Selecting Wireless Network Equipment
Selecting Wireless Network Equipment
CHAPTER
6
Evaluating and Selecting
Wireless Equipment
The equipment that you select for your broadband wireless wide-area network (WAN)
plays a major role in the reliability, scalability, and profitability of your network. This
chapter helps you evaluate and select your wireless network equipment.
This chapter does not list feature information vendor by vendor. The quantity of infor-
mation would be overwhelming and the listing would quickly become outdated. Instead,
this chapter aims to help you understand the features and characteristics that are available
on wireless equipment. When you understand the features and their significance, you will
be in a position to select the equipment that best meets your network needs.
TIP Practice safety when you are working near wireless equipment. High amounts of microwave
energy can cause damage to the human body, so minimize your exposure to this type of
energy. Do not point a directional antenna at yourself or at any other nearby person. Turn
the wireless equipment off any time you are not testing it. Remember: When you double
the distance between yourself and a wireless antenna, you reduce the amount of radiation
reaching you to one-fourth the previous level. Whenever possible, maintain as much
distance as possible between yourself and a wireless antenna.
When your indoor testing is complete and you are comfortable with the units, proceed to
outdoor testing.
model, computer systems made by one manufacturer could not easily communicate with
computer systems made by other manufacturers. The intent of the OSI reference model was
to allow computer systems to successfully communicate with each other even though
different vendors manufactured them. Figure 6-1 shows the OSI reference model alongside
the
TCP/IP architecture.
Application
Presentation
Session Application
Beginning in the 1970s, the United States Department of Defense began promoting
computer networking between university research departments and government installa-
tions. One of the primary goals of this internetworking effort was to develop a survivable
network—one that would be able to continue communicating even if some of the network
nodes or some of the communications links were destroyed. This new networking effort
was based on two primary protocols: the Transmission Control Protocol (TCP) and the
Internet Protocol (IP). TCP performed transport layer functions equivalent to the transport
layer in the OSI model. IP performed network layer functions that were equivalent to the
network layer (Layer 3) in the OSI model. When application layer (Layer 7) protocols
(Telnet, FTP, SMTP, and so on) and physical (Layer 1) and data link layer (Layer 2)
protocols were added, the result was an architecture that effectively contained five layers.
Figure 6-1 shows the TCP/IP model alongside the OSI reference model for comparison.
The TCP/IP architecture is functionally equivalent to the OSI reference model. The major
similarities and differences are as follows:
• Both models have an application, a transport, and a network/Internet layer.
• The TCP/IP model does not have a session layer (Layer 5 of the OSI reference model)
or a presentation layer (Layer 6 of the OSI reference model).
[Link] Page 182 Monday, January 27, 2003 3:37 PM
• Both models have a lower layer that connects the upper layers to the actual physical
network. In the OSI reference model, the lower layer (Layer 1) is called the physical
layer. In the original TCP/IP model, the lower layer was called the host-to-network
layer. In present-day use, TCP/IP networks use the combination of a Layer 2 sublayer
called the medium access control (MAC) sublayer along with Layer 1 to provide
connectivity over the wireless link.
Virtually all the wireless equipment features that you evaluate operate at the physical, data
link, and network layers of the OSI and TCP/IP reference models. The wireless features and
functionality (modulation type, data rate, and so on) take place at the physical layer. Access
to (and sharing of) the wireless medium takes place at the data link layer. Routing takes
place at the network layer.
Peer Protocols
Peer protocols run across the Internet but provide communication only between same-layer
processes. One example of this same-layer communication process is a Hypertext Transfer
Protocol (HTTP) web browser running on the application layer of one network. The HTTP
browser retrieves information from its peer web server running on the application layer of
another network. Although the HTTP communication is application-layer-to-application
layer (peer-to-peer), both networks communicate downward through their lower network
layers.
Services
Information is passed from the top (application) layer of one network down through the
lower layers. Each layer provides a set of services for the layer just above it and utilizes the
services provided by the layer just below it. The set of services between two layers is
referred to as the interface between the two layers. For example, Layer 6 provides services
for Layer 7; Layer 5 provides services for Layer 6; and so on. In this way, Layer 7 (the
application layer) can communicate all the way down to Layer 1 (the physical layer).
The following list illustrates how services and protocols operate. When your web browser
uses HTTP over a wireless network, the information flow is as follows:
1 The HTTP information request originates at the application layer on the originating
network.
2 The HTTP request travels downward from the application layer (using the services
provided by all the intermediate layers) to the physical layer on the originating
network. The physical layer uses the appropriate wireless protocol (for example, the
appropriate direct sequence spread spectrum modulation or DSSS) to communicate
the request over the air wirelessly to the physical layer on the other network.
[Link] Page 183 Monday, January 27, 2003 3:37 PM
3 The physical layer on the other network uses the DSSS protocol to receive the request
from the originating network. The physical layer then passes the information up
through its interface to the data link layer. Using higher and higher layer services,
the request passes upward until it eventually reaches the application layer. There,
the HTTP protocol processes the request and replies with a response.
4 Using services of lower and lower layers, the response travels downward to the
physical layer. Using the Layer 1 DSSS protocol, the response is transmitted over
the air back to the physical layer of the originating network.
5 Using services, the originating network passes the response upward to the application
layer where the HTTP protocol receives the response to its original request.
Packets prepared by Layer 2 (the data link layer) are called frames. Not all frames contain
payload data. Wireless APs and wireless stations exchange three types of frames, each with
the following functions:
• Data frames carry user payload data (the hamburger) between different wireless
network nodes.
• Control frames carry information such as request-to-send (RTS) and clear-to-send
(CTS) messages as well as frame acknowledgments (ACK).
• Management frames carry association and authentication requests and responses in
addition to beacon information.
NOTE You might have heard of wireless networks with a hidden node problem. This problem can
occur in a network that uses DCF. In most wireless networks, certain wireless stations
cannot hear all the other wireless stations. Under heavy traffic loads, several stations might
try to transmit at the same time. This can happen even when the stations are using RTS/CTS.
When stations transmit at the same time, collisions occur and network throughput drops
drastically. The solution to hidden-node problems is to use wireless equipment that can
support PCF.
NOTE No wireless equipment vendor offers all the listed features in any model of their wireless
equipment—nor should they. Each wireless network is built to serve a specific set of end
user needs. These end user needs dictate the best set of wired and wireless features for that
particular network. Each feature listed in the following sections is offered on at least one
brand and model of wireless equipment. It is important that, as you consider the available
features, you keep your wireless network needs in mind. Your equipment research involves
finding the best match between your network needs and the wireless equipment feature set
offered on a particular model of wireless equipment.
[Link] Page 187 Monday, January 27, 2003 3:37 PM
Your physical layer wired-interface feature evaluation includes some or all of the following:
• Low-speed data ports
• Ethernet ports
• High-speed data ports
• Voice interfaces
Ethernet Ports
Ethernet interfaces allow network data to access the wireless network. Wireless equipment
can include one or more of the following Ethernet interfaces:
• 10Base-T—This is the most common Ethernet interface.
• 100Base-TX—This interface is found on higher-speed wireless equipment.
• Ethernet hubs or switches—This interface is found on some wireless APs.
TIP Telecommunications managers who want to provide both Ethernet and voice-PABX
connectivity between buildings find wireless equipment that simultaneously provides both
Ethernet and T1 connectivity to be especially useful.
TIP Remember that, in general, there is an inverse relationship between wireless bandwidth and
wireless distance; as bandwidth goes up, distance goes down. OC-12 wireless equipment
typically operates only over distances up to approximately 1312 ft. (400 m).
Voice Interfaces
Voice interfaces enable wireless equipment to carry voice in addition to data. The following
types of voice interfaces are possible:
• Voice over Internet Protocol (VoIP) interfaces—VoIP interfaces allow IP
telephones to connect directly to the wireless equipment and to make on-network
voice calls. Making calls to the public switched telephone network (PSTN) requires
the use of an external telephone gateway.
• Talkback/orderwire interfaces—A talkback interface (sometimes called an order
wire) provides a two-way voice circuit. Maintenance personnel normally use this
circuit for end-to-end voice communication over the wireless link while servicing the
wireless equipment.
[Link] Page 189 Monday, January 27, 2003 3:37 PM
Because there is no standard definition of NLOS, the process of evaluating NLOS perfor-
mance claims is a challenging one. Almost all vendors of NLOS equipment (either acciden-
tally or intentionally) exclude information about the range of their NLOS equipment. The
impression is left with the customer (you) that the NLOS equipment has the same commu-
nications range as LOS wireless equipment. This is never the case; the range of NLOS
equipment is always substantially less than the range of equipment that is operating over a
true, unobstructed LOS path.
Now, you will learn about features that actually improve performance in NLOS environ-
ments. Two significant challenges that an NLOS environment presents for wireless
equipment are as follows:
• Multipath—Any equipment feature that improves performance in a multipath
environment also improves performance in an NLOS environment. These features are
as follows:
— Diversity antennas
— Circularly polarized antennas
— Smart antennas that constantly adjust their beamwidth to receive and
transmit energy directly to and from each individual end user antenna
— Adaptive equalization
— Multicarrier modulation, such as OFDM
Whenever possible, always try to design your wireless WANs to use LOS paths. You
will achieve more reliable coverage at longer distances.
• Attenuation—Attenuation losses in a non-LOS environment are the reason that the
communications range in an NLOS environment is less than in a LOS environment.
The following equipment and network features reduce attention and improve NLOS
performance:
— Receiver sensitivity
— 900 MHz frequency band
— Mesh networks
900 MHz
900 MHz is the lowest-frequency industrial, scientific, and medical (ISM) band. The total
width of the band is 26 MHz. Signals in this band have a wavelength of approximately
12 inches (30 cm). These signals have the capability to pass through some obstructions
without being completely lost. For example, they can pass through light trees and diffract
[Link] Page 191 Monday, January 27, 2003 3:37 PM
over one low hill and still be strong enough to be received several miles away. 900 MHz is
the best band to use when there are just a few obstacles to the LOS path. Table 6-1 shows
900-MHz power levels.
Table 6-1 Power Levels for the 900-MHz Band
EIRP (Equivalent
Maximum Maximum Isotropic Radiated
Band Transmitter Power Antenna Gain Power)
902 to 928 MHz +30 dBm (1 Watt) +6 dBi +36 dBi
(4 Watts, relative to an
isotropic antenna)
2.4 GHz
2.4 GHz is the middle ISM band. The total width of the band is 83 MHz. Signals in this
band have a wavelength of approximately 4.8 inches (12 cm). These signals have little
capability to pass through obstructions without being lost. Passing through one wall can
result in 10 to 12 dB of attenuation. Attenuation from trees varies depending on the
presence of leaves and whether the leaves are wet or dry but, on average, the attenuation
from trees is approximately .5 dB per meter. One 30-ft (10-meter) diameter tree (the tree
canopy/leaves are 30 feet across, not the tree trunk) results in about 5 dB of attenuation;
6 dB of attenuation reduces the length of a wireless link to 1/2 of its previous length. You
can see that passing a 2.4-GHz signal through a few trees can easily reduce the usable
length of the wireless path to a few hundred feet. Table 6-2 shows 2.4-GHz power levels.
Table 6-2 Power Levels for the 2.4 GHz Band
Maximum Maximum Antenna Maximum
Band Transmitter Power Gain EIRP
2403 to 2483 MHz +30 dBm (1 Watt) +6 dBi +36 dBi (4 Watts).
(Point-to-Multipoint)
2403 to 2483 MHz +30 dBm (1 Watt) (3-to-1 Rule) For Depends on
(Point-to-Point only) every 3 dBi (above +6 antenna size. With
dBi) of antenna gain, a +24 dBi antenna
reduce the transmitter and +24 dBm of
power by 1 dB. (For transmitter power,
example, for a +9 dBi +48 dBi (64 Watts)
antenna, reduce is possible in a
transmitter power to Point-to-Point
+29 dBm.) (only) link.
2403 to 2483 MHz +21 dBm (125 mW) +6 dBi +27 dBi (500 mW).
Wideband frequency
hopping spread
spectrum using from
15 to 74 hopping
frequencies
[Link] Page 192 Monday, January 27, 2003 3:37 PM
3.5 GHz
The 3.5-GHz band is not available for use in the United States; however, some frequency
subbands between 3.3 and 4.0 GHz are available for use (usually on a licensed basis) in a
number of other countries. This band is mentioned here because equipment for this band is,
in many cases, similar to equipment for the 2.4-GHz band. Signals in this band have a
wavelength of approximately 9 cm (3.4 in). The propagation characteristics are somewhat
similar to the 2.4-GHz band, although attenuation from trees and other obstructions is
higher.
5 GHz
There are four license-free subbands at 5 GHz, although two of these bands overlap each
other. There is one ISM band from 5725 to 5850 MHz (5.725 to 5.850 GHz), and there are
three Unlicensed National Information Infrastructure (U-NII) bands: 5150 to 5250 MHz,
5250 to 5350 MHz, and 5725 to 5825 MHz. The ISM band is 125 MHz wide, and each
U-NII band is 100 MHz wide. Signals in the 5-GHz subbands have a wavelength of approx-
imately 2 inches (5 cm). Each 5 GHz subband is wider than the entire 2.4-GHz band;
therefore, it is possible to build 5-GHz wireless equipment that provides more bandwidth
and more throughput than equipment for any other license-free band. The attenuation from
trees at 5 GHz is about 1.2 dB per meter; therefore, each 30-ft (10-meter) diameter tree
(crown) that blocks an LOS path reduces the length of a wireless link by approximately 75
percent. Table 6-3 shows 5-GHz power levels.
Table 6-3 Power Levels for the 5-GHz Band
Maximum Maximum
Band Transmitter Power Antenna Gain EIRP
ISM +30 dBm (1 Watt) +6 dBi +36 dBi (4 Watts).
5725 to 5850 MHz Note that point-to-point
systems can use an antenna
with more than +6 dBi gain
with no transmitter power
reduction.
U-NII +17 dBm (50 mW) +6 dBi +23 dBi (500 mW; indoor
5150 to 5250 MHz use only per FCC
regulations.)
U-NII +24 dBm (250 mW) +6 dBi +30 dBi.
5250 to 5350 MHz (1 Watt).
U-NII +30 dBm (1 Watt) +6 dBi +36 dBi (4 Watts)
5725 to 5825 MHz Note that point-to-point
systems can use an antenna
with up to +23 dBi gain
with no transmitter power
reduction.
[Link] Page 193 Monday, January 27, 2003 3:37 PM
60 GHz
The 59 to 64-GHz ISM band was approved for use in the United States in 1999. The total
width of this band is almost 5 GHz. Signals in this band have a wavelength of about 2/10
of an inch (1/2 cm). Signals at this frequency are attenuated by the presence of oxygen in
the air; therefore, the maximum wireless link distance is approximately half a mile (800 m),
assuming that a LOS path is available. Obstructions completely block the signal. The
advantage of this band is that equipment is available that provides point-to-point raw data
rates up to 622 Mbps. In addition, the oxygen absorption means that the likelihood of inter-
ference from other networks is low.
Modulation Types
This section covers the following information:
• A quick review of the modulation process
• A direct sequence spread spectrum (DSSS) description
• A frequency hopping spread spectrum (FHSS) description
• An orthogonal frequency division multiplexing (OFDM) description
• A brief mention of other spread spectrum and non-spread types of modulation
channels. Each time a DSSS signal is transmitted, the wireless energy is centered around
only one frequency; therefore, DSSS modulation is a single-carrier modulation scheme.
NOTE Hopping sequences are sometimes different in different countries. Check with your
national telecommunications authority for the regulations in your country.
802.11a equipment uses OFDM modulation and operates on the 5-GHz band; 802.11g uses
OFDM on the 2.4-GHz band. OFDM is a multicarrier modulation scheme because it
transmits using more than one carrier simultaneously.
Comparison Between Data Rate and Throughput (Including Simplex Versus Duplex
Throughput)
There is a common misunderstanding regarding the bandwidth, the data rate, and the
throughput of a wireless device:
• Bandwidth refers to the raw data rate of the device.
• Throughput refers to the actual amount of end user data that the device can transfer in
a given time interval.
[Link] Page 196 Monday, January 27, 2003 3:37 PM
The result of this misunderstanding is that wireless network users are frequently disap-
pointed in the wireless throughput (data transfer speeds) that they experience.
Understandably, wireless equipment manufacturers want their equipment to look as
attractive as possible to potential buyers. For this reason, they usually use the raw data rate
in their sales and advertising material. An 802.11b AP, for example, provides a raw data rate
of 11 Mbps.
Wireless users have a different expectation; they are interested in how fast a web page or a
file downloads. They are interested in the capability of the wireless device to deliver their
data. When the wireless users’ 802.11b AP delivers just 5.5 Mbps of data throughput, they
feel that there must be a problem with the equipment.
Most frequently, the real data throughput potential of a half-duplex wireless network is
approximately 50 percent of the raw data rate. An 802.11b AP operating at the maximum
11-Mbps raw data rate has a maximum throughput potential of about 5.5 Mbps. This
difference between raw data rate and actual throughput has several causes, including these:
• The framing and signaling overhead
• The half-duplex turnaround time between transmit and receive
• The lower efficiency inherent in the transmission of small packets
Collisions between wireless users and interference from other networks can reduce the
throughput below 50 percent. Chapter 8, “Solving Noise and Interference Problems,”
discusses this issue in more detail.
Remember that your end users rely on you to set their throughput expectations realistically.
When they measure their throughput and discover that it meets or slightly exceeds the
throughput that you told them to expect, they will judge your wireless network performance
to be good.
As the data rate increases, the maximum AP link distance decreases. AP data rates automat-
ically fall back to the next lower level when the AP detects the signal quality decreasing as
the link distance increases.
NOTE Chapter 8 is devoted completely to the topic of understanding and minimizing the effects
of noise and interference. Refer to Chapter 8 for additional information as you read about
the following interference-reduction features.
In the outdoor wireless environment, many potential interference sources exist. You can use
a few equipment characteristics to provide some help in minimizing the effects of inter-
ference.
The following interference-reduction features operate at the physical layer to help reduce
the effects that interference can have on both AP and CPE throughput.
Receiver Selectivity
Selectivity is the capability of a receiver to reject signals that are not exactly on the desired
receiving frequency. No receiver is perfectly selective; no receiver has the capability to
completely reject all off-frequency signals; therefore, all receivers are susceptible to being
overloaded by nearby, strong off-frequency signals. These off-frequency signals can be
within the license-free band (in-band interference), or they can be outside the band (out-of-
band interference).
Overloading causes a receiver to become desensitized (to experience a reduced sensitivity)
to the desired signals. The symptom of a desensitized receiver is a reduction in the receiving
distance. Some receivers allow you to configure a higher receive threshold level. This
feature enables you to intentionally reduce the sensitivity and therefore reduce the intensity
of the overloading. This feature is similar to a “squelch” control on an FM two-way radio.
[Link] Page 199 Monday, January 27, 2003 3:37 PM
It can be difficult for you to compare receiver selectivity and to predict overload resistance
because most manufacturers do not publish overload specifications. Keep the following
general guidelines in mind as you evaluate wireless equipment:
• Wireless equipment that is designed for outdoor WAN use should be less susceptible
to being overloaded when compared to indoor wireless LAN equipment.
• Wireless equipment that is designed for indoor LAN use is likely to be more
susceptible to being overloaded when used outdoors.
• All wireless equipment might need to have an external bandpass filter added when
there are one or more strong, nearby transmitters such as FM, AM, or television
broadcast transmitters.
Multipath Resistance
Multipath fading is a fact of life at microwave frequencies. Multipath is caused when signal
reflections cause several signals (echoes) to be received almost simultaneously. Equipment
features that minimize the effects of multipath include the following:
• Antenna diversity—Antenna diversity helps minimize multipath by using two
separate antennas. The antennas are separated from each other, and when the signal
fades, one antenna receives a stronger signal than the other antenna. The receiver
automatically selects the strongest antenna signal on each incoming packet, so fading
is reduced.
• Circular antenna polarization—Circularly polarized antennas discriminate against
multipath interference. Equipment that offers the option of using a circularly polarized
antenna provides more protection against multipath compared to equipment without
a circularly polarized antenna.
• OFDM—Equipment that uses orthogonal frequency division multiplexing
modulation provides more immunity to multipath interference compared to non-
OFDM equipment.
Multipath interference is worse in a physical environment where you find many obstacles
that reflect wireless signals. The center of a city with many tall, flat, reflective metal
building surfaces is a high multipath environment. If you plan to deploy wireless service in
a high-multipath environment, use as many multipath-reduction features and techniques as
possible.
Modulation Type
Like antenna directivity, modulation type is a not-so-obvious security feature. If a wireless
network uses DSSS, a hacker must use the same DSSS modulation type. Likewise, if a
network uses FHSS, a hacker must use FHSS. If a network uses another proprietary
modulation type, an unauthorized user must use the same proprietary modulation type.
Therefore, proprietary modulation types provide a higher level of physical layer security
than 802.11b, for example.
[Link] Page 201 Monday, January 27, 2003 3:37 PM
TIP The role of transmitter power in the successful operation of a wireless network is often
misunderstood. Many people believe that more power is always better; however, this is not
true in many cases. Your best approach is to transmit with only the amount of power that
you need to cover your desired service area. Transmitting with too much power results in a
transmitting range that is larger than your receiving range. This causes unnecessary
interference to other networks. The owner of the other networks might then feel the need to
retaliate with excessive transmitter power, which can lead to a cycle of escalation in which
everyone loses.
NOTE When comparing receiver thresholds, compare the threshold values at the same data rate.
Comparisons at different data rates are invalid because as the data rate goes up, a receiver’s
threshold goes up. Stated another way, as the data rate goes up, the receiver becomes less
sensitive.
• Noise figure—Receivers create noise in their circuitry. Noise figure refers to internal
noise or the relative lack of internal noise created by the receiver. The lower the
internal noise, the better a weak signal is received. A 3-dB noise figure is better than
a 6-dB noise figure, for example.
Bridging Features
Bridging takes place at the data link layer and is based on the MAC addresses of the end
user equipment. The typical wireless bridge contains a table of MAC addresses and bridge
ports. Packets are forwarded to the correct bridge port based on the MAC address table
information. Your data link layer feature evaluation includes the following features.
[Link] Page 204 Monday, January 27, 2003 3:37 PM
TIP Sometimes, an equipment vendor’s advertising confuses the MAC address table size with
the number of simultaneous end user connections. For example, an advertisement might
state that one AP can support up to 1000 users. The ad might fail to mention that only 128
of the users can be connected at the same time. This type of error can be caused by an error
on the part of the person preparing the advertisement. This person might be unclear about
MAC address table size versus the number of simultaneous connections. If you see claims
like this that appear to be excessive or too good to be true, ask the vendor to confirm that
the advertised information is correct.
A wireless bridge is designed to support many wireless users, typically from 50 to several
hundred. One special type of wireless bridge is called an Ethernet converter. Originally, an
Ethernet converter was designed to bridge between one Ethernet port (on one computer)
and a wireless WAN. Currently, Ethernet converters are available that support bridging
between up to eight computers and the wireless WAN. This expanded Ethernet converter is
called a super Ethernet converter (SEC).
Switching
Wireless APs occasionally contain a built-in switch. The switch allows Ethernet connec-
tivity from the AP to a number of Ethernet devices without needing to purchase an external
switch.
[Link] Page 205 Monday, January 27, 2003 3:37 PM
Protocol Filtering
Protocol filtering permits you to deny bridging based on the Layer 2 packet protocol.
Protocols such as IPX, NetBEUI, DECNet, or AppleTalk can be denied.
Authentication
Authentication is the process that a network uses to determine if an end user is allowed to
connect to the network. Authentication schemes require an exchange of management
frames between the authenticator (the network) and the end user who is requesting network
access. Simple authentication schemes provide minimal security, whereas more complex
schemes provide higher levels of security.
Several network layers are typically involved in the authentication process; however,
because Layer 2 plays a prominent role, authentication is outlined here.
Open-system authentication is the least secure; it simply requires a station to identify itself
to an AP and request that it be granted authentication.
A more secure authentication system is shared-key authentication using WEP. The shared
key is distributed to all stations that are authorized to use the network. The stations use the
shared key to respond to challenge text sent to them by the AP. If a station responds to the
challenge text correctly, the AP grants network access.
A more secure authentication system is based on one of the 802.1x authentication types
defined in the Extensible Authentication Protocol (EAP). EAP is defined in RFC 2284 and
includes a number of different authentication methods. 802.1x requires using three entities:
• A supplicant (the station requesting authentication)
• The authenticator (typically the AP)
• The authentication server (such as a Remote Authentication Dial-In User Service
[RADIUS] server)
EAP implementations typically allocate a new encryption key each time a wireless user
begins a new session. A number of wireless vendors provide proprietary authentication
features that are based on EAP and 802.1x. In the future, 802.11i wireless standards will
likely evolve out of the current 802.1x standards.
[Link] Page 207 Monday, January 27, 2003 3:37 PM
Encryption
Sending an unencrypted packet over the air increases the chances that an unauthorized
person could intercept and decode the packet. A variety of encryption schemes make it
harder for this to occur. In addition to WEP encryption (already described), other available
encryption schemes include the following:
• Data Encryption Standard (DES)—A 64-bit encryption standard with a user-
selected encryption key.
• Triple DES (3DES)—Uses three 64-bit keys. The first key encrypts the data, the
second key decrypts the data, and the third key re-encrypts the data.
• Advanced Encryption Standard (AES)—The most current U.S. Government-
approved encryption standard. It uses a Rijndael (pronounced “rain-doll”) algorithm
with either a 128-bit, 192-bit, or 256-bit encryption key. AES requires a math
coprocessor; therefore, it might not be compatible with existing 802.11b hardware.
The upcoming 802.11i standard includes AES.
NOTE Later in this chapter, there is an additional discussion of the advantages and disadvantages
of selecting wireless equipment that includes routing.
Routing Features
The following sections contain descriptions of some of the routing protocols and features
that are often available in wireless routers.
[Link] Page 208 Tuesday, January 28, 2003 3:23 PM
Static IP Routing
Every wireless router includes static IP routing. Static routing enables you to configure
permanent IP routes.
Dynamic IP Routing
Some wireless routers include dynamic IP routing. These routers support one or more
dynamic routing protocols. The most common of these supported protocols include the
following:
• Routing Information Protocol (RIP) v1 and v2—RIP is an interior routing
protocol. It is a distance-vector metric protocol that routes packets based on the
number of routing hops needed to reach the destination. RIP is relatively easy to
implement, but it does not take into account the bandwidth of each hop.
• Open Shortest Path First (OSPF)—OSPF is also an interior routing protocol. It is a
link-state metric protocol. OSPF routes packets based on the shortest distance, the
least delay, and the most bandwidth available to reach the destination.
Bandwidth Management
Wireless equipment occasionally includes bandwidth management features. This allows
the bandwidth available to and from each MAC or IP address to be throttled or limited to a
[Link] Page 209 Monday, January 27, 2003 3:37 PM
specified level. This feature allows you to manage your total available bandwidth, to offer
different service levels to different groups of end users, and to serve more end users. Some
equipment allows end user bandwidth to be throttled at different speeds in different
(downstream and upstream) directions.
NOTE Some wireless routers allow you to allocate bandwidth based on either the IP address of the
end user or the MAC address of the end user.
Roaming
Roaming is the ability of an end user to move from AP to AP within the same subnet while
maintaining a network connection. 802.11b APs usually include roaming capabilities. The
vast majority of wireless WANs provide service to fixed end user locations; therefore,
roaming is not used. If you need to design or deploy a wireless WAN that includes roaming,
you should evaluate the following:
• Reassociation speed—The length of time it takes for an end user to be switched from
one AP to another.
• Tunable parameters—Any other AP parameters that are designed specifically to
enable smooth roaming.
• Compatibility issues—AP-to-AP communication standards are not specified in
802.11b. If you anticipate building a network that supports roaming, you should plan
to buy all of your APs from the same vendor.
Firewalls
Wireless routers sometimes contain firewall features. These features allow traffic to flow
outward from a local network to the Internet. Traffic flowing inward from the Internet to the
local network is filtered or blocked.
Network Design
Many factors of network design, including terrain, distance, buildings, trees, and the
presence of other networks, influence the design of your network. Sometimes, relatively
expensive tools (such as spectrum analyzers) are needed to assist during the network design
process. Sometimes, however, inexpensive tools are available to help you with network
design.
Some wireless LAN equipment vendors include site survey utility software along with their
wireless equipment. These usually display signal strength, noise level, signal-to-noise ratio
(SNR), and signal quality information. Although these utilities are often designed for
indoor use, they are useful to show you how well a signal from your AP is being received
at different locations within your desired outdoor coverage area. These utilities are also
useful for antenna alignment. Sometimes, low-cost (or free) hardware-specific utilities are
available that function like a low-cost spectrum analyzer. Although these low-cost utilities
do not have the full range of regular spectrum analyzer features, they do cover the entire
2.4-GHz band and show which channels are in use by other networks.
Network Management
Network management system (NMS) capabilities vary widely between different models of
wireless equipment. Look for some of the following features:
• Access method—Methods used to access the NMS include serial port access, telnet
access, generic Windows browser access, and proprietary Windows-based software.
Generic browser access is probably the easiest method to use.
[Link] Page 211 Monday, January 27, 2003 3:37 PM
• Wireless link statistics—An NMS that provides statistics for each individual
wireless link in a point-to-multipoint system is important to allow effective network
monitoring. At a minimum, the following statistics should be available for each end
user link and each AP: signal strength, noise level, and percentage of packets that need
to be retransmitted.
• Graphical usage statistics—Make network management easier. You can identify
light or heavy traffic patterns, perform usage-based billing based on either IP or MAC
address, and see when bandwidth usage peaks.
• Simple Network Management Protocol (SNMP)—SNMP-based NMSs are fairly
standard today. Some wireless equipment uses proprietary management software;
however, many third-party management programs can manage SNMP-based systems.
• Antenna-alignment utilities—Generate wireless link traffic and allow the system
administrator to see real-time statistics while turning the antenna to receive the
highest signal.
• Flood ping capability—Floods a network with ping packet traffic. This test allows
the system administrator to test the wireless link while simulating a traffic load.
NOTE At the time of this writing, 802.11a equipment that is operating in the 5-GHz U-NII bands
(with bandwidths up to 54 Mbps) is beginning to become available. This equipment is
currently designed for use in indoor LANs and not in outdoor WANs. Further product
development might make outdoor versions available in the future.
Backbone Capacity
Your first backbone decision is to determine how much throughput you need. This
throughput decision is affected by the following factors:
• Market needs—How much throughput do your markets require? A backbone link
that serves businesses located in several cities needs to provide more throughput than
a link that serves only one or two small residential areas.
• Number of users—The number of wireless end users and the nature of their needs
determine the amount of throughput that your backbone needs to provide.
• Simplex versus duplex backbone—Backbone equipment can be either simplex or
duplex. A duplex backbone can provide up to 50 percent more throughput than a
simplex backbone. Duplex backbone costs are generally higher because a duplex link
contains two complete transmitting systems and two complete receiving systems.
• Overselling ratio—Internet usage is bursty. Most Internet users use bandwidth
intermittently; therefore, ISPs can oversell bandwidth knowing that not all users will
be on all the time. The number of times that you resell the same bandwidth (your
overselling ratio) affects the amount of backbone bandwidth that you need. Your ISP
experience combined with your observation of the usage patterns on your network
help you determine your best overselling ratio and your backbone bandwidth needs.
[Link] Page 214 Monday, January 27, 2003 3:37 PM
AP Feature Decisions
The list that follows describes some of the key decisions that you need to make as you select
your AP equipment:
• Frequency band—Your choice of frequency band is probably the most important
equipment decision that you will make. The difference in wireless propagation
characteristics and interference levels between the license-free bands means that a
poor decision here might result in an unusable network. Before making this decision,
you should review the propagation characteristics of each band (discussed earlier in
this chapter). You should also perform a wireless site survey (see Chapter 4,
“Performing Site Surveys”) to determine potential interference levels on a frequency
band before you select equipment for that band. The information in Chapter 8 can help
you if you find high levels of interference.
• NLOS environment—If you are considering buying equipment that operates in an
NLOS environment, you need to either rule out or verify the range claims that the
equipment manufacturer has made. You can do this by visiting an ISP that has the
equipment deployed in an NLOS environment that is similar (such as the same density
of trees and the same type of obstructions) to yours.
• Modulation type—Your choice of modulation type (DSSS, FHSS, or proprietary) is
an important factor in the ultimate success of your network. Choose a modulation type
that is compatible with the level and the type of interference in your coverage area.
• 802.11b or proprietary—Every organization needs to match its budget to its
mission. If your budget is modest, the lowest-cost indoor 802.11b equipment might
be your only choice. A somewhat larger budget allows you to choose higher-cost
802.11b equipment with expanded feature and management capabilities. An even
larger budget allows you to choose from the full range of wireless equipment.
• Hot spot use—802.11b APs deployed for hot spot use should be 802.1x-capable to
implement improved security and to interface to external authentication and
accounting servers.
• End user polling—Some APs implement end user polling as an option to the 802.11b
CSMA/CA and RTS/CTS collision-avoidance mechanisms. If you plan to serve more
than about 25 busy end users from one AP, polling increases your network reliability
and performance.
• Bandwidth management—A few APs contain a bandwidth management capability
that allows you to set bandwidth for each end user link. If the AP that you choose does
not include this feature, consider adding this capability with an external bandwidth
manager.
• Support—Vendor support is important when your wireless customers are looking to
you to provide reliable Internet service. Talk with other wireless network operators to
assess the availability of driver and firmware upgrades, as well as the response time
and quality of support from their equipment vendors.
[Link] Page 216 Monday, January 27, 2003 3:37 PM
NOTE Illegal amplifier use is not the answer to making your WAN operate over longer distances.
Often, a power amplifier actually decreases the receiving range of your WAN. In addition,
using illegally high transmitter power causes substantial interference to other network
operators who are operating legally. Finally, if illegal amplifier use increases, the FCC
might be forced to step in with new, more restrictive regulations that could reduce license-
free operating privileges for everyone. Resist the urge to amplify. Proper wireless network
design and proper antenna system design provides you with the best network performance.
The following sections explain how external amplifiers work and how to use these ampli-
fiers properly.
Transmit Amplification
On transmit, an external amplifier increases the transmitter power that reaches the antenna.
This is useful when the power output of the transmitter is low and the cable length between
the wireless equipment and the antenna system is long. Without an amplifier placed at the
antenna, the high cable loss results in little signal reaching the antenna.
Here is an example of the correct way to use an amplifier. Start with a transmitter that has
an output of 50 mW (+17 dBm). If the antenna cable has a loss of –14 dBm, the power
reaching the antenna system is (+17 dBm – 14 dBm) = 3 dBm (2 mW). This is a low level
of transmit power. If an amplifier with +14 dB of gain is added at the antenna, the +3 dBm
that reaches the amplifier is amplified by +14 dB, resulting in a total of (3 dBm + 14 dB)
+17 dBm (50 mW) reaching the antenna. The amplifier has added back the power that was
lost in the antenna cable.
Receiver Amplification
On receive, an external amplifier mounted at the antenna performs two functions:
• It helps to overcome the signal loss that occurs in the antenna cable.
• It sets the SNR of the receiving system.
These two functions can lead to a small improvement in receiver performance if the
amplifier has a good, low-noise design. In addition, a properly designed antenna should be
used with the amplifier. If the antenna system design is poor, the amplifier can actually
reduce the receiving range of the system.
[Link] Page 220 Monday, January 27, 2003 3:37 PM
Up/Down Converters
Up/down converters translate wireless signals from one frequency band to another. If the
2.4-GHz band is crowded in your area and the 5.8-GHz band is less crowded, you might
want to use a 2.4-to-5.8 converter. Here is how this works. Each AP and end user station is
equipped with a converter. Then, the following occurs:
• During transmit, each 2.4-GHz transmit signal is upconverted (translated up in
frequency) to the 5.8-GHz band.
• During receive, the 5.8-GHz signal from the other station is downconverted to the
2.4-GHz band.
Using lower-cost 2.4-GHz equipment, communication actually takes place on the less
crowded 5.8-GHz band. The advantage of this approach is that it usually costs less than
buying more expensive equipment for 5.8 GHz. The disadvantage of this approach is that
only a few manufacturers supply frequency converters, so your choice is limited.
Converters need to be mounted at the antenna.
Compatibility Issues
Several compatibility issues can reduce the reliability of your network and consume
troubleshooting time. If you are deploying an 802.11b network, never assume that different
brands of wireless cards and wireless APs will work reliably together. Even hardware that
is wireless fidelity (WiFi)-certified sometimes has firmware, software, operating system,
and feature differences that can result in certain equipment combinations that do not work
together. In most cases, equipment manufacturers do not cause these issues intentionally.
There have, however, been a few instances in which large equipment vendors have inten-
tionally created incompatibilities to boost the sales of their equipment and hinder the sale
of lower-cost competitive equipment.
Watch for the folowing incompatibility issues:
• Operating system software—New features might not work with older software
versions, or older features might not work in newer software versions. This situation
can require that you upgrade all your wireless equipment software simultaneously.
• NIC firmware—Upgrades might have features that do not work even though they did
work in earlier versions. NIC firmware might work when matched with older versions
of AP software but not with upgraded AP software versions.
• MAC incompatibilities—Different brands of equipment that should work together
do not work together or some of the features do not work.
• NIC drivers—Drivers might not be available for your OS or, if available, they might
not be upgraded to work with newer versions of your OS.
• USB—There might be incompatibilities between wireless USB devices and certain
PC operating systems.
[Link] Page 221 Monday, January 27, 2003 3:37 PM
Review Questions
1 Why is it important to visit an actual deployment site before you purchase wireless
equipment?
2 The electromagnetic waves that we call wireless exist at what layer of the seven-layer
OSI reference model?
3 How is a packet like a hamburger sandwich?
5 Wireless bandwidth and wireless throughput are the same thing. True or false?
6 The communications range under NLOS conditions is about the same as the
communications range under LOS conditions. True or false?
7 DSSS equipment hops from frequency to frequency. True or false?
8 Other things being equal, the higher the data rate, the shorter the communications
distance. True or false?
9 If you start receiving interference from another network, the best thing to do is to get
an amplifier. True or false?
10 Any 802.11b equipment works with any other 802.11b equipment. True or false?
[Link] Page 223 Monday, January 27, 2003 3:37 PM