Cwna
Cwna
Cwna
EV
IE
Trademarks
ILT Series is a trademark of Axzo Press.
ALL RIGHTS RESERVED. No part of this work may be reproduced, transcribed, or used in any form or by any
meansgraphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution, or
information storage and retrieval systemswithout the prior written permission of the publisher.
Some of the product names and company names used in this book have been used for identification purposes only and
may be trademarks or registered trademarks of their respective manufacturers and sellers.
Disclaimer
PR
EV
IE
We reserve the right to revise this publication and make changes from time to time in its content
without notice.
Introduction
Topic A:
Topic B:
Topic C:
Topic D:
Contents
v
1-1
IE
2-1
EV
3-1
4-1
5-1
PR
6-1
7-1
ii
8-1
9-1
IE
10-1
11-1
EV
12-1
A-1
B-1
PR
C-1
D-1
E-1
IEEE committees
F-1
Course summary
S-1
iii
G-1
Index
I-1
PR
EV
IE
Glossary
PR
EV
IE
iv
Introduction
IE
general.
EV
PR
course.
vi
Our goal at Course Technology is to make you, the instructor, as successful as possible.
To that end, our manuals facilitate students learning by providing structured interaction
with the software itself. While we provide text to help you explain difficult concepts,
the hands-on activities are the focus of our courses. Leading the students through these
activities will teach the skills and concepts effectively.
IE
We believe strongly in the instructor-led class. For many students, having a thinking,
feeling instructor in front of them will always be the most comfortable way to learn.
Because the students focus should be on you, our manuals are designed and written to
facilitate your interaction with the students, and not to call attention to manuals
themselves.
We believe in the basic approach of setting expectations, then teaching, and providing
summary and review afterwards. For this reason, lessons begin with objectives and end
with summaries. We also provide overall course objectives and a course summary to
provide both an introduction to and closure on the entire course.
Our goal is your success. We encourage your feedback in helping us to continually
improve our manuals to meet your needs.
EV
Manual components
Appendices
Course summary
Glossary
Index
PR
Table of contents
The table of contents acts as a learning roadmap for you and the students.
Introduction
The introduction contains information about our training philosophy and our manual
components, features, and conventions. It contains target student, prerequisite,
objective, and setup information for the specific course. Finally, the introduction
contains support information.
Introduction
vii
Units
Units are the largest structural component of the actual course content. A unit begins
with a title page that lists objectives for each major subdivision, or topic, within the unit.
Within each topic, conceptual and explanatory information alternates with hands-on
activities. Units conclude with a summary comprising one paragraph for each topic, and
an independent practice activity that gives students an opportunity to practice the skills
theyve learned.
The conceptual information takes the form of text paragraphs, exhibits, lists, and tables.
The activities are structured in two columns, one telling students what to do, the other
providing explanations, descriptions, and graphics. Throughout a unit, instructor notes
are found in the left margin.
Appendices
IE
EV
This section provides a text summary of the entire course. It is useful for providing
closure at the end of the course. The course summary also indicates the next course in
this series, if there is one, and lists additional resources students might find useful as
they continue to learn about the software.
Glossary
The glossary provides definitions for all of the key terms used in this course.
Index
PR
The index at the end of this manual makes it easy for you and your students to find
information about a particular software component, feature, or concept.
viii
Manual conventions
Item
Description
Italic text
Bold text
Code font
IE
Instructor note/icon
Weve tried to keep the number of elements and the types of formatting to a minimum
in the manuals. We think this aids in clarity and makes the manuals more classically
elegant looking. But there are some conventions and icons you should know about.
Longer strings of
code will look
like this.
Instructor notes.
EV
Keycaps like e
Warning icon.
Tip icon.
PR
Setup icon.
Projector icon.
Introduction
ix
Hands-on activities
Do it!
A-1:
Heres how
1 Open Sales
Heres why
IE
The hands-on activities are the most important parts of our manuals. They are divided
into two primary columns. The Heres how column gives short directions to the
students. The Heres why column provides explanations, graphics, and clarifications.
To the left, instructor notes provide tips, warnings, setups, and other information for the
instructor only. Heres a sample:
EV
For these activities, we have provided a collection of data files designed to help students
learn each skill in a real-world business context. As students work through the activities,
they will modify and update these files. Of course, students might make a mistake and
therefore want to re-key the activity starting from scratch. To make it easy to start over,
students will rename each data file at the end of the first activity in which the file is
modified. Our convention for renaming files is to add the word My to the beginning
of the file name. In the above activity, for example, students are using a file called
Sales for the first time. At the end of this activity, they would save the file as My
sales, thus leaving the Sales file unchanged. If students make mistakes, they can start
over using the original Sales file.
PR
In some activities, however, it might not be practical to rename the data file. Such
exceptions are indicated with an instructor note. If students want to retry one of these
activities, you will need to provide a fresh copy of the original data file.
PowerPoint presentations
Each unit in this course has an accompanying PowerPoint presentation. These slide
shows are designed to support your classroom instruction while providing students with
a visual focus. Each presentation begins with a list of unit objectives and ends with a
unit summary slide. We strongly recommend that you run these presentations from the
instructors station as you teach this course. A copy of PowerPoint Viewer is included,
so it is not necessary to have PowerPoint installed on your computer.
The CD also contains a PowerPoint add-in that enables you to do two things:
Create slide notes for the class
Display a control panel for the Flash movies embedded in the presentations
EV
IE
After you complete this procedure, a new toolbar will be available at the top of the
PowerPoint window. This toolbar contains a single button labeled Create SlideNotes.
Click this button to generate slide-notes files in both text (.txt) and Excel (.xls) format.
By default, these files will be saved to the folder that contains the presentation. If the
PowerPoint file is on a CD-ROM or in some other location to which the slide-notes files
cannot be saved, you will be prompted to save the presentation to your hard drive and
try again.
PR
When you run a presentation and come to a slide that contains a Flash movie, you will
see a small control panel in the lower-left corner of the screen. You can use this panel to
start, stop, and rewind the movie, or to play it again.
Introduction
xi
Properly setting students expectations is essential to your success. This topic will help
you do that by providing:
Prerequisites for this course
A description of the target student
Course prerequisites
IE
Students taking this course should be familiar with personal computers and the use of a
keyboard and a mouse. Furthermore, this course assumes that students have basic
knowledge of computer networks.
Target student
This book is intended to meet the needs of students and professionals who want to
master wireless local area networks. It is also designed to prepare students for the
Certified Wireless Network Administrator (CWNA) exam.
EV
Course objectives
You should share these overall course objectives with your students at the beginning of
the day. This will give the students an idea about what to expect, and it will help you
identify students who might be misplaced. Students are considered misplaced when they
lack the prerequisite knowledge or when they already know most of the subject matter
to be covered.
Note: In addition to the general objectives listed below, specific CWNA exam
objectives are listed at the beginning of each topic. For a complete mapping of exam
objectives to course content, see Appendix A.
After completing this course, students will know how to:
PR
xii
PR
EV
IE
Identify the wired network connection between a wireless network and a wired
network, and troubleshoot and solve problems with WLANs.
Identify types of wireless networks besides LANs, and identify trends in the
future of wireless networks.
xiii
Introduction
Skills inventory
Use the following form to gauge students skill levels entering the class (students have
copies in the introductions of their student manuals). For each skill listed, have students
rate their familiarity from 1 to 5, with five being the most familiar. Emphasize that this
is not a test. Rather, it is intended to provide students with an idea of where theyre
starting from at the beginning of class. If a student is wholly unfamiliar with all the
skills, he or she might not be ready for the class. A student who seems to understand all
of the skills, on the other hand, might need to move on to the next course in the series.
Skill
IE
EV
PR
xiv
IE
EV
Maintaining a WLAN.
PR
Introduction
xv
All our courses assume that each student has a personal computer to use during the
class. Our hands-on approach to learning requires they do. This topic gives information
on how to set up the classroom to teach this course. It includes minimum requirements
for the students personal computers, setup information for the first time you teach the
class, and setup information for each time that you teach after the first time you set up
the classroom.
Hardware requirements
IE
Cisco Aironet 1100 or 1200 series access point with an 802.11b, a, or g radio
installed
Linksys G Wireless-G router
EV
Software requirements
PR
xvi
Network requirements
The following network components and connectivity are also required for this course:
EV
IE
The first time you teach this course, you will need to perform the following steps to set
up each student computer.
1 Install Windows XP on an NTFS partition according to the software
manufacturers instructions. If the student machines have Internet access, and
they are behind a software or hardware firewall, install the latest critical updates
and service packs from www.windowsupdate.com.
2 If necessary, create Internet accounts for the students for Web access.
3 If you dont have the data CD that came with this manual, download the Student
Data files for the course. You can download the data directly to student
machines, to a central location on your network, or to a disk.
a Connect to www.courseilt.com/instructor_tools.html.
b Click the link for Networking to display a page of course listings, and then
click the link for CWNA: Wireless LAN Administration.
c Click the link for downloading the Student Data files, and follow the
instructions that appear on your screen.
Every time you teach this course (including the first time), you will need to perform the
following steps to set up each student computer.
1 If necessary, reset any defaults that have been changed in previous classes.
Refer to the appendix titled Setup options for Cisco Aironet access points
for information on resetting the Cisco AP.
PR
Introduction
xvii
PR
EV
IE
xviii
Topic D: Support
Phone support
Your success is our primary concern. If you need help setting up this class or teaching a
particular unit, topic, or activity, please dont hesitate to get in touch with us. Please
have the name of the course available when you call, and be as specific as possible
about the kind of help you need.
You can call for support 24 hours a day at (888) 672-7500. If you do not connect to a
live operator, you can leave a message, and we pledge to return your call within 24
hours (except on Saturday and Sunday).
IE
Web-based support
PR
EV
The Course ILT Web site provides several instructors tools for each course, including
course outlines and answers to frequently asked questions. To download these files, go
to www.courseilt.com/instructor_tools.html. For additional Course ILT resources,
including our online catalog and contact information, go to http://www.course.com/ilt.
Unit 1
The wireless world
11
IE
everyday life.
technologies.
PR
EV
wireless technologies.
12
Objective
4.1.1
Educational/classroom use
Building-to-building connectivitybridging
IE
Sometimes its easy to overlook the extent to which wireless devices are used today. A
day in the life of a typical user, Amanda Lomax, can reveal just how widespread the use
of wireless technology has become.
At home
EV
Amanda heads back to her house after an early morning workout at the gym. As a
pharmaceutical sales representative, she has a busy day ahead. She grabs her laptop
computer to check her e-mail while she drinks her coffee on the deck. Amandas home
laptop computer is connected to the other computers in the house and even to the
Internet through a wireless local area network (WLAN).
PR
A WLAN is essentially identical to a standard local area network (LAN) except that in a
WLAN, the devices are not connected by wires. With a WLAN, Amanda can access the
Internet and her home network from any room in her house without any cables between
her computer and the Internet connection. She can even use her laptop computer on the
back deck or in the yard. This flexibility makes Amanda more productive because she
can take her work with her. Last week while a repairperson was replacing a window in
her study, she was able to participate in a videoconference session while sitting at the
kitchen table. Without a WLAN, Amanda would have been forced to cancel the session.
As she finishes her coffee, Amanda hears the front doorbell ring. Because she and her
husband have installed a tiny wireless camera over each door, she can open a Web
browser and see whos at the door.
Note: The American Airlines Center in Dallas, an indoor arena, provides its security
personnel with wireless handheld devices. As the security guards move around the
arena, they can access any of the 180 WLAN security cameras that cover more than 1
million square feet of the facility.
13
In the car
As Amanda drives to her office, she needs to make a quick phone call to confirm her
morning appointment. Amandas car is equipped with hands-free cellular calling based
on the Bluetooth wireless standard. Amanda first turns on her Bluetooth-enabled cell
phone to pair it with the Bluetooth device in the car. She can then control the phone with
buttons on her steering wheel. Amanda presses the Talk button on the steering wheel
and says aloud the name of the person shes calling. Her cell phone dials the number
that is stored in the cars phone book. The dialing and caller information, as well as
signal and battery strength indicators, appears on her cars instrument panel. Once the
person answers the call, Amanda can talk hands-free. The Bluetooth system also works
with the cars navigation system, so Amanda can auto-dial phone numbers associated
with local points of interest, such as hotels and restaurants.
IE
Note: Over 2,000 computer, telephone, and peripheral vendors have agreed to create
products based on the Bluetooth standard.
At the office
Amanda checks in at the main office before calling on her clients. She needs some
information stored on a server at another, smaller office, situated about 25 miles away.
She opens up her wireless laptop at her desk, and when the screen prompts her, she
places her index finger on a small scanner that checks her fingerprint to ensure that she
has the right to access the corporate network. She logs on, finds the information she
needs, and prints it.
EV
The two offices are connected by fixed broadband wireless technology for data
communications. Unlike many wireless technologies that allow for mobility, fixed
wireless refers to wireless transmissions occurring between devices that cannot be
mobiletypically between two or more office buildings that obviously cannot be
moved. A small customized antenna is located on the roof of both the main building and
the smaller office building. Each antenna serves as a relay point between the two
buildings. Because the fixed broadband wireless system is part of the computer network
in each building, users can transparently access data from remote locations by using
their office computers or even portable laptops that are part of the WLAN.
Because of recent growth, Amandas company had to lease temporary office space in a
building across the street from the main office. To connect these two buildings,
Amandas company installed a technology known as free space optics (FSO). FSO is an
alternative to high-speed fiber-optic transmissions.
PR
In the field
Amanda heads out to her first appointment. She parks her car in front of the medical
center, and as she walks toward the front door she pulls her handheld device out of her
purse to see if she received an e-mail message with additional information she requested
earlier that morning. The device connects to the nearest cell tower, which then connects
to the local telephone company and then calls her local Internet provider to complete the
connection to the e-mail server. The e-mail messages are sent back to Amanda and
displayed on her device.
14
Amanda is visiting the medical centers director to discuss a new technology her
pharmaceutical company is implementing. Drugs will now be shipped from the
pharmaceutical warehouse to the medical center in large containers that have radio
frequency identification (RFID) tags affixed to them. RFID has been called an
electronic barcode. Like traditional barcodes, RFID tags are used to identify items.
Unlike barcodes, which must be right next to the scanner and perfectly aligned to be
read, RFID tags can be read if they are anywhere within the range of a transmitted radio
signal, depending on the device.
Do it!
A-1:
IE
Not only will Amandas pharmaceutical company be using RFID tags to identify
shipping containers, but it will also be embedding these tags on the underside of
individual labels on its drug products. In this way, the company hopes to identify
counterfeit drugs and to more precisely keep track of its products as they move through
the supply chain.
Heres how
EV
Heres why
gelon.net/about/wapalizer.html
PR
15
Explanation
IE
PR
EV
The list of equipment needed for a wireless LAN is actually very short. Each computer
on the WLAN must have a wireless network interface card (wireless NIC, also called a
wireless adapter) installed. This card performs the same basic functions as a standard
NIC in that it allows the device to communicate on the network. Yet there are some
differences between a wireless NIC and a wired NIC. Instead of an RJ-45 connection
used to accept a patch cable, a wireless NIC contains an antenna to send and receive the
wireless signals. Also, a wireless NIC performs additional tasks, such as encrypting and
decrypting data. A wireless NIC is shown in Exhibit 1-1.
16
IE
The wireless NIC sends its signals through radio waves to an access point (AP). The
access point acts as a base station to receive the signals and to transmit signals back to
the wireless NICs in the other wireless devices. An access point is shown in Exhibit 1-2.
PR
EV
A patch cable connects the access point to a wired LAN or to the Internet. Through this
wired connection, the access point and the wireless devices associated with it can
communicate with the devices connected to the wired network, such as servers, printers,
and even other access points and the wireless devices connected to them. The access
point is fixed in one place (although it can be moved when necessary). The devices with
wireless NICs can move around while remaining connected. A WLAN is illustrated in
Exhibit 1-3.
17
Amandas WLAN connects her laptop computer, her husbands desktop computer, and
the laser printer. The WLAN also connects them to the Internet, so Amanda can check
her e-mail from any room in the house. When Amanda and Brian upgrade to the faster
WLAN, they will also wirelessly connect their stereo system and television to the
network.
EV
IE
This will allow them to view pictures stored on their computer on the larger TV screen
and to play MP3 music stored on their computer through the stereo system. Amandas
home WLAN is illustrated in Exhibit 1-4.
PR
18
Bluetooth
IE
Amanda used a Bluetooth cell phone in her car. Bluetooth is a low-power wireless
technology for data and voice transmission. Bluetooth can be used anywhere a small
stream of data needs to flow. Bluetooth devices communicate using small radio
transceivers called radio modules built onto microprocessor chips. Each Bluetooth
device also uses a link manager, which is software that helps identify other Bluetooth
devices, creates the links between the devices, and sends and receives data. A Bluetooth
device can transmit data at up to 1 Mbps over a distance of 10 meters (33 feet).
Bluetooth devices can send data through physical barriers, like walls, and can send data
to one or more devices at the same time. The devices dont even have to be aimed at
each other. Exhibit 1-5 shows a Bluetooth device.
EV
Bluetooth is named after the tenth-century Danish king Harald Bluetooth, who was
responsible for unifying Scandinavia.
When two Bluetooth devices come within range of each other, they automatically make
a connection. One device is called the master, which controls all of the wireless traffic.
The other device is known as a slave, which is controlled by the master. A Bluetooth
network that contains one master and at least one slave forms a piconet.
Bluetooth support is integrated into Microsoft Windows XP Service Pack 2 (SP2).
Telecommunications links
PR
Through the years, Amandas company tried a variety of connections to link its offices.
In the early days, the company used telephone modems, but those were too slow. Next,
expensive transmission lines were leased from the local telephone company. Integrated
Services Digital Networks (ISDN), which transmit at 256 Kbps (kilobit, or thousand
bits, per second), were soon replaced with T-1 lines, which transmit at 1.544 Mbps.
However, these lines had to be leased at a cost of several thousand dollars per month.
Technologies such as cable modems, which use a television cable connection, and
digital subscriber lines (DSL), which use telephone lines, were available only in
residential areas.
19
Amandas company currently uses two main wireless technologies: fixed broadband and
free space optics (FSO).
With fixed broadband, also known as WiMax, the signal is transmitted between
the antennas of the buildings at speeds of up to 75 Mbps and at distances of up
to 53 kilometers (35 miles).
IE
FSO can transmit at speeds of up to 1.25 Gbps (gigabits, or billion bits, per
second) over a distance of 6.4 kilometers (4 miles). Transmissions are sent
through the open air by low-powered infrared beams. These beams, which do
not harm the human eye, are received by transceivers, shown in Exhibit 1-6.
PR
EV
Because FSO is a line-of-sight technology, the transceivers are mounted in the middle
or upper floors of office buildings to provide a clear transmission path. However, unlike
other wireless technologies, such as WiMax, that require the units to be located on an
open roof, FSO transceivers can be mounted behind a window in the offices. Amandas
office wireless technologies are illustrated in Exhibit 1-7.
110
Cellular telephony
IE
Messages sent to Amandas handheld device are based on Global Systems for Mobile
(GSM) communications technology. GSM coverage includes most of the United States
as well as parts of Europe and Japan and provides transmission speeds of up to 9.6
Kbps. The information transmitted is based on the Wireless Application Protocol
(WAP). WAP provides a standard way to transmit, format, and display Internet data for
devices like cell phones and handheld devices. With traditional computers, software
known as a Web browser runs on a local computer to display Internet data. The Web
browser requests a Web page from the World Wide Web file server. That page is
transmitted back to the Web browser in Hypertext Markup Language (HTML), which is
the standard language for displaying content on the Internet. This model is illustrated in
Exhibit 1-8.
EV
When a Web server sends a Web page back to a PC, the server is only sending HTML
code. The Web browser is responsible for interpreting that code and displaying the
results.
PR
WAP follows this standard Internet model with a few variations. A WAP cell phone
runs a tiny browser program called a microbrowser that uses Wireless Markup
Language (WML) instead of HTML. WML is designed to display text-based Web
content on the small screen of a cell phone or handheld device. However, because the
Internet standard is HTML, a WAP gateway (sometimes called a WAP proxy) must
translate between WML and HTML. The WAP gateway takes the Web page sent from
the Web server in HTML code and changes it to WML before forwarding it to the cell
phone. This WAP model is illustrated in Exhibit 1-9.
111
EV
IE
An RFID tag is tiny. Exhibit 1-10 shows an RFID tag relative to the size of a penny.
Depending on the type of RFID tag, the range at which it transmits signals is typically
about 0.3 meters (1 foot) at 5 Mbps.
PR
The Mexico City attorney generals office has implanted RFID tags in the upper arm of
each staff member, just under the persons skin. The tag is used to restrict access to the
attorney generals headquarters. As a staff member nears a locked door, the tag emits a
special code that causes the door to open.
112
Transmission
distance
Speed
Bluetooth
WPAN
10 meters/33 feet
1 Mbps
WWAN
1.25 Gbps
WWAN
Nationwide
9.6 Kbps
WPAN
.3 meter/1 foot
5 Mbps
WiMax
WWAN
53 kilometers/35 miles
75 Mbps
WLAN
11 Mbps
IE
Wireless technology
Do it!
EV
B-1:
PR
False. FSO is a line-of-sight technology that uses infrared beams, but WiMax uses antennas.
113
Objective
2.1.1
IE
Educational/classroom use
Building-to-building connectivitybridging
Industrialwarehousing and
manufacturing
EV
4.1.1
Explanation
WLAN applications can be found in every industry with employees who need the
freedom to conduct business without being confined to a specific location. This section
describes how some leading industries use wireless technology.
Education
PR
Wireless LANs are an ideal technology for colleges and schools. In fact, educational
institutions were some of the first adopters of WLANs because of their dramatic
advantages in teaching and learning. Teachers can create classroom presentations on the
laptop computers in their offices and then carry the computers right into the classroom.
The teachers do not have to spend time plugging and unplugging cables to attach to the
campus data network. Instead, their laptop devices automatically make the wireless
connection as the teachers walk into the classrooms. In settings where students bring
their own wireless devices to class, teachers can send handouts directly to students
sitting in the classroom.
WLAN connections also offer students an important degree of freedom. Students no
longer have to go to a specific computer lab or the library in order to access the schools
computer network. Instead, they can access the school network wirelessly from almost
any location on campus. And as they move to different classrooms in different
buildings, students can remain connected to the network.
114
EV
IE
Most schools publish maps, like that shown in Exhibit 1-11, that show the location of
wireless access points and the coverage areas in buildings across campus. Schools that
require students to own a laptop computer are now requiring that those computers have
wireless network interface cards. This wireless education model makes computing
resources available from anywhere and at any time.
WLAN technology can help colleges save money. Traditional classrooms become fully
accessible computer labs without the expense of additional wiring and infrastructure.
And colleges no longer have to consider the expense of adding multiple open computer
labs for students, because everyone can access the resources no matter where they are
on campus.
PR
One university issued a policy prohibiting students from running their own private WiFi networks in the schools campus housing. These unregulated hotspots were
interfering with the universitys own wireless service, according to the university. The
policy was later lifted because it was not clear that the university had the legal right to
ban the private equipment.
Business
115
This means that usable office space can be created almost immediately with little
expense. For example, a hotel conference room that might not have the infrastructure to
support a wired network can quickly be turned into a wireless networked office
environment.
Because WLANs are becoming so widespread, computer giant IBM and cell-phone
vendor Nokia are teaming up to make it easier for a companys employees to move
from a WLAN hotspot to an area of GSM coverage while remaining connected to the
network.
Travel
IE
Because traveling is all about mobility, the travel industry has perhaps adopted wireless
technologies more than any other sector of the economy. Most large airport terminals
provide wireless hotspots. For free or for a nominal fee, waiting passengers with
wireless laptops can surf the Internet or read e-mail. Several major airports are also
using RFID technology to keep track of passenger luggage. One airport reported that the
number of lost bags in the airport terminal was reduced by 96% by using RFID
technology.
The U.S. airports with the most wireless hotspots are (in order) Dallas-Fort Worth, New
York (LaGuardia), Atlanta, Chicago (OHare), and Baltimore/Washington.
EV
Even the airplanes themselves are offering wireless connection. Several large airlines
are now providing wireless capabilities to passengers during flights. Like their earthbound counterparts, these passengers can access the Internet or view their corporate data
from their seats at 30,000 feet.
Wireless technology, however, goes beyond serving just the passenger. Some airlines
use WLAN technology to communicate with the aircraft after it has parked or when its
taxiing on the ground. This allows the airline to automatically upload and install
software updates for onboard computers or the avionics system before the next flight.
Other airlines are using WLAN technology for flight maintenance information. Aircraft
maintenance personnel with a WLAN laptop can have immediate access to an online
database that stores important information about each type of aircraft and maintenance
procedures. This information is much more current than that found in printed manuals.
PR
The communications between air traffic controllers and aircraft typically use voice radio
systems that havent changed much in 50 years. Important communications about the
weather or route changes between pilots and company dispatchers or air traffic
controllers use overcrowded voice radio circuits that resemble an old-fashioned partyline telephone system. Many of these connections are of poor quality. Some airlines are
using a new wireless data service to send and receive messages.
C-1:
Do it!
Heres how
Heres why
IE
116
EV
6 Go to maps.yahoo.com
Enter your ZIP code
PR
117
Construction
Although at first glance the construction industry might not seem to be a prime
candidate for wireless technologies, it benefits greatly. This is because one part of the
construction process must be completed before the next part can begin. For example, if
the concrete footings for a new building cannot be poured, then the entire project must
be put on hold. This often means idling construction employees or trying to reschedule
at a moments notice. In addition, construction employees often have to travel to several
job sites in one day. This makes paperwork management difficult. Pay sheets must be
manually filled out by several supervisors and dropped off at the office late at night. The
next day, payroll clerks often wrestle with scrawled or illegible notes and cannot contact
the supervisors for clarification.
IE
Wireless technology is a real plus for the construction industry. Supervisors can enter
timesheet information on a laptop computer and have the information immediately
transmitted via WLAN to the main office in the construction trailer on the job site.
Information from the job site, such as a problem with materials or a tardy subcontractor,
can be instantly relayed back to the main office for rescheduling of workers to other
sites to prevent idle time.
EV
In addition, construction equipment such as bulldozers and earth graders are being fitted
with wireless terminals to turn them into smart equipment. A GPS (global positioning
system) device on a bulldozer can provide location information to within centimeters.
The exact location of the bulldozer and where it should be digging can be transmitted to
a terminal on the bulldozer, which displays a color-coded map to guide the operator.
Also, smart equipment can be connected through wireless transmissions to the home
office, which tracks engine hours and equipment location. The engines diagnostic
system can send wireless alerts for maintenance tasks such as oil changes.
Warehouse management
Managing a warehouse stocked with inventory can be a nightmare. New products arrive
continuously and must be inventoried and stored. When products are shipped out of the
warehouse, they must be found and then transferred to the right loading dock so they
can be placed on the correct truck. A mistake in any one of these steps can result in a
warehouse stocked with products that it cannot find, customers receiving the wrong
items, or a store running out of goods to sell.
PR
118
In the front office, orders are received and entered into the computer that connects to the
WLAN in the warehouse. The WMS software manages order picking, balances
workloads, and selects pick sequences for lift truck operators. The dock-control module
then releases orders for picking. A forklift operator locates the correct storage location,
scans the barcode of the pallet or receives the RFID tag signal, and then ferries the
pallet to the shipping dock to be loaded onto a truck.
Public safety
IE
Vehicles owned by public safety departments are moving away from older
telecommunications systems and using newer wireless networks. These older networks
are being replaced by GSM cellular networks that are almost three times as fast. In
addition, WLAN technology is also being used. Although the GSM cellular network has
a broader range of coverage, its speed is much slower than a WLANs. WLAN access
points are installed on city-owned buildings or sites, such as municipal fuel pumps
where the patrol cars are refueled. Here, large volumes of datasuch as building floor
plans, photographs of criminal suspects, maps, and other informationcan be quickly
downloaded to the vehicle.
If a dispatch call requires a vehicle to immediately respond to a call before a WLAN
download is completed, the software sets a bookmark and will resume in that place
when the vehicle returns.
Health care
EV
Administering medication in a hospital is one of the major problem areas for the health
care industry. It is estimated that incorrectly dispensed medication results in hundreds of
thousands of medical emergencies annually. Typically, medication printouts are posted
at the medication area. As medications are given, they are crossed off the list and
initialed. However, because the paper record cannot always be updated immediately, its
possible that a patient could get an extra dose of medication before an order for a new or
changed medication is processed. This system also forces duplicate documentation.
Nurses first check the medication printout to determine the medication to be given.
Then, they document on paper that the medication was actually given and later enter the
data on the computer.
PR
However, WLAN point-of-care computer systems allow medical staff to access and
update patient records immediately. Many hospitals use laptop computers on mobile
carts with barcode scanners or RFID readers and a wireless network interface card.
Health care professionals can document a patients medication administration
immediately on the computer as they move from room to room, without connecting and
disconnecting cables. Nurses first identify themselves to the computer system by
scanning their own personal barcode ID badge or RFID tag. The patients barcode
armband or RFID tag is then scanned, and all medications currently needed for that
particular patient are displayed on the screen. The medications to be administered are
sealed in RFID-tagged pouches or barcoded bottles. Nurses scan this barcode or RFID
tag before opening the package. An alert immediately appears on the screen if the
wrong medication or incorrect amount is identified. After giving the medication, the
nurse indicates through the wireless network that the medication has been given,
essentially electronically signing the distribution form. A hard copy can be printed as
needed.
119
The system immediately verifies that medication is being administered to the correct
patient in the correct dosage, eliminating potential errors and documentation
inefficiencies. The documentation process now takes place at the bedside where care is
delivered, thus improving accuracy. In addition, all hospital personnel now have realtime access to the latest medication and patient status information.
IE
Wireless technology is also used in other medical areas. A video pill can be swallowed
by patients who are experiencing digestive problems. This pill contains a tiny camera
and a wireless transmitter. As the pill works its way through the digestive system, it
takes two pictures each second and transmits those images to a receiving device worn
on the patients belt. After eight hours, the device is removed and the doctor can then
view the pictures without having to perform invasive surgery. A video pill is shown in
Exhibit 1-12.
EV
C-2:
Exercise
PR
2 Select an area of the economy other than those listed in this topic, and determine
how this sector is using wireless technology.
Answers will vary. Finance, logistics, and military uses might be areas you could research.
120
Explanation
Advantages
Mobility
IE
There are many advantages to using wireless technology. These include mobility, easier
and less expensive network installations, increased network reliability, and disaster
recovery.
The primary advantage of wireless technology is mobility, or the freedom to move about
without being tethered by wires. Mobility enables individuals to use a device like a
laptop computer thats always in contact with the network, no matter where the user
may roam within range of that network. Many occupations that require workers to be
mobile, such as field repair technicians or inventory clerks, find that wireless technology
is vital to their work.
EV
PR
121
Also, the time required to install network cabling is usually significant. Installers must
pull wires through the ceiling and then drop cables down walls to network outlets. This
can usually take days or even weeks to complete. During that time, employees must
somehow continue their work in the midst of the construction zone, and this is often
difficult to do. Using a wireless LAN eliminates any such disruption because there are
no cables to be installed.
Wireless networks also make it easier for any officein an old or new buildingto be
modified with new cubicles or furniture. The design for a remodeled office no longer
has to consider the location of the computer jack in the wall. Instead, the focus can be
on creating the most effective work environment for the employees. No matter where in
the cubicle the computer is placed, it can still be connected to the network.
Increased reliability
IE
One of the most common sources of network problems is network cable failure.
Moisture from a leak during a thunderstorm or a coffee spill can erode metallic
conductors. A user who shifts the computer on his or her desk might break one or more
of the wires in a patch cable. A cable splice that is done incorrectly can cause problems
that result in intermittent errors that are difficult to identify. Using WLAN technology
eliminates these types of cable failures and increases the overall reliability of the
network.
Disaster recovery
EV
Because of risks such as fires, tornados, hurricanes, floods, and even terrorist attacks,
disaster recovery must be a prime concern of every business organization. A
documented disaster-recovery plan is vital to every business if it is to get back on its feet
quickly after a calamity. Any business that is not prepared to recover from these or other
disasters will find itself crippled or out of business.
Almost all organizations must have another site from which to run their operations if the
primary site is no longer available. A hot site is generally run by a commercial disasterrecovery service that enables a business to continue computer and network operations
needed to maintain business continuity. A hot site has all the equipment needed for an
organization to continue running, including office space and furniture, telephone jacks,
computer equipment, and a live telecommunications link. If the organizations dataprocessing center becomes inoperable, data-processing operations can be moved to a hot
site, often within an hour.
PR
However, the contract for maintaining a hot site is very expensive, and not all
businesses can easily afford this expense. An alternative is a cold site. A cold site
provides office space, but the customer must provide and install all the equipment
needed to continue operations. A cold site is less expensive, but it takes longer to get an
enterprise in full operation after the disaster. Many businesses are using cold sites and
WLANs as a major part of their disaster-recovery plans. Laptop computers with
wireless NIC adapters and access points are kept in reserve, along with backup network
servers. If a disaster occurs, operations are quickly moved to the cold site. Network
cabling doesnt need to be considered; instead, laptop computers are distributed to the
resettled employees, and access points are quickly installed. The network can be up and
running immediately so that business can proceed in as normal a fashion as possible.
Typically, a business has an annual contract with a company that offers hot site services
with a monthly service charge. Some services also offer data backup so that all
company data is available, regardless of whether a hot site or cold site is used.
122
Disadvantages
Along with the many advantages of WLAN technology, there are disadvantages and
concerns. These include security, radio signal interference, and health risks.
Security
IE
PR
EV
Because of the unique security challenges of a wireless LAN and because security
features of early WLANs could be easily defeated, wireless security is a major issue.
Although newer types of WLANs have improved security features, wireless security
must be properly addressed to ensure data integrity and privacy.
123
Wireless devices operate using radio signals, creating the potential for two types of
signal interference. Signals from other devices can disrupt wireless transmissions, or the
wireless device might itself be the source of interference for other devices.
For example, several types of devices transmit radio signals that can interfere with a
WLAN. These devices include microwave ovens, elevator motors, photocopying
machines, certain types of outdoor lighting systems, theft protection devices, and
cordless telephones. These devices might cause errors or might completely prevent
transmission between a wireless device and an access point. And because WLAN
devices operate within the same radio frequency, they might return the favor and
interfere with other wireless devices.
IE
Interference is nothing new for a computer data network. Even when network devices
are connected by cables, interference from fluorescent light fixtures and electric motors
can sometimes disrupt data transmission. The solution for wireless devices is the same
as that for standard cabled network devices: find the source of the interference and
eliminate it. This is usually done by moving an access point away from a photocopying
machine or microwave oven. In addition, many wireless devices can identify
transmission errors and retransmit data as necessary.
Health risks
EV
WLAN devices contain radio transmitters and receivers that emit radio frequency (RF)
energy. These are similar to cellular telephones and other mobile wireless devices that
emit low levels of RF while being used. It is well documented that high levels of RF can
produce biological damage through heating effects (this is how a microwave oven cooks
food). However, it is not known if, or to what extent, lower levels of RF might cause
adverse health effects. Although some research has been done to address these
questions, no clear picture of the biological effects of this type of radiation has emerged
to date.
Most wireless devices also emit very low levels of RF energy, even when in stand-by
mode. However, these levels are considered non-significant and do not appear to have
health consequences.
PR
In the United States, the Food and Drug Administration (FDA) and the Federal
Communications Commission (FCC) set policies and procedures for some wireless
devices, such as cellular telephones. A recent FDA update stated that the available
science does not allow us to conclude that [wireless devices] are absolutely safe, or that
they are unsafe. However, the report went on to say that the available scientific
evidence does not demonstrate any adverse health effects associated with the use of
[wireless devices]. At the present time, no scientific studies have revealed health
problems associated with the absorption of low levels of RF energy by the human body.
Questions have been raised about the safety of handheld mobile phones that have a
built-in antenna positioned close to the users head when the user is speaking on the
phone. In mobile devices, the antenna is the primary source of RF energy. The safety of
cordless phones, which have a base unit connected to the telephone wiring in a house
and which operate at far lower power levels and frequencies, has not been questioned.
124
Do it!
D-1:
Exercise
1 Determine the cost savings that would result from establishing a disaster-recovery
cold site with WLAN technology, compared to maintaining a hot site. Using the
Internet and other resources, research the cost of purchasing 20 laptop computers,
20 wireless NICs, and two access points.
Then research approximate costs for leasing 1000 square feet of office space in
your area.
IE
Finally, use the Internet to research hot sites and approximate costs for the same
area.
The cost of a cold site with WLAN technology should be less expensive than the cost of
establishing a hot site. Details on the answers will vary.
2 Locate at least two studies on the health risks posed by wireless technology. How
can you minimize risks when using a cell phone or WLAN technology?
PR
EV
125
Topic B
In this topic, you learned that a WLAN, also known as Wi-Fi, sends radio frequency
signals through the air. To function, a WLAN requires that a wireless network
interface card be installed in each device. These cards send and receive signals to an
access point (AP), which in turn is connected to a wired network or to the Internet. You
also learned that Bluetooth devices communicate by using small radio transceivers
called radio modules, which are built into microprocessor chips. Bluetooth devices
form a piconet. Next, you learned that many organizations are moving away from
expensive leased data-transmission lines and are replacing them with fixed broadband
wireless connections. Two popular technologies are WiMax and free space optics
(FSO). You also learned that handheld devices such as cell phones can send and receive
wireless signals by using the Global System for Mobile (GSM) communications
technology with Wireless Application Protocol (WAP). Finally, you learned that
radio frequency identification (RFID) tags serve as electronic barcodes. However,
RFID tags can contain much more information than can standard barcodes and can be
easily updated. In addition, because the information is transmitted via radio waves, an
RFID tag does not have to be precisely aligned with a reader for the information to be
collected.
EV
IE
Topic A
In this topic, you learned that wireless technologies are generally classified into three
categories. Wireless personal area networks (WPANs) cover technologies where the
transmission generally extends only a few meters or feet. Wireless local area networks
(WLANs) are generally restricted to 112 meters (375 feet). Wireless wide area
networks (WWANs) transmit over much longer distances. You also learned that
WLAN applications can be found in industries in which employees need the freedom
to conduct business without being confined to a specific location.
Topic D
In this topic, you learned that WLANs have significant advantages, including increased
mobility, easier and less expensive network installations, increased network reliability,
and disaster recovery. Some of the disadvantages of WLANs include security, radio
signal interference, and health concerns.
PR
Topic C
126
Review questions
1 A location where wireless data services are available is known as a(n):
B GSAL.
C Access portal.
D
Hotspot.
Wi-Fi.
IE
B WWAN.
A Access spot.
C Wireless SWAN.
D AP.
3 The ________ acts as a base station to receive and transmit signals to and from
wireless NICs in other wireless devices. It also connects to a wired network.
A
Access point.
EV
D WiPTG.
B RFID.
Bluetooth.
D WAP.
PR
127
9 Bluetooth is the best technology for sending and receiving e-mail messages on a
handheld device. True or false?
False. GSM would be the best technology to use.
WPAN.
IE
12 A ______________ site can be used for disaster recovery, but it does not contain
any networking or computer equipment.
Cold.
13 A Bluetooth network that contains one master and at least one slave forms a(n)
____________.
Piconet.
EV
16 List and describe two differences between a wireless and a wired network interface
card.
PR
A wireless NIC performs the same basic functions as a standard NIC in that it allows the device to
communicate on the network. A wired NIC uses an RJ-45 connection to accept a patch cable,
whereas a wireless NIC contains an antenna to send and receive the wireless signals. Also, a
wireless NIC performs additional tasks such as encrypting and decrypting data packets.
128
The information transmitted to cellular telephones and handheld devices is often based on the
Wireless Application Protocol (WAP). WAP provides a standard way to transmit, format, and
display Internet data for devices like cell phones and handheld devices. With traditional
computers, Web browser software runs on a local computer to display Internet data. The Web
browser requests a Web page from the Web server. That page is transmitted back to the Web
browser in Hypertext Markup Language (HTML), which is the standard language for displaying
content on the Internet.
IE
WAP follows this standard Internet model with a few variations. A WAP cell phone runs a tiny
browser program called a microbrowser, which uses Wireless Markup Language (WML) instead
of HTML. WML is designed to display text-based Web content on the small screen of a cell phone
or handheld device. However, because the Internet standard is HTML, a WAP gateway (or WAP
proxy) must translate between WML and HTML. The WAP gateway takes the Web page sent
from the Web server in HTML code and changes it to WML language before forwarding it to the
cell phone.
19 List and describe the differences between radio frequency identification tags and
standard barcodes.
Barcodes can only identify the coded product and its manufacturer. For a barcode to be read, it
must be aligned precisely with a barcode reader.
EV
RFID tags can contain larger amounts of information about an item, such as where it was
manufactured, its expiration date, and where it was purchased. Unlike printed barcodes, RFID
information can be updated. In addition, this information is transmitted in radio waves, so the tag
does not have to be precisely aligned with a reader for the information to be collected.
PR
One of the most common sources of network problems is network cable failure. Moisture from a
leak during a thunderstorm or a coffee spill can erode metallic conductors. A user who shifts the
computer on his or her desk might break one or more of the wires in a patch cable. An incorrect
cable splice can cause problems that result in intermittent errors that are difficult to identify. Using
WLAN technology eliminates these types of cable failures and increases the overall reliability of
the network.
129
Northridge Consulting is a local firm that helps businesses solve their IT problems.
Northridge frequently looks to outside experts for assistance. Northridge has hired you
to help on a new project. Pickup Packages is a local pickup and delivery service that
will go to customers sites to pick up packages and letters and deliver them to other
places in the city within two hours. Out-of-town deliveries are also picked up and taken
to the companys main office, where they are transferred to a national package delivery
system.
IE
1 Pickup Packages has recently moved into an older building, which will be used for
offices and which will provide space for company vehicles, bicycles, and a central
location for pickup by the national package delivery systems. The service needs a
network of computers in the office and in the back work area. Northridge believes
that a WLAN might be a good application for this project. Create a PowerPoint
presentation about WLANs to deliver to Northridge. Create at least 10 slides, and be
sure to cover the following points:
Mobility
Ease and cost of installation
EV
Security
2 After seeing your presentation, Pickup Packages is interested in WLANs, but the
president is concerned about the health risks of wireless LANs. Create another
presentation that looks at the issues of health risks with WLANs. Compare those
with health risks of other wireless technologies, such as cellular telephone and
microwave transmissions.
PR
3 Pickup Packages is also interested in giving its drivers and bikers another means of
communication besides pagers and analog cell phones. The management team
would like the carriers to receive their pickup and delivery messages from the
companys Web server. The managers have asked your opinion about using WAP
with cell phones or handheld devices. To prepare to present your recommendations
to Pickup Packages management team, write a one-page paper.
PR
EV
IE
130
21
Unit 2
Wireless LAN devices and standards
IE
basic functions.
EV
PR
standards.
22
Objective
1.1.1
Loss
Amplification
Reflection
Attenuation
Refraction
Absorption
Diffraction
Wave propagation
Scattering
VSRW
Identify the purpose of the following wireless LAN infrastructure devices and describe how
to install, configure, secure, and manage them:
Access points
EV
3.3.1
IE
Gain
3.3.2
Describe the purpose of the following wireless LAN client devices and explain how to
install, configure, secure, and manage them:
PCMCIA cards
Card adapters
Standard devices
Devices that are part of a WLAN are not entirely unique. Each wireless device has a
counterpart in a wired network. The uniqueness of the wireless device is that it typically
uses an antenna, instead of a cable, to send and receive signals. WLAN devices include
wireless client network interface cards, access points, bridges, and gateways.
PR
Explanation
The hardware that allows a client computer to be part of a wired network is called a
network interface card (NIC); this is also sometimes called a client network adapter. A
NIC is the device that connects the computer to the network so that it can send and
receive data. In a wired network, one end (or edge) of the NIC is connected to the
computer, while the other end has a port for a cable connection, as shown in Exhibit 2-1.
The cable connects the NIC to the network, thus establishing the link between the
computer and the network.
23
IE
A wireless network interface card performs the same functions as a wired NIC, with one
major exception: a wireless NIC has no port for a wire connection to the network. In its
place is an antenna to send and receive signals. Specifically, when wireless NICs
transmit, they:
Change the computers internal data from parallel to serial transmission.
Divide the data into packets (smaller blocks of data), and attach the addresses of
the sending and receiving computers.
Determine when to send the packet.
Transmit the packet.
PR
EV
Unlike their wired counterparts, wireless NICs are available in a variety of shapes and
styles. For desktop computers, wireless NICs are available for a Peripheral Component
Interface (PCI) expansion slot inside the computer, as shown in Exhibit 2-2a. There are
also external wireless NICs that plug into the Universal Serial Bus (USB) port, as either
a standalone device (Exhibit 2-2b) or a key fob (Exhibit 2-2c).
Exhibit 2-2: Wireless NICs for desktop computers: (a) a PCI network interface card;
(b) a standalone USB device; (c) a USB key fob
24
EV
IE
For laptop computers, wireless NICs are also available in different types. One type is
the standard PC Card that a user can install. PC Card adapters are typically found on
laptop computers and come in different configurations, such as CardBus, PC Card Type
II, or PC Card Type III, as shown in Exhibit 2-3. Another type is the Mini PCI card,
which is a small card that is functionally equivalent to a standard PCI expansion card.
The Mini PCI card was developed specifically for integrating communications
peripherals, such as modems and NICs, with laptop computers. Most laptop computers
now come standard with a wireless Mini PCI card installed. Some vendors have
enhanced the Mini PCI slot by embedding an antenna in the laptop case that surrounds
the screen. When a wireless NIC Mini PCI card is used, it automatically activates the
antenna to improve the reception of the wireless signal.
Exhibit 2-3: Wireless NICs for laptop computers: (a) CardBus card; (b) Mini PCI card
PR
For smaller devices like personal digital assistants (PDAs), there are several options for
wireless NICs, depending on the manufacturer. Some PDAs will accept standard
CardBus or Type II PC Card wireless NICs like those used in laptop computers.
However, sometimes an external attachment known as a sled must be purchased and
connected to the PDA. The sled contains a slot for a wireless NIC or similar device.
Another option is a CompactFlash (CF) card, shown in Exhibit 2-4. Flash memory is a
type of solid-state (microchip) technology in which there are no moving parts. A CF
card consists of a small circuit board that contains flash memory chips and a dedicated
controller chip. Compared to PC Cards, CF wireless NICs have two advantages: they
are smaller and they consume less power. Another option is to use a SDIO (Secure
Digital I/O) or SDIO NOW! card. SDIO cards provide high-speed data input/output
with low power consumption for mobile electronic devices.
25
IE
Due to the tremendous popularity of WLANs, separate wireless NICs could soon be a
thing of the past. Some vendors plan to integrate a wireless NIC onto a single chip that
could be included on the motherboard, eliminating the need for a separate card. Not all
vendors agree with this solution, however. Some manufacturers want to keep radio
signals farther from the motherboard to reduce the likelihood of interference with the
audio system. Instead of integrating the components of a wireless NIC on the
computers motherboard, they integrate a wireless NIC behind the LCD display, thus
keeping radio waves away from the motherboard.
PR
EV
The software that interfaces between the wireless NIC and the computer can be part of
the operating system or a separate program (driver) that is loaded onto the computer.
Beginning with Windows XP, all Microsoft desktop operating systems recognize a
wireless NIC without the need for any external software drivers; previous versions of
Windows require these external drivers. Incorporating them into the operating system
eases installation and provides additional features, such as the ability to connect
automatically to different WLANs as the user roams, instead of manually configuring
those settings. Some wireless NIC vendors include software drivers for operating
systems such as MS-DOS, Windows 3.x, and Linux. Current operating systems for
PDAs likewise will recognize a wireless NIC.
A-1:
Do it!
Heres how
Students should perform
this step only if a wireless
NIC is already installed in
their computers.
Heres why
1 Click Start
IE
26
EV
Click Cancel
802.11a-b-c-Ins_WizardV1.exe
PR
Click Next
Click Yes
5 Click Next
6 Click Next
27
Desktop Utility
Click Next
9 Click OK
10 Click OK
IE
EV
14 Click
Click Start
PR
Click Enable
Close all open windows
28
Access points
An access point (AP), shown in Exhibit 2-5, consists of three major parts. First, it
contains an antenna and a radio transmitter/receiver to send and receive signals. Second,
it has an RJ-45 wired network interface that allows it to connect by cable to a standard
wired network. Finally, the access point has special bridging software installed to
interface wireless devices to other devices.
IE
Explanation
EV
You can use a standard PC as an access point. To do so, you need to install a wireless
NIC (which functions as the transmitter/receiver), a standard NIC (which serves as the
wired network interface), and special AP control software.
PR
An access point has two basic functions. First, the access point acts as the base station
for the wireless network. All of the devices with a wireless NIC can transmit to the AP,
which in turn redirects the signals to the other wireless devices. Second, the AP acts as a
bridge between wireless and wired networks. The AP can be connected to the standard
network by a cable, allowing the wireless devices to access the data network through it,
as shown in Exhibit 2-6.
29
IE
Exhibit 2-6: An access point acts as a bridge between the wireless network and a wired
network
EV
The range of an access point acting as the base station depends on several factors. One
factor is the type of wireless network that is supported. Some wireless networks can
transmit up to 115 meters (375 feet), whereas other types can send and receive signals at
only half that distance. In addition, walls, doors, and other solid objects can reduce the
distance the signal can travel.
The number of wireless clients that a single access point can support varies as well. In
theory, some types of access points can support over 100 wireless clients. However,
because the radio signal is shared among users, most industry experts recommend one
access point for no more than 50 users if they are using basic e-mail functions, doing
some light Web surfing, and occasionally transferring medium-sized files. If the users
are constantly accessing the network and transferring large files, a preferred ratio is 20
users per AP.
PR
Access points are typically mounted on a ceiling or another area high off the ground to
reduce interference from surrounding objects. However, electrical power outlets are
generally not found in these locations. In these situations, Power over Ethernet (PoE)
has solved the problem. Instead of receiving power directly from an alternating-current
(AC) electrical outlet, direct-current (DC) power is delivered to the AP through the
unused wires in a standard unshielded twisted-pair (UTP) Ethernet cable that connects
the AP to the wired network. This setup eliminates the need for expensive electrical
wiring and makes mounting APs more flexible. Power over Ethernet is now an IEEE
standard known as 802.3af.
210
A bridge is a device that is used to connect two network segments together, even if
those segments use different types of physical media, such as wired and wireless
connections. A remote wireless bridge is a wireless device designed to connect two or
more wired or wireless networks together. Remote wireless bridges have the same
essential characteristics as wireless LAN APs, with two major exceptions. First, remote
wireless bridges transmit at higher power than do WLAN APs. This enables the bridges
to transmit over longer distances than a WLAN can. Second, whereas a WLAN APs
radio signal transmits in all directions, remote wireless bridges use directional antennas
to focus transmission in a single direction.
IE
Most APs cannot be used in place of a remote wireless bridge. However, some
enterprise-level APs, such as the Cisco Aironet 1200, can also serve as a remote
wireless bridge.
PR
EV
A remote wireless bridge, shown in Exhibit 2-7, looks similar to a WLAN AP. A remote
wireless bridge typically has the same connections as an AP; these include a wired
network connection to connect the bridge to a standard wired Ethernet network. The
bridge also contains special software for transmitting and receiving signals. Most
bridges have whats known as delay spread, which minimizes the spread of the signal
so that it can reach farther distances. Bridges also have software that enables them to
select the clearest transmission channel and avoid noise and interference.
211
IE
PR
EV
212
In root mode, the bridge, called the root bridge, can communicate only with other
bridges that are not in root mode. A root bridge cannot communicate with another root
bridge or any wireless clients.
PR
EV
IE
If a remote wireless bridge is set to non-root mode, it can only transmit to another
bridge in root mode. Some bridge manufacturers enable a remote wireless bridge to also
be configured as an access point. This allows the bridge to communicate with a remote
wireless root bridge while simultaneously sending and receiving signals with the
wireless clients. This is illustrated in Exhibit 2-10.
213
EV
IE
If you want to extend the distance between LAN segments, you can place a remote
wireless bridge between two other bridges. This middle bridge is then in repeater mode,
as illustrated in Exhibit 2-11.
PR
Remote wireless bridges are an excellent alternative to expensive leased wired options
for connecting remote buildings. Remote wireless bridges are ideal solutions for
connecting sites such as satellite offices, remote campus settings, or temporary office
locations when the sites are separated by obstaclessuch as bodies of water, freeways,
or railroadsthat make using a wired connection impractical or very expensive. The
distance between buildings using a remote wireless bridge can be up to 29 kilometers
(18 miles) transmitting at 11 Mbps or up to 40 km (25 miles) transmitting at 2 Mbps.
Even at 11 Mbps, remote wireless bridges are still seven times faster than a traditional
T1 connection.
214
Wireless gateways
A wireless gateway is a device that combines wireless management and security in a
single appliance. A wireless gateway performs the following functions:
IE
Authentication Instead of using the network operating systems user-nameand-password scheme to authenticate wireless users, a wireless gateway ensures
that all wireless users are authenticated before allowing them to connect to the
network. This provides an additional level of security because unauthorized
wireless users will not be able to access the network. Wireless gateway
authentication usually supports such advanced authentication features.
Encryption A wireless gateway can encrypt all transmissions so that
unauthorized eavesdroppers cannot intercept and interpret the wireless signal.
This encryption is generally performed by using virtual private network (VPN)
technology, which is covered in detail in the Implementing wireless LAN
security unit.
Intrusion detection and malicious program protection Most wireless
gateways include real-time monitoring of wireless network traffic in order to
detect malicious attacks from wireless users. A wireless gateway enables the
wireless network administrator to block intruders and worm penetrations.
Bandwidth management Because WLAN bandwidth, or the maximum
amount of data that can be sent and received, is shared among all users, a few
users can monopolize the bandwidth. A wireless gateway allows network traffic
to be monitored so that bandwidth can be more evenly allocated among users.
EV
Wireless gateways provide a single mechanism for managing and monitoring the
wireless network. They have proven to be very effective in large enterprises that use
WLANs extensively.
PR
There are several ways to connect to the Cisco Aironet 1200 series access point to
manage it. Because you might not always find yourself in the same setting, its
important to explore each way so you are aware of the options. The LEDs on a Cisco
Aironet 1200 AP are shown in Exhibit 2-12. The three LEDs report Ethernet activity,
association status, and radio activity:
The Ethernet LED indicates Ethernet traffic. This LED is normally green when
an Ethernet cable is connected, and it blinks green when a packet is received or
transmitted over the Ethernet infrastructure. The LED is off when the Ethernet
cable is not connected. Be sure that this LED is green.
The status LED indicates operational status. Green indicates that the access point
is associated with at least one wireless client. Blinking green indicates that the
access point is operating normally but is not associated with any wireless
devices. This LED should be blinking green.
The radio LED indicates wireless traffic over the radio interface. The light is
normally off, but it blinks green whenever a packet is received or transmitted
over the access point radio.
215
IE
PR
EV
The bottom of the Aironet device contains a panel that shows the MAC address. It will
be preceded by MAC. Entering the IP address of the AP allows you to access the
Cisco Aironet 1200 Home screen, shown in Exhibit 2-13. To use this utility, you must
be using a Windows XP computer.
A-2:
Do it!
Heres how
Heres why
IE
EV
216
Click Yes
Not all APs receive an IP number from a DHCP server, or you might not be able to find
the IP address that the DHCP server has assigned to the AP. Another way to find the IP
number assigned to the AP or to assign a number is to use the Cisco IP Setup Utility
(IPSU). The Cisco IPSU is shown in Exhibit 2-14.
PR
Explanation
A-3:
217
Heres how
Heres why
houndware.com/website/support/downloads.html
IE
4 Click Run
5 Click Start
EV
PR
On the AP.
218
IE
Explanation
PR
EV
A-4:
1 Click Start
Choose Run
Enter telnet
Click OK
Heres why
Heres how
IE
219
4 Enter ?
EV
5 Enter enable
7 Enter disable
8 Enter quit
PR
220
Linksys AP
Another popular brand of AP is Linksys. An example of the Linksys setup screen is
shown in Exhibit 2-16. The wireless page of the setup is shown in Exhibit 2-17.
EV
IE
Explanation
PR
A-5:
221
Setting up a Linksys AP
Heres how
Heres why
IE
EV
PR
222
Topic B: Standards
We live in a world of standards. The gearshift lever in your car, the shape of an
electrical outlet in your house or apartment, and the size of a CD-ROM disc are all
based on standards. And the standards are very important. Imagine what it would be like
for someone to try to drive your car if he didnt know where Reverse was located, or if
you wanted to plug in an appliance but the electrical outlet was the wrong shape, or if
there were different sizes of CD-ROMs and your CD-ROM drive would accept only a
certain size CD. Standards simply make it easier for us to purchase and use a wide
variety of products.
Explanation
IE
Wireless technology likewise is based on standards. In fact, one of the reasons that
wireless LANs have been so successful since their introduction in late 1999 is that
WLANs have been based on standards from the outset. Unlike some computer
technologies, for which different vendors proposed different standards and the battle
had to be fought in the marketplace, wireless technology started with standards, and the
vendors manufactured products that followed these standards. The standards helped
ensure that different products from different vendors all functioned in the same
capacity.
The following sections will discuss the need for standards, their advantages and
disadvantages, different types of standards, and the regulatory bodies responsible for
creating and maintaining standards for WLANs.
EV
The role that standards play in a particular industry varies. Standards for
telecommunications have been essential since the very beginning. This is because of the
nature of the industry: telecommunications involves equipment interacting with other
equipment. Without standards, telecommunications would essentially be impossible.
Yet some professionals in information technology (IT) believe that standards have
stifled growth in this fast-paced field. They maintain that waiting for standards to catch
up to the rapid changes in IT slows down the process of change and development. The
IT industry was founded on cutting-edge technology without standards, the thinking
goes, so to add standards stymies growth.
PR
Despite this negative perception, standards have proven to be more beneficial than
harmful. If you examine the advantages and disadvantages of standards, this should
become evident.
Standards ensure that devices from one vendor will interoperate with those from other
vendors. Devices that are not based on standards might not be able to connect and
interoperate with similar devices from other vendors.
Standards create competition. If a vendor creates a new device that doesnt follow
standards, its called a proprietary device. The vendor owns the specifications and
perhaps even a patent on the device. This makes it almost impossible for another
manufacturer to produce a similar device. On the other hand, because standards apply to
everyone, any vendor can create a device based on a standard.
223
Competition results in lower costs for consumers and manufacturers. When several
vendors make similar products based on the same standards, its likely that they will
also compete on price. Competition also results in lower costs for manufacturers.
Because standards have been established, manufacturers do not have to invest large
amounts of capital in research and development. This reduces startup costs as well as
the amount of time needed to bring a product to the market. Also, manufacturing to
meet standards encourages manufacturers to deploy mass production techniques and
economies of scale to keep production costs low; these savings can then be passed on to
consumers.
IE
Standards help protect the users investment in equipment. It is not uncommon for a
proprietary vendor to phase out a product line, leaving a business that purchased the
equipment with two choices: continue to use the now-obsolete system, with escalating
costs for supplies and technical support; or discard the legacy system and buy an up-todate system. Both choices are expensive. Standards, however, can help create a
migration path for equipment upgrades. Newer standards are generally backwardcompatible or at least provide a means of migrating to equipment based on the newer
standards at a minimal cost.
Standards also have some disadvantages. Examples follow.
EV
PR
Advantages
224
Types of standards
The telecommunications industry has two major types of standards: de facto and de jure.
A third, emerging type of standard, by consortium, is increasingly influencing how
standards are set.
De facto
IE
De facto standards are not actually standards at all. Rather, they are common practices
that the industry follows for various reasons, ranging from ease of use to tradition to
what the majority of the users do. For the most part, de facto standards are established
by success in the marketplace. For example, Microsoft Windows has become the de
facto standard operating system today for personal desktop computers and network
servers. This occurred because the majority of users have elected to install and run
Windows on their computers. There was no standards body that proclaimed Windows as
the standard operating system; the widespread use of the operating system has created
what amounts to be a standard, at least in the corporate world.
The phrase de facto comes from Latin and means from the fact. The phrase de
jure is also from Latin and means from the law.
De jure
EV
Consortia
PR
One of the complaints about de jure standards is the amount of time it takes for a
standard to be completed. For example, the initial standard for wireless LANs took
seven years to complete. In the IT economy, this represents an extremely long period of
time before products can be brought to the market.
In reaction to this, consortia are often used today to create standards. Consortia are
usually industry-sponsored organizations that want to promote a specific technology.
The goal of a consortium is to develop a standard that promotes a specific technology in
a short period of time. Unlike de jure standards bodies, membership in consortia is not
always open to everyone, although it might be. Sometimes specific high-profile
companies both create a consortium and serve on it.
One of the most famous consortia is the World Wide Web Consortium (W3C), which is
composed of industry giants such as Microsoft, Sun Microsystems, and IBM. The W3C
is responsible for creating the standards that are widely used on the Web today,
including Hypertext Markup Language (HTML), Cascading Style Sheets (CSS), and the
Document Object Model (DOM).
225
Enforcing standards
Although setting standards is essential for IT, enforcing them is equally important. After
all, standards would be useless if no one followed them. How are the standards to be
enforced? The marketplace itself enforces some standards. That is, a vendor who refuses
to abide by standards for cellular telephone transmissions will find that nobody will buy
its products. Standards created by consortia are often regulated by the marketplace.
De jure standards, however, must often be enforced by an outside regulatory agency.
The role of a regulatory agency is to ensure that all participants adhere to the prescribed
standards. The agency must have the power to enforce the standards and effectively
punish those who refuse to abide by them. There are a number of national and
international regulatory agencies whose job is to ensure that standards are strictly
adhered to.
B-1:
IE
Do it!
EV
2 Compare your opinions of standards with your classmates. Discuss the other side
of the argument they make.
PR
226
Objective
4.1.1
Educational/classroom use
Industrialwarehousing and
manufacturing
Building-to-building connectivitybridging
Last-mile data deliverywireless ISP
IE
EV
Explanation
PR
IEEE is the worlds largest technical professional society, with members around the
globe. Serving the computing, electrical engineering, and electronics professions, the
IEEE engages in technical, educational, and professional activities that advance the
theory and practice of whats called electrotechnology. The 37 Societies and Councils
of the IEEE routinely publish technically focused journals, magazines, and proceedings,
in addition to working on more than 800 standards. Some of these standards apply to
circuits and devices, communication and information technology, control and
automation, electromagnetics, geoscience, ocean technology and remote sensing,
instrumentation, measurement, and testing, optics, power and energy, and signal
processing.
Note: The IEEE is currently developing standards for rechargeable batteries for laptop
computers and electronic voting equipment data exchange.
Although the IEEE is one of the leading developers of global standards in a broad range
of industries, such as energy, biomedicine and health care, and transportation, the IEEE
is best known for its work in establishing standards for computer networks. In the early
1980s, the IEEE began started developing standards for computer network architecture.
This work was called Project 802. Project 802 quickly expanded into several categories
of network technology, known as 802.1, 802.2, and so on, all the way to 802.16. IEEE
Project 802.3 set specifications for Ethernet LAN technology.
227
Project 802 received its name from the fact that the work was begun in 1980 (80) during
February, the second month (2).
As older network technologies have been replaced with new ones, the IEEE 802
committees have likewise reflected the changes. Several committees have been retired,
while new committees have been formed to address emerging technologies. The
following table lists the current IEEE 802 network committees.
Description
802.3
802.11
Wireless networks
802.15
802.16
IE
Note: The IEEE is also responsible for setting standards for computer technologies
besides networking. For example, IEEE 1394 is the standard for FireWire.
Wi-Fi Alliance
EV
Shortly after the IEEE released its revised wireless network standards in 1999, there was
concern about how this new wireless technology would be accepted in the marketplace.
A consortium of wireless-equipment manufacturers and software providers was formed
to promote wireless network technology. This group was known as the Wireless
Ethernet Compatibility Alliance (WECA). The WECA had three goals:
To encourage wireless manufacturers to use the IEEE 802.11 technologies in
their wireless networking products
To promote and market these technologies to consumers in the home, in small
office/home office (SOHO) settings, and in large businesses and organizations
To test and certify that wireless products adhere to the IEEE 802.11 standards to
ensure product interoperability
Note: The SOHO market has been particularly eager to embrace wireless LAN
technology. The sales of wireless LAN equipment to SOHO settings grew by 73% from
2003 to 2004, according to the DellOro Group.
PR
In October 2002, the WECA organization changed its name to the Wi-Fi Alliance,
which reflected the name of the certification that it uses (Wi-Fi, or Wireless Fidelity) to
verify that a product follows IEEE standards. Although all wireless devices are
sometimes called Wi-Fi, only products that have passed the Wi-Fi Alliance testing are
allowed to refer to their products as Wi-Fi Certified, which is a registered trademark
shown in Exhibit 2-18.
228
In addition to product testing and certification, the Wi-Fi Alliance is branching out into
new areas. Businesses can apply to be registered as Wi-Fi zones. This qualifies them to
be placed in an online database of wireless hotspot locations, which can be accessed
through the Alliances Web site. In addition, these businesses can display a Wi-Fi
ZONE logo at the physical business location and in product literature.
The Wi-Fi Alliance Web site is www.wi-fi.org.
Do it!
C-1:
Heres how
Heres why
IE
grouper.ieee.org/groups/
802/16
EV
PR
network
229
Responsibilities
In the United States, the organization that controls and regulates wireless transmissions
is the Federal Communications Commission (FCC). This section discusses what its role
is and how the FCC regulates the radio frequency spectrum on which wireless
transmissions take place.
The FCC is the primary regulatory agency for wireless communications in the United
States and its territorial possessions. The FCC, which is an independent government
agency directly accountable to Congress, was established by the Communications Act of
1934. The FCC was charged with regulating interstate and international
communications by radio, television, wire, satellite, and cable.
IE
To preserve its independence, the FCC is directed by five commissioners who are
appointed by the President and confirmed by the Senate for five-year terms. Only three
commissioners can be members of the same political party, and none of them can have a
financial interest in any FCC-related business.
The Commerce Departments National Telecommunications and Information
Administration (NTIA) serves as the principal adviser to the President on domestic and
international communications and information issues. NTIA also represents the views of
the Executive Branch before the Congress, the FCC, foreign governments, and
international organizations.
EV
The FCCs responsibilities are very broad. In addition to developing and implementing
regulatory programs, the FCC also processes applications for licenses and other filings,
analyzes complaints, conducts investigations, and takes part in congressional hearings.
The FCC also represents the United States in negotiations about telecommunications
issues with other nations.
The Web site of the FCC is www.fcc.gov.
The FCC plays an important role in wireless communications. It regulates radio and
television broadcast stations, as well as cable and satellite stations. It oversees cellular
telephones, pagers, and two-way radios. The FCC regulates the use of radio frequencies
to fulfill the communications needs of businesses, local and state governments, publicsafety service providers, aircraft and ship operators, and individuals.
PR
The FCC is charged with regulating the radio frequency spectrum, which is the entire
range of all radio frequencies. The spectrum is divided into 450 sections, or bands. The
following table lists some of the more common bands. The U.S. is obligated to comply
with the international spectrum allocations established by international governing
bodies. However, the U.S. domestic spectrum uses might differ from international
allocations if these domestic uses do not conflict with international regulations or
agreements.
Common uses
10 KHz to 30 KHz
Maritime ship-to-shore
Cordless telephones
AM radio
3 MHz to 30 MHz
Public safety
Cellular telephones
Air traffic control radar
Wireless LANs
Wireless LANs
Radio astronomy
Band
IE
230
EV
Item
40 MHz
Baby monitors
49 MHz
Radio-controlled airplanes
72 MHz
Radio-controlled cars
75 MHz
PR
Although a license is normally required from the FCC to send and receive signals on a
specific frequency, there is a notable exception. This is known as the license-exempt
spectrum, or a set of unregulated bands. Unregulated bands are bands of the radio
spectrum that are available nationwide to all users, without requiring a license. Devices
that use these bands can be either fixed or mobile. The FCC says that it created the
unregulated bands to foster the development of a broad range of new devices, stimulate
the growth of new industries, and promote the ability of U.S. manufacturers to compete
globally by enabling them to develop unlicensed digital products for the world market.
The FCC does impose power limits on devices using the unregulated bands, and this
reduces their range. This prevents manufacturers of devices such as long-range walkietalkies from using these frequencies instead of the regulated frequencies intended for
these products.
231
IE
The unregulated bands are summarized in the following table. Two of the bands are
used for WLANs. One of these bands is the Industrial, Scientific, and Medical (ISM)
band, which was approved by the FCC in 1985. Another unlicensed band used for
WLANs is the Unlicensed National Information Infrastructure (U-NII) band, approved
in 1996. The U-NII band is intended for devices that provide short-range, high-speed,
wireless digital communications. U-NII devices can provide a way for educational
institutions, libraries, and health care providers to connect to basic and advanced
telecommunications services. Educational institutions, for example, could form
inexpensive wireless computer networks between classrooms. U-NII unlicensed
wireless networks could help improve the quality and reduce the cost of medical care by
allowing medical staff to obtain on-the-spot patient data, x-rays, and medical charts, and
by giving health care workers in remote areas access to telecommunications services.
Depending on the type of wireless LAN, it will use either the ISM or the U-NII band.
Frequency
Total bandwidth
Common uses
Industrial, Scientific,
and Medical (ISM)
234.5 MHz
Unlicensed Personal
Communications
Systems
30 MHz
Unlicensed National
Information
Infrastructure (U-NIII)
300 MHz
Millimeter Wave
59 to 64 GHz
5 GHz
EV
Unlicensed band
Home network
applications
There are some negative features of the unregulated bands. Because they are not
regulated and licensed, devices from different vendors might attempt to use the same
frequency. This conflict can cause the signals from different devices to interfere with
each other and prevent the devices from functioning properly. Thus the performance of
devices using unregulated bands can be unpredictable.
C-2:
PR
Do it!
Heres how
Heres why
1 Visit fcc.gov/wbatf
232
Objective
2.2.1
Identify, explain, and apply the concepts covered by the IEEE 802.11 standard and the
differences between the following 802.11 clauses:
802.11g
802.11a
802.11h
802.11b
802.11i
802.11d
802.11j
802.11e
802.11n
802.11f
2.3.1
IE
802.11
802.11s
Define the roles of the following organizations in providing direction, cohesion, and
accountability within the wireless LAN industry:
FCC
IEEE
EV
Wi-Fi Alliance
Explanation
Since the late 1990s, the IEEE has approved four standards for wireless LANs: IEEE
802.11, 802.11b, 802.11a, and 802.11g. A new standard, 802.11n, is expected to be
approved by 2006. Each of these standards will be examined in detail in this topic.
IEEE 802.11
In 1990, the IEEE formed a committee to develop a standard for WLANs operating at 1
and 2 Mbps. Several proposals were initially recommended before a draft was
developed. This draft went through seven revisions, which took almost seven years to
complete. On June 26, 1997, the IEEE approved the final draft.
PR
The IEEE 802.11 standard specified that wireless transmissions can take place in one of
two ways: through infrared light, and through radio signals.
Infrared transmissions
All of the different types of light that travel from the sun to the earth make up what is
called the light spectrum. Visible light is just a small part of that spectrum. Some of the
other energies of the spectrumsuch as x-rays, ultraviolet rays, and microwavesare
invisible to the human eye. Infrared light, which is also invisible, can be used for
wireless transmissions.
Note: Infrared light is next to visible light on the light spectrum and shares many of the
same characteristics.
233
Infrared transmissions can send data by the intensity of the infrared light wave, instead
of using on-off signals of, for example, a flashlight. To transmit a 1, an emitter (a
device that transmits a signal) increases the intensity of the current and sends a pulse
using infrared light. On the receiving end, a detector (a device that receives a signal)
senses the higher-intensity pulse of light and produces a proportional electrical current.
Note: Emitters and detectors are sometimes combined into a single device.
IE
EV
PR
A diffused transmission relies on reflected light. The emitters for diffused transmissions
have a widely focused beam instead of a narrow beam. The emitter is pointed at the
ceiling of a room and uses it as the reflection point. When the emitter transmits an
infrared signal, it bounces off the ceiling and fills the room. The detectors are also
pointed at the same reflection point and can detect the reflected signal, as shown in
Exhibit 2-20.
234
Infrared wireless systems have several advantages. Infrared light neither interferes with
nor is affected by other communications signals. Also, because infrared light does not
penetrate walls, the signals are kept inside a room. This makes it impossible for
someone elsewhere to listen in on the transmitted signal. The IEEE 802.11 standard
outlines the use of diffused infrared transmissions for WLANs.
However, infrared wireless LAN systems have significant limitations:
IE
Limited range Directed infrared systems, which require a clear line of sight,
cannot be placed in an environment where something could get in the way of the
infrared beam. This means that devices using infrared transmission must be
placed close enough to one another to eliminate the possibility of something
moving between them (imagine someone standing in front of your remote while
you are trying to change TV channels). Due to the angle of deflection, diffused
infrared systems can cover only a range of about 15 meters (50 feet).
Confined to indoor use Because diffused infrared systems require a
reflection point and because transmission is poor in bright sunlight, wireless
infrared LANs cannot be reliably used outdoors.
EV
Slow transmission speed Diffused infrared systems can send data at speeds
of up to only 4 Mbps. This is because the wide angle of the beam loses energy as
it reflects. The loss of energy results in a weakened signal. The weak signal
cannot be transmitted over long distances, nor does it have sufficient energy to
maintain a high transmission speed. This results in lower data throughput.
Because of these limitations, 802.11 infrared WLAN systems were never widely
adopted. Today, infrared transmissions are generally used in specialized applications,
such as data transfers between laptop computers, digital cameras, handheld data
collection devices, PDAs, electronic books, and other similar mobile devices.
Note: WLANs that use infrared transmissions are used in specialized situations where
radio signals would interfere with other equipment, such as in hospital operating rooms
or areas where security is a concern, such as in secure government buildings.
PR
Unlike infrared transmissions, radio waves can penetrate objects like walls and thus
allow the wireless user to be truly mobile. In addition, radio waves travel longer
distances and can be used indoors as well as outdoors. Also, radio waves can travel at
much higher speeds than can infrared transmissions. The IEEE 802.11 standard
outlining the use of radio waves in transmissions has become the preferred method for
wireless LANs.
235
IEEE 802.11b
The bandwidth of 2 Mbps for the 802.11 standard introduced in 1997 was not sufficient
for most network applications. The IEEE body revisited that standard shortly after it was
released to determine what changes could be made to increase the speed. In September
1999, an 802.11b amendment was added to the standard. This added two higher speeds
(5.5 Mbps and 11 Mbps) to the original 802.11 standard (1 Mbps and 2 Mbps). Like the
802.11 standard, 802.11b uses the ISM band.
IE
The 802.11b standard can support wireless devices that are up to 115 meters (375 feet)
apart. However, devices that far apart might not be transmitting at 11 Mbps. Radio
waves decrease in power over distance, much like the sound of your voice: a person
standing 1 meter away from you might hear you very clearly, whereas a person 60
meters away would have difficulty hearing you. Instead of completely dropping the
signal if it falls out of range for transmitting at 11 Mbps, the 802.11b standard specifies
that the devices should drop their transmission speed to the next lower level (5.5, 2, or 1
Mbps). This allows devices to transmit farther apart but at lower speeds.
IEEE 802.11a
EV
At the same time the IEEE created the 802.11b standard, it also issued another standard
with even higher speeds. The 802.11a standard specifies a maximum rated speed of 54
Mbps and supports 48, 36, 24, 18, 12, 9, and 6 Mbps transmissions using the U-NII
band. Although the 802.11a and 802.11b specifications were published at the same time,
802.11b products started to appear almost immediately, and 802.11a products did not
arrive until late 2001. The 802.11a products came to the market later because of
technical issues, along with the high cost of developing products for the standard.
Devices based on the 802.11a standard cannot use complementary metal oxide
semiconductors (CMOS), the semiconductor used in 802.11b WLANs. Instead, devices
must use a compound such as gallium arsenide (GaAs) or silicon germanium (SiGe).
These semiconductors are more expensive and require more capital investment and time
to develop and manufacture.
Although devices following the 802.11a standard achieve higher speeds, the tradeoff is
that devices cannot be as far apart as with the 802.11b standard. A wireless network that
follows the 802.11a standard might generally have devices that are no more than 30
meters (100 feet) apart.
PR
IEEE 802.11g
The tremendous success of the IEEE 802.11b standard shortly after its release prompted
the IEEE to re-examine the 802.11b and 802.11a standards to determine if a third
intermediate standard could be developed. This best of both worlds approach would
preserve the stable and widely accepted features of 802.11b, but increase the data
transfer rates to 54 Mbps, similar to those of 802.11a. The IEEE formed a task group to
explore this possibility. By late 2001, a draft standard known as IEEE 802.11g was
proposed. The standard was formally ratified in 2003.
The IEEE 802.11g draft was a compromise based on input from several chip
(microprocessor) manufacturers, who had a major stake in the outcome. Although most
major vendors of commercial wireless networking products will build and sell products
based on whatever standard is approved, the same is not true for the chip manufacturers.
236
The 802.11g standard specifies that devices operate entirely in the ISM frequency and
not in the U-NII band used by 802.11a. This requirement gives the 802.11g standard the
ability to support devices that are farther apart with higher speeds, but it uses the
crowded ISM band. Like 802.11b, 802.11g can support devices that are up to 115
meters (375 feet) apart.
IE
EV
Although the final proposal might not be ratified until 2006, devices that follow one of
the proposed options will appear much earlier than that. This occurs because there is a
significant lag between when the final proposal is published and when it is ultimately
ratified by the IEEE. This occurred with the 802.11g standard: devices were marketed
and sold months before the standard was finally ratified. A WLAN based on one of the
802.11n proposals appeared in mid-2004 under the name 802.11 pre-N.
Note: The Wi-Fi Alliance refuses to sanction and certify devices manufactured before
the final release of the standard.
IEEE 802.11r
PR
Another standard that has not been approved yet is 802.11r. This standard will provide
support for fast Basic Service Set (BSS) transitions. This will enable a user traveling at
high speeds, such as in a car or train, to maintain a wireless network connection as it is
passed from one base station to another. This will be necessary if Voice over IP (VoIP)
enabled mobile phones are to work properly. Current 802.11 wireless standards cannot
switch fast enough to prevent disruption in the connection when switching between
access points.
D-1:
237
Heres how
Heres why
IE
PR
EV
238
Topic B
In this topic, you learned that an access point (AP) serves as both the base station for
the wireless network and a bridge to connect the wireless network with the wired
network. The range of an access point and the number of wireless clients that it can
support vary. Power over Ethernet (IEEE 802.3af) technology allows an AP to be
placed in almost any location because electrical current is supplied through the Ethernet
cable. A remote wireless bridge connects two or more wired or wireless networks
together. Remote wireless bridges can function in access point mode, root mode, nonroot mode, or repeater mode. A wireless gateway is a device that combines wireless
management and security management in a single appliance.
Topic C
In this topic, you learned that there are several advantages of standards for the IT
industry. Standards ensure that devices from one vendor will interoperate with those
from other vendors. Standards also create competition between vendors, which results
in lower costs for consumers and often results in lower costs of manufacturing as well.
However, there are disadvantages, particularly in international markets. There are three
types of telecommunications standards: de facto, de jure, and by consortia.
EV
In this topic, you learned that there are three regulatory bodies that play a major role in
WLAN technology. The IEEE has developed network standards since 1980. The Wi-Fi
Alliance is a consortium of wireless equipment manufacturers and software providers
involved in promoting and certifying wireless technology. The Federal
Communications Commission (FCC) is responsible for controlling and regulating
wireless transmissions in the United States. There are three standards or types of
wireless LANs. IEEE 802.11b networks transmit at 11 Mbps over a distance of up to
115 meters (375 feet). The 802.11a standard devices transmit at speeds of up to 54
Mbps, but at distances of up to only 30 meters (100 feet). A compromise between the
two, the 802.11g, can transmit at 54 Mbps up to 115 meters (375 feet).
PR
Topic D
IE
Topic A
Review questions
An access portal.
239
2 A wireless client network interface card performs each of the following tasks,
except:
A Transmitting the packet over radio waves.
3 The type of wireless network interface card that would not be found in a laptop
computer is a(n):
A Mini PCI card.
PCI card.
IE
C CardBus.
B Desktop computer.
PDA.
EV
D Access point.
5 An access point has a(n) ______ interface that allows it to connect to a wired
network.
A
RJ-45.
B SDDIO.
C CF.
D RJ-11.
PR
6 One of the functions of an access point is to serve as a base station for the wireless
network. True or false?
True.
7 Although the transmission range of an access point can vary, the number of wireless
clients that it can support does not vary. True or false?
False.
8 Power over Ethernet allows wireless client NICs to be placed in locations even if
there is not an electrical outlet nearby. True or false?
False.
9 A remote wireless bridge can connect only wireless networks together. True or
false?
False.
240
11 A(n) _____ is a device that combines wireless management and security in a single
appliance.
Wireless gateway.
12 _____________ standards are not formal standards but are common practices that
an industry follows.
De facto.
Consortia.
IE
14 The _____ organization has been establishing network standards for almost 25
years.
IEEE.
EV
16 List and describe the four modes in which a remote wireless bridge can function.
Access point mode In this mode, a remote wireless bridge functions as a standard AP only and
does not communicate with other remote wireless bridges.
Root mode In root mode, the bridge, called the root bridge, can communicate only with bridges
that are not in root mode. A root bridge cannot communicate with another root bridge or any
wireless clients.
Non-root mode In this mode, a remote wireless bridge can transmit only to another bridge in
root mode. Some bridge manufacturers enable a remote wireless bridge to also be configured as
an access point. This allows the bridge to simultaneously communicate with a remote wireless
root bridge and send and receive signals with the wireless clients.
PR
Repeater mode To extend the distance between LAN segments, another remote wireless
bridge can be positioned between two other bridges. This middle bridge is then in repeater mode.
241
18 What are unregulated bands and how are they used in wireless LANs?
Although a license is normally required from the FCC to send and receive transmissions on a
specific frequency, the license-exempt spectrum (unregulated bands) is an exception.
Unregulated bands are bands of the radio spectrum that are available nationwide to all users,
without requiring a license. Devices that use these bands can be either fixed or mobile.
One unregulated band is the Industrial, Scientific and Medical (ISM) band, which was approved
by the FCC in 1985. Another unlicensed band is the Unlicensed National Information
Infrastructure (U-NII), approved in 1996. The U-NII band is intended for devices that will provide
short-range, high-speed, wireless digital communications. Depending on the type of wireless
LAN, it will use either the ISM or the U-NII band.
IE
Limitations include lack of mobility, limited range of coverage, confinement to indoor use, and
slow speed of transmission.
20 Write a brief summary of the characteristics of IEEE 802.11b, 802.11a, and 802.11g
wireless networks.
The IEEE 802.11b WLAN can transmit at 1, 2, 5.5 and 11 Mbps using the ISM band over a
distance of up to 375 feet.
The IEEE 802.11a WLAN has a maximum rated speed of 54 Mbps and also supports 48, 36,
24, 18, 12, 9, and 6 Mbps transmissions using the U-NII band.
EV
The IEEE 802.11g WLAN can also transmit up to 54 Mbps like 802.11a but it uses the ISM
band, like 802.11b.
Coldstone Lighting is opening another store across town and needs to install a new
network. Northridge Consulting has asked you to come up with a presentation for
Coldstone outlining the advantages of a wireless network for their retail store. Because
the managers at Coldstone do not have a technical background, your presentation should
be at a general level and not a technical level.
PR
PR
EV
IE
242