Internet Connection With Two Hardware Access Points example essay topic
Each computer can communicate to other wireless enabled computers. They can share files and printers, but may not be able access wired LAN resources unless one computer acts as a bridge to connect to a wired LAN. Access points (base stations) can be hardware based or software based. The hardware based access point (Fig. 2) is a separate component connected to a wired Ethernet network and or server via an interface card. Software based access points (Fig. 3) can be a computer operating with software installed and is connected to a wired Ethernet network with an interface card.
The benefits of software access points are there are less components, easier to set up, more cost effective, and has more built in features. - pg 3 Many manufacturers of wireless equipment can function with each other using I 802.11 standards. There are two different methods for wireless communication, Frequency Hopping (FH) and Direct Sequence Spread Spectrum (D or DS). It is important to check which of these two methods are being used because they can not work together. The latest version of the I 802.11 standard is eleven m bps and five point five m bps (mega bits per second), with support for the older standard of one m bps and two m bps speeds. This new standard only covers Direct Sequence Spread Spectrum, not Frequency Hopping types. It is expected that the price of wireless networking interface cards to become inexpensive like the Ethernet cards.
If your computer is connected to a wireless LAN, you can communicate to a wired LAN. You would need some sort of bridge between the wired and wireless LAN. (Fig. 7) You would need a hardware or software based access point. Hardware access points are available with various types of network interfaces such as Ethernet or Token Ring, but may need extra hardware if the network requirements change. If networking requirements go beyond just interconnecting a wired network to a small wireless network, a software based access point would probably be the best solution.
A software access point does not limit the type or number of network interfaces you use. It is very flexible in providing access to different network types such as different types of Ethernet, Wireless, and Token Ring networks. - pg 4 As mentioned before, software access points (Fig. 8) can offer more features like Internet access, web caching or content filtering, which are useful to some users and administrators. The range of a wireless network is finite. With this limitation overlapping of access points are needed for seamless use. Use of wireless networking indoors can range from 150 to 300 feet, outdoor range can be up to 1000 feet (depending on vender of equipment). Other variables of performance are the environment and building construction.
The further you are from an access point the performance will also degrade. Multiple access points are needed for roaming building a steady network connection by monitoring the signal strength from in range access points and locking on to the one with the best quality. The amount of connections that can use an access point depends on the manufacturer. Some are limited to ten and other more expensive access points support up to one hundred connections.
Using more computers than recommended will degrade the performance and reliability of all the connections at that access point. It is recommended to use one vender when overlapping access points. (Fig. 6) Another way to implement wireless networking is to interconnect two LANs (Fig. 7). This requires two access points acting as a bridge or router connecting its own LAN to the wireless connection. Campuses, hospitals, businesses, etc use - pg 5 this type of installation. To set up a wireless connection in your neighborhood to share files, printers, and Internet access (not recommended Fig. 10, 11).
To share an Internet connection you would need an Internet sharing hardware device or software program and a LAN or computer used as a WEB server (Fig. 8). To share an Internet connection with two hardware access points, connect to your LAN and allow wireless access computers to access the existing Internet connection in the same way as a wired LAN computer (Fig. 9). Networking software will have no problem recognizing the Wireless cards. Wireless cards just like Ethernet cards have a unique MAC hardware address that are formatted like Ethernet hardware addresses and is allocated from the same standards organization. Security is an issue that can be minimized. An intruder does not need physical access to the traditional wired network in order to gain access to data communications.
However 802.11 wireless communication can not be received, much less decoded, by simple scanners, short wave receivers etc. You can gain access with specialist equipment. You can protect your data with a function built into 802.11 called WEP (Wired Equivalent Privacy), a form of encryption, which provides comparable privacy as the wired network. Traditional Virtual Private Networking (VPN) will work over wireless networks in the same way as traditional wired networks. - pg 6 I 802.11 standard makes it possible to connect anything that has support for instance PDA's, cell phones, cars, appliances, computers, body suits, electronic watches, etc. This technology is growing fast and soon everything will be communicating with each other.
There are many uses of this technology and can be implemented in a number of different ways. Security of data can be minimized using WEP and VPN. The technology is not that old and like most electronics and software, it too will evolve and change over time. More standards and uses are being developed.
Technology is only limited by our dreams. PRG 2110 C Windows 2000 Server Wireless NetworkingByPresented to Professor A paper to College in partial fulfillment of the requirements for the Associate of Science Degree. Presented on- pg 1 Title Wireless Networking Thesis Statement This report on implementing I 802.11 wireless network will include the different types, methods, and limitations in its use. Outline I. Introduction A. Definition. Explanation II. Body A. Kinds of wireless networks.
Types of access points. Interoperability D. Different ways of implementing. Range of useF. Limitations. Security issues II. Conclusion A. Closing statement.
Short review- pg 7