What is a Wireless LAN?
Wireless LANs provide all the functionality of wired LANs, without the need for
physical connections (wires). Data is modulated onto a radio frequency carrier
and transmitted through the ether. Typical bit-rates are 11Mbps and 54Mbps,
although in practice data throughput is half of this. Wireless LANs can be
formed simply by equipping PC's with wireless NICs. If connectivity to a wired
LAN is required an Access Point (AP) is used as a bridging device. AP's are
typically located close to the centre of the wireless client population.
What are the advantages of Wireless LAN?
Mobility: Wireless LAN systems can provide LAN users with access to
real-time information anywhere in their organization. This mobility supports
productivity and service opportunities not possible with wired networks.
Installation Speed and Simplicity: Installing a wireless LAN system can be
fast and easy and can eliminate the need to pull cable through walls and
ceilings.
Installation Flexibility: Wireless technology allows the network to go where
wire cannot go.
Reduced Cost-of-Ownership: While the initial investment required for
wireless LAN hardware can be higher than the cost of wired LAN hardware,
overall installation expenses and life-cycle costs can be significantly lower. Long-term cost benefits are greatest in dynamic environments requiring
frequent moves and changes.
Scalability: Wireless LAN systems can be configured in a variety of topologies
to meet the needs of specific applications and installations. Configurations are
easily changed and range from peer-to-peer networks suitable for a small
number of users to full infrastructure networks of thousands of users that
enable roaming over a broad area.
What is the disadvantage of Wireless LAN?
The speed of Wireless LAN is still relatively slower than wired LAN. The setup
cost of Wireless LAN is relative high because the equipment cost including
access point and PCMCIA Wireless LAN card is higher than hubs and CAT 5
cables.
What is an Access Point?
The AP (access point also known as a base station) is the wireless server that
with an antenna and a wired Ethernet connection that broadcasts information
using radio signals. AP typically acts as a bridge for the clients. It can pass
information to wireless LAN cards that have been installed in computers or
laptops allowing those computers to connect to the campus network and the
Internet without wires.
Is it possible to use wireless products from a variety of
vendors?
Yes. As long as the products comply with the same IEEE 802.11 standard. The Wi-Fi logo is used to define 802.11b compatible products. Wi-Fi5 is a
compatibility standard for 802.11a products running in the 5GHz band.
What is Wi-Fi?
The Wi-Fi logo signifies that a product is interoperable with wireless
networking equipment from other vendors. A Wi-Fi logo product has been
tested and certified by the Wireless Ethernet Compatibility Alliance (WECA).
The Socket Wireless LAN Card is Wi-Fi certified, and that means that it will
work (interoperate) with any brand of Access Point that is also Wi-Fi certified.
What types of devices use the 2.4GHz Band?
Various spread spectrum radio communication applications use the 2.4 GHz
band. This includes WLAN systems (not necessarily of the type IEEE
802.11b), cordless phones, wireless medical telemetry equipment and
Bluetooth™ short-range wireless applications, which include connecting
printers to computers and connecting modems or hands-free kits to mobile
phones.
Does the 802.11 interfere with Bluetooth device?
Any time devices are operated in the same frequency band; there is the
potential for interference.
Both the 802.11b/g and Bluetooth devices occupy the same2.4-to-2.483-GHz
unlicensed frequency range-the same band. But a Bluetooth device would not
interfere with other 802.11 devices much more than another 802.11 device
would interfere. While more collisions are possible with the introduction of a
Bluetooth device, they are also possible with the introduction of another 802.11
device, or a new 2.4 GHz cordless phone for that matter. But, Bluetooth
devices are usually low-power, so the effects that a Bluetooth device may have
on an 802.11 network, if any, aren't far-reaching.
Can radio signals pass through wall?
Transmitting through a wall is possible depending upon the material used in its
construction. In general, metals and substances with high water content do not allow radio waves to pass through. Metals reflect radio waves and concrete
attenuates radio waves. The amount of attenuation suffered in passing through
concrete will be a function of its thickness and amount of metal re-enforcement
used.
What are potential factors that may causes interference
among WLAN products?
Factors of interference:
(1) Obstacles: walls, ceilings, furniture… etc.
(2) Building Materials: metal door, aluminum studs.
(3) Electrical devices: microwaves, monitors, electric motors.
Solution:
(1) Minimizing the number of walls and ceilings
(2) Antenna is positioned for best reception
(3) Keep WLAN products away from electrical devices, eg: microwaves,
monitors, electric motors,…, etc.
(4) Add additional APs if necessary.
What's the difference between a WLAN and a WWAN?
WLANs are generally privately owned, wireless systems that are deployed in a
corporation, warehouse, hospital, or educational campus setting. Data rates
are high and there are no per-packet charges for data transmission.
WWANs are generally publicly shared data networks designed to provide
coverage in metropolitan areas and along traffic corridors. WWANs are owned
by a service provider or carrier. Data rates are low and charges are based on
usage. Specialized applications are characteristically designed around short,
burst messaging.
What is Ad Hoc mode?
A wireless network consists of a number of stations without using an access
point or any connection to a wired network.
What is Infrastructure mode?
Infrastructure mode implies connectivity to a wired communications
infrastructure. If such connectivity is required the Access Points must be used
to connect to the wired LAN backbone. Wireless clients have their
configurations set for "infrastructure mode" in order to utilize access points
relaying.
How many Access Points are required in a given area?
This depends on the surrounding terrain, the diameter of the client population,
and the number of clients. If an area is large with dispersed pockets of
populations then extension points can be used for extend coverage.
What is Direct-Sequence Spread Spectrum Technology –
(DSSS)?
DSSS spreads its signal continuously over a wide frequency band. DSSS
maps the information bearing bit-pattern at the sending station into a higher
data rate bit sequence using a "chipping" code. The chipping code (also known
as processing gain) introduces redundancy which allows data recovery if
certain bit errors occur during transmission. The FCC rules the minimum
processing gain should be 10, typical systems use processing gains of 20.
IEEE 802.11b specifies the use of DSSS.
What is Frequency-hopping Spread Spectrum Technology –
(FHSS)?
FHSS uses a narrowband carrier which hops through a predefined sequence
of several frequencies at a specific rate. This avoids problems with fixed
channel narrowband noise and simple jamming. Both transmitter and receiver
must have their hopping sequences synchronized to create the effect of a
single "logical channel". To an unsynchronized receiver an FHSS transmission
appears to be short-duration impulse noise. 802.11 may use FHSS or DSSS.
Do I need the same kind of antenna on both sides of a link?
No. Provided the antenna is optimally designed for 2.4GHz or 5GHz operation.
WLAN NICs often include an internal antenna which may provide sufficient
reception.
Why the 2.4 GHZ Frequency range?
This frequency range has been set aside by the FCC, and is generally labeled
the ISM band. A few years ago Apple and several other large corporations
requested that the FCC allow the development of wireless networks within this
frequency range. What we have today is a protocol and system that allows for
unlicensed use of radios within a prescribed power level. The ISM band is
populated by Industrial, Scientific and Medical devices that are all low power
devices, but can interfere with each other.
What is Server Set ID (SSID)?
SSID is a configurable identification that allows clients to communicate to the
appropriate base station. With proper configuration, only clients that are
configured with the same SSID can communicate with base stations having
the same SSID. SSID from a security point of view acts as a simple single
shared password between base stations and clients.
What is an ESSID?
ESSID stands for Extended Service Set Identifier and identifies the wireless
LAN. The ESSID of the mobile device must match the ESSID of the AP to
communicate with the AP. The ESSID is a 32-character maximum string and is
case-sensitive.
What is WEP?
Wired Equivalent Privacy. WEP is a security mechanism defined within the
802.11 standard and designed to make the security of the wireless medium
equal to that of a cable (wire). WEP data encryption was designed to prevent
access to the network by "intruders" and to prevent the capture of wireless
LAN traffic through eavesdropping. WEP allows the administrator to define a
set of respective "Keys" for each wireless network user based on a "Key
String" passed through the WEP encryption algorithm. Access is denied by
anyone who does not have an assigned key. Note, WEP has shown to have
fundamental flaws in its key generation processing.
What is WPA-PSK?
WPA-PSK (Wi-Fi Protected Access Pre-Shared Key) can be used if user do
not have a Radius server but still want to benefit from it. Because WPA-PSK
only requires a single password to be entered on wireless AP/gateway and
wireless client. As long as the passwords match, a client will be granted
access to the WLAN.
What is a WEP key?
A WEP key is a user defined string of characters used to encrypt and decrypt
data.
Will 128-bit WEP communicate with 64-bit WEP?
No. 128-bit WEP will not communicate with 64-bit WEP. Although 128 bit WEP
also uses a 24 bit Initialization Vector, but it uses a 104 bit as secret key. Users
need to use the same encryption level in order to make a connection.