Documente Academic
Documente Profesional
Documente Cultură
Hindustan Petroleum Corporation limited having one of its gas plant at Loni,
Ghaziabad, which was automated by M/S Honeywell Automation India Ltd.
In 2001-2002.
Wired technologies
• Twisted pair: wire is the most widely used medium for telecommunication.
Twisted-pair wires are ordinary telephone wires which consist of two
insulated copper wires twisted into pairs and are used for both voice and
data transmission. The use of two wires twisted together helps to reduce
crosstalk and electromagnetic induction. The transmission speed ranges
from 2 million bits per second to 100 million bits per second.
• Coaxial cable: is widely used for cable television systems, office buildings,
and other worksites for local area networks. The cables consist of copper
or aluminum wire wrapped with insulating layer typically of a flexible
material with a high dielectric constant, all of which are surrounded by a
conductive layer. The layers of insulation help minimize interference and
distortion. Transmission speed range from 200 million to more than 500
million bits per second.
Although wired LAN has great connectivity and reliability but situation may be the
different as follows;
To overcome these situations, favor was already given to wireless technology but
recently it was not so much reliable. Now after so many changes and revisions
and after adding new technologies its become a reliable source of networking to
think beyond the wired LAN and also having great connectivity options ( up to
1GBPS is available in market and up to 3GBPS is upcoming in market.) with
great security feature compare to wired LAN.
Introduction
An access point can be either a main, relay or remote base station. A main base
station is typically connected to the wired Ethernet. A relay base station relays
data between remote base stations, wireless clients or other relay stations to
either a main or another relay base station. A remote base station accepts
connections from wireless clients and passes them on to relay or main stations.
Connections between "clients" are made using MAC addresses rather than by
specifying IP assignments.
All base stations in a Wireless Distribution System must be configured to use the
same radio channel, method of encryption (none, WEP, or WPA) and encryption
keys. They can be configured to different service set identifiers (Known as SSI).
WDS also requires that every base station be configured to forward to others in
the system.
WDS may also be referred to as repeater mode because it appears to bridge and
accept wireless clients at the same time (unlike traditional bridging). It should be
noted; however, that throughput in this method is halved for all clients connected
wirelessly.
• Wireless Bridging in which WDS APs communicate only with each other
and don't allow wireless clients or Stations (STA) to access them
• Wireless Repeating in which APs communicate with each other and with
wireless STAs
Recent Apple base and some other brands stations allow WDS with WPA,
though in some cases firmware updates are required. Firmware for the Renasis
SAP36g Super Access Point and most third party firmware for the Linksys
WRT54G(S)/GL support AES encryption using WPA2-PSK Mixed Mode security,
and TKIP encryption using WPA-PSK, while operating in WDS mode. However,
this mode may not be compatible with other units running stock or alternate
firmware.
Operating System
Wireless Bridge:
Wireless bridge devices work in pairs (point-to-point), one on each side of the
"bridge". However, there can be many simultaneous "bridges" using one central
device (point to multipoint).[3]
A wireless router is a device that performs the functions of a router but also
includes the functions of a wireless access point. It is commonly used to allow
access to the Internet or a computer network without the need for a cabled
connection. It can function in a wired LAN (local area network), a wireless only
LAN, or a mixed wired/wireless network. Most current wireless routers have the
following characteristics:
A wireless router is a device that performs the functions of a router but also
includes the functions of a wireless access point. It is commonly used to allow
access to the Internet or a computer network without the need for a cabled
connection. It can function in a wired LAN (local area network), a wireless only
LAN or a mixed wired/wireless network. Most current wireless routers have
thefollowing characteristics:
• LAN ports, which function in the same manner as the ports of a network
switch
• A WAN port, to connect to a wide area network, typically one with Internet
access. External destinations are accessed using this port. If it is not used,
many functions of the router will be bypassed.
• Wireless antennae. These allow connections from other wireless devices
(NICs (network interface cards), wireless repeaters, wireless access
points, and wireless bridges, for example), usually using the Wi-Fi
standard
Security
• For closed networks (like home users and organizations) the most
common way is to configure access restrictions in the access points.
Those restrictions may include encryption and checks on MAC address.
Another option is to disable ESSID broadcasting, making the access point
difficult for outsiders to detect. Wireless Intrusion Prevention Systems can
be used to provide wireless LAN security in this network model.
• For commercial providers, hotspots, and large organizations, the preferred
solution is often to have an open and unencrypted, but completely isolated
wireless network. The users will at first have no access to the Internet nor
to any local network resources. Commercial providers usually forward all
web traffic to a captive portal which provides for payment and/or
authorization. Another solution is to require the users to connect securely
to a privileged network using VPN.
• Wireless networks are less secure than wired ones; in many offices
intruders can easily visit and hook up their own computer to the wired
network without problems, gaining access to the network, and it's also
often possible for remote intruders to gain access to the network through
backdoors like Back Orifice. One general solution may be end-to-end
encryption, with independent authentication on all resources that shouldn't
be available to the public.
One of the simplest techniques is to only allow access from known, approved
MAC addresses. However, this approach gives no security against sniffing, and
client devices can easily spoof MAC addresses, leading to the need for more
advanced security measures.
Another very simple technique is to have a secret ESSID (id/name of the wireless
network), though anyone who studies the method will be able to sniff the ESSID.
Today all (or almost all) access points incorporate Wired Equivalent Privacy
(WEP) encryption and most wireless routers are sold with WEP turned on.
However, security analysts have criticized WEP's inadequacies, and the U.S. FBI
has demonstrated the ability to break WEP protection in only three minutes using
tools available to the general public.
The Wi-Fi Protected Access (WPA and WPA2) security protocols were later
created to address these problems. If a weak password, such as a dictionary
word or short character string is used, WPA and WPA2 can be cracked. Using a
long enough random password (e.g. 14 random letters) or passphrase (e.g. 5
randomly chosen words) makes pre-shared key WPA virtually uncrackable. The
second generation of the WPA security protocol (WPA2) is based on the final
IEEE 802.11i amendment to the 802.11 standard and is eligible for FIPS 140-2
compliance. With all those encryption schemes, any client in the network that
knows the keys can read all the traffic.
Solutions include a newer system for authentication, IEEE 802.1x, that promises
to enhance security on both wired and wireless networks. Wireless access points
that incorporate technologies like these often also have routers built in, thus
becoming wireless gateways.
End-to-End encryption
One can argue that both layer 2 and layer 3 encryption methods are not good
enough for protecting valuable data like passwords and personal emails. Those
technologies add encryption only to parts of the communication path, still
allowing people to spy on the traffic if they have gained access to the wired
network somehow.
Today, there is almost full wireless network coverage in many urban areas - the
infrastructure for the wireless community network (which some consider to be the
future of the internet) is already in place. One could roam around and always be
connected to Internet if the nodes were open to the public, but due to security
concerns, most nodes are encrypted and the users don't know how to disable
encryption. Many people consider it proper etiquette to leave access points open
to the public, allowing free access to Internet. Others think the default encryption
provides substantial protection at small inconvenience, against dangers of open
access that they fear may be substantial even on a home DSL router.
The density of access points can even be a problem - there are a limited number
of channels available, and they partly overlap. Each channel can handle multiple
networks, but places with many private wireless networks (for example,
apartment complexes), the limited number of Wi-Fi radio channels might cause
slowness and other problems.
On the other hand, in some countries including Germany [1], persons providing an
open access point may be made (partially) liable for any illegal activity conducted
via this access point.
The Cisco Aironet Wireless LAN Client Adapters, also referred to as adapters,
are radio modules that provide transparent, wireless, data communications
between fixed, portable, or mobile devices and other wireless devices or a wired
network infrastructure. The adapters are fully compatible when used in devices
supporting Plug-and-Play (PnP) technology. Host devices can be any device
equipped with a PC Card Type II or Type III slot. These devices include:
• Desktop systems
• Portable laptops
• Notebook computers
The PC Card can also be built into peripheral devices such as printers to provide
them with a transparent wireless connection to a wired network.
This document covers three types of adapters:
• PCI client adapter—a client adapter card radio module that can be inserted
into any device equipped with an empty PCI expansion slot, such as a desktop
computer.
Refer to the "Radio Antenna" section for antenna differences between these
adapters.
Terminology
• End Node—A client node that is located at the end of the Network Tree.
• Repeater— A repeater is an access point that extends the radio range of the
infrastructure. A repeater is not physically attached to the wired LAN, but
communicates through radio to another access point, which is either a root unit
or another repeater.
• Root Unit. — The root unit is an access point that is located at the top, or
starting point, of a wireless infrastructure. A root unit provides the physical
connection to the wired LAN and contains configuration information in its
association table that covers all nodes that access the wired network (backbone).
All access points directly attached to the wired LAN backbone are root units.
The client adapter is composed of three major parts: a radio, a radio antenna,
and two LEDs.
Radio
Radio Antenna
• PCI client adapters are shipped with a 2-dBi dipole antenna that attaches to
the adapter's antenna connector. However, other types of antennas can be used.
PCI adapters can be operated only through the antenna port located on the right
side of the radio module (not to be confused with the antenna connector on the
card carrier).
LEDs
The adapter has two LEDs that glow or blink to show the status of the adapter or
to convey error messages.
Radio Ranges
Here are some operating and environmental conditions that you need to
consider:
• Data Rates—Sensitivity and range are inversely proportional to data bit rates.
The maximum radio range is achieved at the lowest workable data rate. There is
a decrease in receiver threshold sensitivity as the radio data rate increases.
• Antenna Type and Placement—Proper antenna configuration is a critical
factor in maximizing radio range. As a general guide, range increases in
proportion to antenna height.
Link Test
The link test tool is used to determine RF coverage. The test results help the
installer eliminate low RF signal level area that can result in loss of connection.
The Cisco Aironet Wireless LAN Adapter transports data packets transparently
as they move through the wireless infrastructure. The PC Card operates similarly
to a standard network product except that the wire is replaced with a radio
connection. No special wireless networking functions are required. All existing
applications, which operate over a network, operate using the Cisco Aironet
Wireless LAN Adapter.
Protocols Supported
The Cisco Aironet Wireless LAN Client Adapter can be used in a variety of
infrastructure configurations. Cisco Aironet access points provide connections to
Ethernet Networks. When using the Cisco Aironet standard device drivers, the
PC Card is fully compliant with the protocols and wired networks listed in Table
Security Features
The Cisco Aironet Wireless LAN Client Adapter employs Direct Sequence
Spread Spectrum Technology, previously developed for military anti-jamming
and low probability of intercept radio systems.
The access point must be set to the same SSID as all other devices on the
wireless infrastructure. Units with a different SSID cannot directly communicate
with each other.
System Configurations
The Cisco Aironet Wireless LAN Client Adapter can be used in a variety of
network system configurations. Access points provide connections to your
Ethernet networks or act as repeaters increasing wireless communication range.
The maximum communication range is based on how you configure your
wireless infrastructure.
Examples of some common system configurations are shown on the pages that
follow, along with a description of each.
• ease of installation
• total cost
• reliability
• performance
• security
Wired LANs use Ethernet cables and network adapters. Although two computers
can be directly wired to each other using an Ethernet crossover cable, wired
LANs generally also require central devices like hubs, switches, or routers to
accommodate more computers.
For dial-up connections to the Internet, the computer hosting the modem must
run Internet Connection Sharing or similar software to share the connection with
all other computers on the LAN. Broadband routers allow easier sharing of cable
modem or DSL Internet connections, plus they often include built-in firewall
support.
Installation
Ethernet cables must be run from each computer to another computer or to the
central device. It can be time-consuming and difficult to run cables under the floor
or through walls, especially when computers sit in different rooms. Some newer
homes are pre-wired with CAT5 cable, greatly simplifying the cabling process
and minimizing unsightly cable runs.
After hardware installation, the remaining steps in configuring either wired or
wireless LANs do not differ much. Both rely on standard Internet Protocol and
network operating system configuration options. Laptops and other portable
devices often enjoy greater mobility in wireless home network installations (at
least for as long as their batteries allow).
Cost
Ethernet cables, hubs and switches are very inexpensive. Some connection
sharing software packages, like ICS, are free; some cost a nominal fee.
Broadband routers cost more, but these are optional components of a wired LAN,
and their higher cost is offset by the benefit of easier installation and built-in
security features.
Reliability
Ethernet cables, hubs and switches are extremely reliable, mainly because
manufacturers have been continually improving Ethernet technology over several
decades. Loose cables likely remain the single most common and annoying
source of failure in a wired network. When installing a wired LAN or moving any
of the components later, be sure to carefully check the cable connections.
Broadband routers have also suffered from some reliability problems in the past.
Unlike other Ethernet gear, these products are relatively new, multi-function
devices. Broadband routers have matured over the past several years and their
reliability has improved greatly.
Performance
Security
For any wired LAN connected to the Internet, firewalls are the primary security
consideration. Wired Ethernet hubs and switches do not support firewalls.
However, firewall software products like Zone Alarm can be installed on the
computers themselves. Broadband routers offer equivalent firewall capability built
into the device, configurable through its own software.