Chapter 8 - Review

Network+ Guide to Networks, Chapter 8 Review
Wireless Networking


The Wireless Spectrum
All wireless signals are carried through the air by electromagnetic waves. The wireless spectrum is a continuum of the electromagnetic waves used for data and voice communication. On the spectrum, waves are arranged according to their frequencies, from lowest to highest. The wireless spectrum (as defined by the FCC, which controls its use) spans frequencies between 9 KHz and 300 GHz. Each type of wireless service can be associated with one area of the wireless spectrum. AM broadcasting, for example, sits near the low-frequency end of the wireless communications spectrum, using frequencies between 535 and 1605 KHz. Infrared waves belong to a wide band of frequencies at the high-frequency end of the spectrum, between 300 GHz and 300,000 GHz. Most wireless networks use frequencies around 2.4 GHz or 5 GHz and some use frequencies around 3.7 GHz. Figure 8-1 on page 345, shows the wireless spectrum and roughly identifies the range of frequencies associated with major wireless services. Later in this chapter, you will learn specifically which frequencies each technology uses. In the United States, the collection of frequencies available for communication—also known as “the airwaves”—is considered a natural resource available for public use. The FCC grants organizations in different locations exclusive rights to use each frequency. It also determines what frequency ranges can be used for what purposes. Of course, signals propagating through the air do not necessarily remain within one nation. Therefore, it is important for countries across the world to agree on wireless communications standards. ITU is the governing body that sets standards for international wireless services, including frequency allocation, signaling, and protocols used by wireless devices; wireless transmission and reception equipment; satellite orbits; and so on. If governments and companies did not adhere to ITU standards, chances are that a wireless device could not be used outside the country in which it was manufactured.

Characteristics of Wireless Transmission
In previous chapters, you learned about signals that travel over a physical medium, such as a copper or fiber-optic cable. Wired and wireless signals share many similarities, including use of the same Layer 3 and higher protocols, for example. However, the nature of the atmosphere makes wireless transmission vastly different from wired transmission. Because the air provides no fixed path for signals to follow, signals travel without guidance. Contrast this to guided media, such as UTP or fiber-optic cable, which do provide a fixed signal path. The lack of a fixed path requires wireless signals to be transmitted, received, controlled, and corrected differently from wired signals. Just as with wired signals, wireless signals originate from electrical current traveling along a conductor. The electrical signal travels from the transmitter to an antenna, which then emits the signal, as a series of electromagnetic waves, to the atmosphere. The signal propagates through the air until it reaches its destination. At the destination, another antenna accepts the signal, and a receiver converts it back to current. Figure 8-2 on page 346, illustrates this process. Notice that antennas are used for both the transmission and reception of wireless signals. As you would expect, to exchange information, two antennas must be tuned to the same frequency. In communications terminology, this means they share the same channel.


Antennas
Each type of wireless service requires an antenna specifically designed for that service. The service’s specifications determine the antenna’s power output, frequency, and radiation pattern. An antenna’s radiation pattern describes the relative strength over a three-dimensional area of all the electromagnetic energy the antenna sends or receives. A directional antenna issues wireless signals along a single direction. This type of antenna is used when the source needs to communicate with one destination, as in a point-to-point link. A satellite downlink (for example, the kind used to receive digital TV signals) uses directional antennas. In contrast, an omnidirectional antenna issues and receives wireless signals with equal strength and clarity in all directions. This type of antenna is used when many different receivers must be able to pick up the signal, or when the receiver’s location is highly mobile. TV and radio stations use omnidirectional antennas, as do most towers that transmit cellular signals. The geographical area that an antenna or wireless system can reach is known as its range. Receivers must be within the range to receive accurate signals consistently. Even within an antenna’s range, however, signals may be hampered by obstacles and rendered unintelligible.

Signal Propagation
Ideally, a wireless signal would travel directly in a straight line from its transmitter to its intended receiver. This type of propagation, known as LOS (line-of-sight), uses the least amount of energy and results in the reception of the clearest possible signal. However, because the atmosphere is an unguided medium and the path between a transmitter and a receiver is not always clear, wireless signals do not usually follow a straight line. When an obstacle stands in a signal’s way, the signal may pass through the object or be absorbed by the object, or it may be subject to any of the following phenomena: reflection, diffraction, or scattering. The object’s geometry governs which of these three phenomena occurs. Reflection in wireless signaling is no different from reflection of other electromagnetic waves, such as light. The wave encounters an obstacle and reflects—or bounces back—toward its source. For this reason, when assessing wireless transmission, reflection is also called bounce. A wireless signal will bounce off objects whose dimensions are large compared with the signal’s average wavelength. In the context of a wireless LAN, which may use signals with wavelengths between 1 and 10 meters, such objects include walls, floors, ceilings, and the Earth. In addition, signals reflect more readily off conductive materials, like metal, than insulators, like concrete. In diffraction, a wireless signal splits into secondary waves when it encounters an obstruction. The secondary waves continue to propagate in the direction in which they were split. If you could see wireless signals being diffracted, they would appear to be bending around the obstacle. Objects with sharp edges—including the corners of walls and desks—cause diffraction. Scattering is the diffusion, or the reflection in multiple different directions, of a signal. Scattering occurs when a wireless signal encounters an object that has small dimensions compared with the signal’s wavelength. Scattering is also related to the roughness of the surface a wireless signal encounters. The rougher the surface, the more likely a signal is to scatter when it hits that surface. In an office building, objects such as chairs, books, and computers cause scattering of wireless LAN signals. For signals traveling outdoors, rain, mist, hail, and snow may all cause scattering. Because of reflection, diffraction, and scattering, wireless signals follow a number of different paths to their destination. Such signals are known as multipath signals. Figure 8-3 on page 348, illustrates multipath signals caused by these three phenomena.



The multipath nature of wireless signals is both a blessing and a curse. On one hand, because signals bounce off obstacles, they have a better chance of reaching their destination. In environments such as an office building, wireless services depend on signals bouncing off walls, ceilings, floors, and furniture so that they may eventually reach their destination. Imagine how inconvenient and inefficient it would be, for example, to make sure you were standing within clear view of a transmitter to receive a text message. The downside to multipath signaling is that, because of their various paths, multipath signals travel different distances between their transmitter and a receiver. Thus, multiple instances of the same signal can arrive at a receiver at different times. This may cause signals to be misinterpreted, resulting in data errors. Error-correction algorithms will detect the errors and the sender will have to retransmit the signal. The more errors that occur, the slower the throughput; Environments such as manufacturing plants, which contain myriad reflective surfaces, experience greater throughput degradation than relatively open spaces, such as homes.

Signal Degradation
No matter what paths wireless signals take, they are bound to run into obstacles. When they do, the original signal issued by the transmitter will experience fading, or a variation in signal strength as a result of some of the electromagnetic energy being scattered, reflected, or diffracted after being issued by the transmitter. Multipath signaling is a significant cause of fading. Because of fading, the strength of the signal that reaches the receiver is lower than the transmitted signal’s strength. This makes sense because as more waves are reflected, diffracted, or scattered by obstacles, fewer are likely to reach their destination on time and without errors. Excessive fading can cause dropped calls or slow data transmission. As with wired signals, wireless signals also experience attenuation. After a signal is transmitted, the farther it moves away from the transmission antenna the more it weakens. Just as with wired transmission, wireless signals are amplified (if analog) or repeated (if digital) to strengthen the signal so that it can be clearly received. The difference is that the intermediate points through which wireless signals are amplified or repeated are transceivers connected to antennas. However, attenuation is not the most severe flaw affecting wireless signals. Wireless signals are also susceptible to noise. As you learned in Chapter 3, noise is also known as EMI (electromagnetic interference), or, in the context of wireless communications, interference. Interference is a significant problem for wireless communications because the atmosphere is saturated with electromagnetic waves. For example, wireless LANs may be affected by cellular phones, hands-free headsets, microwaves, machinery, or overhead lights. Interference can distort and weaken a wireless signal in the same way that noise distorts and weakens a wired signal. However, because wireless signals cannot depend on a conduit or shielding to protect them from extraneous EMI, they are more vulnerable to noise. The extent of interference that a wireless signal experiences depends partly on the density of signals within a geographical area. Signals traveling through areas in which many wireless communications systems are in use—for example, the center of a metropolitan area—are the most apt to suffer interference.

Frequency Ranges
For many years, wireless networks relied on frequencies in the range of 2.4–2.4835 GHz, more commonly known as the 2.4-GHz band, to send and receive signals. This band offers 11 communications channels that are unlicensed in the United States. An unlicensed frequency is one for which the FCC does not require users to register their service and reserve it for their sole use.
Because the 2.4-GHz band also carries cordless telephone and other types of signals, it is highly susceptible to interference. For example, on your home wireless network, your tablet computer might lose connectivity when your cordless telephone rings. One way to guard against this type of interference is to make sure your access point and cordless telephone use different channels within the 2.4-GHz band. Wireless LANs and WANs may instead use the 5-GHz band, which comprises four frequency bands: 5.1 GHz, 5.3 GHz, 5.4 GHz, and 5.8 GHz. It consists of 24 unlicensed bands, each 20-MHz wide. Because the 5-GHz band is also used by weather and military radar communications in the United States, WLAN equipment using this range of frequencies must be able to monitor and detect radar signals and, if one is detected, switch to a different channel automatically.

Narrowband, Broadband, and Spread-Spectrum Signals
Transmission technologies differ according to how much of the wireless spectrum their signals use. An important distinction is whether a wireless service uses narrowband or broadband signaling. In narrowband, a transmitter concentrates the signal energy at a single frequency or in a very small range of frequencies. In contrast to narrowband, broadband uses a relatively wide band of the wireless spectrum. Broadband technologies, as a result of their wider frequency bands, offer higher throughputs than narrowband technologies. The use of multiple frequencies to transmit a signal is known as spread-spectrum technology because the signal is spread out over the wireless spectrum. In other words, a signal never stays continuously within one frequency range during its transmission. One result of spreading a signal over a wide frequency band is that it requires less power per frequency than narrowband signaling. This distribution of signal strength makes spread-spectrum signals less likely to interfere with narrowband signals traveling in the same frequency band. Spread-spectrum signaling, originally used with military wireless transmissions in World War II, remains a popular way of making wireless transmissions more secure. Because signals are split across several frequencies according to a sequence known only to the authorized transmitter and receiver, it is much more difficult for unauthorized receivers to capture and decode spread-spectrum signals. To generic receivers, signals issued via spread-spectrum technology appear as unintelligible noise. One specific implementation of spread spectrum is FHSS (frequency hopping spread spectrum). In FHSS transmission, a signal jumps between several different frequencies within a band in a synchronization pattern known only to the channel’s receiver and transmitter, as shown in Figure 8-4 on page 350. FHSS devices in the U.S. split the 2.4–2.4835 band into 79 distinct frequencies. Another type of spread-spectrum signaling is called DSSS (direct-sequence spread spectrum). In DSSS, a signal’s bits are distributed over an entire frequency band at once, as shown in Figure 8-5 on page 351. Each bit is coded so that the receiver can reassemble the original signal upon receiving the bits. Most wireless LAN standards specify some form of DSSS modulation.

Fixed vs. Mobile
Each type of wireless communication falls into one of two categories: fixed or mobile. In fixed wireless systems, the locations of the transmitter and receiver do not move. The transmitting antenna focuses its energy directly toward the receiving antenna. This results in a point-to-point link. One advantage of fixed wireless is that, because the receiver’s location is predictable, energy need not be wasted issuing signals across a large geographical area. Thus, more energy can be used for the signal. Fixed wireless links are used in some data and voice applications. For example, a service provider may obtain data services through a fixed link with a satellite.
In cases in which a long distance or difficult terrain must be traversed, fixed wireless links are more economical than cabling. Many types of communications are unsuited to fixed wireless, however. For example, a waiter who uses a wireless handheld computer to transmit orders to the restaurant’s kitchen could not use a service that requires him to remain in one spot to send and receive signals. Instead, wireless LANs, along with cellular telephone, paging, and many other services use mobile wireless systems. In mobile wireless, the receiver can be located anywhere within the transmitter’s range. This allows the receiver to roam from one place to another while continuing to pick up its signal. Now that you understand some characteristics of wireless transmission, you are ready to learn about the way most wireless LANs are structured. Later, you’ll learn about their access methods and how to install wireless connectivity devices.

WLAN (Wireless LAN) Architecture
Because they are not bound by cabling paths between nodes and connectivity devices, wireless networks are not laid out using the same topologies as wired networks. They have their own, different layouts. Smaller wireless networks, in which a small number of nodes closely positioned need to exchange data, can be arranged in an ad hoc fashion. In an ad hoc WLAN, wireless nodes, or stations, transmit directly to each other via wireless NICs without an intervening connectivity device, as shown in Figure 8-6 on page 352.  However, an ad hoc arrangement would not work well for a WLAN with many users or whose users are spread out over a wide area, or where obstacles could stand in the way of signals between stations. Instead of communicating directly with each other in ad hoc mode, nearly all WLANs use the infrastructure mode, which depends on an intervening connectivity device called a wireless access point. A wireless access point (WAP)—also known simply as an access point, or an AP—is a device that accepts wireless signals from multiple nodes and retransmits them to the rest of the network. Access points may also be known as base stations. Access points for use on small office or home networks often include routing functions. As such, they may also be called wireless routers or wireless gateways. To cover its intended range, an access point must have sufficient power and be strategically placed so that stations can communicate with it. For instance, if an access point serves a group of workstations in several offices on one floor in a building, it should probably be located in an open area near the center of that floor. And like other wireless devices, access points contain an antenna connected to their transceivers. An infrastructure WLAN is shown in Figure 8-7 on page 353. It’s common for a WLAN to include several access points. The number of access points depends on the number of stations a WLAN connects. The maximum number of stations each access point can serve varies from 10 to 100, depending on the wireless technology used. Exceeding the recommended maximum leads to a greater incidence of errors and slower overall transmission. Mobile networking allows wireless nodes to roam from one location to another within a certain range of their access point. This range depends on the wireless access method, the equipment manufacturer, and the office environment. As with other wireless technologies, WLAN signals are subject to interference and obstruction that cause multipath signaling. Therefore, a building with many thick, concrete walls, for example, will limit the effective range of a WLAN more severely than an open area divided into cubicles. In most WLAN scenarios, stations must remain within 300 feet of an access point to maintain optimal transmission speeds. In addition to connecting multiple nodes within a LAN, wireless technology can be used to connect two different parts of a LAN or two separate LANs. Such connections typically use a fixed link with directional antennas between two access points, as shown in Figure 8-8 on page 354.
Because point-to-point links only have to transmit in one direction, they can apply more energy to signal propagation than mobile wireless links. As a result of applying more energy to the signal, their maximum transmission distance is greater. In the case of connecting two WLANs, access points could be as far as 1000 feet apart. WLANs support the same protocols (for example, TCP/IP) and operating systems (for example, UNIX, Linux, or Windows) as wired LANs. This compatibility ensures that wireless and wired transmission methods can be integrated on the same network. Only the signaling techniques differ between wireless and wired portions of a LAN. However, techniques for generating and encoding wireless signals vary from one WLAN standard to another. The following section describes the most popular WLAN Physical and Data Link layer standards.

802.11 WLANs
Similar to the development of wired network access technologies, the evolution of wireless access methods did not follow one direct and cooperative path, but grew from the efforts of multiple vendors and organizations. Now, the industry accepts a handful of different wireless technologies. Each wireless technology is defined by a standard that describes unique functions at both the Physical and the Data Link layers of the OSI model. These standards differ in their specified signaling methods, geographic ranges, and frequency usages, among other things. Such differences make certain technologies better suited to home networks and others better suited to networks at large organizations. The most popular wireless standards used on contemporary LANs are those developed by IEEE’s 802.11 committee. IEEE released its first wireless network standard in 1997. Since then, its WLAN standards committee, also known as the 802.11 committee, has published several distinct standards related to wireless networking. Each IEEE wireless network access standard is named after the 802.11 task group (or subcommittee) that developed it. The four IEEE 802.11 task groups that have generated notable wireless standards are 802.11b, 802.11a, 802.11g, and 802.11n. Collectively, these four 802.11 standards are known as Wi-Fi, for wireless fidelity, and they share many characteristics. For example, although some of their Physical layer services vary, all four use half-duplex signaling. In other words, a wireless station using one of the 802.11 techniques can either transmit or receive, but cannot do both simultaneously (assuming the station has only one transceiver installed, as is usually the case). In addition, all 802.11 networks follow the same access method, as described in the following section.

Access Method
In Chapter 2, you learned that the MAC sublayer of the Data Link layer is responsible for appending physical addresses to a data frame and for governing multiple nodes’ access to a single medium. As with 802.3 (Ethernet), the 802.11 MAC services append 48-bit (or 6-byte) physical addresses to a frame to identify its source and destination. The use of the same physical addressing scheme allows 802.11 networks to be easily combined with other IEEE 802 networks, including Ethernet networks. However, because wireless devices are not designed to transmit and receive simultaneously, and, therefore, cannot quickly detect collisions, 802.11 networks use a different access method than Ethernet networks. 802.11 standards specify the use of CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) to access a shared medium. Using CSMA/CA, a station on an 802.11 network checks for existing wireless transmissions before it begins to send data. If the source node detects no transmission activity on the network, it waits a brief, random amount of time, and then sends its transmission.
If the source does detect activity, it waits a brief period of time before checking the channel again. The destination node receives the transmission and, after verifying its accuracy, issues an acknowledgment (ACK) packet to the source. If the source receives this acknowledgment, it assumes the transmission was properly completed. However, interference or other transmissions on the network could impede this exchange. If, after transmitting a message, the source node fails to receive acknowledgment from the destination node, it assumes its transmission did not arrive properly, and it begins the CSMA/CA process anew. Compared with CSMA/CD (Carrier Sense Multiple Access with Collision Detection), CSMA/CA minimizes, but does not eliminate, the potential for collisions. The use of ACK packets to verify every transmission means that 802.11 networks require more overhead than 802.3 networks. Therefore, a wireless network with a theoretical maximum throughput of 10 Mbps will, in fact, transmit less data per second than a wired Ethernet network with the same theoretical maximum throughput. In reality, most wireless networks tend to achieve between one-third and one-half of their theoretical maximum throughput. For example, one type of 802.11 network,
802.11g, is rated for a maximum of 54 Mbps; most 802.11g networks achieve between 20 and 25 Mbps. As described later in this chapter, however, the 802.11n standard includes several techniques for reducing overhead and making the technology’s actual throughput match its theoretical throughput. One way to ensure that packets are not inhibited by other transmissions is to reserve the medium for one station’s use. In 802.11, this can be accomplished through the optional RTS/CTS (Request to Send/Clear to Send) protocol. RTS/CTS enables a source node to issue an RTS signal to an access point requesting the exclusive opportunity to transmit. If the access point agrees by responding with a CTS signal, the access point temporarily suspends communication with all stations in its range and waits for the source node to complete its transmission. RTS/CTS is not routinely used by wireless stations, but for transmissions involving large packets (those more subject to damage by interference), RTS/CTS can prove more efficient. On the other hand, using RTS/CTS further decreases the overall efficiency of the 802.11 network. Figure 8-9 on page 356, illustrates the CSMA/CA process.

Association
Suppose you have just purchased a new laptop with a wireless NIC that supports one of the
802.11 wireless standards. When you bring your laptop to a local Internet café and turn it on, your laptop soon prompts you to log on to the café’s wireless network to gain access to the Internet. This seemingly simple process, known as association, involves a number of packet exchanges between the café’s access point and your computer. Association is another function of the MAC sublayer described in the 802.11 standard.  As long as a station is on and has its wireless protocols running, it periodically surveys its surroundings for evidence of an access point, a task known as scanning. A station can use either active scanning or passive scanning. In active scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range. When an access point finds the probe frame, it issues a probe response. This response contains all the information a station needs to associate with the access point, including a status code and station ID number for that station. After receiving the probe response, a station can agree to associate with that access point. The final decision to associate with an access point, at least for the first time, usually requires the consent of the user. Once association is complete, the two nodes begin communicating over the frequency channel specified by the access point. In passive scanning, a wireless station listens on all channels within its frequency range for a special signal, known as a beacon frame, issued from an access point.
The beacon frame contains information that a wireless node requires to associate itself with the access point. For example, the frame indicates the network’s transmission rate and the SSID (service set identifier), a unique character string used to identify an access point. After detecting a beacon frame, the station can choose to associate with that access point. The two nodes agree on a frequency channel and begin communicating. When setting up a WLAN most network administrators use the access point’s configuration utility to assign a unique SSID; rather than the default SSID provided by the manufacturer. This can contribute to better security and easier network management. For example, the access point used by employees in the Customer Service Department of a company could be assigned the SSID “CustSvc”. In IEEE terminology, a group of stations that share an access point are said to be part of one BSS (basic service set). The identifier for this group of stations is known as a BSSID (basic service set identifier). Some WLANs are large enough to require multiple access points. A group of access points connected to the same LAN are known collectively as an ESS (extended service set). BSSs that belong to the same ESS share a special identifier, called an ESSID (extended service set identifier). In practice, many networking professionals don’t distinguish between the terms SSID and ESSID. They simply configure every access point in a group or LAN with the same SSID. Within an ESS, a client can associate with any one of many access points that use the same ESSID. That allows users to roam about an office without losing wireless network service. In fact, roaming is the term applied to a station moving from one BSS to another without losing connectivity. Figure 8-10 on page 358, illustrates a network with only one BSS; Figure 8-11 on page 359, shows a network encompassing multiple BSSs that form an ESS. Clients running Windows 7 or modern versions of Linux will first attempt to associate with a known access point. For example, suppose the SSID for your access point at home is “SpaceInvader”. When you visit a café on the other side of the city, your laptop will recognize that the “SpaceInvader” SSID doesn’t exist in that location. Instead, your laptop’s operating system will detect the presence of other access points in the area. If the café has an access point, for example, it will offer you the option of associating with that access point. Suppose the café is in a busy metropolitan area where every business on the block has its own access point. In that case, the operating system (or the NetworkManager program, if you are running Linux) will present you with a list of all access points within range. Further, your client software will prioritize the access point with the strongest signal and the lowest error rate compared with others. Note that a station does not necessarily prioritize the closest access point. For example, suppose another user brings his own access point to the café and his access point has a signal that is twice as strong as the café’s access point. In that case, even if the new access point is farther away, your laptop will recognize the other user’s access point as the best option. When you are presented with this option, however, you would be wise to not confirm the association. If a client is configured to indiscriminately connect with the access point whose signal is strongest, that client is susceptible to being compromised by a powerful, rogue access point. If your system associates with this unauthorized access point, the person controlling that access point could steal your data or gain access to another network that trusts your system. Rogue access points can exist inadvertently, too, as when a user brings his own access point to work or uses software to turn his workstation into an access point. On a network with several authorized access points in an ESS, however, a station must be able to associate with any access point while maintaining network connectivity. Suppose that when you begin work in the morning at your desk, your laptop associates with an access point located in a telco room down the hall. Later, you need to give a presentation in the company’s main conference room on another floor of your building. Without your intervention, your laptop will choose a different access point as you travel to the conference room (perhaps more than one, depending on the size of your company’s building and network).
Connecting to a different access point requires reassociation. Reassociation occurs when a mobile user moves out of one access point’s range and into the range of another, as described in the previous example. It might also happen if the initial access point is experiencing a high rate of errors. On a network with multiple access points, network managers can take advantage of the stations’ scanning feature to automatically balance transmission loads between those access points.

Frames
You have learned about some types of overhead required to manage access to the 802.11 wireless networks—for example, ACKs, probes, and beacons. For each function, the 802.11 standard specifies a frame type at the MAC sublayer. These multiple frame types are divided into three groups: control, management, and data. Management frames are those involved in association and reassociation, such as the probe and beacon frames. Control frames are those related to medium access and data delivery, such as the ACK and RTS/CTS frames. Data frames are those that carry the data sent between stations. An 802.11 data frame is illustrated in Figure 8-12 on page 360. (Details of control and management frames are beyond the scope of this book.) Glancing at the 802.11 data frame, its significant overhead—that is, the large quantity of fields added to the data field—becomes apparent. These fields are explained next. Compare the 802.11 data frame with the Ethernet data frame also shown in Figure 8-12. Notice that the wireless data frame contains four address fields, rather than two. These four addresses are the source address, transmitter address, receiver address, and destination address. The transmitter and receiver addresses refer to the access point or another intermediary device (if used) on the wireless network. The source and destination addresses have the same meaning as they do in the Ethernet II frame. Another unique characteristic of the 802.11 data frame is its Sequence Control field. This field is used to indicate how a large packet is fragmented—that is, subdivided into smaller packets for more reliable delivery. Recall that on wired TCP/IP networks, error checking occurs at the Transport layer of the OSI model and packet fragmentation, if necessary, occurs at the Network layer. However, in 802.11 networks, error checking and packet fragmentation is handled at the MAC sublayer of the Data Link layer. By handling fragmentation at a lower layer, 802.11 makes its transmission—which is less efficient and more error-prone—transparent to higher layers. This means 802.11 nodes are more easily integrated with 802.3 networks and prevent the 802.11 segments of an integrated network from slowing down the 802.3 segments. The Frame Control field in an 802.11 data frame holds information about the protocol in use, the type of frame being transmitted, whether the frame is part of a larger, fragmented packet, whether the frame is one that was reissued after an unverified delivery attempt, what type of security the frame uses, and so on. Security is a significant concern with WLANs because access points are typically more vulnerable than devices on a wired network. Wireless security is discussed in detail along with other network security topics in Chapter 11. Although 802.11b, 802.11a, 802.11g, and 802.11n share all of the MAC sublayer characteristics described in the previous sections, they differ in their modulation methods, frequency usage, and ranges. In other words, each varies at the Physical layer. In addition, 802.11n modifies the way frames are used at the MAC sublayer. The following sections summarize those differences.



802.11b
In 1999, the IEEE released its 802.11b standard, which uses the 2.4–2.4835-GHz frequency range, better known as the 2.4-GHz band, and separates it into 22-MHz channels. 802.11b provides a theoretical maximum of 11-Mbps throughput; actual throughput is typically around 5 Mbps. To ensure this throughput, wireless nodes must stay within 100 meters (or approximately 330 feet) of an access point or each other, in the case of an ad hoc network. Among all the 802.11 standards, 802.11b was the first to take hold. It is also the least expensive of all the 802.11 WLAN technologies. However, most network administrators have replaced 802.11b with a faster standard, such as 802.11n.

802.11a
Although the 802.11a task group began its standards work before the 802.11b group, 802.11a was released after 802.11b. The 802.11a standard differs from 802.11b and 802.11g in that it uses channels in the 5-GHz band and provides a maximum theoretical throughput of 54 Mbps, though its effective throughput falls generally between 11 and 18 Mbps. 802.11a’s high throughput is attributable to its use of higher frequencies, its unique method of modulating data, and more available bandwidth. Perhaps most significant is that the 5-GHz band is not as congested as the 2.4-GHz band. Thus, 802.11a signals are less likely to suffer interference from microwave ovens, cordless phones, motors, and other (incompatible) wireless LAN signals. However, higher-frequency signals require more power to transmit, and they travel shorter distances than lower-frequency signals. The average geographic range for an 802.11a antenna is 20 meters, or approximately 66 feet. As a result, 802.11a networks require a greater density of access points between the wired LAN and wireless clients to cover the same distance that 802.11b networks cover. The additional access points, as well as the nature of 802.11a equipment, make this standard more expensive than either 802.11b or 802.11g. For this and other reasons, 802.11a is rarely preferred.

802.11g
IEEE’s 802.11g WLAN standard is designed to be just as affordable as 802.11b while increasing its maximum theoretical throughput from 11 Mbps to 54 Mbps through different data modulation techniques. The effective throughput of 802.11g ranges generally from 20 to 25 Mbps.
An 802.11g antenna has a geographic range of 100 meters (or approximately 330 feet).
802.11g, like 802.11b, uses the 2.4-GHz frequency band. In addition to its high throughput,
802.11g benefits from being compatible with 802.11b networks. Thus, if a network administrator installed 802.11b access points on her LAN three years ago, this year she could add 802.11g access points and laptops, and the laptops could roam between the ranges of the 802.11b and 802.11g access points without an interruption in service.

802.11n
In 2009, IEEE ratified the 802.11n standard. However, it was in development for years before that, and as early as mid-2007, manufacturers were selling 802.11n-compatible transceivers in their networking equipment. The primary goal of IEEE’s 802.11n committee was to create a wireless standard that provided much higher effective throughput than the other 802.11 standards. By all accounts, they succeeded. 802.11n boasts a maximum throughput of 600 Mbps, making it a threat to Fast Ethernet and a realistic platform for telephone and video signals. IEEE also specified that the 802.11n standard must be backward compatible with the 802.11a, b, and g standards.
802.11n may use either the 2.4-GHz or 5-GHz frequency range. It employs the same data modulation techniques used by 802.11a and 802.11g. However, it differs dramatically from the other three 802.11 standards in how it manages frames, channels, and encoding. These differences, which allow 802.11n to achieve its high throughput, include the following innovations:

MIMO (multiple input-multiple output) - In 802.11n, multiple antennas on an access point may issue a signal to one or more receivers. As you learned earlier, signals issued by an omnidirectional antenna will propagate in a multipath fashion. Therefore, multiple signals cannot be expected to arrive at the same receiver in concert. To account for this, in MIMO the phases of these signals are adjusted when they reach a receiving station, and the strength of the multiple signals are summed. To properly adjust phases, MIMO requires stations to update access points with information about their location.  Among 802.11 equipment this function is only available with 802.11n-capable transceivers. In addition to increasing the network’s throughput, MIMO can increase an access point’s range. Figure 8-13 on page 362, shows an 802.11n access point with three antennas.

Channel bonding - In 802.11n, two adjacent 20-MHz channels can be combined, or bonded, to make a 40-MHz channel, as shown in Figure 8-14 on page 363.  In fact, bonding two 20-MHz channels more than doubles the bandwidth available in a single 20-MHz channel; that’s because the small amount of bandwidth normally reserved as buffers against interference at the top and bottom of the 20-MHz channels can be assigned to carry data instead. Because the 5-GHz band contains more channels and is less crowded (at least, for now), it’s better suited to channel bonding than the 2.4-GHz band.

Higher modulation rates - As mentioned earlier, 802.11n uses the same type of data modulation used by 802.11a and 802.11g. This modulation technique allows for a single channel to be subdivided into multiple, smaller channels. Simply put, 802.11n makes more efficient use of these smaller channels and is capable of choosing from different encoding methods. 802.11n also allows for shortening the period of time transceivers wait between issuing each bit of data (which is necessary to prevent interference).

Frame aggregation - 802.11n networks can use one of two techniques for combining multiple frames (of the type shown in Figure 8-12) into one larger frame. Combining multiple frames reduces overhead. Suppose four small data frames are combined into one larger frame. Each larger frame will have only one copy of the same addressing information that would appear in the smaller frames. Proportionally, the data field takes up more of the aggregated frame’s space. In addition, replacing four small frames with one large frame means an access point and station will have to exchange one-quarter the number of statements to negotiate media access and error control. To take advantage of frame aggregation, the maximum frame size for 802.11n is 64 KB, compared with the maximum 802.11a, b, and g frame size of 4 KB. The potential disadvantage with using larger frames is the increased probability of errors when transmitting larger blocks of data. Figure 8-15 on page 363, illustrates the relatively low overhead of an aggregated 802.11n frame.



Note that not all of the techniques listed here will be used in every 802.11n implementation.
Further, reaching maximum throughput depends on the number and type of these strategies used. It also depends on whether the network uses the 2.4-GHz or 5-GHz band. Considering these factors, an 802.11n network’s actual throughputs will vary between 65 to 500 Mbps.
As mentioned earlier, 802.11n is compatible with all three earlier versions of the 802.11 standard. However, in mixed environments, some of the new standard’s techniques for improving throughput will not be possible. To ensure the fastest data rates on your 802.11n LAN, it’s optimal to use only 802.11n-compatible devices. To qualify for Network+ certification, you need to understand the differences between the 802.11 wireless standards. A summary of these WLAN standards is shown in Table 8-1.

Table 8-1 Wireless standards
Standard
Frequency range

Theoretical
maximum
throughput
Effective
throughput
(approximate)
Average geographic range
802.11b
2.4 GHz
11 Mbps
5 Mbps

100 meters (or approximately 330 feet)
802.11a
5 GHz
54 Mbps
11–18 Mbps
20 meters (or approximately 66 feet)
802.11g
2.4 GHz
54 Mbps
20–25 Mbps
100 meters (or approximately 330 feet)
802.11n
2.4 GHz or 5 GHz
65 to 600 Mbps
65 to 600 Mbps
Up to 400 meters (or approximately 1310
feet) if MIMO is used

The actual geographic range of any wireless technology depends on several factors, including the power of the antenna, physical barriers or obstacles between sending and receiving nodes, and interference in the environment. Therefore, although a technology is rated for a certain average geographic range, it may actually transmit signals in a shorter or longer range.

Implementing a WLAN
Now that you understand how wireless signals are exchanged, what can hinder them, and which Physical and Data Link layer standards they may follow, you are ready to put these ideas into practice. This section first describes how to design small WLANs, the types you might use at home or in a small office. It also describes how larger, enterprise-wide WANs are formed. Next it walks you through installing and configuring access points and clients. Finally, it details the pitfalls of implementing WLANs and how to avoid them.

Determining the Design
You have learned that WLANs may be arranged as ad hoc or infrastructure networks. You also know that infrastructure WLANs is far more common. This section assumes your WLAN follows the infrastructure model, and as such, will include access points. A home or small office network might call for only one access point. In this case, the access point, often combined with switching and routing functions, connects wireless clients to the LAN and acts as their gateway to the Internet. Note that the access point functions independently from the Internet access technology.
In other words, configuring your home or small office WLAN follows the same principles no matter whether you connect to the Internet using broadband cable or DSL. Figure 8-16 on page 365, illustrates the typical arrangement of a home or small office WLAN. Notice that the access point (or wireless router) is connected to the cable or DSL modem using an RJ-45 cable. The cable is inserted into the access point’s WAN port, which is set apart from the other data ports and might be labeled “Internet” or remain unlabeled. The additional ports on the access point allow for wired access to the router. An access point that does not include routing or switching functions would lack these extra ports and act much like a wireless hub. Placement of an access point on a WLAN must take into account the typical distances between the access point and its clients. If your small office spans three floors, for instance, and clients are evenly distributed among the floors, you might choose to situate the access point on the second floor. Recall that 802.11b and g signals can extend a maximum of 330 feet and still deliver data reliably, while 802.11n signals can, using MIMO, extend a maximum of 1310 feet. Also consider the type and number of obstacles between the access point and clients. For example, if your three-story building is constructed like a bunker with massive concrete floors, you might consider installing a separate access point on each floor. For best signal coverage, place the access point in a high spot, such as on a shelf or rack or in a drop ceiling. Also, make sure it’s not close to potential sources of interference, including cordless phones and microwave ovens. Larger WLANs warrant a more systematic approach to access point placement. Before placing access points in every telco room, it’s wise to conduct a site survey. A site survey assesses client requirements, facility characteristics, and coverage areas to determine an access point arrangement that will ensure reliable wireless connectivity within a given area. For example, suppose you are the network manager for a large organization whose wireless clients are distributed over six floors of a building. On two floors, your organization takes up 2000 square feet of office space, but on the other four floors, your offices are limited to only 200 square feet. In addition, clients move between floors regularly. Other building occupants are also running wireless networks. As part of a site survey, you should study building blueprints to help identify potential obstacles and clarify the distances your network needs to span on each floor. The site survey will indicate whether certain floors require multiple access points. Visually inspecting the floors will also help determine coverage areas and best access point locations. Measuring the signal coverage and strength from other WLANs will inform your decision about the optimal strength and frequency for your wireless signals. A site survey also includes testing proposed access point locations. In testing, a “dummy” access point is carried from location to location while a wireless client connects to it and measures its range and throughput. (Some companies sell software specially designed to conduct such testing.) Most important is testing wireless access from the farthest corners of your space. Also, testing will reveal unforeseen obstacles, such as EMI issued from lights or heavy machinery. After a site survey has identified and verified the optimal quantity and location of access points, you are ready to install them. Recall that to ensure seamless connectivity from one coverage area to another, all access points must belong to the same ESS and share an ESSID. Configuring access points, including assigning ESSIDs, is described in the next section. Figure 8-17 on page 367, shows an example of an enterprise-wide WLAN.
When designing an enterprise-wide WLAN, you must consider how the wireless portions of
the LAN will integrate with the wired portions. Access points connect the two. But an access
point may perform other functions as well. It may provide security features, by, for example,
including and excluding certain clients. It may participate in VLANs, allowing mobile clients
to move from one access point’s range to another while belonging to the same virtual LAN.
Every wireless client’s MAC address can be associated with an access point and each access
point can be associated with a port on a switch.
When these ports are grouped together in a VLAN, it doesn’t matter with which access point a client associates. Because the client stays in the same grouping, it can continue to communicate with the network as if it had remained in one spot.

Configuring Wireless Connectivity Devices
You have learned that access points provide wireless connectivity for mobile clients on an infrastructure WLAN. Access points vary in which wireless standards they support, antenna strength, and optional features such as support for voice signals or the latest security measures.
You can find a small access point or wireless router suitable for home or small-office use for less than $50. More sophisticated or specialized access points—for example, those designed for rugged outdoor use, as on city streets or at train platforms—cost much more. However, as wireless networking has become commonplace, sophistication in even the least expensive devices has increased. Each access point comes with an installation program on CD-ROM or DVD that guides you through the setup process. The process for installing such devices is similar no matter the manufacturer or model.

The variables you will set during installation include:
·         Administrator password
·         SSID
·         Whether or not DHCP is used; note that most network administrators do not configure their wireless access point as a DHCP server and, in fact, doing so when another DHCP server is already designated will cause addressing problems on the network.
·         Whether or not the SSID is broadcast.
·        Security options such as which type, and, for each type, what credentials are necessary to associate with the access point.

In the Hands-On Projects at the end of this chapter, you will have the chance to install and configure one popular wireless router/access point. If something goes awry during your wireless router configuration, you can force all of the variables you changed to be reset. Wireless routers feature a reset button on their back panel. To reset the wireless router, first unplug it. Then, using the end of a paper clip, depress the reset button while you plug it in. Continue holding down the button for at least 30 seconds (this time period varies among manufacturers; check your wireless router’s documentation for the duration yours requires). At the end of this period, the wireless router’s values will be reset to the manufacturer’s defaults. After successfully configuring your access point/wireless router, you are ready to introduce it to the network. In the case of a small office or home WLAN, this means using a patch cable to connect the devices WAN port and your cable or DSL modem’s LAN port. Afterward, clients should be able to associate with the access point and gain Internet access. The following section describes how to configure clients to connect to your WLAN.

Configuring Wireless Clients
Wireless access configuration varies from one type of client to another. In general, as long as an access point is broadcasting its SSID, clients in its vicinity will detect it and offer the user the option to associate with it. If the access point uses encryption, you will need to know the type of encryption and provide the right credentials to associate with it successfully. In the Hands-On Projects at the end of this chapter, you’ll have the chance to explore wireless client configuration on a computer running Windows 7.
As with Windows operating systems, most Linux and UNIX clients provide a graphical interface for configuring their wireless interfaces. Because each version differs somewhat from the others, describing the steps required for each graphical interface is beyond the scope of this book. However, iwconfig, a command-line function for viewing and setting wireless interface parameters, is common to nearly all versions of Linux and UNIX. Following is a basic primer for using the iwconfig command. For more detailed information, type man iwconfig at any Linux or UNIX command-line prompt. Before using iwconfig, make sure your wireless NIC is installed and that your Linux or UNIX workstation is within range of a working access point. You must also be logged in as root or a user with root-equivalent privileges. (Root on UNIX or Linux systems is comparable to an administrative user on Windows systems.) Next, open a terminal session (i.e., Command Prompt window), type iwconfig at the prompt, and then press Enter. The iwconfig output should look similar to that shown in Figure 8-18 on page 369. Notice that in this example, “eth0” represents an interface that is not wireless (that is, a wired NIC), while “eth1” represents the wireless interface. The “lo” portion of the output indicates the loopback interface. On your computer, the wireless NIC might have a different designation. Also notice that iwconfig reveals characteristics of your access point’s signal, including its frequency, power, and signal and noise levels. Using the iwconfig command, you can modify the SSID of the access point you choose to associate with, as well as many other variables. Some examples are detailed below.

The syntax of the following examples assumes your workstation has labeled your wireless NIC “eth1”:

·         iwconfig eth1 essid CLASS_1—This command instructs the wireless interface to associate with an access point whose SSID (or ESSID, as shown in this command) is CLASS_1.

·         iwconfig eth1 mode Managed—This command instructs the wireless interface to operate in infrastructure mode (as opposed to ad hoc mode).

·         iwconfig eth1 channel auto—This command instructs the wireless interface to automatically select the best channel for wireless data exchange.

·         iwconfig eth1 freq 2.422G—This command instructs the wireless interface to communicate on the 2.422-GHz frequency.

·         iwconfig eth1 key 6e225e3931—This command instructs the wireless interface to use the hexadecimal number 6e225e3931 as its key for secure authentication with the access point. (6e225e3931 is only an example; on your network you will choose your own key.)

In this and the previous section, you have learned how to configure wireless clients and access points. The following section summarizes some key points about setting up wireless networks properly.


Avoiding Pitfalls
You might have had the frustrating experience of not being able to log on to a network, even though you were sure you’d typed in your username and password correctly. Maybe it turned out that your Caps Lock key was on, changing your case-sensitive password. Or maybe you were trying to log on to the wrong server. On every type of network, many variables must be accurately set on clients, servers, and connectivity devices in order for communication to succeed. Wireless networks add a few more variables.

As a reminder, following are some wireless configuration pitfalls to avoid:

SSID mismatch - Your wireless client must specify the same SSID as the access point it’s attempting to associate with. As you have learned, you may instruct clients to search for any available access point (or clients might be configured to do this by default). However, if the access point does not broadcast its SSID, or if your workstation is not configured to look for access points, you will have to enter the SSID during client configuration. Also bear in mind that SSIDs are case sensitive. That is, CLASS_1 does not equal Class_l. SSID mismatch will result in failed association.

Incorrect encryption -Your wireless client must be configured to (a) use the same type of encryption as your access point, and (b) use a key or passphrase that matches the access point’s. If either of these is incorrect, your client cannot authenticate with the access point.

Incorrect channel or frequency - You have learned that the access point establishes the channel and frequency over which it will communicate with clients. Clients, then, automatically sense the correct channel and frequency. However, if you have instructed your client to use only a channel or frequency different from the one your access point uses, association will fail to occur.

Standard mismatch (802.11 a/b/g/n) - If your access point is set to communicate only via
802.11g, even if the documentation says it supports 802.11b and 802.11g, clients must also follow the 802.11g standard. Clients may also be able to detect and match the correct type of 802.11 standards. However, if they are configured to follow only one standard, they will never find an access point broadcasting via a different standard.

Incorrect antenna placement - On a network, many factors can cause data errors and a resulting decrease in performance. As you have learned, the most popular WLAN standards require clients to be within 330 feet of an access point’s antenna for reliable data delivery. Beyond that distance, communication might occur, but data errors become more probable. Also remember to place your antenna in a high spot for best signal reception.

Interference - If intermittent and difficult-to-diagnose wireless communication errors occur, interference might be the culprit. Check for sources of EMI, such as fluorescent lights, heavy machinery, cordless phones, and microwaves in the data transmission path.
Wireless WANs
The best 802.11n signal can travel approximately a quarter of a mile. But other types of wireless networks can connect stations over longer distances. For example, in some large cities dozens of surveillance cameras trained on municipal buildings and parks beam video images to a central public safety headquarters. Meanwhile, in developing countries, wireless signals deliver lectures and training videos to students in remote, mountainous regions. In rural areas of the U.S., elderly patients at home wear medical monitoring devices, such as blood pressure sensors and blood glucose meters, which use wireless networks to convey the information to their doctors hundreds of miles away. Such networks can even alert paramedics in case of an emergency. All of these are examples of wireless WANs. Unlike wireless LANs, wireless WANs are designed for high-throughput, long-distance digital data exchange. As in asymmetrical wired broadband, on wireless WANs downstream data transmission is typically faster than upstream transmission. Downstream, also called downlink in the context of wireless transmission, represents the connection between a carrier’s antenna and a client’s transceiver—for example, a smartphone. Upstream, also called uplink in the context of wireless transmission, refers to the connection between a client’s transceiver and the carrier’s antenna. The following sections describe a variety of ways wireless clients can communicate across a city or state.

802.16 (WiMAX)
In 2001, IEEE standardized a new wireless technology under its 802.16 (wireless MAN) committee. Since that time, IEEE has released several versions of the 802.16 standard. Collectively, the 802.16 standards are known as WiMAX, which stands for Worldwide Interoperability for Microwave Access, the name of a group of manufacturers, including Intel and Nokia, who banded together to promote and develop 802.16 products and services. WiMAX was envisioned as a wireless alternative to DSL and T-carrier services for homes and businesses. It achieves much faster throughput than T-carriers at a lower cost for end users.

Notable features of this standard include:

·         Line-of-sight transmission between two antennas for use with fixed clients or non-line-of-sight transmission between multiple antennas for use with mobile clients.

·         Use of frequencies in the 2 to 11 GHz range or the 11 to 66 GHz, either licensed or nonlicensed; most WiMAX installations in the U.S. use the 2.3-, 2.5-, or 3.65-GHz bands.

·         Use of MIMO

·         Ability to transmit and receive signals up to 50 km, or approximately 30 miles, when antennas are fixed or up to 15 km, or approximately 10 miles, when they are mobile.

·         QoS (quality of service) provisions.

To date, the most popular IEEE 802.16 version is 802.16e, which was approved in 2005.
This was the first version of the standard that allowed for mobile clients. 802.16e connections can theoretically reach throughputs of up to 70 Mbps. A newer version of WiMAX, based on the 802.16m standard, also known as WiMAX 2, was released in 2011.


With higher throughput, less latency, and better support for IP telephony than previous WiMAX versions, 802.16m is positioned to compete favorably with cellular data services. And because it is backward compatible with 802.16e equipment, customers and carriers can easily transition to the newer version. Its maximum downlink throughput is 120 Mbps and its maximum uplink throughput is 60 Mbps. Future improvements to WiMAX are in the works, with throughputs of 1 Gbps predicted. In practice, since WiMAX is a shared technology, actual throughputs for all versions are lower than the published maximums. For example, a typical non-line-of-sight client using 802.16e actually experiences 4-Mbps downlink throughput instead of 70 Mbps. Also, as you would expect, the highest throughput is possible only over the shortest distances between transceivers in a line-of-sight arrangement. For example, 802.16e will not achieve its maximum 70 Mbps across a 30-mile span. Furthermore, some service providers cap the maximum bandwidth each customer is allowed to use and might offer a maximum downlink rate of 1 Mbps. Still, WiMAX provides much greater throughput than Wi-Fi and T1s. Also, its range extends much farther than any of the 802.11 standards. For these reasons, WiMAX is considered more appropriate for use on MANs and WANs. It offers an alternative to DSL and broadband cable for business and residential customers who want high-speed Internet access or business customers who want an alternative to T-carriers. It’s well suited to rural customers, for example, who might be in an area lacking copper or fiber-optic cabling infrastructure. WiMAX also provides network access for mobile computerized devices, including smartphones, laptops, and PDAs in metropolitan areas. Finally, WiMAX can act as the backhaul link, or an intermediate connection between subscriber networks and a telecommunications carrier’s network. Figure 8-19 on page 372, illustrates three uses for WiMAX, including a residential customer, mobile users, and a backhaul link. As shown in Figure 8-19, in residential or small business WiMAX, the carrier installs a small antenna on the roof or even inside the building. This antenna is connected to a device similar to a cable or DSL modem for clients to access the LAN. The connectivity device could be incorporated along with the antenna in the same housing or might be separate. If separate, the device typically attaches to the antenna with coaxial cable. It’s often combined with a router. The customer’s antenna communicates in a non-line-of-sight fashion with the service provider’s antenna. If the service provider’s facility is far away, it might use multiple antennas on towers that communicate in a line-of-sight manner, as shown in Figure 8-19. Figures 8-20 and 8-21 on page 373, depict the type of antenna used at a customer’s location and the type of antenna used by service providers on their towers. In some installations, as when a WiMAX provider serves a metropolitan area, the customer’s antenna and connectivity device are eliminated. Instead, each computer communicates directly via its on-board WiMAX transceiver with an antenna such as the one shown in Figure 8-21. In the United States, companies such as Clearwire have established WiMAX networks in several cities using licensed frequency bands. For example, Clearwire has registered with the FCC for the sole use of channels in the 2.5-GHz band in the Chicago metropolitan area. Because the band is licensed, it suffers little interference, and Clearwire can guarantee a certain level of service. In Tokyo, WiMAX will provide Internet access to riders on fast-moving subway trains. On a citywide network, WiMAX makes more sense than Wi-Fi. However, WiMAX has received significant competition from quickly evolving cellular data services, described next.



Cellular
Cellular networks were initially designed to provide analog phone service. However, since the first mobile phones became available to consumers in the 1970s, cellular services have changed dramatically. In addition to voice signals, cellular networks now deliver text messages, Web pages, music, and videos to smartphones and handheld devices. This section describes current cellular data technology and explains the role it plays in wide area networking. To put today’s services in context, it’s useful to understand that each leap in cellular technology has been described as a new generation. Each successive generation has brought a greater range of services, better quality, and higher throughputs. For example, first-generation, or 1G, services from the 1970s and 1980s were analog. Second-generation or 2G, services, which reigned in the 1990s, used digital transmission and paved the way for texting and media downloads on mobile devices. Still, data transmission on 2G systems didn’t exceed 240 Kbps. With the third generation, or 3G, released in the early 2000s, data rates rose to 384 Kbps and data (but not voice) communications used packet switching. The latest generation is 4G. It is characterized by an all-IP, packet-switched network for both data and voice transmission. 4G standards, released in 2008, also specify throughputs of 100 Mbps for fast-moving mobile clients, such as those in cars, and 1 Gbps for slow-moving mobile clients, such as pedestrians. WiMAX, though not strictly a cellular-based technology, is considered 4G because of its high-speed, packet-switched characteristics. Later in this section, you will learn about other 3G and 4G systems. Although their access methods and features might differ, all cellular networks share a similar infrastructure in which coverage areas are divided into cells. Each cell is served by an antenna and its base station, or cell site. At the base station, a controller assigns mobile clients frequencies and manages communication with them. In network diagrams, cells are depicted as hexagons. Multiple cells share borders to form a network in a honeycomb pattern, as shown in Figure 8-22. Antennas are positioned at three corners of each cell, radiating and providing coverage over three equidistant lobes. When a client passes from one coverage area to another, his mobile device begins communicating with different antenna. His communication might change frequencies or even carriers between cells. The transition, which normally happens without the user’s awareness, is known as handoff. Cell sizes vary from roughly 1000 feet to 12 miles in diameter. The size of a cell depends on the network’s access method and the region’s topology, population, and amount of cellular traffic. An urban area with dense population and high volume of data and voice traffic might use cells with a diameter of only 2000 feet, their antennas mounted on tall buildings. In sparsely populated rural areas, with antennas mounted on isolated hilltop towers, cells might span more than 10 miles. In theory, the division of a network into cells provides thorough coverage over any given area. In reality, cells are misshapen due to terrain, EMF, and antenna radiation patterns. Some edges overlap and others don’t meet up, leaving gaps in coverage. As shown in Figure 8-22 on page 375, each base station is connected to an MSC (mobile switching center), also called an MTSO (mobile telecommunications switching office) by a wireless link or fiber-optic cabling. The MSC might be located inside a telephone company’s central office or it might stand alone and connect to the central office via another fiber-optic cabling or a microwave link. At the MSC, the mobile network intersects with the wired network. Equipment at an MSC manages mobile clients, monitoring their location and usage patterns, and switches cellular calls. It also assigns each mobile client an IP address. With 4G cellular services, a client’s IP address remains the same from cell to cell and from one carrier’s territory to another. In 3G cellular services, however, client IP addresses may change when the user transitions to a different carrier’s service area.

From the switching center, packets sent from cellular networks are routed to wired data networks through the PSTN or private backbones using WAN technologies you learned about in Chapter 7. Cellular networking is a complex topic, with rapidly evolving encoding and access methods, changing standards, and innovative vendors vying to dominate the market. This chapter does not detail the various encoding and access methods used on cellular networks. However, to qualify for Network+ certification, you should understand the basic infrastructure of a cellular network and the cellular technologies frequently used for data networking, beginning with HSPA+. HSPA+ (High Speed Packet Access Plus) is a 3G technology released in 2008 that uses MIMO and sophisticated encoding techniques to achieve a maximum 84-Mbps downlink throughput and 11-Mbps uplink throughput in its current release. Soon, the downlink data rate is expected to increase to 336 Mbps. To achieve such speeds, HSPA+ will use limited channels more efficiently and incorporate more antennas in MIMO transmission. Approximately 170 HSPA+ networks exist around the globe. However, faster and more flexible technologies, such as LTE, are likely to overtake HSPA+ in popularity. LTE (Long Term Evolution) is a 4G technology that uses a different access method than HSPA+ to achieve downlink data rates of up to 1 Gbps and uplink rates up to 500 Mbps. LTE is currently the fastest wireless broadband service available in the U.S. While Sprint embraced WiMAX early on for its wireless broadband services, other carriers, such as AT&T and Verizon, passed on WiMAX to adopt LTE service. WiMAX 2 and LTE now coexist and compete for market share in the U.S. Table 8-2 summarizes wireless WAN services described in this section. Note that this does not represent a complete list of wireless broadband services—for example, older 2G and 3G cellular technologies are excluded.

Table 8-2 Characteristics of some wireless WAN services
Technology

Voice
switching

Data
switching

Maximum theoretical downlink
throughput

Maximum
theoretical uplink
throughput

3G–HSPA+

Circuit
Packet
84 Mbps (with promises of 336 Mbps)
11 Mbps
(N/A)–WiMAX (802.16e)
Packet
Packet
70 Mbps
70 Mbps
4G–WiMAX 2 (802.16m)

Packet
Packet
120 Mbps (with promises of 1 Gbps for
fixed clients)
60 Mbps
4G–LTE
Packet
Packet
1 Gbps
500 Mbps

Satellite
In 1945, Arthur C. Clarke (the author of 2001: A Space Odyssey) wrote an article in which he described the possibility of communication between manned space stations that continually orbited the Earth. Other scientists recognized the worth of using satellites to convey signals from one location on Earth to another. By the 1960s, the United States was using satellites to transmit telephone and television signals across the Atlantic Ocean. Since then, the proliferation of this technology and reductions in its cost, have made satellite transmission appropriate and available for transmitting consumer voice, video, music, and data. For many years, satellites have been used to transmit live broadcasts of events happening around the world. Satellites are also used to deliver digital television and radio signals, voice and video signals, and cellular and paging signals.
More recently, they have become a means of providing data services to mobile clients, such as travelers in flight or on ships at sea, who are beyond the reach of WiMAX, HSPA+, or LTE.

Satellite Orbits
Most satellites circle the Earth 22,300 miles above the equator in a geosynchronous orbit. Geosynchronous earth orbit (GEO) means that satellites orbit the Earth at the same rate as the Earth turns. Consequently, at every point in their orbit, the satellites maintain a constant distance from a specific point on the Earth’s equator. Because satellites are generally used to relay information from one point on Earth to another, information sent to Earth from a satellite first has to be transmitted to the satellite from Earth in an uplink from an Earth-based transmitter to an orbiting satellite. Often, the uplink signal information is scrambled (in other words, its signal is encoded) before transmission to prevent unauthorized interception. At the satellite, a transponder receives the uplink signal, and then transmits it to an Earth-based receiver in a downlink. A typical satellite contains 24 to 32 transponders. Each satellite uses unique frequencies for its downlink. These frequencies, as well as the satellite’s orbit location, are assigned and regulated by the FCC. Back on Earth, the downlink is picked up by a dish-shaped antenna. The dish shape concentrates the signal so that it can be interpreted by a receiver. Figure 8-23 on page 377, provides a simplified view of satellite communication. Geosynchronous earth orbiting satellites are the type used by the most popular satellite data service providers. This technology is well established, and is the least expensive of all satellite technology. Also, because they remain in a fixed position relative to the Earth’s surface, stationary receiving dishes on Earth can be counted on to receive satellite signals reliably.

Satellite Frequencies
Satellites transmit and receive signals in any of following five frequency bands, which are roughly defined as:
·         L-band—1.5–2.7 GHz
·         S-band—2.7–3.5 GHz
·         C-band—3.4–6.7 GHz
·         Ku-band—12–18 GHz
·        Ka-band—18–40 GHz
Within each band, frequencies used for uplink and downlink transmissions differ. This variation helps ensure that signals traveling in one direction (for example from a satellite to the Earth) do not interfere with signals traveling in the other direction (for example, signals from the Earth to a satellite).

Satellite Internet Services
A handful of companies offer high-bandwidth Internet access via GEO satellite links. Each subscriber uses a small satellite antenna and receiver, or satellite modem, to exchange signals with the service provider’s satellite network. Clients may be fixed, such as rural dwellers who are too remote for DSL, or mobile subscribers, such as travelers on ocean-going yachts. Clients are able to exchange signals with satellites as long as they have a line-of-sight path, or an unobstructed view of the sky. To establish a satellite Internet connection, each subscriber must have a dish antenna, which is approximately two feet high by three feet wide, installed in a fixed position. In North America, these dish antennas are pointed toward the Southern Hemisphere (because the geosynchronous satellites travel over the equator).
The dish antenna’s receiver is connected, via cable, to a modem. This modem uses either a PCI or USB interface to connect with the subscriber’s computer. As with several other wireless WAN technologies, satellite services are typically asymmetrical and bandwidth is shared among many subscribers. Throughputs vary and are controlled by the service provider. Typical downlink rates range from 1 to 2 Mbps and uplink rates reach approximately 300 Kbps. Compared with other wireless WAN options, satellite services are slower and suffer more latency. In addition, client equipment is more expensive than that required by WiMAX, HSPA+, or LTE. Given these drawbacks, satellite data service is preferred only in circumstances that allow few alternatives or in cases where satellite receiving equipment is already installed.

Chapter Summary

The wireless spectrum is a continuum of the electromagnetic waves used for data and voice communication. Each type of wireless service can be associated with one area, or frequency band, of the wireless spectrum.

Most cordless telephones and many WLANs (wireless LANs) use frequencies in the 2.4-GHz band. Other WLANs use a range of frequencies near 5 GHz. The 5-GHz band offers more unlicensed channels and less potential interference.

Wireless signals originate from electrical current traveling along a conductor. The electrical signal travels from the transmitter to an antenna, which then emits the signal, as a series of electromagnetic waves, to the atmosphere. The signal propagates through the air until it reaches its destination. At the destination, another antenna accepts the signal, and a receiver converts it back to current.

To exchange information, two antennas must be tuned to the same frequency. In communications terminology, this means they share the same channel.

The geographical area that an antenna or wireless system can reach is known as its range. Receivers must be within the range to receive accurate signals consistently.

Wireless transmission is susceptible to interference from EMI. Signals are also affected by obstacles in their paths, which cause them to reflect, diffract, or scatter. A large number of obstacles can prevent wireless signals from reaching their destination.

Because of reflection, diffraction, and scattering, wireless signals follow a number of different paths to their destination. Such signals are known as multipath signals.

Each type of wireless communication falls into one of two categories: fixed or mobile. In fixed wireless systems, the locations of the transmitter and receiver do not move. In mobile wireless, the receiver can be located anywhere within the transmitter’s range. This allows the receiver to roam from one place to another while continuing to pick up its signal.

In an ad hoc WLAN, wireless nodes, or stations, transmit directly to each other via wireless NICs without an intervening connectivity device.

Modern WLANs operate in infrastructure mode. They rely on access points that transmit and receive signals to and from wireless stations and connectivity devices. Access points may connect stations to a LAN or multiple network segments to a backbone. They are often combined with routers.


Wireless standards vary by frequency, methods of signal, and geographic range. The IEEE 802.11 committee has ratified four notable wireless standards: 802.11b, 802.11a, 802.11g, and 802.11n.

All four 802.11 standards share characteristics at the MAC sublayer level, including the CSMA/CA access method, frame formats, and methods of association between access points and stations.

802.11b operates in the 2.4-GHz band, uses DSSS (direct-sequence spread spectrum), and is characterized by a maximum theoretical throughput of 11 Mbps (though actual throughput is typically half of that).

802.11a, ratified after 802.11b, operates in the 5-GHz band and is incompatible with802.11b or g. It’s characterized by a maximum theoretical throughput of 54 Mbps, though actual throughput is much less.

802.11g, which operates in the 2.4-GHz band and is compatible with 802.11b, is characterized by a maximum theoretical throughput of 54 Mbps, though actual throughput is much less.

802.11n offers significantly faster throughput than any previously adopted 802.11 standard. Techniques such as MIMO (multiple input-multiple output), channel bonding, frame aggregation, and higher modulation rates allow 802.11n to achieve between 65 and 600 Mbps actual throughput. MIMO also dramatically increases the range of 802.11n access points. 802.11n is backward compatible with 802.11b, a, and g, though mixed 0environments cannot take advantage of all of 802.11n’s speed enhancements.

Most home and small office WLANs depend on a single access point, which should be
centrally located to provide reliable wireless service to clients at any location.

Designing an enterprise-wide WLAN involves choosing the appropriate quantity of
access points and knowing where to position them. A site survey helps by assessing
the network’s client requirements, facility characteristics, and coverage areas.

You can install and configure an access point using setup software provided by the manufacturer, or by directly connecting to the device’s operating software. At a minimum, you should change the access point’s SSID (service set identifier) and administrator password. If the access point acts as a router, or Internet gateway, you must provide your Internet account credentials. In addition, you probably want to choose a method of secure authentication, modify the LAN TCP/IP properties, and perhaps change the channel and mode of communication.

Client setup for WLANs can be very simple, if you allow the client to find an access point and choose default values for associating with it. If the access point requires secure authentication, you must at least configure the client to meet those credentials.

For correct functioning on your WLAN, make sure clients and access points agree on an SSID, security settings, and channels. Also make sure access points are positioned far from sources of interference and that client locations do not exceed the maximum range for the type of wireless technology you use.

IEEE 802.16 (WiMAX) is a wireless broadband technology designed for residential or business subscribers who may be fixed or mobile. The 802.16e standard can use frequencies from 2 to 66 GHz and may issue signals in a line-of-sight or non-line-of-sight manner. WiMAX can achieve throughputs of up to 70 Mbps at the shortest ranges. Its signals can travel up to 30 miles in a line-of-sight arrangement.


WiMAX 2, specified in IEEEs 802.16m standard, is a 4G technology that achieves theoretical throughputs of 330 Mbps with lower latency and better quality for VoIP applications than previous WiMAX versions. 802.16m has been approved as a true 4G technology. Manufacturers expect it to reach throughputs of 1 Gbps in the near future.

Cellular networks provide data services to mobile clients over packet-switched networks. Though there are many types of cellular networks, all share an infrastructure in which coverage areas are divided into cells that are serviced by antennas and base stations. Base stations communicate with MSCs (mobile switching centers), which connect the cellular network with the PSTN and other WANs.

Two types of high-speed cellular data services are currently vying for market share: HSPA+ (High Speed Packet Access Plus) and LTE (Long Term Evolution). Both are considered 4G technologies. LTE can already achieve downlink throughputs of up to 1 Gbps, which makes it more attractive than WiMAX as well.

Geosynchronous satellites are used to provide wireless data services to mobile or fixed clients. Satellite-based services are most appropriate for rural clients who cannot receive DSL or cable broadband or by users on planes or ships at sea, where other wireless broadband services can’t reach.

Key Terms

1G - The first generation of mobile phone services, popular in the 1970s and 1980s, which were entirely analog.
2.4-GHz band - The range of radio frequencies from 2.4 to 2.4835 GHz. The 2.4-GHz band, which allows for 11 unlicensed channels, is used by WLANs that follow the popular 802.11b and 802.11g standards. However, it is also used for cordless telephone and other transmissions making the 2.4-GHz band more susceptible to interference than the 5-GHz band.
2G - Second-generation mobile phone service, popular in the 1990s. 2G was the first standard to use digital transmission, and as such, it paved the way for texting and media downloads on mobile devices.
3G - Third-generation mobile phone service, released in the early 2000s, that specifies throughputs of 384 Kbps and packet switching for data (but not voice) communications.
4G - Fourth-generation mobile phone service that is characterized by an all-IP, packet switched network for both data and voice transmission. 4G standards, released in 2008, also specify throughputs of 100 Mbps for fast-moving mobile clients, such as those in cars, and 1 Gbps for slow-moving mobile clients, such as pedestrians.
5-GHz band - A range of frequencies that comprises four frequency bands: 5.1 GHz, 5.3 GHz, 5.4 GHz, and 5.8 GHz. It consists of 24 unlicensed bands, each 20-MHz wide. The 5-GHz band is used by WLANs that follow the 802.11a and 802.11n standards.
802.11a - The IEEE standard for a wireless networking technique that uses multiple frequency bands in the 5-GHz frequency range and provides a theoretical maximum throughput of 54 Mbps. 802.11a’s high throughput, compared with 802.11b, is attributable to its use of higher frequencies, its unique method of encoding data, and more available bandwidth.


802.11b - The IEEE standard for a wireless networking technique that uses DSSS (direct-sequence spread spectrum) signaling in the 2.4–2.4835-GHz frequency range (also called the 2.4-GHz band). 802.11b separates the 2.4-GHz band into 14 overlapping 22-MHz channels and provides a theoretical maximum of 11-Mbps throughput.
802.11g - The IEEE standard for a wireless networking technique designed to be compatible with 802.11b while using different encoding techniques that allow it to reach a theoretical maximum capacity of 54 Mbps. 802.11g, like 802.11b, uses the 2.4-GHz frequency band.
802.11n - The IEEE standard for a wireless networking technique that may issue signals in the 2.4- or 5-GHz band and can achieve actual data throughput between 65 and 600 Mbps.  It accomplishes this through several means, including MIMO, channel bonding, and frame aggregation. 802.11n is backward compatible with 802.11a, b, and g.
802.16 - An IEEE standard for wireless MANs. 802.16 networks may use frequencies between 2 and 66 GHz. Their antennas may operate in a line-of-sight or non-line-of-sight manner and cover 50 kilometers (or approximately 30 miles). 802.16 connections can achieve a maximum throughput of 70 Mbps, though actual throughput diminishes as the distance between transceivers increases. Several 802.16 standards exist. Collectively, they are known as WiMAX.
802.16e - Currently, the most widely implemented version of WiMAX. With 802.16e, IEEE improved the mobility and QoS characteristics of the technology, making it better suited to VoIP and mobile phone users. 802.16e is capable of 70-Mbps throughput, but because bandwidth is shared and service providers cap data rates, most users actually experience 1–4 Mbps throughput.
802.16m - Also known as WiMAX 2, the IEEE standard for a version of 802.16 that achieves theoretical throughputs of 330 Mbps with lower latency and better quality for VoIP applications than previous WiMAX versions. 802.16m has been approved as a true 4G technology. Manufacturers expect it to reach throughputs of 1 Gbps in the near future.
access point  - A device used on wireless LANs that transmits and receives wireless signals to and from multiple nodes and retransmits them to the rest of the network segment. Access points can connect a group of nodes with a network or two networks with each other. They may use directional or omnidirectional antennas.
active scanning - A method used by wireless stations to detect the presence of an access point. In active scanning, the station issues a probe to each channel in its frequency range and waits for the access point to respond.
ad hoc - A type of wireless LAN in which stations communicate directly with each other (rather than using an access point).
AP - See access point.
Association - In the context of wireless networking, the communication that occurs between a station and an access point to enable the station to connect to the network via that access point.
backhaul - An intermediate connection between subscriber networks and a telecommunications carrier’s network.
base station - See access point.
basic service set - See BSS.
basic service set identifier - See BSSID.
beacon frame - In the context of wireless networking, a frame issued by an access point to alert other nodes of its existence.
bounce - See reflection.
BSS (basic service set) - In IEEE terminology, a group of stations that share an access point.
BSSID (basic service set identifier) - In IEEE terminology, the identifier for a BSS (basic service set).
Carrier Sense Multiple Access with Collision Avoidance - See CSMA/CA.
cell - In a cellular network, an area of coverage serviced by an antenna and base station.
channel bonding - In the context of 802.11n wireless technology, the combination of two 20-MHz frequency bands to create one 40-MHz frequency band that can carry more than twice the amount of data that a single 20-MHz band could. It’s recommended for use only in the 5-GHz range because this band has more available channels and suffers less interference than the 2.4-GHz band.
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) - A network access method used on 802.11 wireless networks. In CSMA/CA, before a node begins to send data it checks the medium. If it detects no transmission activity, it waits a brief, random amount of time, and then sends its transmission. If the node does detect activity, it waits a brief period of time before checking the channel again. CSMA/CA does not eliminate, but minimizes, the potential for collisions.
Diffraction - In the context of wireless signal propagation, the phenomenon that occurs when an electromagnetic wave encounters an obstruction and splits into secondary waves. The secondary waves continue to propagate in the direction in which they were split. If you could see wireless signals being diffracted, they would appear to be bending around the obstacle. Objects with sharp edges—including the corners of walls and desks—cause diffraction.
direct-sequence spread spectrum - See DSSS.
directional antenna - A type of antenna that issues wireless signals along a single direction, or path.
downlink - In the context of wireless transmission, the connection between a carrier’s antenna and a client’s transceiver—for example, a smartphone.
DSSS (direct-sequence spread spectrum) - A transmission technique in which a signal’s bits are distributed over an entire frequency band at once. Each bit is coded so that the receiver can reassemble the original signal upon receiving the bits.
ESS (extended service set) - A group of access points and associated stations (or basic service sets) connected to the same LAN.
ESSID (extended service set identifier) - A special identifier shared by BSSs that belong to the same ESS.
extended service set -  See ESS.
extended service set identifier - See ESSID.
fading - A variation in a wireless signal’s strength as a result of some of the electromagnetic energy being scattered, reflected, or diffracted after being issued by the transmitter.
FHSS (frequency hopping spread spectrum) - A wireless signaling technique in which a signal jumps between several different frequencies within a band in a synchronization pattern known to the channel’s receiver and transmitter.
fixed - A type of wireless system in which the locations of the transmitter and receiver are static. In a fixed connection, the transmitting antenna focuses its energy directly toward the receiving antenna. This results in a point-to-point link.
frequency hopping spread spectrum - See FHSS.
GEO (geosynchronous earth orbit) - The term used to refer to a satellite that maintains a constant distance from a point on the equator at every point in its orbit. Geosynchronous orbit satellites are the type used to provide satellite Internet access.
geosynchronous earth orbit - See GEO.
handoff -The transition that occurs when a cellular network client moves from one antenna’s coverage area to another.
High Speed Packet Access Plus - See HSPA+.
HSPA+ (High Speed Packet Access Plus) - A 3G mobile wireless technology released in 2008 that uses MIMO and sophisticated encoding techniques to achieve a maximum 84-Mbps downlink throughput and 11-Mbps uplink throughput in its current release. Advances in more efficiently using limited channels and incorporating more antennas in MIMO promise to push the maximum downlink data rate to 336 Mbps.
infrastructure WLAN - A type of WLAN in which stations communicate with an access point and not directly with each other.
Iwconfig -  A command-line utility for viewing and setting wireless interface parameters on Linux and UNIX workstations.
line-of-sight - See LOS.
Long Term Evolution - See LTE.
LOS (line-of-sight) - A wireless signal or path that travels directly in a straight line from its transmitter to its intended receiver. This type of propagation uses the least amount of energy and results in the reception of the clearest possible signal.
LTE (Long Term Evolution) - A 4G cellular network technology that achieves downlink data rates of up to 1 Gbps and uplink rates up to 500 Mbps. AT&T and Verizon have adopted LTE for their high-speed wireless data networks.
MIMO (multiple input-multiple output) - In the context of 802.11n wireless networking, the ability for access points to issue multiple signals to stations, thereby multiplying the signal’s strength and increasing their range and data-carrying capacity. Because the signals follow multipath propagation, they must be phase-adjusted when they reach their destination.
Mobile -  A type of wireless system in which the receiver can be located anywhere within the transmitter’s range. This allows the receiver to roam from one place to another while continuing to pick up its signal.
mobile switching center - See MSC.
mobile telecommunications switching office - See MSC.
MSC (mobile switching center) - A carrier’s facility to which multiple cellular base stations connect. An MSC might be located inside a telephone company’s central office or it might stand alone and connect to the central office via fiber-optic cabling or a microwave link. Equipment at an MSC manages mobile clients, monitoring their location and usage patterns, and switches cellular calls. It also assigns each mobile client an IP address.
MTSO (mobile telecommunications switching office) - See MSC.
multipath  - The characteristic of wireless signals that follow a number of different paths to their destination (for example, because of reflection, diffraction, and scattering).
multiple input-multiple output - See MIMO.
narrowband - A type of wireless transmission in which signals travel over a single frequency or within a specified frequency range.
omnidirectional antenna - A type of antenna that issues and receives wireless signals with equal strength and clarity in all directions. This type of antenna is used when many different receivers must be able to pick up the signal, or when the receiver’s location is highly mobile.
passive scanning - In the context of wireless networking, the process in which a station listens to several channels within a frequency range for a beacon issued by an access point.
Probe -  In 802.11 wireless networking, a type of frame issued by a station during active scanning to find nearby access points.
radiation pattern - The relative strength over a three-dimensional area of all the electromagnetic energy an antenna sends or receives.
range -The geographical area in which signals issued from an antenna or wireless system can be consistently and accurately received.
reassociation - In the context of wireless networking, the process of a station establishing a connection (or associating) with a different access point.
reflection - In the context of wireless, the phenomenon that occurs when an electromagnetic wave encounters an obstacle and bounces back toward its source. A wireless signal will bounce off objects whose dimensions are large compared with the signal’s average wavelength.
Request to Send/Clear to Send - See RTS/CTS.
Roaming -  In wireless networking, the process that describes a station moving between BSSs without losing connectivity.
RTS/CTS (Request to Send/Clear to Send) - An exchange in which a wireless station requests the exclusive right to communicate with an access point and the access point confirms that it has granted that request.
scanning - The process a wireless station undergoes to find an access point. See also active scanning and passive scanning.
scattering - The diffusion of a wireless signal that results from hitting an object that has smaller dimensions compared with the signal’s wavelength. Scattering is also related to the roughness of the surface a wireless signal encounters. The rougher the surface, the more likely a signal is to scatter when it hits that surface.
service set identifier - See SSID.
site survey - In the context of wireless networking, an assessment of client requirements, facility characteristics, and coverage areas to determine an access point arrangement that will ensure reliable wireless connectivity within a given area.
spread spectrum - A type of wireless transmission in which lower-level signals are distributed over several frequencies simultaneously. Spread-spectrum transmission is more secure than narrowband.
SSID (service set identifier) - A unique character string used to identify an access point on
an 802.11 network.
station - An end node on a network; used most often in the context of wireless networks.
transponder - The equipment on a satellite that receives an uplinked signal from Earth, amplifies the signal, modifies its frequency, then retransmits it (in a downlink) to an antenna on Earth.
Uplink - In the context of wireless transmission, the connection between a client’s transceiver and a carrier’s antenna.
WAP (wireless access point) - See access point.
Wi-Fi - See 802.11.
WiMAX - See 802.16.
WiMAX 2 - See 802.16m.
wireless - A type of signal made of electromagnetic energy that travels through the air.
wireless access point - See access point.
wireless gateway -  An access point that provides routing functions and is used as a gateway.
wireless LAN - See WLAN.
wireless router - An access point that provides routing functions.
wireless spectrum - A continuum of electromagnetic waves used for data and voice communication. The wireless spectrum (as defined by the FCC, which controls its use) spans frequencies between 9 KHz and 300 GHz. Each type of wireless service can be associated with one area of the wireless spectrum.
WLAN (wireless LAN) - A LAN that uses wireless connections for some or all of its transmissions.
Worldwide Interoperability for Microwave Access (WiMAX) - See 802.16a.

Review Questions

1.   To transmit and receive signals to and from multiple nodes in a three-story office building, what type of antenna should an access point use?
a.      Omnidirectional
b.      Unidirectional
c.       Bidirectional
d.      Tridirectional

2.   Which of the following is not true about multipath signaling?
a.   The more obstacles a wireless signal reflects or diffracts off, the better chance it has of reaching its destination.
b.  Multipath signaling uses less energy and results in clearer reception than line- of-sight signaling.
c.   Given that they follow multiple paths to their destination, signals will arrive at the same destination at slightly different times.
d.   The more obstacles between a wireless transmitter and receiver, the more signal fading will occur.

3.   You are setting up a WLAN for an insurance agency. The network includes 32 clients, three printers, two servers, and a DSL modem for Internet connectivity. What type of WLAN architecture would best suit this office?
a.   Ad hoc
b.   Interstitial
c.   Infrastructure
d.   Round robin

4.   Which of the following 802.11 transmission requirements contributes to its inefficiency?
a.     Before it can associate, a station must listen for an access point’s beacon on every channel within its frequency range.
b.      A source node must regularly ping the access point to ensure it is still available for transmitting data to the rest of the stations.
c.       A destination node must issue an acknowledgment for every packet that is received intact.
d.      Before transmitting, a source node must check to ensure the access point has not changed its SSID.
5. In the 802.11 standard, IEEE specifies what type of access method?
a.      Beacon passing
b.      Demand priority
c.       CSMA/CD
d.      CSMA/CA

6. Suppose a user on your office network has changed the channel on which his wireless NIC communicates. Assuming the wireless connection is his only access to the LAN, what will happen when he next tries to send an e-mail?
a.   The e-mail program will take longer than usual to send his message.
b.  The e-mail program will respond with a message indicating it could not connect to the mail server.
c.   The e-mail program will send the message without problems.
d.   The e-mail program will request the user to supply his logon credentials again before sending the message.

7.   What frequency band is used by 802.11b, 802.11g, and 802.11n?
a.      1.5 GHz
b.      2.4 GHz
c.       5 GHz
d.      11 GHz

8. Your office currently runs a mix of 802.11b and 802.11g clients. Rumor has it that your company is about to merge with another company that uses a different wireless technology. Which of the following would be compatible with what your WLAN currently runs?
a. 802.11a
b. 802.11n
c. Bluetooth
d. WiMAX

9. If your wireless stations are configured to perform passive scanning, what do they need from an access point to initiate association?
a.   A request to send
b.   An alert frame
c.   A beacon frame
d.   Nothing; they will find the access point on their own

10. You’re working on a school district’s 802.11n WLAN. Within each school, several access points serve students, teachers, and administrators. So that users can move about the school with their laptops and not lose network connectivity, each of the access points must share which of the following?
a.   The same ESSID
b.   The same make and model
c.   The same average distance to the client
d.   The same location

11. When a mobile WLAN user roams from access point As range into access point B’s range, what does it do automatically to maintain network connectivity?
a.  Associate with access point B in order to communicate with access point A
b. Reassociate with access point B
c. Reestablish its connection with access point A on another channel
d. Nothing; the user must reestablish network connectivity manually

12. Which two of the following techniques help to reduce overhead in 802.11n wireless transmission?
a. CSMA/CA
b. Asynchronous communication
c. Frame aggregation
d. Spread-spectrum signaling
e. Channel bonding

13. Your organization is expanding and plans to lease 3000 square feet of space in a nearby building. Your supervisor asks you to conduct a site survey of the space. If conducted properly, which of the following will your site survey reveal?
a. The optimal quantity and locations of access points for the WLAN
b. All potential sources of EMI
c. The distance between each workgroup area and telco room
d. All of the above

14. Which of the following wireless technologies boasts the highest maximum theoretical throughput?
a. LTE
b. HSPA+
c. 802.11g
d. 802.11n

15. Which of the following will help an access point’s transmissions reach farther?
a. Limiting the number of stations that may associate with the access point
b. Boosting its signal strength
c. Using the highest possible channel in the frequency band
d. Configuring it to use 802.11n only

16.  What part of a cellular network manages handoff?
a.   The client
b.   The base station
c.   The MSC
d.   The central office



17. Suppose you work for a telecommunications carrier who is looking into providing WiMAX in a suburb of a large city. A colleague suggests that your company reserve licensed frequencies from the FCC for your service. Why?
a.   Licensed frequencies will suffer less interference than unlicensed frequencies.
b.   Licensed frequencies allow users to roam farther than unlicensed frequencies.
c.   Licensed frequencies can use multiple areas of the wireless spectrum at once, thus increasing potential throughput.
d.   Licensed frequencies require less expensive equipment to transmit and receive than unlicensed frequencies.

18. On your Linux workstation, you open a terminal window and type at the command prompt iwconfig eth0 key 5c00951b22. What have you done?
a.   Established the wireless interface’s mode of transmission
b.  Established the strength with which the wireless interface will transmit data
c.   Established the credentials the wireless interface will use to communicate securely with the access point
d.  Established the SSID with which the wireless interface will attempt to associate

19. As the network manager for a small business, you have been asked to evaluate high-speed, packet-switched wireless data services that your company’s users can use at their desks, in their cars, and at their homes within your metropolitan area. Which two of the following meet those criteria, and are therefore candidates for evaluation?
a.   802.11g
b.   802.11n
c.  WiMAX 2
d.  HSPA+
e.  LTE

20. Which of the following types of satellites is used to provide satellite data services?
a. Geosynchronous orbit
b. Low Earth orbit
c. Medium Earth orbit
d. High Earth orbit



Sample Quiz

1. On the wireless spectrum, waves are arranged according to their ________ , from lowest to highest.
a. wavelengths           
b. strengths    
c. amplitudes
d. frequencies            

2. An antenna's ________ describes the relative strength over a three-dimensional area of all the electromagnetic energy the antenna sends or receives.
a. range          
b. reflection   
c. radiation pattern    
d. spread-spectrum    

3. ________ is the diffusion, or the reflection in multiple different directions, of a signal.
a. Diffraction  
b. Reflection   
c. Fading         
d. Scattering   

4. In a(n) ________ WLAN, wireless nodes, or stations, transmit directly to each other via wireless NICs without an intervening connectivity device.
a. mobile        
b. fixed           
c. ad hoc         
d. infrastructure         

5. Each IEEE wireless network access standard is named after the ________ .
a. the company who first sold it        
b. the person who invented it            
c. 802.11 task group that developed it          
d. the technology it uses        

6. The 802.11 standards specify the use of ________ to access a shared medium.
a. CSMA/CA   
b. CSMA/CD   
c. RTS/CTS      
d. RTS/CA       

7. In active scanning, the station transmits a special frame, known as a ________ , on all available channels within its frequency range.
a. routing metric        
b. broadcast signal     
c. cell  
d. probe          
8. A(n) ________ assesses client requirements, facility characteristics, and coverage areas to determine an access point arrangement that will ensure reliable wireless connectivity within a given area.
a. site survey  
b. audit report            
c. wiring closet diagram        
d. infrastructure map            

9. Which statement is true with regard to WLANs?
a. Wireless access configuration is largely identical across clients.            
b. Proposed access point locations should be tested prior to a site survey.
c. Incorrect encryption is usually the culprit with intermittent and difficult-to-diagnose wireless communication errors.          
d. Infrastructure WLANs are far more common than ad-hoc WLANs.         

10. Which statement is true with regard to wireless WANs?
a. Satellites maintain a constant distance from a specific point on the Earth's equator.    
b. Upstream data transmission is typically faster than downstream transmission.
c. Cellular networks were initially designed to provide digital phone service.        
d. HSPA+ is currently the fastest wireless broadband service available in the U.S.

11. Wireless signals originate from electrical current traveling along a conductor.
a. True
b. False           

12. Wireless networks are laid out using the same topologies as wired networks.
a. True
b. False           

13. 802.11n is compatible with all three earlier versions of the 802.11 standard.
a. True
b. False           

14. Placement of an access point on a WLAN must take into account the typical distances between the access point and its clients.
a. True
b. False           

15. WiMAX provides fewer throughputs than Wi-Fi and T1s.
a. True
b. False           


Practice Test

1. A(n) ____ is the creation of a communications channel for a transmission from an Earth-based transmitter to an orbiting satellite.
a.      downlink
b.      transponder
c.       directional antenna
d.      uplink

2.  ____ networking allows wireless nodes to roam from one location to another within a certain range of their access point.
a.      LOS
b.      Extended
c.       Fixed
d.      Mobile

 
 3. The downside to multipath signaling is that, because of their various paths, multipath signals travel different distances between their transmitter and a receiver.
                       
    True
                       
    False

 
 4

    The IEEE 802.11 standard specifies communication between two wireless nodes, or stations, and between a station and an access point. It also specifies how two access points should communicate.
                       
    True
                       
    False

 
 5

    802.11 networks use the same access method as Ethernet networks.

    True

    False

 
 6

    Access points for use on small office or home networks often include routing functions.
                       
    True
                       
    False

 
 7

    ____ occurs when a mobile user moves out of one access point's range and into the range of another.
                       
    Fading
                       
    Low earth orbiting
                       
    Reassociation
                       
    Passive scanning

 
 8

    In ____ transmission, a signal jumps between several different frequencies within a band in a synchronization pattern known only to the channel's receiver and transmitter.
                       
    star
                       
    bus
                       
    mesh
                       
    FHSS

 
 9

    If governments and companies did not adhere to ITU standards, chances are that a wireless device could not be used outside the country in which it was manufactured.
                       
    True
                       
    False

 
 10

    ____ signals follow a number of different paths to their destination because of reflection, diffraction, and scattering.
                       
    Multipath
                       
    Opened
                       
    Closed
                       
    Variable

 
 11

    Access points are also known as ____.
base stations
 
 12

    Using the ____ command, you can modify the SSID of the access point you choose to associate with, as well as many other variables.
                       
    ping
                       
    ipconfig
                       
    iwconfig
                       
    nbtstat

 
 13

    Spread-spectrum signaling is a popular way of making wireless transmissions more secure.

    True

    False

 
 14

    ____ is the governing body that sets standards for international wireless services, including frequency allocation, signaling and protocols used by wireless devices, wireless transmission and reception equipment, satellite orbits, and so on.
                       
    ITU
                       
    IEEE
                       
    CSMA/CA
                       
    LEO

 
 15

    In a(n) ____ arrangement, a subscriber receives data from the Internet via a satellite downlink transmission, but sends data to the satellite via an analog modem (dial-up) connection.
Dial Return
 
 16

    WiMAX provides Internet access to mobile computerized devices, including cell phones, laptops, and PDAs in metropolitan areas.
                       
    True
                       
    False

 
 17

    Data ____ are those that carry the data sent between stations.
frames
 18

    The four 802.11 standards (802.11b, 802.11a, 802.11g, 802.11n) are collectively known as ____.
                       
    WiMAX
                       
    Wi-Fi
                       
    Bluetooth
                       
    Open

 
 19

    One advantage of  ____ wireless is that because the receiver's location is predictable, energy need not be wasted issuing signals across a large geographical area.
fixed
 
 20

    A site survey also includes testing proposed access point locations.
                       
    True
                       
    False

Chapter Test
1

    Clients are able to exchange signals with satellites as long as they have a ____ path.
            a.        
    view
            b.        
    directional
            c.        
    proprietary
            d.        
    line-of-sight

 
 2

    802.11b and g signals can extend a maximum of ____________________ feet and still deliver data reliably.
330
 
 3

    ____________________ means that satellites orbit the Earth at the same rate as the Earth turns.
GEO
 
 4

    If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit.
            a.        
    incorrect encryption
            b.        
    incorrect antenna placement
            c.        
    SSID mismatch
            d.        
    interference

 
 5

    WiMAX is defined by the IEEE 802.11 standard.

    True

    False

 
 6

    Wireless signals experience attenuation.

    True

    False

 
 7

    Most satellites circle the Earth ____  miles above the equator in a geosynchronous orbit.
            a.        
    100
            b.        
    1240
            c.        
    6,000
            d.        
    22,300

 
 8

    ____ satellites are the type used by the most popular satellite data service providers.
            a.        
    Low earth orbiting
            b.        
    Transponder
            c.        
    Medium earth orbiting
            d.        
    Geosynchronous earth orbiting

 
 9

    The average geographic range for an 802.11a antenna is ____ meters.
            a.        
    20
            b.        
    100
            c.        
    330
            d.        
    600

 
 10

    ____ is a significant problem for wireless communications because the atmosphere is saturated with electromagnetic waves.
            a.        
    Interference
            b.        
    Attenuation
            c.        
    Diffraction
            d.        
    Fading

 
 11

    The ____________________ is a unique character string used to identify an access point.
SSID
 
 12

    An 802.11g antenna has a geographic range of ____ meters.
            a.        
    20
            b.        
    100
            c.        
    300
            d.        
    330

 
 13

    Which satellites transmit and receive signals in the 12 to 18 GHz band?
            a.        
    Ku-
            b.        
    S-
            c.        
    L-
            d.        
    Ka-

 
 14

    In ____ scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range.
            a.        
    fixed
            b.        
    passive
            c.        
    active
            d.        
    open

 
 15

    In the case of connecting two WLANs, access points could be as far as ____ feet apart.
            a.        
    500
            b.        
    800
            c.        
    1000
            d.        
    1200

 
 16

    ____ may use either the 2.4-GHz or 5-GHz frequency range.
            a.        
    802.11a
            b.        
    802.11b
            c.        
    802.11g
            d.        
    802.11n

 
 17

    A(n) ____________________ assesses client requirements, facility characteristics, and coverage areas to determine an access point arrangement that will ensure reliable wireless connectivity within a given area.
site survey
 
 18

    The use of multiple frequencies to transmit a signal is known as ____________________ technology.

 
 19

    ____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel.
            a.        
    Channel bonding
            b.        
    Channel aggregation
            c.        
    Frame bonding
            d.        
    Frame aggregation

 
 20

    An ad hoc arrangement would work well for a WLAN with many users.

    True

    False

 
 21

    In ____, a wireless signal splits into secondary waves when it encounters an obstruction.
            a.        
    bounce back
            b.        
    scattering
            c.        
    reflection
            d.        
    diffraction

 
 22

    Spread spectrum is a popular way of making wireless transmissions more secure.

    True

    False

 
 23

    ____ is a command-line function for viewing and setting wireless interface parameters and it is common to nearly all versions of Linux and UNIX.
            a.        
    config
            b.        
    ivconfig
            c.        
    iwconfig
            d.        
    ipconfig

 
 24

    In ____ wireless systems, the transmitting antenna focuses its energy directly toward the receiving antenna which results in a point-to-point link.
            a.        
    open
            b.        
    variable
            c.        
    mobile
            d.        
    fixed

 
 25

    To establish a satellite Internet connection, each subscriber must have a ____.
            a.        
    dish pathway
            b.        
    dish antenna
            c.        
    line-of-sight antenna
            d.             source pathway