmission delay of
approximately 100 ms is experienced between an Earth terminal and the satellite.
This results in an approximate Earth-to-Earth-delay of 200 ms. This causes the
system to be inefficient for use with protocols, such as 802.11, that require a
response after each packet of information is transmitted before transmitting the
next packet. In fact, most networking protocols do not work efficiently over satel¬
lite links because the protocols expect timely acknowledgments from the destina¬
tion.
164 Chapter 7: Wireless WANs: Networks for Worldwide Connections
Known as a poor man’s satellite system, meteor burst communications (see Figure 7-8)
bounce RF signals off meteor trails. This enables a long-haul (1,500 mile) wireless-
data transmission link without the expense of launching and maintaining a satellite.
Figure 7-8 Meteor Burst Systems Use Meteor Trails to Reflect Sig¬
nals Back to Earth
Meteor Trails
However, the cost of deploying meteor burst equipment is so low compared to sat¬
ellite systems that low-performance applications, such as telemetry, are feasible.
Meteor burst, for example, works well for transmitting snow levels from remote
mountainous areas to monitoring centers.
Wireless WAN Technologies 165
Frequency Band
166 Chapter 7: Wireless WANs: Networks for Worldwide Connections
Figure 7-10 TDMA Makes Users Transmit Only During Their Assigned
Time Slot
Time -—-►
note
Some wireless WAN devices, such as mobile phones, have multiple modes
or bands and support more than one technology. For example, a single
mobile phone can support both TDM A and CDMA. The phone automati¬
cally switches from one technology to the other depending on which net¬
work is available.
Chapter Summary
Wireless WANs include cellular towers, parabolic antennae, satellites, and tele-
«
communications infrastructure. Most wireless WAN applications make use of out¬
door connections, but some indoor facilities, such as airports and convention
centers, deploy wireless WANs when large numbers of subscribers are present.
Wireless WAN infrastructure is expensive compared to other types of wireless
networks, but wireless WANs are the most feasible for covering countries and
continents. Cellular and satellite systems are the most common forms of wireless
WANs capable of providing moderate performance. Meteor burst communica¬
tions is less expensive, but offers only low performance.
168 Chapter 7: Wireless WANs: Networks for Worldwide Connections
1. What types of user devices are most common with wireless WANs?
3. Why must you be careful when selecting a wireless WAN radio NIC for your
user device?
7. Which of the two following cellular systems offers the highest data rates:
GPRS or UMTS?
10. How does CDMA keep users from interfering with each other?
*
What You Will Learn
After reading this chapter, you should be able to
Security Threats
As show in Figure 8-1, there are several forms of security threats to wireless net¬
works. For example, hackers can steal information from a company, obtain unau¬
thorized access to applications, and even disrupt operation of the network.
Wireless
Network
172 Chapter 8: Wireless Network Security: Protecting Information Resources
Traffic Monitoring
An experienced hacker, or even casual snooper; can easily monitor unprotected
wireless data packets using tools such as AirMagnet and AiroPeek, which fully
disclose the contents of wireless data packets. For example, snoopers can monitor
all transactions occurring over the wireless portion of the network several hundred
feet away from the building that has the wireless LAN. Of course, the issue is that
anyone can identify usernames, passwords, credit card numbers, and so on. In
fact, war drivers even post their finds on web sites, just for fun.
The solution to this problem is to, at a minimum, employ encryption between the
wireless client device and the base station. Encryption alters data bits using a
secret key. Because the key is secret, a hacker is not able to decipher the data. As a
result, the use of effective encryption mechanisms upholds the privacy of data.
Unauthorized Access
Similar to monitoring a wireless application, someone can effortlessly access a
corporate wireless network from outside the facility if the proper precautions are
not taken. Someone can, for example, sit in a parked car and associate with one of
the wireless base stations located inside a building. Without proper security, this
person can access servers and applications residing on the corporate network. This
is similar to letting a stranger inside your home or office.
Unfortunately, many companies deploy their wireless networks using the default,
unsecured base station configurations, making it possible for anyone to interface
with their application servers. In fact, you can go war driving and discover that
30 percent of the wireless LAN access points in an average city do not deploy any
form of security. This allows anyone to access hard drives and use resources such
as Internet connections.
The Windows XP operating system makes it easy to interface with wireless net¬
works, especially on public wireless LANs. When a laptop associates with the
wireless LAN, the user can navigate to any other laptop associated with the same
Security Threats 173
wireless LAN. Without personal firewall protection, someone can browse through
your hard drive. This is a tremendous security risk.
Even if you implement all security controls on access points, the possible connec¬
tion of a rogue access point is a significant threat. (See Figure 8-2.) A rogue
access point is an unauthorized access point on the network. An employee might
purchase an access point and install it within his office without knowing the secu¬
rity implications. A hacker could also plant a rogue access point within a facility
by purposely connecting an unprotected access point to the corporate network.
A rogue access point can be exploited because it probably won’t have any encryp¬
tion activated, which provides an open door for someone to easily access the cor¬
porate network from outside the facility. For that reason, a company should
continually monitor for the presence of rogue access points. Keep in mind that
this is a problem whether a wireless network is in place or not. Someone could
connect a rogue access point to a completely wired Ethernet network.
174 Chapter 8: Wireless Network Security: Protecting Information Resources
Man-in-the-Middle Attacks
The use of encryption and authentication techniques improves the security of a
wireless network; however, smart hackers can still find vulnerabilities because of
the way that networking protocols operate. A definite weakness is a man-in-the-
middle attack, which is when a hacker places a fictitious device between the users
and the wireless network. (See Figure 8-3.) For example, a common man-in-the-
middle attack exploits the common address resolution protocol (ARP) that all
TCP/IP networks utilize. A hacker with the right tools can exploit ARP and take
control of the wireless network.
ARP is a crucial function used by sending a wireless or wired NIC to discover the
physical address of a destination NIC. The physical address of a card is the same
as the medium-access control (MAC) address, which is embedded in the card by
the manufacturer and unique from any other NIC or network component. The
MAC address is analogous to the street address of your home. Just as someone
must know this address to send you a letter, a sending NIC must know the MAC
address of the destination. The NIC only understands and responds to the physical
MAC address.
The application software that needs to send the data will have the destination IP
address, but the sending NIC must use ARP to discover the corresponding physi¬
cal address. It gets the address by broadcasting an ARP request packet that
announces the destination NIC’s IP address. All stations will hear this request, and
the station with the corresponding IP address will return an ARP response packet
containing its MAC address and IP address.
The sending station will then include this MAC address as the destination address
in the frame being sent. The sending station also stores the corresponding IP
address and MAC address mapping in a table for a specified period of time (or
until the station receives another ARP response from the station having that IP
address).
A problem with ARP is that it introduces a security risk resulting from ARP
spoofing. For example, a hacker can fool a station by sending, from a rogue net¬
work device, a fictitious ARP response that includes the IP address of a legitimate
network device and the MAC address of the rogue device. This causes all legiti¬
mate stations on the network to automatically update their ARP tables with the
false mapping.
Of course, these stations will then send future packets to the rogue device rather
than to the legitimate access point or router. This is a classic man-in-the-middle
attack, which enables a hacker to manipulate user sessions. As a result, the hacker
can obtain passwords, capture sensitive data, and even interface with corporate
servers as if they were the legitimate user.
176 Chapter 8: Wireless Network Security: Protecting Information Resources
The use of SARP, however, requires the installation of special software on each cli¬
ent. Consequently, SARP is not practical for public hotspots. Enterprises, though,
can install SARP on clients and be much freer from man-in-the-middle attacks.
Denial of Service
A Denial of Service (DoS) attack is an assault that can cripple or disable a wire¬
less network. The possibility of such an attack is something that anyone deploying
wireless networks should consider. Be sure to think about what could happen if
the wireless network becomes unavailable for an indefinite period of time.
The severity of the DoS attack depends on the impact of the wireless network
becoming inoperative. For example, a hacker could disable someone’s home wire¬
less LAN, but the result will probably just inconvenience the homeowner. A DoS
attack that shuts down a wireless inventory system, however, could cause major
financial loss.
One form of DoS attack is the brute-force method. For example, a huge flood of
packets that uses all of the network’s resources and forces the network to shut
down is a DoS brute-force attack. There are tools on the Internet that enable hack¬
ers to cause excessive flooding on wireless networks. A hacker can perform a
packet-based brute-force DoS attack by sending useless packets to the server from
other computers on the network. This adds significant overhead on the network
and takes away usable bandwidth from legitimate users.
Another way of stopping most wireless networks, especially those that use carrier
sense access, is using a strong radio signal to dominate the airwaves and render
access points and radio cards useless. Protocols such as 802.11 are very polite and
let the DoS attack signal have access to the medium for as long as it wants.
Security Threats 177
The use of strong radio signals to disrupt the network is a rather risky attack for a
hacker to attempt, however. Because a powerful transmitter at a close range must
execute this type of attack, the owners of the wireless network can find the hacker
through the use of homing tools available in network analyzers. Once the jam¬
ming source is found, authorities can stop it and possibly apprehend the culprits.
In addition, some security mechanisms are prime targets for DoS attacks. Wi-Fi
Protected Access (WPA), for example, is vulnerable to a type of DoS attack. WPA
uses mathematical algorithms to authenticate users to the network. If a user is try¬
ing to get in and sends two packets of unauthorized data within one second, WPA
will assume it is under attack and shut down.
The only completely effective way to counter DoS attacks is to isolate your com¬
puter in a room with heavy security and unplug it from all networks, including the
«
Internet. This means not using a wireless network, of course. The U.S. govern¬
ment uses this method to protect their most sensitive data, but this solution is not
practical for any enterprise or home application, where there are benefits for
deploying wireless networks.
The most fundamental defense against DoS is developing and maintaining strong
security practices. Actions such as implementing and updating firewalls, main¬
taining updated virus protection, installing up-to-date security patches, ensuring
strong passwords, and turning off network devices when they are not needed
should be routine practices for all companies and homeowners.
You can protect a wireless LAN against DoS attacks by making the building as
resistant as possible to radio signals coming in. Flere are some steps to help reduce
radio signal leakage:
■ If interior walls use metal studs, make sure they are grounded.
■ Run tests to determine how far the signal actually leaks outside of the build¬
ing. Adjust transmitter power accordingly until the leakage is eliminated or
reduced to the point that it would be easy to locate a hacker.
■ Aim directive access point antennas toward the inside of the building.
Because there’s no way of completely countering all types of DoS attacks, con¬
sider a plan B if a DoS attack will cause significant damage. For example, have a
process for switching to batch processing or paper-based methods if the applica¬
tion is subjected to a severe DoS attack. You certainly don’t want potential weak¬
nesses in the wireless network to bring down your company!
Encryption
Encryption alters the bits of each data packet to guard eavesdroppers from decod¬
ing data, such as credit card numbers. Before encryption the data is called plain¬
text, which is easy to decode by using sniffing tools. The encryption converts the
plaintext into ciphertext, which someone can decode only through the use of a
proper secret key.
Many encryption methods, such as the 802.11 Wired Equivalent Privacy (WEP),
are symmetric—that is, the same key that does the encryption is also the one that
performs the decryption. Figure 8-4 illustrates this process.
Encryption 179
' >
Encryption Decryption
Ciphertext
ooooooooooooo i
Access
User Point
r
For example, the radio NIC uses key xyz to encrypt a data packet, and an access
point uses key xyz to perform the decryption. This requires both the sending and
receiving stations to trust each other, as is the case with a private wireless network
application such as an enterprise wireless LAN. It’s not practical to use symmetric
keys in a public application, however, because anyone, including hackers, could
*
For symmetric encryption to be effective, the function must minimize the reuse of
encryption keys by changing them often, possibly every frame transmission. This
decreases the time available for a hacker to break into the network and makes it
difficult—if not impossible —to compromise the security of the network. As a
result, symmetric encryption mechanisms must have effective key distribution
methods.
Public key cryptography uses asymmetric keys, with one that is private and
another one that is public. As the name applies, the private key is secret; however,
anyone can know the public key. This enables more effective encryption and
authentication mechanisms because it simplifies key distribution.
An important requirement of public key encryption is that a set of public and pri¬
vate keys must match from a cryptographic standpoint. For example, the sending
station can encrypt data using the public key, and the receiver uses the private key
180 Chapter 8: Wireless Network Security: Protecting Information Resources
for decryption. The opposite is also true. The sending station can encrypt data using
the private key, and the receiving station decrypts the data using the public key.
If the goal is to encrypt data, the sending station will use a public key to encrypt
the data before transmission; this is shown in Figure 8-5. The receiving station
uses the matching private key to decrypt the data upon reception. Each station
keeps its private key hidden in order to avoid compromising encrypted informa¬
tion. As a result, the process allows any station to use a publicly known key to
send encrypted data to any other station.
Public /
Key /
Encryption Decryption
Ciphertext
OOOOOOOOOOOOO msmj
Access
User Point 1_
Public key cryptography works effectively for encrypting data because the public
key can be made freely available to anyone wanting to send encrypted data to a
particular station. A station that generates a new private key can distribute the cor¬
responding public key over the network to everyone without worry of compro¬
mise. The public key can be posted on a website or sent unencrypted across the
network.
Encryption 181
WEP
WEP is 802.1 l’s optional encryption and authentication standard implemented in
the MAC Layer that most radio NIC and access point vendors support. When
deploying a wireless network, you need to fully understand the ability of WEP to
improve security.
WEP Operation
If a user activates WEP, the NIC encrypts the payload (frame body and cyclic
redundancy check [CRC]) of each 802.11 frame before transmission using an
RC4 stream cipher provided by RSA security. The receiving station, such as an
access point or another radio NIC, performs decryption upon arrival of the frame.
As a result, 802.11 WEP only encrypts data between 802.11 stations. Once the
frame enters the wired side of the network, such as between access points, WEP
no longer applies.
As part of the encryption process, WEP prepares a key schedule (seed) by linking
the shared secret key supplied by the user of the sending station with a randomly
«
generated 24-bit initialization vector (IV). The IV lengthens the life of the secret
key because the station can change the IV for each frame transmission. WEP
inputs the resulting seed into a pseudo-random number generator that produces a
key stream equal to the length of the frame’s payload plus a 32-bit integrity check
value (ICV).
The ICV is a checksum that the receiving station recalculates and compares to the
one sent by the sending station. It determines whether the transmitted data under¬
went any form of tampering while in transit. If the receiving station calculates an
ICV that doesn’t match the one found in the frame, the receiving station can reject
the frame or flag the user.
WEP specifies a shared secret key to encrypt and decrypt the data. With WEP, the
receiving station must use the same key for decryption. Each radio NIC and
access point, therefore, must be manually configured with the same key.
182 Chapter 8: Wireless Network Security: Protecting Information Resources
Before transmission takes place, WEP combines the key stream with the payload/ICV
through a bitwise XOR process, which produces ciphertext (encrypted data).
WEP includes the IV in the clear (unencrypted) within the first few bytes of the
frame body. The receiving station uses this IV along with the shared secret key
supplied by the receiving station user to decrypt the payload portion of the frame
body.
In most cases, the sending station will use a different IV for each frame (this is not
required by the 802.11 standard). When transmitting messages having a common
beginning, such as the sender’s address in an e-mail, the beginning of each
encrypted payload will be equivalent when using the same key. After encrypting
the data, the beginnings of these frames would be the same, offering a pattern that
can aid hackers in cracking the encryption algorithm. Since the IV is different for
most frames, WEP guards against this type of attack. The frequent changing of
I Vs also improves the ability of WEP to safeguard against someone compromis¬
ing the data.
WEP Issues
WEP is vulnerable because of relatively short I Vs and keys that remain static. The
issues with WEP don’t really have much to do with the RC4 encryption algorithm.
With only 24 bits, WEP eventually uses the same IV for different data packets.
For a large, busy network, this reoccurrence of I Vs can happen within an hour or
so.
This results in the transmission of frames having key streams that are too similar.
If a hacker collects enough frames based on the same IV, the individual can deter¬
mine the shared values among them—that is, the key stream or the shared secret
key. This, of course, leads to the hacker decrypting any of the 802.11 frames.
The static nature of the shared secret keys emphasizes this problem. 802.11
doesn t provide any functions that support the exchange of keys among stations.
As a result, system administrators and users generally use the same keys for
weeks, months, and even years. This gives mischievous culprits plenty of time to
monitor and hack into WEP-enabled networks.
Encryption 183
The TKIP process begins with a 128-bit temporal key shared among clients and
access points. TKIP combines the temporal key with the client’s MAC address
and then adds a relatively large 16-octet IV to produce the key that will encrypt
the data. This procedure ensures that each station uses different key streams to
encrypt the data.
TKIP uses RC4 to perform the encryption, which is the same as WEP. A major
difference from WEP, however, is that TKIP changes temporal keys every 10,000
packets. This provides a dynamic distribution method that significantly enhances
the security of the network.
In addition to the TKIP solution, the 802.1 li standard includes the Advanced
Encryption Standard (AES) protocol. AES offers much stronger encryption. AES
uses the Rine Dale encryption algorithm, which is a tremendously strong encryp¬
tion that replaces RC4. Most cryptographers feel that AES is uncrackable. In addi¬
tion, the 802.1 li standard will include AES as an option over TKIR In fact, the
U.S. Commerce Department’s National Institutes of Standards and Technology
(NIST) organization chose AES to replace the aging Data Encryption Standard
(DES). AES is now a Federal Information Processing Standard, which defines a
cryptographic algorithm for use by U.S. government organizations to protect sen¬
sitive but unclassified information. The Secretary of Commerce approved the
adoption of AES as an official government standard in May 2002.
The problem with AES is that it requires more processing power than what most
access points on the market today can support. As a result, the implementation of
AES will require companies to upgrade their existing wireless LAN hardware to
support the performance demands of AES. An issue, however, is that AES requires
a coprocessor (additional hardware) to operate. This means that companies need
to replace existing access points and client NICs to implement AES.
WPA 1.0 is actually a snapshot of the current version of 802.1 li, which includes
TKIP and 802.lx mechanisms. The combination of these two mechanisms pro¬
vides dynamic key encryption and mutual authentication, something needed in
wireless LANs. WPA 2.0 offers full compliance with the 802.1 li standard.
Authentication 185
Authentication
The use of mutual authentication is important in a wireless network. This will
guard against many security issues, such as man-in-the-middle attacks. With
mutual authentication, the wireless client and the wireless network must prove
their identity to each other. This process uses an authentication server, such as
Remote Authentication Dial-In User Service (RADIUS), to perform the authenti¬
cation. Figure 8-6 illustrates the process of authentication.
Credentials
0000000000000
User
Authentication
Server
When a wireless client becomes active, it searches the medium for beacons broad¬
cast by access points. By default, the access point broadcasts beacons containing
the service set identifier (SSID) of the access point, as well as other parameters.
The access point only enables association if the client SSID matches the access
point SSID. This process offers a basic, but weak, form of authentication.
The major vulnerability is the fact that the SSID is sent unencrypted, which makes
it visible to wireless packet sniffers. Because of this, a hacker can easily identify
the SSID within the beacon frame and authenticate with the wireless network.
Even if the access point is set not to broadcast the SSID—an optional feature
available in only a few access points—sniffers can still obtain the SSID from
association request frames sent from client devices to the access point.
The 802.11 standard also includes shared key authentication, an optional, more
advanced form of authentication. This is a four-step process:
3. The client then encrypts the challenge text using the common WEP encryp¬
tion key. The client sends the encrypted challenge text back to the access
point, which decrypts the text using the common key and compares the
result with the text originally sent.
4. If the decrypted text matches, the access point authenticates the client.
This seems adequate for authentication, but a problem is that shared key authenti¬
cation only proves that the client has the correct WEP key.
Authentication 187
MAC Filters
Some wireless base stations offer medium access control (MAC) filtering. When
implementing MAC filtering, the access point examines the source MAC address
of each incoming frame. The access point will deny frames without a MAC
address that matches a specific list programmed by the administrator. As a result,
MAC filtering provides a primitive form of authentication.
MAC filtering, however, has some weaknesses. For example, WEP encryption
does not encrypt the MAC address field of the frame. This allows a hacker to eas¬
ily sniff the transmission of frames and discover valid MAC addresses. And, a
hacker can use freely available software to change the MAC address radio NICs to
match a valid MAC address. This enables the hacker to masquerade as a real user
and fool the access point when the legitimate user is not present on the network.
In addition, MAC filtering can be tedious to manage when there are several users.
An administrator must enter each user’s MAC address in a table, and then make
applicable changes when new users come about. For example, an employee from
another company location might need access to the wireless LAN during a visit.
The administrator must determine the MAC address and program it in the system
before the visitor can access the network. MAC address filtering might be ade¬
quate for smaller home and office applications, but the hands-on nature of this
approach is not desirable by administrators of enterprise wireless networks.
tion’s name, the receiving station knows that the sending station is valid. The
encryption of a particular string of text in this case acts as a digital signature. Fig¬
ure 8-7 illustrates the concept of using public key encryption for authentication.
Private \ Public /
Key \ Key /
> r ' t
Encryption Decryption
Digital Signature
0000000000000
Access
User Point
T
802.1 x
The use of IEEE 802.lx offers an effective framework for automatically authenti¬
cating and controlling user traffic to a protected network, as well as dynamically
varying encryption keys. 802.lx ties a protocol called Extensible Authentication
Protocol (EAP) to both the wired and wireless network media and supports multi¬
ple authentication methods, such as token cards, Kerberos, one-time passwords,
certificates, and public key authentication.
802.lx Operation
Initial 802.lx communication begins with an unauthenticated supplicant (wireless
client device) attempting to connect with an authenticator (wireless base station).
The base station responds by enabling a port for passing only EAP packets from
the client to an authentication server located on the wired side of the base station.
The base station blocks all other traffic, such as HTTP, DHCP, and POP3 packets,
until the base station can verify the client’s identity using an authentication server,
Authentication 189
such as RADIUS. Once authenticated, the base station opens the client’s port for
other types of traffic based on access rights held by the authentication server.
To get a better idea of how the 802.lx process takes place, the following specific
interactions occur among the various 802.lx elements:
1. The client sends an EAP start message. This begins a series of message
exchanges to authenticate the client; think of this as a group of visitors enter¬
ing the front gate of a theme park and the group’s leader (client) asking the
gatekeeper (base station) whether they can enter.
2. The base station replies with an EAP request identity message. In the case of
the theme park, the gatekeeper will ask the leader for her name and driver’s
license.
3. The client sends an EAP response packet containing the identity to the
authentication server. The leader in this example will provide her name and
driver’s license, and the gatekeeper forwards this information to the group
tour manager (authentication server), who determines whether the group has
entry rights.
5. The authentication server will their send an accept or reject message to the
base station. In this case, an accept means the group tour manager at the
theme park tells the gatekeeper to let the group enter.
6. The base station sends an EAP success packet to the client. The gatekeeper
informs the leader that the group can enter the park. The gatekeeper, of
course, would not let the group in if the group tour manager had rejected the
group’s admittance.
190 Chapter 8: Wireless Network Security: Protecting Information Resources
7. If the authentication server accepts the client, the base station will transition
the client’s port to an authorized state and forward additional traffic. This is
similar to the gatekeeper automatically opening the gate to let in only people
belonging to the group cleared for entry.
The base station uses the session keys to build, sign, and encrypt an EAP key mes¬
sage that is sent to the client immediately after sending the success message. The
client can then use contents of the key message to define applicable encryption
keys. In typical 802.lx implementations, the client can automatically change
encryption keys frequently to minimize the risk of eavesdroppers having enough
time to crack the key in current use.
Authentication Types
It’s important to note that 802.lx doesn’t provide the actual authentication mecha¬
nisms. When utilizing 802.lx, you need to choose an EAP type (such as EAP
Transport Layer Security [EAP-TLS], EAP Tunneled Transport Layer Security
[EAP-TTLS], or Cisco’s Lightweight EAP [LEAP]), which defines how the
authentication takes place. The software supporting the specific EAP type resides
on the authentication server and within the operating system or application soft¬
ware on the client devices.
Security Policies
One of the first steps in providing wireless network security is to formulate effec¬
tive policies and corresponding enforcement processes. Carefully analyze security
Security Policies 191
Assessment Steps
After deploying a wireless network, you need to implement a security assessment
that ensures that the WLAN complies with security policies. For most situations,
this is necessary whether the network implements effective security mechanisms.
Don’t put too much trust in the design of a system. It’s best to run tests to be cer¬
tain that the network is hardened enough to guard against unauthorized persons
attacking company resources.
In fact, companies should conduct regular, periodic security reviews to ensure that
changes to the wireless LAN don’t make the system vulnerable to hackers. An
annual review might suffice for low-risk networks; but a review each quarter or
more often might be necessary if the network supports high-risk information, such
as financial data, postal mail routing, and manufacturing control functions.
Before getting too far with the security assessment, become familiar with com¬
pany policies regarding wireless network security. This provides a benchmark for
determining whether a company is complying with its own policies. In addition,
you’ll be able to assess and make corresponding recommendations for policy
modifications. Determine whether the policy leaves any room for a disgruntled
employee to access company resources.
Lor example, the policy should describe adequate encryption and authentication
mechanisms, keeping in mind that 802.11 WEP is broken. Also, the policy should
mandate that all employees coordinate with the company’s IT department before
purchasing or installing base stations. It’s important that all base stations have
192 Chapter 8: Wireless Network Security: Protecting Information Resources
configuration settings that comply with the policies and provide the proper level
of security. In addition, you need to ensure that security policies are disseminated
to employees in an effective manner.
Meet with IT personnel and read through related documentation to gain an under¬
standing of the system’s architecture and base stations configurations. You’ll need
to determine whether there are any design flaws that provide weaknesses that
could allow a hacker inside the system.
Learn as much as possible about existing support tools and procedures to spot
potential issues. Most companies, for example, configure the base stations over
the wired Ethernet backbone. With this process, the passwords sent to open a con¬
nection with a particular base stations are sent unencrypted over the wired net¬
work. As a result, a hacker with monitoring equipment hooked to the Ethernet
network can likely capture the passwords and reconfigure the base station.
Interview Users
Be sure to talk with a sample of employees to determine whether they are aware
of the security policies within their control. For example, do the users know that
they must coordinate the purchase and installation of wireless network compo¬
nents with the appropriate department? Even though the policy states this, don’t
count on everyone having knowledge of the policy. Someone might purchase a
base station from a local office supply store and install it on the corporate network
to provide wireless connectivity within the office. It’s also a good idea to verify
that people are using personal firewalls.
As part of the assessment, walk through the facilities with base stations and use
tools to capture the base station configurations. If the company has centralized
Security Policies 193
support software in place, you should be able to view the configuration settings
from a single console attached to the wired side of the network. This is to deter¬
mine which security mechanisms are actually in use and whether they comply
with effective policies.
For example, the policies might state that base stations must disable the physical
console port, but while testing you determine that most base stations have the
ports enabled. This would indicate noncompliance with the policies, and it would
enable a hacker to reset the base station to the factory default settings with no
security enabled. In addition, look at the firmware version of each base station to
see if it’s up-to-date. Older firmware versions might not implement the more
recent patches that fix encryption vulnerabilities.
Also, investigate base stations’ physical installations. As you walk through the
facilities, investigate the installation of base stations by noting their physical
accessibility, antenna type and orientation, and radio wave propagation into por¬
tions of the facility that don’t have physical security controls. The base stations
should be mounted in a position that would make it difficult for someone to phys¬
ically handle the base station and go unnoticed. «
A base station simply placed on top of a bookshelf, for example, would make it
easy for a hacker to swap the base station with a rogue one that doesn’t have any
security enabled. Or, the hacker could attach a laptop to the console port to reset
the base station. If the base stations are all mounted above the ceiling tiles and out
of plain view, however, someone would need to use a ladder and would probably
be noticed by an employee or security guard.
As a result, scan for these unauthorized base stations as part of the assessment.
Most companies will be surprised to learn how many they find. The most effective
method for detecting rogue base stations is to walk through the facilities with
sniffing tools. In addition, the company should periodically scan the network for
potential rogue base stations from the wired side of the network. This is available
in many of the centralized wireless network management systems.
In addition to hunting for rogue base stations, try going a step further and attempt
to access corporate resources using common tools available to hackers. For exam¬
ple, can you utilize AirSnort to crack through WEP? Is it possible to associate
with a base station from outside the company’s controlled perimeter? Of course
your job will be easy if WEP is turned off. If strong encryption and authentication
techniques are in use, you’ll likely not find a way in.
The information you gather during the assessment provides a basis for under¬
standing the security posture of a company or organization. After collecting infor¬
mation, spend some time thinking about potential gaps in security. This includes
issues with policy, network architecture, operational support, and other items that
weaken security, such as presence of unauthorized base stations and abilities to
penetrate the network. This requires you to think like a hacker and uncover any
and all methods that make it easier for someone to penetrate and access (or con¬
trol) company resources through the wireless network.
Recommend Improvements
As you spot weaknesses, research and describe methods that will counter the
issues. Start by recommending improvements to the policies, which dictate what
the company requires in terms of security for the wireless networks. This provides
a basis for defining technical and procedural solutions that strengthen the system’s
security to a level that protects the company’s interests.
Security Policies 195
DMZ
Users
W oooooo
000000
Access
Point
O
Corporate Network
1 Firewall
L_ oooooo f ;
Point
The problem with a VPN solution for all users is that it’s difficult to manage and
sometimes slows performance. As a result, mainly consider VPNs if users will
roam into public areas.
Skilled hackers can crack into a WEP-protected network using freely available
tools. However, WEP does a good job of protecting many home and business net¬
works from the general public. To crack WEP, you need to know how to use com-
196 Chapter 8: Wireless Network Security: Protecting Information Resources
plicated tools and capture a lot of network packets, something that most people
won’t bother with unless the network resources are extremely valuable and they
have infinite patience. The use of standard 802.11 WEP for networks with low
attack risk is a minimum for any security policy.
Vendors often implement patches to firmware in base stations and radio NICs that
fix security issues. Start by upgrading the firmware in the base station soon after
pulling it out of the box. Make it a habit to periodically check that all devices have
the most recent firmware releases to cover up all known security holes. This is
why it’s a good idea to make certain you can easily upgrade the firmware in the
base stations that you purchase.
For example, don’t place a base station within easy reach on a table in the office.
Instead, mount them out of view above ceiling tiles. Some base stations don’t
have reset buttons, but they allow you to reset through an RS-232 cable via a con¬
sole connection. To prevent this, be sure to disable the console port.
Also, don’t leave base stations within reach of a hacker who can replace a legiti¬
mate safeguarded base station with an unsecured, rogue base station that accepts
access from any user. In fact, it’s a good idea to conceal the base station as much
as possible to make it more difficult for a hacker to find. Be sure, however, to note
the location of the wireless hardware; otherwise, you’ll have a difficult time find¬
ing them yourself.
Security Policies 197
Disable base stations during outage periods. If possible, shut down the base sta¬
tions when users don’t need them. This limits the window of opportunity. You
could pull the power plug on each base station; however, consider deploying
power-over-Ethernet equipment that provides this feature through centralized
operational support tools.
The disabling of SSIDs isn’t foolproof, however, because someone can still moni¬
tor 802.11 association frames and recover the SSID. Shutting off the broadcast
mechanism, however, will limit access.
only optimizes coverage, it also minimizes the ability for a snooper to eavesdrop
on user signal transmissions or interface with the corporate network through an
access point.
If a hacker is able to associate with a base station, the hacker can easily access
files on other users’ devices through the Windows operating system that are asso¬
ciated with an access point connected to the same wireless LAN. As a result, it’s
crucial that all users disable file sharing for all folders and utilize personal fire¬
walls. This is crucial when users are operating in public locations.
Utilize operational support tools to continually monitor the network and check for
base stations that don’t conform to configuration policies. A base station that
doesn’t match specific security settings has likely been reset or is possibly a rogue
base station.
If base stations are found with improper settings, restore the settings as soon as
possible. Be sure to encrypt management traffic, however, through the use of
secure Simple Network Management Protocol (SNMP). SNMP Version 1, for
example, sends everything in the clear. You can also deploy intrusion detection
sensors, available in some operational support tools, to identify the presence of
hackers based on invalid MAC addresses. The main idea is to provide alerts if sus¬
picious behavior is occurring.
Control Deployments
Ensure that all employees and organizations within the company coordinate the
installation of wireless networks with the appropriate IT group. For example, for¬
bid the use of unauthorized access points. Mandate the use of approved vendor
products after you’ve had a chance to verify appropriate security safeguards.
Chapter Review Questions 199
Maintain a list of authorized radio NIC and base station MAC addresses that you
can use as the basis for identifying rogue base stations during surveys. In addition,
deploy management tools that force base stations to comply with corporate secu¬
rity policies.
With these recommendations in mind, you have a basis for forming a solid secu¬
rity policy. When deciding on which techniques to implement, however, consider
the actual security needs. For example, WEP might be good enough for home and
small business wireless LANs. If you work for a financial institution or retail store
transmitting sensitive data, concentrate on using something stronger, such as WPA
or AES.
Chapter Summary
Security is one of the most important and complex elements of wireless networks.
The ability of a hacker to monitor traffic, gain unauthorized access to valuable
resources, and deny the service of a wireless network are issues jthat you must
consider. Through the use of effective encryption and authentication, it’s possible
to significantly minimize threats. Keep in mind, however, that the necessary level
of security depends on requirements. An acceptable level of security for a home
application is much lower than what’s needed for an enterprise.
4. What method will help alleviate the implications of a successful DoS attack?
7. WPA uses TKIP and is a subset of the 802.1 li standard. True or false?
10. What should you install on a laptop that a user will utilize on a public wire¬
less LAN to avoid unauthorized people from accessing files on the laptop?
\
APPENDIX A
Answers to Chapter
Review Questions
Chapter 1
1. What is a distinguishing attribute of a wireless network as compared to a
general wireless communication system?
Answer: 50 feet.
5. True or false: A wireless PAN consumes little power from small handheld
computer devices.
Answer: True.
8. Why do wireless WANs not effectively satisfy requirements for indoor wire¬
less networks?
Answer: Wireless WAN systems are generally installed outdoors, and the
signals lose strength before reaching the inside of the facility.
Chapter 2
1. Which wireless NIC form factors are best for small wireless computer
devices?
2. What are examples of elements that impair the propagation of wireless com¬
munications signals through the air medium?
Answer: False.
8. A wireless NIC must convert the information into what type of signal before
transmission through the air medium?
Answer: Analog.
Answer: CSMA.
Answer: The receiving wireless NIC performs error checking and sends a
request to the sending wireless NIC to retransmit the frame if errors are
found.
Chapter 3
1. RF signals offer relatively short range as compared to light signals. True or
false?
Answer: False.
5. Multipath affects higher data rates more than lower data rates for 2.4-GHz
systems. True or false?
Answer: True. The receiver has difficulties with differentiating one bit
from another when demodulating high data rate signals because the bits are
close together.
Answer: A system that emits light in all directions that reflects off of the
ceiling and walls.
Answer: 1 mile.
Answer: False.
Chapter 4 207
Chapter 4
1. What form factors are common for wireless PAN radio cards?
2. What application can strongly benefit through the use of a wireless USB
adapter (also referred to as a wireless dongle)?
5. Which IEEE standards group uses Bluetooth as the basis for the standard?
«
Answer: 802.15.
7. What is the primary issue of using Bluetooth around 802.11 wireless LANs?
Answer: They both operate in the same 2.4 GHz frequency band, which
can result in interference and degradation in performance.
Answer: False.
Answer: 4 Mbps.
208 Appendix A: Answers to Chapter Review Questions
Chapter 5
1. Which wireless LAN component is most commonly used in home and small
offices?
2. What is the primary difference between an access point and a wireless LAN
router?
4. How does a wireless LAN radio NIC identify with which access point to
associate?
Answer: The radio NIC listens for beacons being sent periodically by each
access point and associates with the access point having the strongest beacon
signal.
Answer: False.
Answer: 5 GHz.
Answer: Three.
Chapter 6 209
Answer: True.
Chapter 6
1. Why does a wireless MAN offer good return on investment?
Answer: False.
9. What are the advantages of using packet radio for wireless MANs?
Answer: Packet radio routers don’t require any cabling between them, and
the system is relatively survivable because packets can take a different route
if a router becomes inoperative.
Chapter 7
1. What types of user devices are most common with wireless WANs?
3. Why must you be careful when selecting a wireless WAN radio NIC for your
user device?
Answer: There are many different types of wireless WANs that are not
compatible with each other.
Chapter 8 211
Answer: It can cover vast areas. A single satellite can cover roughly
one-third of the Earth’s surface.
7. Which of the two following cellular systems offers the highest data rates:
GPRS or UMTS?
Answer: UMTS.
Answer: False.
10. How does CDMA keep users from interfering with each other?
Chapter 8
1. What are the three major security threats of a wireless network?
4. What method will help alleviate the implications of a successful DoS attack?
Answer: Hackers are able to crack the WEP encryption algorithm through
the use of publicly available tools.
7. WPA uses TKIP and is a subset of the 802.1 li standard. True or false?
Answer: True.
Answer: A rogue access point does not have any security features set and
is put in by a hacker or employee. The rogue access point offers an open port
to the network for hackers to exploit.
10. What should you install on a laptop that a user will utilize on a public wire¬
less LAN to avoid unauthorized people from accessing files on the laptop?
1G cellular The initial (first-generation) cellular phone system that used analog
signaling. This system did not effectively support the transmission computer data.
2G cellular The first cellular phone system (second-generation) that used digi¬
tal signaling that supports data rates of under 20 kbps.
802.11 A standard published by the IEEE that defines the radio characteristics
and operation of a medium-range radio frequency LAN. Specifies the use of
CSMA as the primary method for sharing access to a common air medium.
802.15 A standard published by the IEEE that defines the radio characteristics
and operation of wireless PANs. 802.15 is based on the Bluetooth specification.
802.16 A standard published by the IEEE that defines the radio characteristics
and operation of wireless MANs. ,
802.3 A standard published by the IEEE that defines the signal characteristics
and operation of a wired local-area network. Defines the use of CSMA, which is
similar to 802.11 wireless LANs.
access point A type of base station that wireless LANs use to interface wireless
users to a wired network and provide roaming throughout a facility.
authentication The process of proving the identity of a user or base station. The
use of usernames and passwords is a common authentication method, but many
other, more-sophisticated authentication mechanisms exist. For example, digital
certificates can offer a means of authentication without user intervention.
base station Hardware that interfaces wireless computing devices together and
to a wired network. Access points and wireless routers are types of wireless LAN
base stations.
carrier signal The primary RF signal that carries data through the air medium.
Various modulation types vary the carrier signal frequency, phase, or amplitude to
represent information.
CDMA (code division multiple access) A process where each user modulates
their signals with a different, noninterfering code.
CDPD (Cellular Digital Packet Data) A technology that enables the transmis¬
sion of data over analog cell phone systems with data rates of 19.2 kbps. CDPD is
becoming obsolete as newer 3G systems are becoming available.
CF (CompactFlash) A small NIC for PDAs, cameras, and other small com¬
puter devices. Bluetooth and 802.11 CF NICs are readily available.
DSSS (direct sequence spread spectrum) 217
client device Hardware having a user interface that enables the use of wireless
network applications. Client device is another name for computer device.
computer device Any end point of a wireless network, such as a laptop, PDA,
or robot. The computer device is often referred to as a client device.
CSMA (carrier sense multiple access) A process that allows multiple 802.11
stations to share a common air medium. Stations attempt to only transmit data
when no other station is transmitting. Otherwise, collisions will occur and the sta¬
tion must retransmit the data.
data Information, such as electronic files, that is stored and sent over a wireless
network. Often data are sent in multiple packets, which are sent separately
through the network.
data rate The number of bits per second (bps) that data is sent. For example,
802.1 lb wireless LANs operate at up to 11 Mbps.
digital signal A signal that varies in amplitude steps as time advances. The dig¬
ital signal represents data within a computer device. The digital signal must be
converted to an analog form—known as modulation—before the data can be sent
through the air medium.
directional antenna A type of antenna that focuses radio waves and range more
in one direction than others. Directional antennae are commonly found in wireless
MANs and wireless WAN systems. The directivity of the antenna increases range
in one direction and decreases range in other directions.
encryption The scrambling of data bits according to a key prior to sending the
data over a network. WEP and WPA are examples of encryption that wireless
LAN utilize.
Ethernet A name that depicts 802.3 wired LANs. Ethernet is a common type of
network that companies use to interconnect PCs and servers. Ethernet provides
the distribution system of most wireless LANs.
firewall A device that keeps users connecting to a specific part of the network
from accessing important resources. Because of their vulnerability, access points
of wireless LANs are often placed outside the firewall.
frequency The number of times per second that a signal repeats itself. Often
measured in Hertz (Hz), which is the number of cycles occurring each second.
Frequencies of wireless LANs, for example, are within the 2.4-GHz and 5-GHz
bands.
GPS (global positioning system) A system that enables people having a GPS
client device to easily determine their geographical position. GPS offers the basis
of an excellent navigation system, as well as location-based services over wireless
networks.
medium access control (MAC) layer 219
hacker A person who has the desire and ability to steal information that resides
on a network. Hackers often try breaking into corporate systems for fun and to
exploit the vulnerabilities of wireless networks.
hotspot The location of a public wireless LAN. Hotspots are found within areas
where people congregate with computer devices including airports, hotels, con¬
vention centers, and coffee shops.
IPSec (IP Security) A protocol that supports secure exchange of packets at the
network layer of a network. IPSec is commonly implemented in VPNs and
encrypts data packets across the entire network; often referred to as end-to-end
encryption.
location-based services The ability to track the location of users and deliver
information to them that relates to position within a particular area.
modulation Modulation creates a radio or light signal from the network data so
that it is suitable for propagation through the air medium. Examples of modula¬
tion types are FSK, PSK, and QAM.
optical fiber A long piece of small-diameter glass with a covering that carries
light signals. An optical fiber cable has a protective coating, making it difficult to
distinguish from copper-based cables.
PDA (personal digital assistant) A small device that people use to store con¬
tact information, schedules, and to-do lists. Some PDAs run software programs,
such as e-mail clients and web browsers.
PSK (phase shift keying) A modulation process that makes slight changes to
the phase of the carrier signal in order to represent information in a way that’s
suitable for propagation through the air.
repeater A device that receives and retransmits signals for the sole purpose of
extending range.
rogue access point An access point that is unauthorized and has configuration
settings that might enable someone to gain access to network resources.
satellite A signal repeater located in orbit around the Earth. Satellites offer
wireless WAN coverage using radio signals.
spread spectrum The spreading of the carrier signal over a wider part of the
frequency spectrum. Direct sequence and frequency hopping are two types of
spread spectrum.
TDMA (time division multiple access) A process that allows only one user to
transmit in any given time slot. Each user has use of the entire bandwidth during
its assigned time slot.
terminal emulation A mechanism for users to interface over a network to
applications running on a centralized computer. VT-220, 3270, and 5250 are types
of terminal emulation.
transceiver A device that both transmits and receives information. The trans¬
ceiver resides in a radio NIC.
VPN (virtual private network) The use of special software on the client
device that controls access to remote applications and secures the connection from
end to end using encryption.
WEP (Wired Equivalent Privacy) A part of the 802.11 standard that defines
encryption between devices connected to a wireless LAN.
Wi-Fi A brand name given to wireless LANs that comply with standards as
defined and published by the Wi-Li Alliance. Wi-Li standards are based on the
802.11 standard.
Wi-Fi Protected Access (WPA) A security protocol, defined by the Wi-Fi Alli¬
ance, that enables computer devices to periodically obtain a new encryption key.
WPA version 1 implements Temporal Key Integrity Protocol (TKIP) and WEP;
whereas, WPA version 2 implements the full 802.1 li standard (which includes
AES).
wireless LAN A network that satisfies wireless networking needs within the
area of a building or college campus. 802.11 and Wi-Fi are popular standards
defining wireless LANs.
wireless MAN A network that satisfies wireless networking needs within the
area of a city. Wireless MANs make use of 802.16 and proprietary standards.
wireless PAN A network that satisfies wireless networking needs within a small
room or reach of a person. Bluetooth and 802.15 are popular technologies for
wireless PANs.
WISP (wireless Internet service provider) 223
wireless WAN A network that satisfies wireless networking needs over a large
geographical area, such as a country or continent. Satellites offer a means for
extending radio signals over a wireless WAN.
F (FDMA), 165
frequency hopping spread spectrum
FDMA (frequency division multiple (FHSS) physical layers, 124
access), 165 FSK (frequency shift-keying), 81
FHSS (frequency hopping spread full-duplex lines, 64
spectrum) physical layers, 124
field services, wireless WANs,
application of, 20-21
filters, MAC filters, 187
firewalls, 173 G-H
personal firewalls, implementing, 198 gateways, 39
updating, 196
users, placing outside of, 195 hackers, 171
first generation cellular (1G cellular), half-duplex lines, 64
wireless WANs, 158 health care industry, wireless LANs,
flow of information, wireless networks, application of, 17
57 help desks, management systems, 49
air medium, 59-64 Hertz, 57
connections, 65-66 highly directional antennas, wireless
data signal transference, 65 MANs, 141-142
end points, 57-58 HiperLAN/2 (High Performance Radio
form factors, NICs (network interface LAN), wireless LANs, 131-133
cards), 35-37
interference 229
hotspots, public wireless LANs, 114 air medium, interfacing with, 59-64
connections, 65-66
data signals, transferring, 65
end points, 57-58
I information signals, 54
analog signals, 56-57
IEEE 802.11 standard digital signals, 54-56
authentication, 185-186 Infrared Data Association (IrDA). See
wireless LANs, 9, 118-120 IrDA (Infrared Data Association)
association, 122 infrastructure, wireless networks, 31
authentication, 121-122 infrastructures, 38-48
fragmentation, 123 access controllers, 40-42
MAC layer, 118-124 application connectivity software,
physical layers, 124-129 42-45
power save mode, 123 base stations, 38-42
RTS/CTS, 122 distribution systems, 46-^48
scanning, 120 inputting information, 58
WEP, 122 intelligent restarts, middleware, 45
wireless MANs, 145 interactivity (SMS), 160
IEEE 802.15 standard, wireless PANs, interfacing with air medium, 59-64
7, 95 interference
IEEE 802.16, wireless MANs, 146-147 Bluetooth, minimizing, 98-101
IEEE 802.1x, authentication, 188-190 light signals, 79
impairments RF signals, 73-74
230 Internet connections, wireless PAN home and small office systems
IV1
MAC filters, authentication, 187
MAC Layer (IEEE 802.11), wireless
L LANs, 118-124
LDAP (Lightweight Directory Access maintenance, management systems, 51
Protocol), 42 management systems, 48-51
light signals, 69, 76 configuration management, 49
attributes, 76-77 engineering, 51
benefits, 78 help desk, 49
detriments, 78 maintenance, 51
impairments, 78 network monitoring, 50
attenuation, 79 reporting, 50
interference, 79 security, 48
modulation, 80-83 man-in-the-middle attacks, 174- 176
FSK (frequency shift-keying), 81 medium access, 59
OFDM (Orthogonal Frequency CSMA/CA (carrier sense multiple
Division Multiplexing), 85 access with collision avoidance)
PSK (phase shift-keying), 82 protocol, 118
penetration tests, performing 231
updating, 196
improvements, recommending, 194 radio frequency (RF) signals. See RF
antennas, 69
transmitters, 69
v-z
vending companies, wireless WANs,
wireless PANs, 6
application of, 21
transferring signals, 65
voice over wireless, 16
Transmission Control Protocol (TCP),
VPNs (virtual private networks), 185
53
WEP (Wired Equivalent Privacy), 178,
transmissions, air medium, 31
181-183
transmitters, wireless transceivers, 69
TKIP (Temporal Key Integrity Pro¬
transport layer (Layer 4), OSI
tocol), 183-184
Reference Model, 53
wireless LANs, 122
wide-area networks (WANs). See
wireless WANs (wide-area networks)
Wi-Fi (Wireless Fidelity)
U wireless LANs, 9,130-131
UMTSs (Universal Mobile Telecommu¬ wireless MANs, 145
nications Systems), 159 Wi-Fi Alliance, 130
unauthorized access threats, 171- 174 Wi-Fi Protected Access (WPA), 130
universities, wireless LANs, application Wired Equivalent Privacy (WEP). See
of, 18 WEP (Wired Equivalent Privacy)
USB adapters, wireless PANs, 90-91 wireless devices, configurations,
user devices verifying, 192-193
wireless LANs, 105 wireless DMZs (demilitarized zones),
wireless PANs, 89-90 195
wireless WANs, 152 Wireless Fidelity (Wi-Fi). See Wi-Fi
antennas, 155-156 (Wireless Fidelity)
base stations, 154-155 wireless LANs (local-area networks), 5,
multiple technology support, 167 7-8,105
printing, 93-94
access), 165
location-based services, 23
utility companies, 20
vending companies, 21
Cisco Systems
Cisco Press
Your first-step to
networking starts here
Are you new to the world of networking? Whether you are beginning your
networking career or simply need a better understanding of technology to gain
more meaningful discussions with networking experts, Cisco Press First-Step
books are right for you.
Check out each of these First-Step books that cover key networking topics:
MR
ffirst-sstep
gyps: 8
lift
1— •—.'
Tom Thomas
Cisco Systems
Copyright © 2004 Cisco Systems, Inc. All rights reserved. Cisco Systems is a registered trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries
Cisco Systems
Cisco Press
SAVE UP TO 25%
Become a member and save at ciscopress.com!
The profile information we collect is used in aggregate to provide us with better insight into your technology
interests and to create a better user experience for you. You must be logged into ciscopress.com to receive
your discount. Discount is on Cisco Press products only; shipping and handling are not included.
CISCOS Cisco Press CCNA INTRO Exam CertiffcaHanGtdde - Microsoft Internet Pnpfcfw; -lOi xj
Home Products Author CffapwH* Promotions Cstfitteaito'n
fie Etft View FavorRas Tools ttslp mm
mm
Books Artistes info -r-Batk - J il 3 JjFawrtei ^Mo&s J -Jj’ J
: krty Safari MyBoofcafrett My Downloads My Account Login
Address • http //safen.ciscopress cor 1-58720-094-5&open=fdlse&g=&s.chText=BOOk+^w] Uoks
r:~..
:
BhoSwtws
Safari BooKsheif — E-reference library for programmers and IT profession:
Nmn ciscopress.com
TSws
r C-i-JX : :<*>• Unlike an online bookstore, Safari Bookshelf Is a fully-searchable virtual library that hour
Advance# Sframh collection of technical books from industry-leading publishers. Home Products Authors Copters* Promotions Certification
HSggeaiiii P' Search across the full text of thousands of the best technical books available toda
Home My Safari
Books
My Bookshelf
Articles
;
info
Mv Account login ;
•Vtew Afi.TMas
■At Appliisci Sconces $• Read books cover to cover online, or flip directly to the answer or code sample yoi
*}. Assign*
A$N«r: Sss ;$h f¥ By Wandf;!! Odom CG1E No 16 24
JK5SBU
*■ DesflOP p.^r-lisi-sn-:) *' Tam o? C*nt»M»
Publisher . Cisco Press
*i E-Comflieroe
Pub Date August 08, 2003
.t; Enterprise CompUina
'Mg.
1 wm CCNA iMTRO Exam
Certification Guide Table of
ISBN 1 -58720-094-5
Pages 648
.teHafthwaye Cortard;?
Microsoft Press Cisco Press <
s*j rHuKierfe-Ccaaiiat intefactfoo 1 lr-dsx
.t: ff Mdataftmerit
ii -About me Atunc-r
The official self-study test preparation guide for the Cisco CCNA INTRO exam
& Lsiyaugoes save time in the search for inform8hor 640-821
■M Mojumetta books have indexes, but the mdex to one be &
jfereal
' £5 Ackrtow-eduments
This best-selling study guide helps you master all the topics on the new CCNA
tone
£3 Icon? Used in Irks Book INTRO exam, including
*■ Command Syntax Conventions
aBStartj S - Ifhbox - Microsoft; Outlook o Pres* - Microsoft... oncp-Pamt • TCP/IP and OSI networking models
3b Notwortcna Fundamentals
*i OofefgtaKi Cisco Devices
• Operating Cisco routers and LAN switches
-—---—J -J'
w
Bstaft; : ;'j3 # 72 iy:; : ;:Slnbiik-Mitioi8ftOu...|itllci»c<iPra.»-CCH., .jSa<*n«hot»I y|untjtl«l-Pant 1 -i
■ Search the full text of thousands of technical books, including more than 70 Cisco Press
titles from authors such as Wendell Odom, Jeff Doyle, Bill Parkhurst, Sam Halabi, and
Karl Solie.
■ Read the books on My Bookshelf from cover to cover, or just flip to the information
you need.
With a customized library, you'll have access to your books when and where you need
them—and all you need is a user name and password.
Cisco Press
ROI and TCO metrics that assist with complex technology decisions
Interviews with industry leaders that provide real-world insights on technology decisions
Visit www.ciscopress.com/series for details about the Network Business series and a complete list
of titles.
Cisco Systems
Cisco Press
3 STEPS TO LEARNING
STEP 1 STEP 2 STEP 3
first-stem
Vftor fS****#^ mt<* th«
WHBaro Parkhurst
/ .
'
3S
' .
■ IgS
i-:: V:.
k .i
...
If you’re using :V‘- -i'vWj
Cisco products,
YOU RE QUALIFIED
TO RECEIVE A
FREE SUBSCRIPTION O CD
c/5 C/5 O
CD
~ H
O Q)
O
C/5 o
_ 3
<
to Cisco’s CD
X! 05
CD
-> Z5
jO "
Q)
^4 =:
[PREMIER PUBLICATION. O C/5
o
V
CD
c_
00
Packet“ magazine. ho
I
□ Mr.
□ Ms.
Title/Position (Required)
Address
publication linking customers to Cisco Systems,
6. Your personal involvement in networking: resource. I look forward to hearing from you!
A □ Entire enterprise at all sites F □ Public network
B □ Departments or network segments at more than one site D □ No involvement
C □ Single department or network segment E □ Other (specify): Cecelia Glover
Packet Circulation Manager
7. Your Industry: [email protected]
A □ Aerospace G □ Education (K—12) K □ Health Care
www.cisco.com/go/packet
B □ Agriculture/Mining/Construction U □ Education (College/Univ.) L □ Telecommunications
C □ Banking/Finance H □ Government—Federal M □ Utilities/Transportation
D □ Chemical/Pharmaceutical I □ Government—State N □ Other (specify):
E □ Consultant J □ Government—Local
F □ Computer/Systems/Electronics
CPRESS
*
Cisco Systems
Wireless Networks
first-step
Your first step to wireless begins here!
>- Learn how wireless networks send and receive
information
> Discover key radio frequency (RF) and light
signal concepts
>■ Become familiar with basic wireless network
terminology
> Realize crucial techniques for securing wireless
networks