(Post 14/02/2006) Wireless
technologies represent a rapidly emerging area of growth and importance
for providing ubiquitous access to the network for all of the campus community.
Students, faculty and staff increasingly want un-tethered network access
from general-purpose classrooms, meeting rooms, auditoriums, and even
the hallways of campus buildings.
Overview of Wireless Technologies
- Introduction
- Applications
- Voice and Messaging
- Hand-held and Internet-enabled devices
- Data Networking
- Wireless Local Area Networks
- Broadband Wireless
- Bluetooth
- Important issues
- Standards
- Coverage
- Security
- What is UT doing?
Introduction
Wireless technologies represent a rapidly
emerging area of growth and importance for providing ubiquitous access
to the network for all of the campus community. Students, faculty and
staff increasingly want un-tethered network access from general-purpose
classrooms, meeting rooms, auditoriums, and even the hallways of campus
buildings. There is interest in creating mobile computing labs utilizing
laptop computers equipped with wireless Ethernet cards. Recently, industry
has made significant progress in resolving some constraints to the widespread
adoption of wireless technologies. Some of the constraints have included
disparate standards, low bandwidth, and high infrastructure and service
cost. Wireless technologies can both support the institution mission and
provide cost-effective solutions. Wireless is being adopted for many new
applications: to connect computers, to allow remote monitoring and data
acquisition, to provide access control and security, and to provide a
solution for environments where wires may not be the best solution.
What follows is an overview of existing
wireless technologies and related issues.
Applications
There are numerous applications for all
the different wireless technologies. For the purposes of this paper, applications
of wireless technologies are divided into the following:
- Voice and messaging
- Hand-held and other Internet-enabled devices
- Data Networking
Although a traditional classification,
this way of categorizing wireless technologies also includes their differences
in cost models, bandwidth, coverage areas, etc. Finally, a section is
included on issues related to wireless technologies.
Voice and Messaging
Cell phones, pagers, and commercial two-way
business radios can provide voice and messaging services. These devices
may be based on analog or digital standards that differ primarily in the
way in which they process signals and encode information. The analog standard
is the Advanced Mobile Phone Service (AMPS). Digital standards are Global
System for Mobile Communications (GSM), Time Division Multiple Access
(TDMA), or Code Division Multiple Access (CDMA).
Normally, devices operate within networks
that provide metropolitan, statewide, or nationwide coverage. These large
and costly networks are operated by carriers such as AT&T, Sprint,
Verizon, local phone companies, etc. and operate in different frequency
bands which are allocated by the FCC. Throughput depends on the standard
being used, but presently in the U.S., these networks operate throughput
rates up to 16 kilobits per second (Kbps). New digital standards, also
referred to as "Third-Generation Services" or 3G, are expected
by 2004, and will provide 30 times faster transfer rates and enhanced
capabilities. Because of the many standards, there are interoperability
issues between networks, carriers, and devices. Generally, charges are
based on per minute utilization or per number of messages.
Hand-held and Internet-enabled
devices
Internet-enabled cell phones and Personal
Digital Assistants (PDAs) have emerged as the newest products that can
connect to the Internet across a digital wireless network. New protocols,
such as Wireless Application Protocol (WAP), and new languages, such as
WML (Wireless Markup Language) have been developed specifically for these
devices to connect to the Internet. However, the majority of current Internet
content is not optimized for these devices; presently, only email, stock
quotes, news, messages, and simple transaction-oriented services are available.
Other limitations include low bandwidth (less than 14 Kbps), low quality
of service, high cost, the need for additional equipment, and high utilization
of devices' battery power. Nevertheless, this type of wireless technology
is growing rapidly with better and more interoperable products.
Data Networking
We differentiate between pure data applications
in wireless local area networks (WLANs) and data, voice, and video converged
in broadband wireless. We also briefly discuss Bluetooth, an emerging
wireless technology.
Wireless Local Area Networks
Wireless Local Area Networks (WLAN) are
implemented as an extension to wired LANs within a building and can provide
the final few meters of connectivity between a wired network and the mobile
user.
WLANs are based on the IEEE 802.11 standard.
There are three physical layers for WLANs: two radio frequency specifications
(RF - direct sequence and frequency hopping spread spectrum) and one infrared
(IR). Most WLANs operate in the 2.4 GHz license-free frequency band and
have throughput rates up to 2 Mbps. The new 802.11b standard is direct
sequence only, and provides throughput rates up to 11 Mbps. Currently
the predominant standard, it is widely supported by vendors such as Cisco,
Lucent, Apple, etc. By the middle of 2002, a new standard, 802.11a, will
operate in the 5 GHz license-free frequency band and is expected to provide
throughput rates up to 54 Mbps.
WLAN configurations vary from simple,
independent, peer-to-peer connections between a set of PCs, to more complex,
intra-building infrastructure networks. There are also point-to-point
and point-to-multipoint wireless solutions. A point-to-point solution
is used to bridge between two local area networks, and to provide an alternative
to cable between two geographically distant locations (up to 30 miles).
Point-to-multi-point solutions connect several, separate locations to
one single location or building. Both point-to-point and point-to-multipoint
can be based on the 802.11b standard or on more costly infrared-based
solutions that can provide throughput rates up to 622 Mbps (OC-12 speed).
In a typical WLAN infrastructure configuration, there are two basic components:
- Access Points - An access point/base station connects to a LAN by
means of Ethernet cable. Usually installed in the ceiling, access
points receive, buffer, and transmit data between the WLAN and the
wired network infrastructure. A single access point supports on average
twenty users and has a coverage varying from 20 meters in areas with
obstacles (walls, stairways, elevators) and up to 100 meters in areas
with clear line of sight. A building may require several access points
to provide complete coverage and allow users to roam seamlessly between
access points.
- Wireless Client Adapter - A wireless adapter connects users via
an access point to the rest of the LAN. A wireless adapter can be
a PC card in a laptop, an ISA or PCI adapter in a desktop computer,
or can be fully integrated within a handheld device.
Broadband Wireless
Broadband wireless (BW) is an emerging
wireless technology that allows simultaneous wireless delivery of voice,
data, and video. BW is considered a competing technology with Digital
Subscriber Line (DSL). It is generally implemented in metropolitan areas
and requires clear line of sight between the transmitter and the receiving
end. BW comes in two flavors: Local multi-point distribution service (LMDS)
and Multi-channel multi-point distribution service (MMDS). Both operate
in FCC-licensed frequency bands.
LMDS is a high bandwidth
wireless networking service in the 28-31 GHz range of the frequency spectrum
and has sufficient bandwidth to broadcast all the channels of direct broadcast
satellite TV, all of the local over-the-air channels, and high speed full
duplex data service. Average distance between LMDS transmitters is approximately
one mile apart.
MMDS operates at lower
frequencies, in the 2 GHz licensed frequency bands. MMDS has wider coverage
than LMDS, up to 35 miles, but has lower throughput rates. Companies such
as Sprint and WorldCom own MMDS licenses in the majority of U.S. metropolitan
areas. Broadband wireless still involves costly equipment and infrastructures.
However, as it is more widely adopted, it is expected that the service
cost will decrease.
Bluetooth
Bluetooth is a technology specification
for small form factor, low-cost, short-range wireless links between mobile
PCs, mobile phones, and other portable handheld devices, and connectivity
to the Internet. The Bluetooth Special Interest Group (SIG) is driving
development of the technology and bringing it to market and it includes
promoter companies such as 3Com, Ericsson, IBM, Intel, Lucent, Motorola,
Nokia, and over 1,800 Adopter/Associate member companies. Bluetooth covers
a range of up to ten meters in the unlicensed 2.4GHz band. Because 802.11
WLANs also operate in the same band, there are interference issues to
consider. Bluetooth technology and products started being available in
2001, but interoperability seems to be a big problem. By the time and
if Bluetooth becomes an adopted technology, current WLANs will already
be migrating to the 5 GHz band (mid 2002).
Important Issues for Wireless
As with any relatively new technology,
there are many issues that affect implementation and utilization of wireless
networks. There are both common and specific issues depending on the type
of wireless network. Some of the common factors include electromagnetic
interference and physical obstacles that limit coverage of wireless networks,
while others are more specific, such as standards, data security, throughput,
ease of use, etc.
- Standards
- Coverage
- Security
Standards
A major obstacle for deployment of wireless
networks is the existence of multiple standards. As it was mentioned previously,
there are analog and digital standards in wireless telephony. While GSM
is the only widely supported standard in Europe and Asia, multiple standards
are in use in the U.S. As a result, the U.S. has lagged in wireless networks
deployment.Just recently, organizations have been formed to ensure network
and device interoperability. For example, the adoption of the 802.11b
standard has made wireless data networks one of the hottest newcomers
in the current wireless market.
Coverage
Another issue is coverage. Coverage mainly
depends on the output power of the transmitter (FCC regulated), its location
and frequency used to transmit data. For example, lower frequencies are
more forgiving when it comes to physical obstacles (walls, stairways,
etc.), while high frequencies require clear line of sight. For each particular
application, throughput decreases as distance from the transmitter or
access point increases.
Security
Data security is a major issue for wireless
due to the nature of the transmission mechanism (electromagnetic signals
passing through the air). It is commonly believed that voice applications
are less secure than data applications. This is due to limited capabilities
of existing technologies to protect information that is being transmitted.
For example, in metropolitan areas, users are at risk that simple scanning
devices can highjack cell phone numbers and be maliciously used. In WLANs,
authentication and encryption provide data security. Current implementations
include:
- MAC address-based access lists on access points, where only registered
and recognized MAC addresses are accepted and allowed to join the
network.
- A closed wireless system, where users have to know non-advertised
the network name to be able to join.
- RADIUS server based authentication, where users are authenticated
against a centralized RADIUS server based on their MAC address or
their username and password.
- Wireless Equivalency Privacy (WEP) utilizes data encryption with
40-bit or 128-bit keys that are hidden from users. WEP provides three
options, depending on the level of security needed: no encryption
of data, combination of encrypted and non-encrypted data, and forced
data encryption.
- High security solutions for encryption are proprietary: Cisco AP-350
and Lucent/Agere AS-2000. Both offer per user/per session encryption
keys and authenticate users based on username/password scheme.
It is important to understand that in
WLANs, data is encrypted only between the wireless adapter and the access
point. Data travels through a wired LAN unencrypted. Therefore, data transmitted
by wireless is not more secure than data transmitted through the wire,
but probably not less secure. Application level encryption mechanisms,
like secure web transactions (SSL), SSH, etc. are responsible for further
protection of data.
What is UT doing?
Voice and messageing wireless services
are provided in the Knoxville area by a number of commercial wireles providers.
Wireless networking access on UT campus is provided by OIT.
During 2000, DII (now OIT) has evaluated a number of products for wireless
LAN access. Lucent/Agere/Orinoco/Proxim
Access Server 2000 was selected. This product provides encryption with
dynamic per user/per session keys by using RC4 encryption algorithm, thus
preventing network sniffing. Users also have to login to the wireless
network by providing their NetID username and password. This is authenticated
against Radius and LDAP servers. If a user is not in LDAP or does not
meet other criteria, a user is denied access to the wireless network.
Since the first inception and due to limited client support and buggy
software/firmware, UT has reverted to AP-2000 code in May 2002.
(From Office of Information
Technology) |