1 / 68

WIRELESS LAN & PDA

WIRELESS LAN & PDA. CIS 454 (LAN) Prof. Ganesan. Group members & outline. Belinda Wireless LAN Anthony Vu Topology & wireless technology of LAN Ka Yan (Susana) Chung Implementation of wireless LAN Norman-Ngan Vu Lam Personal Digital Assistant (PDA). WIRELESS LAN.

kiele
Télécharger la présentation

WIRELESS LAN & PDA

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WIRELESS LAN & PDA CIS 454 (LAN) Prof. Ganesan

  2. Group members & outline • Belinda • Wireless LAN • Anthony Vu • Topology & wireless technology of LAN • Ka Yan (Susana) Chung • Implementation of wireless LAN • Norman-Ngan Vu Lam • Personal Digital Assistant (PDA)

  3. WIRELESS LAN WIRLESS LOCAL AREA NETWORK

  4. INTRODUCTION • It is a flexible data communications system implemented as an extension to, or as an alternative for, a wired LAN. • Using radio frequency (RF) technology, wireless LANs transmit and receive data over the air, minimizing the need for wired connections. • With wireless LANs, users can access shared information without looking for a place to plug in, and network managers can set up or augment network without installing or moving wires.

  5. WHY WIRELESS? Wireless LANs offer the following Productivity, convenience, and cost advantages over traditional wired networks: • MOBILITY • INSTALLATION SPEED AND SIMPLICITY. • INSTALLATION FLEXIBILITY. • REDUCED COST-OF-OWNERSHIP. • SCALABILITY.

  6. MOBILITY Wireless LAN systems can provide LAN users with access to real-time information anywhere at work and in the home.

  7. INSTALLATION SPEED AND SIMPLICITY Installing a wireless LAN system can be fast and easy and can eliminate the need to pull cable through walls and ceilings.

  8. INSTALLATION FLEXIBLITY Wireless technology allows the network to go where wire cannot go.

  9. REDUCED COST-OF-OWNERSHIP While the initial investment required for wireless LAN hardware can be higher than the cost of wired LAN hardware, overall installation expenses and life-cycle costs can be significantly lower. Long-term cost and benefits are greatest in dynamic environments requiring frequent moves and changes.

  10. SCALABILITY Wireless LAN systems can be configured in a variety of topologies to meet the needs of specific applications and installations. Configurations are easily changed and range from peer-to-peer networks suitable for a small number of users to full infrastructure networks for thousands of users that enable roaming over a broad area.

  11. OVERVIEW BY INDUSTRY • Currently wireless LAN is not a replacement for the wired infrastructure, but it is a significant complement to what currently exists. Some examples in the industry are: • EDUCATION. • MANFACTURING COMPANIES. • HEALTHCARE. • RETAIL. • FINANCIAL/OFFICE-AUTOMATION.

  12. MAJOR FINDINGS IN THE INDUSTRIES • 89% Of the companies experienced a successful implementation. • 92% of respondents interviewed believe there is a definite economic and business benefit after installation. • 92% of respondents reported that they will continue to deploy wireless technology in their network through 2000 because of the benefits experienced by end users and/or IT staff. • Payback was less than one year, across all industries surveyed.

  13. RETAIL MANUFA-CTURING HEALTH- CARE OFFICE AUTOM- ATION EDUCA- TION Benefits per Company (millions $) 5.6 2.2 .94 2.5 .5 Costs per Company (millions $) 4.2 1.3 .90 1.3 .3 Payback (#of months) 9.7 7.2 11.4 6.3 7.1 Cost Chart

  14. Wireless Topology • Topologies are architectural drawings representing the cable layout for the wireless LAN. • Topologies of a network are the physical configuration of the nodes in the network. • They can be hardware dependent.

  15. Topologies

  16. Star Topology (Centralized) • Star topology is probably the oldest topology used for data communication.

  17. Star Topology (cont) • Computers are connected through a series of point-to-point dedicated circuits. • Each computer is linked by a separate full-duplex point-to-point through the central computer. • It is easy to set up.

  18. Bus Topology • Star topology is sometimes known as the linear-bus topology. • All terminals share a single cable to transmit and receive messages. • There are endpoints to cable segment commonly known as terminating points.

  19. Physical Bus Topology

  20. Ring Topology • In the ring topology, all computers are connected in a close loop. • Each computer links to the next one. • There is no endpoints to this cable topology. • Messages can travel around the ring in one direction.

  21. Physical Ring Topology

  22. Speed and Distance • Transmission speed worsens problems • Error rates increase because bit periods are smaller and are more likely to be damaged by brief noise spikes and interference. • High speeds create high-frequency components in the signal that attenuate more rapidly than lower-frequency components. • In general, as speed increases, maximum distance decreases, although improving technology can lessen the decrease.

  23. Applications According to Electromagnetic Spectrum

  24. How cellular phone works ? (cont.) • This process takes the same amount of time that it takes to make a call from a landline phone.

  25. Solid Objects

  26. Between Office Buildings

  27. How Does Satellite Work? • Communication • Frequency • Uplink & downlink

  28. Between Ground Unit and Satellite

  29. Attenuation • As signal travels, gets weaker • If too weak, cannot tell 1s and 0s Distance

  30. Distortion • As signal travels, it become distorted • Changes shape • Successive bits may merge, making reception difficult Distance

  31. Noise • Unwanted energy on line. Always present • Noise floor is average level • Noise spikes will cause problems Signal Signal Strength Spike Noise Noise Floor Time

  32. Approaching the Noise Floor • Attenuation will bring signal ever closer to the noise floor, creating more errors Signal Strength Signal Noise Floor Distance

  33. Interference • Unwanted signal from outside sources • Often intermittent, difficult to diagnose Signal Signal Strength Interference

  34. Implementation of Wireless LAN by Susana

  35. Wired Vs. Wireless LAN. • Wired LAN transmit data in cables such as twisted pair, coaxial, and fiber optic cable. • Wireless LAN transmit data in air, it use infrared (IR) or radio frequency (RF) to transmit data on air.

  36. Radio Frequency (RF) • Microwave transmission - high frequency, narrow band radio waves that require special license. • Spread spectrum - spread signal over a range of frequency, therefore, harder to intercept • RF electromagnetic wave can easily pass through ordinary wall, it needs to implement with heavy concrete or metal screening.

  37. Indoor infrared is the most secure wireless LAN, it’s the easiest types of wireless signal to contain with a certain location. Also, no license needed. Use to connect nodes over small distance. Infrared (IR) • Point-to-point infrared must be within sight of each other with no obstacles in the path of signal. • Signal would be weaken by moist environment, dusty environment, person in signal path, and sheet of plastic.

  38. Wireless LAN Hardware Implementation • A wireless NIC - connect nodes to transmission medium. Allow communication between node and network. Consist of on board transceiver, & fix/external antenna. • For PC, wireless NIC are either PCI/ISA, for laptop, it uses PCMCIA type II card. • Installs driver to configure NIC. • Another option of wireless LAN implementation is “wireless LAN adapter” - external desktop transceiver and antenna connect to PC through parallel port and it function like a NIC.

  39. Wire Replacement System • It use wireless transmission instead of cabling to communicate with backbone. • Make use of existing Ethernet . • Use device called “user modules and control modules.” • User module is a desktop transceiver and antenna can be shared with up to 8 nodes with Ethernet cards that are individually wired to the user module. • Control modules are similar to AP, it allow communication with wired backbone through control modules.

  40. Data-link Layer • Data-link layer of the OSI model governs a node’s access to a shared medium. • Logical link control (LLC) layer deal with communication between nodes over a single link of network. • Media access control (MAC) layer which define how user obtain access to the shared medium when they need it. “OSI 7 layers”

  41. Different Types of MAC • Random Access MAC • Ordered MAC • Deterministic MAC

  42. Random Access MAC • Simple to implement • Offer fast response time under light network traffic • Offer effective throughput under heavy traffic • Wired network use CSMA/CD protocol to ensure data transmit efficiently (it checks if line is free, then transmits and listen if there’s collision, if collision, it stops and waits for re-send) • Wireless NICs can’t transmit and receive on the same frequency at the same time, therefore, it can’t detect collisions.

  43. Random Access MAC (continue) • Wireless NIC might not aware of all other node on network - known as “hidden node” (a node outside of coverage area) Wireless network use CSMA/CA - Carrier sense multiply access with collision avoidance. Also known as LBT - Listen before you talk. (Check if line I free, if yes, send and wait for acknowledgment for receiving node, if no acknowledgement receive within set period of time, it assume a collision occur and wait to re-send) • CSMA/CA can’t be use when there’s hidden node • CSMA/CA cam be adapted to use with hidden node with the use of RTS/CTS/ACK - request to send/clear to send/acknowledge.

  44. Ordered MAC • Ordered MAC is unsuitable for wireless LAN because it is possible for a node to leave the bus or ring and break the orders

  45. Deterministic MAC (3 types) 1) Time division multiple access (TDMA) - each node given the same set amount of time to transmit data. -Another type of TDMA is reservation/polling MAC - node sends request to control point to request channel, channels are issue on a “first come first serve” base. 2) Frequency division multiple access (FDMA) - available bandwidth is divide into channels of different frequency and nodes allocate a particular frequency. 3) Code division multiple access (CDMA) - nodes share same channel bandwidth but use different spreading code to prevent interference.

  46. Deterministic MAC (continue) • Deterministic MAC provide effective throughout and response time when network traffic is heavy. • Each node must request access from control point before transmitting, therefore, deterministic MAC have slower response time than Random Access MACs in light traffic conditions.

  47. CSMA/TDMA • Combination of random-access MAC and deterministic MAC technique is called CSMA/TDMA. It offers fast response time in light traffic; effective throughout under heavy, but more complexes to administer on the network • CSMA/CA, RTS/CTS/ACK and CSMA/TDMS are suitable for wireless networks.

  48. Access Point (AP) Access Point are consists of 1) A wired NIC to communicate with wired backbone 2) A transceiver and antenna to communicate with wireless node within range 3) MAC-layer bridging software. • AP can be use to extend the range of a wireless network or connect an existing wired LAN to a wireless LAN. • Wireless subnets are connected to a wired backbone through AP. • AP bridging ensure only packet destined for wireless nodes within its service are forwarded to the wireless subnet.

  49. Bridging • Bridging - device that filters traffic between different section of the same network, of different LAN • It acts like a repeater, & sends data to both wired and wireless network. 1) Bridging software processes data and analyzes address info on packet. 2) It construct a table indicate location of each node. 3) Each time it receives packet, it checks if destination address is in table 4) If address to wired LAN, it checks if on table, if yes, only forward to wired LAN, if not, it forward to both wired and wireless.

  50. Bridging (continue) • There are 2 ways to create table 1) Source route algorithm - entire path of the package is included in each frame and bridge record information, most of the routing work is performed by nodes. 2) Spanning tree algorithm - used by most network, bridge notes the direction from which it receives each packet and concludes source node can be reach by sending packet in that direction and record it in table. It regularly exchange configuration message with other bridge, if one fails, network can adjust routing accordingly. • Bridge-to-bridge protocol ensures each network section can only access through a designated bridge. • Table is not permanent. For wired LAN, entries “age out” in hours; in wireless LAN, entries “age out” in minutes.

More Related