Top Banner
Introduction of wireless Link in Terminal Automation at HPCL Loni. Hindustan Petroleum Corporation limited having one of its gas plant at Loni, Ghaziabad, which was automated by M/S Honeywell Automation India Ltd. In 2001-2002. Automation in Plant is working fine over LAN connectivity suddenly one Ethernet Cable between control room to planning room got damaged/break. In addition to above I would like to introduce that distance between control rooms and planning room is more than 200 meters with 50 meters hard RCC platforms in between. And hence replacement of faulty Ethernet cable was a big project and very typical against all HPCL and Honeywell team. Suddenly one great idea of wireless communication clicked, while testing the same it was found ok and lots of advantage over wired LAN/optic fibre cable
40
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Wireless Technology

Introduction of wireless Link in Terminal Automation at HPCL Loni.

Hindustan Petroleum Corporation limited having one of its gas plant at Loni,

Ghaziabad, which was automated by M/S Honeywell Automation India Ltd.

In 2001-2002.

Automation in Plant is working fine over LAN connectivity suddenly one

Ethernet Cable between control room to planning room got damaged/break.

In addition to above I would like to introduce that distance between control

rooms and planning room is more than 200 meters with 50 meters hard RCC

platforms in between. And hence replacement of faulty Ethernet cable was a

big project and very typical against all HPCL and Honeywell team.

Suddenly one great idea of wireless communication clicked, while testing

the same it was found ok and lots of advantage over wired LAN/optic fibre

cable link . Then it finalized to have wireless link instead of wired link.

Page 2: Wireless Technology

A local area network (LAN) is a network that connects computers and devices in

a limited geographical area such as home, school, computer laboratory, office

building, or closely positioned group of buildings. Each computer or device on the

network is a node. Current wired LANs are most likely to be based on Ethernet

technology, although new standards like ITU-T G.hn also provide a way to create

a wired LAN using existing home wires (coaxial cables, phone lines and power

lines)

Wired technologies

Twisted pair: wire is the most widely used medium for telecommunication.

Twisted-pair wires are ordinary telephone wires which consist of two

insulated copper wires twisted into pairs and are used for both voice and

data transmission. The use of two wires twisted together helps to reduce

crosstalk and electromagnetic induction. The transmission speed ranges

from 2 million bits per second to 100 million bits per second.

Coaxial cable: is widely used for cable television systems, office buildings,

and other worksites for local area networks. The cables consist of copper

or aluminum wire wrapped with insulating layer typically of a flexible

material with a high dielectric constant, all of which are surrounded by a

conductive layer. The layers of insulation help minimize interference and

distortion. Transmission speed range from 200 million to more than 500

million bits per second.

Optical fiber cable: consists of one or more filaments of glass fiber

wrapped in protective layers. It transmits light which can travel over

extended distances without signal loss. Fiber-optic cables are not affected

by electromagnetic radiation. Transmission speed may reach trillions of

Page 3: Wireless Technology

bits per second. The transmission speed of fiber optics is hundreds of

times faster than for coaxial cables and thousands of times faster than for

twisted-pair wire.

Although wired LAN has great connectivity and reliability but situation may be the

different as follows;

span a distance beyond the capabilities of typical cabling,

need to provide a backup communications link in case of normal network failure without delaying of 15 – 20 days.

To link portable or temporary workstations,

To overcome situations where normal cabling is difficult or financially impractical, or

To remotely connect mobile users or networks.

To overcome these situations, favor was already given to wireless technology but

recently it was not so much reliable. Now after so many changes and revisions

and after adding new technologies its become a reliable source of networking to

think beyond the wired LAN and also having great connectivity options ( up to

1GBPS is available in market and up to 3GBPS is upcoming in market.) with

great security feature compare to wired LAN.

Wireless communication is the transfer of information over a distance without

the use of enhanced electrical conductors or "wires” The distances involved may

be short (a few meters as in television remote control) or long (thousands or

millions of kilometers for radio communications). When the context is clear, the

term is often shortened to "wireless". Wireless communication is generally

considered to be a branch of telecommunications.

Page 4: Wireless Technology

Wireless NetworkThe bridge provides connectivity to the wireless network for wired machines in remote locations.

Introduction

Wireless operations permits services, such as long range communications, that

are impossible or impractical to implement with the use of wires. The term is

commonly used in the telecommunications industry to refer to

telecommunications systems (e.g. radio transmitters and receivers, remote

controls, computer networks, network terminals, etc.) which use some form of

energy (e.g. radiofrequency (RF), infrared light, laser light, visible light, acoustic

energy, etc.) to transfer information without the use of wires. Information is

transferred in this manner over both short and long distances.i.e. the various

types of unlicensed 2.4 GHz WiFi devices) is used to meet many needs. Perhaps

the most common use is to connect laptop users who travel from location to

location. Another common use is for mobile networks that connect via satellite. A

wireless transmission method is a logical choice to network a LAN segment that

must frequently change locations. The following situations justify the use of

wireless technology:

To span a distance beyond the capabilities of typical cabling,

To provide a backup communications link in case of normal network failure ,

To link portable or temporary workstations,

To overcome situations where normal cabling is difficult or financially impractical, or

To remotely connect mobile users or networks.

Page 5: Wireless Technology

Applications may involve, point to point communication, point-to-multipoint communication, broadcasting, cellular networks and other.

Point to point communications is a term that is used in the

telecommunications fields which refer to communications which is accomplished

via a specific and distinct type of single point connection.

Page 6: Wireless Technology

Point-to-multipoint communication is a term that is used in the

telecommunications field which refers to communication which is accomplished

via a specific and distinct type of multipoint connection, providing multiple paths

from a single location to multiple locations

Wireless Distribution System :

WDS is a system that enables the wireless interconnection of access points. It

allows a wireless network to be expanded using multiple access points without

the need for a wired backbone to link them, as is traditionally required. The

notable advantage of WDS over other solutions is that it preserves the MAC

addresses of client frames across links between access points

An access point can be either a main, relay or remote base station. A main base

station is typically connected to the wired Ethernet. A relay base station relays

data between remote base stations, wireless clients or other relay stations to

either a main or another relay base station. A remote base station accepts

connections from wireless clients and passes them on to relay or main stations.

Connections between "clients" are made using MAC addresses rather than by

specifying IP assignments.

All base stations in a Wireless Distribution System must be configured to use the

same radio channel, method of encryption (none, WEP, or WPA) and encryption

Page 7: Wireless Technology

keys. They can be configured to different service set identifiers (Known as SSI).

WDS also requires that every base station be configured to forward to others in

the system.

WDS may also be referred to as repeater mode because it appears to bridge and

accept wireless clients at the same time (unlike traditional bridging). It should be

noted; however, that throughput in this method is halved for all clients connected

wirelessly.

WDS can be used to provide two modes of wireless AP-to-AP connectivity:

Wireless Bridging in which WDS APs communicate only with each other

and don't allow wireless clients or Stations (STA) to access them

Wireless Repeating in which APs communicate with each other and with

wireless STAs

Two disadvantages to using WDS are:

The maximum wireless effective throughput is halved after the first

retransmission (hop) that is made. For example, in the case of two routers

connected via WDS, and communication is made between a computer

that is plugged into router A and a laptop that is connected wirelessly

using router B's access point, the throughput is halved, because router B

has to retransmit the information during the communication of the two

sides. However, in the case of communications between a computer that

is plugged into router A and a computer that is plugged into router B, the

throughput is not halved since there is no need to retransmit the

information. ( Note: This one not covered in case of terminal Automation System or in plant operation)

Dynamically assigned and rotated encryption keys are usually not

supported in a WDS connection. This means that dynamic Wi-Fi Protected

Access (WPA) and other dynamic key assignment technology in most

cases can not be used, though WPA using pre-shared keys is possible.

Page 8: Wireless Technology

This is due to the lack of standardization in this field, which may be

resolved with the upcoming 802.11s standard. As a result only static WEP

or WPA keys may be used in a WDS connection, including any STAs that

associate to a WDS repeating AP.

Recent Apple base and some other brands stations allow WDS with WPA,

though in some cases firmware updates are required. Firmware for the Renasis

SAP36g Super Access Point and most third party firmware for the Linksys

WRT54G(S)/GL support AES encryption using WPA2-PSK Mixed Mode security,

and TKIP encryption using WPA-PSK, while operating in WDS mode. However,

this mode may not be compatible with other units running stock or alternate

firmware.

Wireless Router Application Platform:

Operating System

The WRAP is capable of running many different operating systems, including

various Linux distributions, FreeBSD, NetBSD, OpenBSD, as well as proprietary

OSes. The WRAP lacks a keyboard controller (for obvious reasons), so some

OSes that rely on one for the boot process may have to be modified

Wireless Bridge:

A wireless bridge is a hardware component used to connect two or more

network segments (LANs or parts of a LAN) which are physically and logically (by

protocol) separated. It does not necessarily always need to be a hardware

device, as some operating systems (such as Windows, Linux, Mac OS X and

FreeBSD) provide software to bridge different protocols. This is seen commonly

in protocols over wireless to cable. So in a

Page 9: Wireless Technology
Page 10: Wireless Technology

Many wireless routers and wireless access points offer either a "bridge" mode or

a "repeater" mode, both of which perform a similar common function. The

difference being the bridge mode connects to different protocol types and the

repeater modes relays the same protocol type. Wireless routers, access points,

and bridges are available that are compliant with the IEEE802.11a, b, g and n

standards. The frequency bands for these wireless standards can be used

license-free in most countries.

Wireless bridge devices work in pairs (point-to-point), one on each side of the

"bridge". However, there can be many simultaneous "bridges" using one central

device (point to multipoint).[3]

Bridging can be via WDS (Wireless Distribution System) which creates a

transparent Level 2 wireless bridge between 2 or more points. Alternately the

bridge can be setup as an Access Point / Client relationship which requires the

wireless devices used for the bridge to be set to the same service set identifier

(SSID).

An example of a point to point bridge application connecting two commercial

buildings. An example of a combination point to point bridge and point to

multipoint application connecting multiple farm buildings.

Bridging has historically referred to propagation of data across a device without

traversing a network stack, such as TCP/IP. Wireless bridging is a colloquial

term. A more accurate description of connecting two local area networks would

be a Wireless LAN to LAN Bridge. The distinction is important. While a device

may not support bridging to a remote wireless access point to connect two LANs,

it may be desirable (and supported) that a wireless access point support true

bridging; where packets traverse from a wireless to wired network without

passing through an internal protocol stack, firewall or other network abstraction.

Two bridged networks could be treated as parts of a single subnet under Internet

Protocol (IP). A wireless client would be able to make a DHCP request from a

Page 11: Wireless Technology

wired server if the wired and wireless networks were bridged. In the ISO OSI

model, a device in which packets traverse the network layer is considered a

router; a device in which packets traverse the data link layer only is considered a

bridge.

A wireless router is a device that performs the functions of a router but also

includes the functions of a wireless access point. It is commonly used to allow

access to the Internet or a computer network without the need for a cabled

connection. It can function in a wired LAN (local area network), a wireless only

LAN, or a mixed wired/wireless network. Most current wireless routers have the

following characteristics:

A wireless router is a device that performs the functions of a router but also

includes the functions of a wireless access point. It is commonly used to allow

access to the Internet or a computer network without the need for a cabled

Page 12: Wireless Technology

connection. It can function in a wired LAN (local area network), a wireless only

LAN or a mixed wired/wireless network. Most current wireless routers have

thefollowing characteristics:

LAN ports, which function in the same manner as the ports of a network

switch

A WAN port, to connect to a wide area network, typically one with Internet

access. External destinations are accessed using this port. If it is not used,

many functions of the router will be bypassed.

Wireless antennae. These allow connections from other wireless devices

(NICs (network interface cards), wireless repeaters, wireless access

points, and wireless bridges, for example), usually using the Wi-Fi

standard

Security

One issue with corporate wireless networks in general, and WLANs in

particular, involves the need for security. Many early access points could

not discern whether or not a particular user had authorization to access

the network. Although this problem reflects issues that have long troubled

many types of wired networks (it has been possible in the past for

individuals to plug computers into randomly available Ethernet jacks and

get access to a local network), this did not usually pose a significant

problem, since many organizations had reasonably good physical security.

However, the fact that radio signals bleeds outside of buildings and across

property lines makes physical security largely irrelevant to Piggybackers.

There are three principal ways to secure a wireless network.

For closed networks (like home users and organizations) the most

common way is to configure access restrictions in the access points.

Those restrictions may include encryption and checks on MAC address.

Another option is to disable ESSID broadcasting, making the access point

Page 13: Wireless Technology

difficult for outsiders to detect. Wireless Intrusion Prevention Systems can

be used to provide wireless LAN security in this network model.

For commercial providers, hotspots, and large organizations, the preferred

solution is often to have an open and unencrypted, but completely isolated

wireless network. The users will at first have no access to the Internet nor

to any local network resources. Commercial providers usually forward all

web traffic to a captive portal which provides for payment and/or

authorization. Another solution is to require the users to connect securely

to a privileged network using VPN.

Wireless networks are less secure than wired ones; in many offices

intruders can easily visit and hook up their own computer to the wired

network without problems, gaining access to the network, and it's also

often possible for remote intruders to gain access to the network through

backdoors like Back Orifice. One general solution may be end-to-end

encryption, with independent authentication on all resources that shouldn't

be available to the public.

Access Control at the Access Point level

One of the simplest techniques is to only allow access from known, approved

MAC addresses. However, this approach gives no security against sniffing, and

client devices can easily spoof MAC addresses, leading to the need for more

advanced security measures.

Another very simple technique is to have a secret ESSID (id/name of the wireless

network), though anyone who studies the method will be able to sniff the ESSID.

Today all (or almost all) access points incorporate Wired Equivalent Privacy

(WEP) encryption and most wireless routers are sold with WEP turned on.

Page 14: Wireless Technology

However, security analysts have criticized WEP's inadequacies, and the U.S. FBI

has demonstrated the ability to break WEP protection in only three minutes using

tools available to the general public.

The Wi-Fi Protected Access (WPA and WPA2) security protocols were later

created to address these problems. If a weak password, such as a dictionary

word or short character string is used, WPA and WPA2 can be cracked. Using a

long enough random password (e.g. 14 random letters) or passphrase (e.g. 5

randomly chosen words) makes pre-shared key WPA virtually uncrackable. The

second generation of the WPA security protocol (WPA2) is based on the final

IEEE 802.11i amendment to the 802.11 standard and is eligible for FIPS 140-2

compliance. With all those encryption schemes, any client in the network that

knows the keys can read all the traffic.

Restricted access networks

Solutions include a newer system for authentication, IEEE 802.1x, that promises

to enhance security on both wired and wireless networks. Wireless access points

that incorporate technologies like these often also have routers built in, thus

becoming wireless gateways.

End-to-End encryption

One can argue that both layer 2 and layer 3 encryption methods are not good

enough for protecting valuable data like passwords and personal emails. Those

technologies add encryption only to parts of the communication path, still

allowing people to spy on the traffic if they have gained access to the wired

network somehow.

Open Access Points

Today, there is almost full wireless network coverage in many urban areas - the

infrastructure for the wireless community network (which some consider to be the

Page 15: Wireless Technology

future of the internet) is already in place. One could roam around and always be

connected to Internet if the nodes were open to the public, but due to security

concerns, most nodes are encrypted and the users don't know how to disable

encryption. Many people consider it proper etiquette to leave access points open

to the public, allowing free access to Internet. Others think the default encryption

provides substantial protection at small inconvenience, against dangers of open

access that they fear may be substantial even on a home DSL router.

The density of access points can even be a problem - there are a limited number

of channels available, and they partly overlap. Each channel can handle multiple

networks, but places with many private wireless networks (for example,

apartment complexes), the limited number of Wi-Fi radio channels might cause

slowness and other problems.

According to the advocates of Open Access Points, it shouldn't involve any

significant risks to open up wireless networks for the public:

The wireless network is after all confined to a small geographical area. A

computer connected to the Internet and having improper configurations or

other security problems can be exploited by anyone from anywhere in the

world, while only clients in a small geographical range can exploit an open

wireless access point. Thus the exposure is low with an open wireless

access point, and the risks with having an open wireless network are

small. However, one should be aware that an open wireless router will

give access to the local network, often including access to file shares and

printers.

The only way to keep communication truly secure is to use end-to-end

encryption. For example, when accessing an internet bank, one would

almost always use strong encryption from the web browser and all the way

to the bank - thus it shouldn't be risky to do banking over an unencrypted

wireless network. The argument is that anyone can sniff the traffic applies

to wired networks too, where system administrators and possible crackers

Page 16: Wireless Technology

have access to the links and can read the traffic. Also, anyone knowing

the keys for an encrypted wireless network can gain access to the data

being transferred over the network.

If services like file shares, access to printers etc. are available on the local

net, it is advisable to have authentication (i.e. by password) for accessing

it (one should never assume that the private network is not accessible

from the outside). Correctly set up, it should be safe to allow access to the

local network to outsiders.

With the most popular encryption algorithms today, a sniffer will usually be

able to compute the network key in a few minutes.

It is very common to pay a fixed monthly fee for the Internet connection,

and not for the traffic - thus extra traffic will not hurt.

Where Internet connections are plentiful and cheap, freeloaders will

seldom be a prominent nuisance.

On the other hand, in some countries including Germany [1], persons providing an

open access point may be made (partially) liable for any illegal activity conducted

via this access point.

Introduction to the Wireless LAN Adapters:

The Cisco Aironet Wireless LAN Client Adapters, also referred to as adapters,

are radio modules that provide transparent, wireless, data communications

between fixed, portable, or mobile devices and other wireless devices or a wired

network infrastructure. The adapters are fully compatible when used in devices

supporting Plug-and-Play (PnP) technology. Host devices can be any device

equipped with a PC Card Type II or Type III slot. These devices include:

• Desktop systems

• Portable laptops

Page 17: Wireless Technology

• Notebook computers

• Personal digital assistants

• Pen based computers

• Other data collection devices

The primary function of the adapters is to transfer data packets

transparently through the wireless infrastructure. The adapters operate

similarly to a standard network product except that the cable is replaced

with a radio connection. No special wireless networking functions are

required, and all existing applications that operate over a network can

operate using the adapters.

The PC Card can also be built into peripheral devices such as printers to provide

them with a transparent wireless connection to a wired network.

Page 18: Wireless Technology

This document covers three types of adapters:

• PC card client adapter (also referred to as a PC card)—A PCMCIA card radio

module that can be inserted into any device equipped with an external Type II or

Type III PC card slot. Host devices can include laptops, notebook computers,

personal digital assistants, and hand-held or portable devices.

• LM card client adapter (also referred to as an LM card)—A PCMCIA card

radio module that can be inserted into any device equipped with an internal Type

II or Type III PC card slot. Host devices usually include hand-held or portable

devices.

• PCI client adapter—a client adapter card radio module that can be inserted

into any device equipped with an empty PCI expansion slot, such as a desktop

computer.

Refer to the "Radio Antenna" section for antenna differences between these

adapters.

Terminology

Throughout this document, these terms are used:

• client adapter—Refers to all three types of adapters

• PC card, LM card, or PCI client adapter—refers only to a specific adapter

Page 19: Wireless Technology

• workstation (or station)—Refers to a computing device with an installed client

adapter

• End Node—A client node that is located at the end of the Network Tree.

• Infrastructure. — The wireless infrastructure is the communications system

that combines access points, mobile nodes, and fixed nodes. Access points

within the infrastructure can be either root units, which are physically wired to the

LAN backbone, or can act as wireless repeaters. Other RF enabled devices

serve as fixed nodes or mobile client nodes.

• Parent/Child Node—Refers to the relationships between nodes in the

wireless infrastructure. The complete set of relationships is sometimes described

as a network tree. For example, the access point (at the top of the tree) would be

the parent of the end nodes. Conversely, the end nodes would be the children of

the access point.

• Power Saving Protocol (PSP) and Non-Power Saving Protocol—The Power

Saving Protocol allows computers (usually portable computers) to power up only

part of the time to conserve energy. If a client node is using the Power Saving

Protocol to communicate with the network, the access point must be aware of

this mode and implement additional features such as message store and

forward. If the client node is powered from an AC line, do not use PSP.

• Repeater— A repeater is an access point that extends the radio range of the

infrastructure. A repeater is not physically attached to the wired LAN, but

communicates through radio to another access point, which is either a root unit

or another repeater.

• Root Unit. — The root unit is an access point that is located at the top, or

starting point, of a wireless infrastructure. A root unit provides the physical

connection to the wired LAN and contains configuration information in its

Page 20: Wireless Technology

association table that covers all nodes that access the wired network (backbone).

All access points directly attached to the wired LAN backbone are root units.

Parts of the Client Adapter

The client adapter is composed of three major parts: a radio, a radio antenna,

and two LEDs.

Radio

The client adapter contains a direct-sequence spread spectrum (DSSS) radio

that operates in the 2.4-GHz license-free Industrial Scientific Medical (ISM) band.

The radio transmits data over a half-duplex radio channel operating at up to 11

Mbps.

DSSS technology causes radio signals to be transmitted over a wide frequency

range, using multiple frequencies simultaneously. The benefit of this technology

is its ability to protect the data transmission from interference. For example, if a

particular frequency encounters noise, interference, or both, enough redundancy

is built into the signal on other frequencies that the client adapter usually is

successful in its transmission.

Radio Antenna

The type of antenna used depends on your client adapter:

• PC cards have an integrated, permanently attached diversity antenna. The

benefit of the diversity antenna system is improved coverage. The system works

by allowing the card to switch and sample between its two antenna ports in order

to select the optimum port for receiving data packets. As a result, the card has a

better chance of maintaining the radio frequency (RF) connection in areas of

interference. The antenna is located within the section of the card that protrudes

from the PC card slot when the card is installed.

Page 21: Wireless Technology
Page 22: Wireless Technology

Fig: Typical wireless Installation diagram

• LM cards are shipped without an antenna; however, an antenna can be

connected through the card's external connector. If a snap-on antenna is used, it

should be operated in diversity mode. Otherwise, the antenna mode used should

correspond to the antenna port to which the antenna is connected.

• PCI client adapters are shipped with a 2-dBi dipole antenna that attaches to

the adapter's antenna connector. However, other types of antennas can be used.

PCI adapters can be operated only through the antenna port located on the right

side of the radio module (not to be confused with the antenna connector on the

card carrier).

LEDs

The adapter has two LEDs that glow or blink to show the status of the adapter or

to convey error messages.

Radio Ranges

Because of differences in component configuration, placement, and physical

environment, every network application is a unique installation. Before installing

the system, you should perform a site survey in order to determine the optimum

utilization of networking components and to maximize range, coverage, and

network performance.

Here are some operating and environmental conditions that you need to

consider:

• Data Rates—Sensitivity and range are inversely proportional to data bit rates.

The maximum radio range is achieved at the lowest workable data rate. There is

a decrease in receiver threshold sensitivity as the radio data rate increases.

Page 23: Wireless Technology

• Antenna Type and Placement—Proper antenna configuration is a critical

factor in maximizing radio range. As a general guide, range increases in

proportion to antenna height.

• Physical Environments—Clear or open areas provide better radio range than

closed or filled areas. Also, the less cluttered the work environment, the greater

the range.

• Obstructions— Avoid locating the computing device and antenna in a location

where there is a metal barrier between the sending and receiving antennas.

• Building Materials—Radio penetration is greatly influenced by the building

material used in construction. For example, drywall construction allows greater

range than concrete blocks. Metal or steel construction is a barrier to radio

signals.

Link Test

The link test tool is used to determine RF coverage. The test results help the

installer eliminate low RF signal level area that can result in loss of connection.

Data Transparency and Protocols

The Cisco Aironet Wireless LAN Adapter transports data packets transparently

as they move through the wireless infrastructure. The PC Card operates similarly

to a standard network product except that the wire is replaced with a radio

connection. No special wireless networking functions are required. All existing

applications, which operate over a network, operate using the Cisco Aironet

Wireless LAN Adapter.

Protocols Supported

The Cisco Aironet Wireless LAN Client Adapter can be used in a variety of

infrastructure configurations. Cisco Aironet access points provide connections to

Page 24: Wireless Technology

Ethernet Networks. When using the Cisco Aironet standard device drivers, the

PC Card is fully compliant with the protocols and wired networks listed in Table

.

Security Features

The Cisco

Aironet Wireless LAN Client Adapter employs Direct Sequence Spread Spectrum

Technology, previously developed for military anti-jamming and low probability of

intercept radio systems.

The access point must be set to the same SSID as all other devices on the

wireless infrastructure. Units with a different SSID cannot directly communicate

with each other.

System Configurations

The Cisco Aironet Wireless LAN Client Adapter can be used in a variety of

network system configurations. Access points provide connections to your

Ethernet networks or act as repeaters increasing wireless communication range.

The maximum communication range is based on how you configure your

wireless infrastructure.

Examples of some common system configurations are shown on the pages that

follow, along with a description of each.

Table 1-1 Protocols Supported

Drivers Operating Systems

ODI MS-DOS-based driver for Novell NetWare

NDIS2 MS-DOS, Windows 3.xx

Packet MS-DOS, Windows 3.xx

Page 25: Wireless Technology

Ad Hoc Wireless LAN

An ad hoc wireless LAN is the simplest wireless LAN configuration. In a wireless

LAN, using an ad hoc network operating system (such as Windows for

Workgroups), all devices equipped with the PC Card can be linked together and

communicate directly with each other

Wireless Infrastructure with Workstations Accessing a Wired LAN

A micro-cellular network can be created by placing two or more access points on

a LAN. The roaming protocols allow remote workstations to move from one

microcell domain to another. The process is seamless and transparent. The

connection to the file server or host is maintained without disruption. This

configuration is useful with portable or mobile stations, allowing them to be

directly connected to the wired network even while moving about (roaming).

When an infrastructure is configured by using multiple access points and

repeaters, a mobile station is automatically associated and re-associated to the

access point which provides the best performance. This is referred to as

seamless roaming.

Typical diagram for Wireless Infrastructure with Workstations Accessing a Wired

LAN

Page 26: Wireless Technology

Comparison:

Computer networks for the home and small business can be built using either

wired or wireless technology. Wired Ethernet has been the traditional choice in

homes, but Wi-Fi wireless technologies are gaining ground fast. Both wired and

wireless can claim advantages over the other; both represent viable options for

home and other local area networks (LANs).

Below we compare wired and wireless networking in five key areas:

ease of installation

total cost

reliability

performance

security

About Wired LANs

Wired LANs use Ethernet cables and network adapters. Although two computers

can be directly wired to each other using an Ethernet crossover cable, wired

Page 27: Wireless Technology

LANs generally also require central devices like hubs, switches, or routers to

accommodate more computers.

For dial-up connections to the Internet, the computer hosting the modem must

run Internet Connection Sharing or similar software to share the connection with

all other computers on the LAN. Broadband routers allow easier sharing of cable

modem or DSL Internet connections, plus they often include built-in firewall

support.

Installation

Ethernet cables must be run from each computer to another computer or to the

central device. It can be time-consuming and difficult to run cables under the floor

or through walls, especially when computers sit in different rooms. Some newer

homes are pre-wired with CAT5 cable, greatly simplifying the cabling process

and minimizing unsightly cable runs.

After hardware installation, the remaining steps in configuring either wired or

wireless LANs do not differ much. Both rely on standard Internet Protocol and

network operating system configuration options. Laptops and other portable

devices often enjoy greater mobility in wireless home network installations (at

least for as long as their batteries allow).

Cost

Ethernet cables, hubs and switches are very inexpensive. Some connection

sharing software packages, like ICS, are free; some cost a nominal fee.

Broadband routers cost more, but these are optional components of a wired LAN,

and their higher cost is offset by the benefit of easier installation and built-in

security features.

Page 28: Wireless Technology

Reliability

Ethernet cables, hubs and switches are extremely reliable, mainly because

manufacturers have been continually improving Ethernet technology over several

decades. Loose cables likely remain the single most common and annoying

source of failure in a wired network. When installing a wired LAN or moving any

of the components later, be sure to carefully check the cable connections.

Broadband routers have also suffered from some reliability problems in the past.

Unlike other Ethernet gear, these products are relatively new, multi-function

devices. Broadband routers have matured over the past several years and their

reliability has improved greatly.

Performance

Wired LANs offer superior performance. A traditional Ethernet connection offer

only 10 Mbps bandwidth, but 100 Mbps Fast Ethernet technology costs little

more and is readily available. Although 100 Mbps represents a theoretical

maximum performance never really achieved in practice, Fast Ethernet should be

sufficient for home file sharing, gaming, and high-speed Internet access for many

years into the future.

Wired LANs utilizing hubs can suffer performance slowdown if computers heavily

utilize the network simultaneously. Use Ethernet switches instead of hubs to

avoid this problem; a switch costs little more than a hub.

Security

For any wired LAN connected to the Internet, firewalls are the primary security

consideration. Wired Ethernet hubs and switches do not support firewalls.

However, firewall software products like Zone Alarm can be installed on the

computers themselves. Broadband routers offer equivalent firewall capability built

into the device, configurable through its own software.