week05-04_Wireless Networking

Wireless Networking

Table of Contents

Introduction to Wireless Networking Technologies

In today's world, fewer and fewer devices are weighed down by physical cables in order to connect to computer networks. With so many portable computing devices in use, from laptops to tablets to smartphones, we've also seen the rise of wireless networking.

Wireless networking, is exactly what it sounds like. A way to network without wires.

By the end of this lesson, you'll be able to describe the basics of how wireless communication works. You'll know how to tell the difference between infrastructure networks, and ad hoc networks. You'll be able to explain how wireless channels help wireless networks operate. And you'll understand the basics of wireless security protocols. These are all invaluable skills as an IT support specialist, since wireless networks are becoming more and more common in the workplace.

The most common specifications for how wireless networking devices should communicate, are defined by the IEEE 802.11 standards. This set of specifications, also called the 802.11 family, make up the set of technologies we call WiFi. Wireless networking devices communicate with each other through radiowaves. Different 802.11 standards generally use the same basic protocol, but might operate at different frequency bands.

A frequency band is a certain section of the radio spectrum that's been agreed upon to be used for certain communications.

In North America, FM(frequency modulation) radio transmissions operate between 88 and 108 megahertz.This specific frequency band is called the FM broadcast band. WiFi networks operate on a few different frequency bands. Most commonly, the 2.4 gigahertz and 5 gigahertz bands. There are lots of 802.11 specifications including some that exist just experimentally or for testing. The most common specifications you might run into are 802.11b, 802.11a, 802.11g, 802.11n, and 802.11ac. We won't go into detail about each one here. For now, just know that we've listed these in the order they were adopted. Each newer version of the 802.11 specifications has generally seen some improvement, whether it's higher access speeds, or the ability for more devices to use the network simultaneously.

In terms of our networking model, you should think of 802.11 protocols as defining how we operate at both the physical and the data link layers. An 802.11 frame has a number of fields.

  • The first is called the frame control field.

This field is 16 bits long, and contains a number of sub-fields that are used to describe how the frame itself should be processed.

This includes things like what version of the 802.11 was used.

  • The next field is called a duration field.

It specifies how long the total frame is. So, the receiver knows how long it should expect to have to listen to the transmission.

After this, are four address fields. Let's take a moment to talk about why there are four instead of the normal two.

We'll discuss different types of wireless network architectures in more detail later in this lesson, but the most common setup includes devices called access points.

A wireless access point is a device that bridges the wireless and wired portions of a network.

A single wireless network might have lots of different access points to cover a large area. Devices on a wireless network will associate with a certain access point. This is usually the one they're physically closest to. But, it can also be determined by all sorts of other things like general signal strength, and wireless interference. Associations isn't just important for the wireless device to talk to a specific access point, it also allows for incoming transmissions to the wireless device to be sent by the right access point. There are four address fields, because there needs to be room to indicate which wireless access point should be processing the frame. So, we'd have our normal source address field, which would represent the MAC address of the sending device. But, we'd also have the intended destination on the network, along with a receiving address and a transmitter address. The receiver address would be the MAC address of the access point that should receive the frame, and the transmitter address would be the MAC address of whatever has just transmitted the frame.

In lots of situations, the destination and receiver address might be the same. Usually, the source and transmitter addresses are also the same. But, depending on exactly how a specific wireless network has been architected, this won't always be the case. Sometimes, wireless access points will relay these frames from one another. Since all addresses in an 802.11 frame are Mac addresses, each of those four fields is 6 bytes long.

In between the third and fourth address fields, you'll find the sequence control field.

The sequence control field is 16 bits long and mainly contains a sequence number used to keep track of ordering the frames.

After this is the data payload section which has all of the data of the protocols further up the stack.

Finally, we have a frame check sequence field which contains a checksum used for a cyclical redundancy check. Just like how ethernet does it.

Wireless Network Configurations

There are a few main ways that a wireless network can be configured.

  • Ad-hoc networks: where nodes all speak directly to each other.
  • LANS or WLANS: where one or more access points act as a bridge between a wireless and a wired network.
  • Mesh networks: which are kind of a hybrid of the two.

Ad-hoc networks

Ad-hoc networks are the simplest of the three, in an ad-hoc network, there isn't really any supporting network infrastructure.

Every device involved with the network communicates with every other device within range and all nodes help pass along messages.

Even though they're the most simple, ad-hoc networks aren't the most common type of wireless network, but they do have some practical applications. Some smartphones can establish ad-hoc networks with other smartphones in the area so that people can exchange photos, video or contact information. You'll also sometimes see ad-hoc networks used in industrial or warehouse settings, where individual pieces of equipment might need to communicate with each other, but not with anything else. Finally, ad-hoc networks can be powerful tools during disaster situations. If a natural disaster like an earthquake or hurricane knocks out all of the existing infrastructure in an area, disaster relief professionals can use an ad-hoc network to communicate with each other while they perform search and rescue efforts.

LANS or WLANS

The most common type of wireless network you'll run into in the business world is a wireless LAN or WLAN. A wireless LAN consists of one or more access points, which act as bridges between the wireless and wired networks. The wired network operates as a normal LAN, like the types we've already discussed, the wired LAN contains the outbound internet link. In order to access resources outside of the WLAN, wireless devices would communicate with access points. They then forward traffic along to the gateway router, where everything proceeds like normal.

Mesh networks

Finally, we have what's known as mesh networks. Mesh networks are kind of like ad-hoc networks, since lots of the devices communicate with each other wirelessly, forming a mesh.

If you were to draw lines for all the links between all the nodes, most mesh networks you'll run into are made up of only wireless access points and will still be connected to a wired network. This kind of network let's you deploy more access points to the mesh without having to run a cable to each of them. With this kind of setup, you can really increase the performance and range of a wireless network.

Wireless Channels

The concept of channels is one of the most important things to understand about wireless networking.

Channels are individual, smaller sections of the overall frequency band used by a wireless network.

Channels are super important because they help address a very old networking concern, collision domains. You might remember that a collision domain is any one network segment where one computer can interrupt another.Communications that overlap each other can't be properly understood by the receiving end. So when two or more transmissions occur at the same time, also called a collision, all devices in question have to stop their transmissions. They wait a random amount of time and try again when things quiet down. This really slows things down. The problem caused by collision domains has been mostly reduced on wired networks through devices called switches. Switches remember which computers live on which physical interfaces. So traffic is only sent to the node It's intended for. Wireless networking doesn't have cables, so there aren't physical interfaces for a wireless device to connect to. That means, we can have something that works like a wireless switch. Wireless devices are doomed to talk over each other.

Channels help fix this problem to a certain extent. When we were talking about the concept the frequency bands, we mentioned that FM radio in North America operates between 80 megahertz and 108 megahertz. But when we discuss the frequency bands we use by Wi-Fi, we just mentioned 2.4 Gigahertz and five Gigahertz. This is because that's really just shorthand for where these frequency bands actually begin.

For wireless networks that operate on a 2.4 Gigahertz band, what we really mean is that they operate on roughly the band from 2.4 Gigahertz to 2.5 Gigahertz. Between these two frequencies are a number of channels, each with a width of a certain megahertz.

Since different countries and regions have different regulatory committees for what radio frequencies might be used for what, exactly how many channels are available for use depends on where in the world you are.

For example, dealing with an 802.11b network, channel one operates at 2412 megahertz, but since the channel width is 22 megahertz, the signal really lives on the frequencies between 2401 megahertz and 2423 megahertz.

This is because radio waves are imprecise things. So, you need some buffer around what exact frequencies a transmission might actually arrive on. Some channels overlap but some are far enough apart so they won't interfere with each other at all.

Let's look again at 802.11b network running on a 2.4 Gigahertz band, because it's really the simplest and the concepts translate to all other 802.11 specifications. With a channel width of 22 megahertz, channel one with its midpoint at 2412 megahertz, is always completely isolated from channel six with its midpoint at 2437 megahertz. For an 802.11b network, this means that channels one and six and 11 are the only ones that never overlap at all. That's not all that matters, though.

Today, most wireless networking equipment is built to auto sense what channels are most congested. Some access points will only perform this analysis when they start up, others will dynamically change their channel as needed. Between those two scenarios and manually specified channels, you can still run into situations where you experience heavy channel congestion. This is especially true in dense urban areas with lots of wireless networks in close proximity. So, why is this important in the world of I.T. support? Well, understanding how these channels overlap for all of the 802.11 specifications is a way you can help troubleshoot bad wireless connectivity problems or slowdowns in the network.

You want to avoid collision domains wherever you can. I should call out that it's not important to memorize all of the individual numbers we've talked about. The point is to understand how collision domains are a necessary problem with all wireless networks, and how you can use your knowledge in this space to optimize wireless network deployments. You want to make sure that both your own access points and those of neighboring businesses overlap channels as little as possible.

Wireless Security

When you're sending data over a wired link, your communication has a certain amount of inherent privacy. The only devices that really know what data is being transmitted are the two nodes on either end of the link. Someone or some device that happens to be in close proximity can't just read the data. With wireless networking, this isn't really the case, since there aren't cables, just radio transmissions being broadcast through the air, anyone within range could hypothetically intercept any transmissions, whether they were intended for them or not.To solve this problem, WEP was invented.

WEP stands for Wired Equivalent Privacy, and it's an encryption technology that provides a very low level of privacy.

Actually, it's really right there in the name, wired equivalent privacy. Using WEP protects your data a little but it should really only be seen as being as safe as sending unencrypted data over a wired connection. The WEP standard is a really weak encryption algorithm. It doesn't take very long for a bad actor to be able to break through this encryption and read your data. You'll learn more about key lengths and encryption in a future course. But for now, it's important to know that the number of bits in an encryption key corresponds to how secure it is, the more bits in a key the longer it takes for someone to crack the encryption. WEP only uses 40 bits for its encryption keys and with the speed of modern computers, this can usually be cracked in just a few minutes.

WEP was quickly replaced in most places with WPA or Wi-Fi Protected Access.
WPA, by default, uses a 128-bit key, making it a whole lot more difficult to crack than WEP. Today, the most commonly used encryption algorithm for wireless networks is WPA2, an update to the original WPA. WPA2 uses a 256-bit key make it even harder to crack.

Another common way to help secure wireless networks is through MAC filtering.

With MAC filtering, you configure your access points to only allow for connections from a specific set of MAC addresses belonging to devices you trust.

This doesn't do anything more to help encrypt wireless traffic being sent through the air, but it does provide an additional barrier preventing unauthorized devices from connecting to the wireless network itself.

Cellular Networking

Another super popular form of wireless networking is cellular networking, also called mobile networking. Cellular networks are now common all over the world. In some places, using a cellular network for Internet access is the most common way of connecting. At a high level, cellular networks have a lot in common with the 802.11 networks we've already talked about. Just like there are many different 802.11 specifications, there are lots of different cellular specifications. Just like Wi-Fi, cellular networking operates over radio waves, and there are specific frequency bands specifically reserved for cellular transmissions.

One of the biggest differences is that these frequencies can travel over longer distances more easily, usually over many kilometers or miles.

Cellular networks are built around the concept of cells. Each cell is assigned a specific frequency band for use. Neighboring cells are set up to use bands that don't overlap, just like how we discussed the optimal setup for a W Lan with multiple access points.

In fact, the cell towers that broadcast and receive cellular transmissions can be thought of like access points, just with a much larger range. Lots of devices today use cellular networks for communication. And not just phones, also tablets and some laptops also have cellular antennas. It's become more and more common for high-end automobiles to have built-in cellular access, too.

Mobile Device Networks

Mobile devices use wireless networks to communicate with the Internet and with other devices.Depending on the device, it might use cellular networks, Wi-Fi, Bluetooth and or one of several Internet of Things or IoT network protocols.

As an IT Support Specialist, you'll often have to help troubleshoot networking or connectivity issues for end users. You'll need to figure out what network the device should be connecting to, and then make sure the device is configured to do that. For example, turning individual components and systems on and off is a common feature in mobile devices, which can sometimes be confusing for the end users. Battery life is precious, and people switch off these network radios to save battery life. If someone brings a device to you because it won't connect to a wireless network, the first thing you should check is whether the wireless radio has been disabled. Yeah, sometimes the solution is really that simple. You can toggle the Wi-Fi, Bluetooth, and cellular networks on or off in the device's settings.

Lots of mobile devices will also have an Airplane Mode that disables all wireless networking at once.

It is also pretty common for a mobile device to have multiple network connections at the same time. Both Wi-Fi and cellular data for example. Mobile devices will try to connect to the Internet using the most reliable and least expensive connection available. That's right. I said at least expensive. Many mobile operating systems understand the concept of metered connections. Does your cell phone plan have a limit on how much data you can use in a month? Or charge you based on how much data you use? Then you have a metered connection through that cell phone plan. Mobile devices will use other non-metered connections like Wi-Fi, if they're available, so that you don't use up your limited data connection.

Here's another example of how you might help as an IT Support Specialist. Let's say you have a remote employee that works from a coffee shop sometimes, but the Wi-Fi network in the coffee shop restricts access to some websites. The employee might choose to disconnect from the Wi-Fi network, and use the cell network, even though it might be more expensive so that they can access the websites they need. By toggling the Wi-Fi and cellular data connections, you can force the device to use the network connection that you want to use. If you're troubleshooting an unreliable wireless network connection, keep in mind that wireless networking works by sending a radio signal between two antennas. What, you don't see an antenna? Well surprise, your device has one. It might be printed on a circuit board, or it might have a wire or ribbon that runs through your device. The radio signal will get weaker the farther it has to travel, especially if it passes through or reflects off of things between the two antennas. Mobile devices can go with you to places where there is too much distance or interference for the wireless signal to be reliable. Even the way the mobile device is held or worn can impact the strength of the signal. So Wi-Fi and cellular data networks are used to connect your mobile devices to the internet.

But there's one other type of wireless network to talk about. Mobile devices connect to their peripherals using short-range wireless networks. The most common short range wireless network is called Bluetooth. You might have used Bluetooth headphones, keyboards, or mice before. When you connect a wireless peripheral to a mobile device, we call that pairing the devices. The two devices exchange information, sometimes including a PIN or password, so that they can remember each other. From then on, the devices will automatically connect to each other when they're both powered on and in range. Pairing devices like this can sometimes fail, and you might need to make your device forget the peripheral, so it can be paired again. Check out the next supplemental reading to see how to do this in iOS and Android. Remember, Bluetooth can be turned off very easily. When you're troubleshooting a Bluetooth peripheral, always make sure that Bluetooth is on.

Internet of Things Protocols

Some mobile devices are what we call Internet of Things (IoT) devices. These devices communicate with each other using Wi-Fi, and/or IoT network protocols. Some of these IoT network protocols areZ-Wave, Connectivity Standards Alliance, and Thread. If you work with IoT devices, you will need to understand what network protocols they support, and how they communicate with one another.

Bluetooth Pairing

Mobile devices connect to their peripherals using short-range wireless networks. The most common short range wireless network is called Bluetooth. You might have used Bluetooth headphones, keyboards, or mice before. When you connect a wireless peripheral to a mobile device, we call that pairing the devices. The two devices exchange information, sometimes including a PIN or password, so that they can remember each other. From then on, the devices will automatically connect to each other when they're both powered on and in range. Pairing devices like this can sometimes fail, and you might need to make your device forget the peripheral, so it can be paired again. Check out these articles to see how to do this in iOS and Android.

Reference:
https://www.coursera.org/learn/computer-networking/lecture/RgXEN/introduction-to-wireless-networking-technologies
https://en.wikipedia.org/wiki/IEEE_802.11
https://www.coursera.org/learn/computer-networking/lecture/jcLql/wireless-network-configurations
https://www.coursera.org/learn/computer-networking/lecture/Bmf8g/wireless-channels
https://www.coursera.org/learn/computer-networking/lecture/3ZI1X/wireless-security
https://www.coursera.org/learn/computer-networking/lecture/17QyP/cellular-networking
https://www.coursera.org/learn/computer-networking/lecture/K6YyP/mobile-device-networks

最后编辑于
©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 159,716评论 4 364
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 67,558评论 1 294
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 109,431评论 0 244
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 44,127评论 0 209
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 52,511评论 3 287
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 40,692评论 1 222
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 31,915评论 2 313
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 30,664评论 0 202
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 34,412评论 1 246
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 30,616评论 2 245
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 32,105评论 1 260
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 28,424评论 2 254
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 33,098评论 3 238
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 26,096评论 0 8
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 26,869评论 0 197
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 35,748评论 2 276
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 35,641评论 2 271

推荐阅读更多精彩内容