WIRELESS LAN & PDA CIS 454 (LAN) Prof. Ganesan Group members & outline • Belinda – Wireless LAN • Anthony Vu – Topology & wireless technology of LAN • Ka Yan (Susana) Chung – Implementation of wireless LAN • Norman-Ngan Vu Lam – Personal Digital Assistant (PDA) WIRELESS LAN WIRLESS LOCAL AREA NETWORK INTRODUCTION • It is a flexible data communications system implemented as an extension to, or as an alternative for, a wired LAN. • Using radio frequency (RF) technology, wireless LANs transmit and receive data over the air, minimizing the need for wired connections. • With wireless LANs, users can access shared information without looking for a place to plug in, and network managers can set up or augment network without installing or moving wires. WHY WIRELESS? Wireless LANs offer the following Productivity, convenience, and cost advantages over traditional wired networks: • MOBILITY • INSTALLATION SPEED AND SIMPLICITY. • INSTALLATION FLEXIBILITY. • REDUCED COST-OF-OWNERSHIP. • SCALABILITY. MOBILITY Wireless LAN systems can provide LAN users with access to real-time information anywhere at work and in the home. INSTALLATION SPEED AND SIMPLICITY Installing a wireless LAN system can be fast and easy and can eliminate the need to pull cable through walls and ceilings. INSTALLATION FLEXIBLITY Wireless technology allows the network to go where wire cannot go. REDUCED COST-OFOWNERSHIP While the initial investment required for wireless LAN hardware can be higher than the cost of wired LAN hardware, overall installation expenses and life-cycle costs can be significantly lower. Long-term cost and benefits are greatest in dynamic environments requiring frequent moves and changes. SCALABILITY Wireless LAN systems can be configured in a variety of topologies to meet the needs of specific applications and installations. Configurations are easily changed and range from peer-to-peer networks suitable for a small number of users to full infrastructure networks for thousands of users that enable roaming over a broad area. OVERVIEW BY INDUSTRY • Currently wireless LAN is not a replacement for the wired infrastructure, but it is a significant complement to what currently exists. Some examples in the industry are: – – – – – EDUCATION. MANFACTURING COMPANIES. HEALTHCARE. RETAIL. FINANCIAL/OFFICE-AUTOMATION. MAJOR FINDINGS IN THE INDUSTRIES • 89% Of the companies experienced a successful implementation. • 92% of respondents interviewed believe there is a definite economic and business benefit after installation. • 92% of respondents reported that they will continue to deploy wireless technology in their network through 2000 because of the benefits experienced by end users and/or IT staff. • Payback was less than one year, across all industries surveyed. Cost Chart RETAIL MANUFACTURING HEALTHCARE OFFICE AUTOMATION EDUCATION Benefits per Company (millions $) 5.6 2.2 .94 2.5 .5 Costs per Company (millions $) 4.2 1.3 .90 1.3 .3 9.7 7.2 11.4 6.3 7.1 Payback (#of months) Wireless Topology • Topologies are architectural drawings representing the cable layout for the wireless LAN. • Topologies of a network are the physical configuration of the nodes in the network. • They can be hardware dependent. Topologies Star Topology (Centralized) • Star topology is probably the oldest topology used for data communication. Star Topology (cont) • Computers are connected through a series of point-to-point dedicated circuits. • Each computer is linked by a separate full-duplex point-to-point through the central computer. • It is easy to set up. Bus Topology • Star topology is sometimes known as the linearbus topology. • All terminals share a single cable to transmit and receive messages. • There are endpoints to cable segment commonly known as terminating points. Physical Bus Topology Ring Topology • In the ring topology, all computers are connected in a close loop. • Each computer links to the next one. • There is no endpoints to this cable topology. • Messages can travel around the ring in one direction. Physical Ring Topology Speed and Distance • Transmission speed worsens problems – Error rates increase because bit periods are smaller and are more likely to be damaged by brief noise spikes and interference. – High speeds create high-frequency components in the signal that attenuate more rapidly than lower-frequency components. – In general, as speed increases, maximum distance decreases, although improving technology can lessen the decrease. Applications According to Electromagnetic Spectrum How cellular phone works ? (cont.) This process takes the same amount of time that it takes to make a call from a landline phone. Solid Objects Between Office Buildings How Does Satellite Work? • Communication • Frequency • Uplink & downlink Between Ground Unit and Satellite Attenuation • As signal travels, gets weaker – If too weak, cannot tell 1s and 0s Distance Distortion • As signal travels, it become distorted – Changes shape – Successive bits may merge, making reception difficult Distance Noise • Unwanted energy on line. Always present • Noise floor is average level • Noise spikes will cause problems Signal Strength Signal Noise Spike Noise Floor Time Approaching the Noise Floor • Attenuation will bring signal ever closer to the noise floor, creating more errors Signal Strength Signal Noise Floor Distance Interference • Unwanted signal from outside sources – Often intermittent, difficult to diagnose Signal Strength Signal Interference Implementation of Wireless LAN by Susana Wired Vs. Wireless LAN. • Wired LAN transmit data in cables such as twisted pair, coaxial, and fiber optic cable. • Wireless LAN transmit data in air, it use infrared (IR) or radio frequency (RF) to transmit data on air. Radio Frequency (RF) • Microwave transmission high frequency, narrow band radio waves that require special license. • Spread spectrum - spread signal over a range of frequency, therefore, harder to intercept • RF electromagnetic wave can easily pass through ordinary wall, it needs to implement with heavy concrete or metal screening. Infrared (IR) • Indoor infrared is the most secure wireless LAN, it’s the easiest types of wireless signal to contain with a certain location. Also, no license needed. • Use to connect nodes over small distance. • Point-to-point infrared must be within sight of each other with no obstacles in the path of signal. • Signal would be weaken by moist environment, dusty environment, person in signal path, and sheet of plastic. Wireless LAN Hardware Implementation • A wireless NIC - connect nodes to transmission medium. Allow communication between node and network. Consist of on board transceiver, & fix/external antenna. • For PC, wireless NIC are either PCI/ISA, for laptop, it uses PCMCIA type II card. • Installs driver to configure NIC. • Another option of wireless LAN implementation is “wireless LAN adapter” - external desktop transceiver and antenna connect to PC through parallel port and it function like a NIC. Wire Replacement System • It use wireless transmission instead of cabling to communicate with backbone. • Make use of existing Ethernet . • Use device called “user modules and control modules.” • User module is a desktop transceiver and antenna can be shared with up to 8 nodes with Ethernet cards that are individually wired to the user module. • Control modules are similar to AP, it allow communication with wired backbone through control modules. Data-link Layer • Data-link layer of the OSI model governs a node’s access to a shared medium. • Logical link control (LLC) layer deal with communication between nodes over a single link of network. • Media access control (MAC) layer which define how user obtain access to the shared medium when they need it. “OSI 7 layers” Different Types of MAC •Random Access MAC •Ordered MAC •Deterministic MAC Random Access MAC • • • • Simple to implement Offer fast response time under light network traffic Offer effective throughput under heavy traffic Wired network use CSMA/CD protocol to ensure data transmit efficiently (it checks if line is free, then transmits and listen if there’s collision, if collision, it stops and waits for re-send) • Wireless NICs can’t transmit and receive on the same frequency at the same time, therefore, it can’t detect collisions. Random Access MAC (continue) • Wireless NIC might not aware of all other node on network known as “hidden node” (a node outside of coverage area) Wireless network use CSMA/CA - Carrier sense multiply access with collision avoidance. Also known as LBT - Listen before you talk. (Check if line I free, if yes, send and wait for acknowledgment for receiving node, if no acknowledgement receive within set period of time, it assume a collision occur and wait to re-send) • CSMA/CA can’t be use when there’s hidden node • CSMA/CA cam be adapted to use with hidden node with the use of RTS/CTS/ACK - request to send/clear to send/acknowledge. Ordered MAC • Ordered MAC is unsuitable for wireless LAN because it is possible for a node to leave the bus or ring and break the orders Deterministic MAC (3 types) 1) Time division multiple access (TDMA) - each node given the same set amount of time to transmit data. -Another type of TDMA is reservation/polling MAC - node sends request to control point to request channel, channels are issue on a “first come first serve” base. 2) Frequency division multiple access (FDMA) - available bandwidth is divide into channels of different frequency and nodes allocate a particular frequency. 3) Code division multiple access (CDMA) - nodes share same channel bandwidth but use different spreading code to prevent interference. Deterministic MAC (continue) • Deterministic MAC provide effective throughout and response time when network traffic is heavy. • Each node must request access from control point before transmitting, therefore, deterministic MAC have slower response time than Random Access MACs in light traffic conditions. CSMA/TDMA • Combination of random-access MAC and deterministic MAC technique is called CSMA/TDMA. It offers fast response time in light traffic; effective throughout under heavy, but more complexes to administer on the network • CSMA/CA, RTS/CTS/ACK and CSMA/TDMS are suitable for wireless networks. Access Point (AP) Access Point are consists of 1) A wired NIC to communicate with wired backbone 2) A transceiver and antenna to communicate with wireless node within range 3) MAC-layer bridging software. • AP can be use to extend the range of a wireless network or connect an existing wired LAN to a wireless LAN. • Wireless subnets are connected to a wired backbone through AP. • AP bridging ensure only packet destined for wireless nodes within its service are forwarded to the wireless subnet. Bridging • Bridging - device that filters traffic between different section of the same network, of different LAN • It acts like a repeater, & sends data to both wired and wireless network. 1) Bridging software processes data and analyzes address info on packet. 2) It construct a table indicate location of each node. 3) Each time it receives packet, it checks if destination address is in table 4) If address to wired LAN, it checks if on table, if yes, only forward to wired LAN, if not, it forward to both wired and wireless. Bridging (continue) • There are 2 ways to create table 1) Source route algorithm - entire path of the package is included in each frame and bridge record information, most of the routing work is performed by nodes. 2) Spanning tree algorithm - used by most network, bridge notes the direction from which it receives each packet and concludes source node can be reach by sending packet in that direction and record it in table. It regularly exchange configuration message with other bridge, if one fails, network can adjust routing accordingly. • Bridge-to-bridge protocol ensures each network section can only access through a designated bridge. • Table is not permanent. For wired LAN, entries “age out” in hours; in wireless LAN, entries “age out” in minutes. Mobile IP • Wired node’s IP address associate with a particular physical location; wireless node is addressed by a protocol called Mobile IP. • Mobile IP allows nodes to take an IP address with them when they move. • Wireless node using mobile IP is known as a mobile host. • Mobile host can have 2 IP address at a time, one is home address which is permanent; the other is “care of” address which is temporary. • Foreign agents provide mobile host with “care of” address and home agents redirect package from home network to “care of” address. Security • Encryption is an effective security technique, there are 2 types of encryption technique. 1) DES chip - is a symmetric encryption method, use same key for encrypting and decrypting. 2) RSA - is an asymmetric encryption method, use different key encode and decode. Data is encoded using public encryption key, and decoded using private key. • Symmetric encryption is faster than asymmetric, but possible security risk. • Only encrypting sensitive message at higher application level before transmitting can reduce processing time. PERSONAL DIGITAL ASSISTANT (PDA) By Norman-Ngan Vu Lam What is PDA? • Personal Digital Assistant • A handheld PC that is capable of handling all the normal task of the organizer and more. Features of PDA • All Palm organizers include the following features: – Applications: Date Book, Address Book, To Do List, Memo Pad, Expense, Calculator, desktop e-mail connectivity, Security, Games, and HotSync software for local and remote synchronization – Modem-enabled and Internet-ready with TCP/IP software – An infrared port – Windows and Macintosh compatibility** Palm VII • Check stock quotes from the airport. Send e-mail from a taxi. Book a flight, get directions and read the news virtually anywhere, anytime. • Wireless Features of Palm VII • • • • • AAA bateries Data transfer rate at 8kbps 2 MB of RAM Web clipping Palm Query Application (PQA) Web Clipping Apps • Financial – – – • News – – – • ABCNEWS.com ESPN.com USATODAY.com Reference and Directory – – – • Bank of America Fidelity Investments E*Trade Merriam-Webster US WEST Dex Yahoo! People Search Travel and Entertainment – – – MapQuest.com Moviefone.com The Weather Channel iMessenger • Receiving messages – Through your user@Palm.net account – Only first 500 characters are being sent • Sending messages – There are 3 ways to compose text to send. 3 ways to enter data • Graffiti – Only display lower case • Onscreen keyboard – Both lower and upper case • Desktop keyboard – Hotsync technology Graffiti Characters On screen keyboard Area coverage for PDA What’s new? • Unlimited plan • Download web clipping apps at http://www.palm.net/apps/ PDA service plan Basic Plan Expanded Plan Volume Plan Unlimited Plan Monthly service fee $9.99 $24.99 $39.99 $44.99 Kilobytes included in your monthly service fee 50KB1 150KB2 300KB Unlimited Service Plan Options Sample monthly usage4 Each additional kilobyte One-time set-up fee 30 messages 20 stock quotes 10 sports scores 10 traffic reports 10 weather updates $.20 $9.99 90 messages 60 stock quotes 30 sports scores 30 traffic reports 30 weather updates $.20 $9.99 180 messages 120 stock quotes 60 sports scores 60 traffic reports 60 weather updates Unlimited $.20 $0 $9.99 $9.99 Strengths and weaknesses • Pros – Webclipping PQA – iMessaging • Cons – Coverage for wireless services too limited – Only 2MB of storage space – Expensive & monthly service charges too high References • • • • • • Shelly, Cashman, and Serwatka. “ Business Data Communications” International Thomson Publishing, 1998. Naugle, G Mathew. “ Local Area Networking” McGraw-Hill, Inc. New York, 1991. FitzGerald, Jerry & Dennis, Allen. “Business Data Communications and Networking”. John Wiley & Sons, Inc. New York, 1999. Robinson, Teri. “ Mobile Computing” Micro Times. No 203, pg137-39. Feb 8, 2000. www.blackbox.com www.calstatela.edu/cbtweb/curicula/courses/lant01e/lant01e.htm References • www.palm.net • www.palm.com • Hudson, I.J. “Intranet Access In the Palm of your hand” TechWeb www.techweb.com August 23, 1999 • The PC technology guide www.pctechguide.com/25mob2.htm