You are on page 1of 15

QUESTION 1(A)

A. 3G

The International Telecommunications Union (ITU) defined the third generation (3G) of
mobile telephony standards – IMT-2000 – to facilitate growth, increase bandwidth, and
support more diverse applications. For example, GSM (the current most popular cellular
phone standard) could deliver not only voice, but also circuit-switched data at download
speeds up to 14.4 kbps. But to support mobile multimedia applications, 3G had to deliver
packet-switched data with better spectral efficiency, at far greater speeds

3G wireless technology represents the convergence of various 2G wireless


telecommunications systems into a single uniform global system which includes
terrestrial and satellite components in its functioning.

3G or the third-generation wireless refers to near future developments in personal &


business wireless technology, especially relating to mobile communications. 3G or The
Third Generation will usher in many benefits as roaming capability, broad bandwidth and
high speed communication (upwards of 2Mbps). 

Network operators & telecommunications service providers are embracing the recently
adopted global third generation (3G) wireless standards in order to cater to emerging
user demands and to offer new services to their customers.3G wireless technology
represents a shift from voice-centric services to multimedia-oriented like video, voice,
data, fax services
B. WIMAX

WiMAX, meaning Worldwide Interoperability for Microwave Access, is a


telecommunications technology that provides wireless transmission of data using a
variety of transmission modes, from point-to-multipoint links to portable and fully
mobileinternet access. The technology provides up to 3 Mbit/s broadband speed without
the need for cables. The technology is based on the IEEE 802.16 standard (also called
Broadband Wireless Access). The name "WiMAX" was created by the WiMAX Forum,
which was formed in June 2001 to promote conformity and interoperability of the
standard. The forum describes WiMAX as "a standards-based technology enabling the
delivery of last mile wireless broadband access as an alternative to cable and DSL.

The bandwidth and range of WiMAX make it suitable for the following potential
applications:
Connecting Wi-Fi hotspots to the Internet.
Providing a wireless alternative to cable and DSL for "last mile" broadband
access.
Providing data and telecommunications services.
Providing a source of Internet connectivity as part of a business continuity plan.
That is, if a business has both a fixed and a wireless Internet connection,
especially from unrelated providers, they are unlikely to be affected by the same
service outage. Providing portable connectivity.

Companies are closely examining WiMAX for last mile connectivity. The resulting
competition may bring lower pricing for both home and business customers or bring
broadband access to places where it has been economically unavailable. WiMAX access
was used to assist with communications in Aceh, Indonesia, after the tsunami in
December 2004. All communication infrastructures in the area, other than amateur radio,
were destroyed, making the survivors unable to communicate with people outside the
disaster area and vice versa. WiMAX provided broadband access that helped
regenerate communication to and from Aceh
C. Wireless LAN

A wireless LAN (or WLAN, for wireless local area network, sometimes referred to as
LAWN, for local area wireless network) is one in which a mobile user can connect to a
local area network (LAN) through a wireless (radio) connection. The IEEE 802.11 group
of standards specifies the technologies for wireless LANs. 802.11 standards use the
Ethernet protocol and CSMA/CA (carrier sense multiple access with collision avoidance)
for path sharing and include an encryption method, the Wired Equivalent Privacy
algorithm.

High-bandwidth allocation for wireless will make possible a relatively low-cost wiring of
classrooms in the United States. A similar frequency allocation has been made in
Europe. Hospitals and businesses are also expected to install wireless LAN systems
where existing LANs are not already in place.

Using technology from the Symbionics Networks, Ltd., a wireless LAN adapter can be
made to fit on a Personal Computer Memory Card Industry Association (PCMCIA) card
for a laptop or notebook computer
QUESTION 1(B)

There are many technologies available to counteract wireless network intrusion, but
currently no method is absolutely secure. The best strategy may be to combine a
number of security measures. Possible steps towards securing a wireless network
include:
All wireless LAN devices need to be secured
All users of the wireless network need to be educated in wireless network
security
All wireless networks need to be actively monitored for weaknesses and
breaches

Disabling at least the IP Address assignment function of the network's DHCP server,
with the IP addresses of the various network devices then set by hand, will also make it
more difficult for a casual or unsophisticated intruder to log onto the network. This is
especially effective if the subnet size is also reduced from a standard default setting to
what is absolutely necessary and if permitted but unused IP addresses are blocked by
the access point's firewall. In this case, where no unused IP addresses are available, a
new user can log on without detection using TCP/IP only if he or she stages a successful
Man in the Middle Attack using appropriate software.

WEP stands for Wired Equivalent Privacy. This encryption standard was the original
encryption standard for wireless. As its name implies, this standard was intended to
make wireless networks as secure as wired networks. Unfortunately, this never
happened as flaws were quickly discovered and exploited. There are several open
source utilities like aircrack-ng, weplab, WEPCrack, or airsnort that can be used by
crackers to break in by examining packets and looking for patterns in the encryption.
WEP comes in different key sizes. The common key lengths are currently 128- and 256-
bit. The longer the better as it will increase the difficulty for crackers. However, this type
of encryption is now being considered outdated and seriously flawed. In 2005 a group
from the FBI held a demonstration where they used publicly available tools to break a
WEP encrypted network in three minutes. WEP protection is better than nothing, though
generally not as secure as the more sophisticated WPA-PSK encryption. A big problem
is that if a cracker can receive packets on a network, it is only a matter of time until the
WEP encryption is cracked.

WEP has some serious issues. First, it does not deal with the issue of key management
at all. Either the keys have to be manually given to end users, or they have to be
distributed in some other authentication method. Since WEP is a shared key system, the
AP uses the same key as all the clients and the clients also share the same key with
each other. A cracker would only have to compromise the key from a single user, and he
would then know the key for all users.

Wi-Fi Protected Access (WPA) is a software/firmware improvement over WEP. All


regular WLAN-equipment that worked with WEP are able to be simply upgraded and no
new equipment needs to be bought. WPA is a trimmed-down version of the 802.11i
security standard that was developed by the Wi-Fi Alliance to replace WEP. The TKIP
encryption algorithm was developed for WPA to provide improvements to WEP that
could be fielded as firmware upgrades to existing 802.11 devices. The WPA profile also
provides optional support for the AES-CCMP algorithm that is the preferred algorithm in
802.11i and WPA2.

WPA Enterprise provides RADIUS based authentication using 802.1x. WPA Personal
uses a pre-shared Shared Key (PSK) to establish the security using an 8 to 63 character
passphrase. The PSK may also be entered as a 64 character hexadecimal string. Weak
PSK passphrases can be broken using off-line dictionary attacks by capturing the
messages in the four-way exchange when the client reconnects after being
deauthenticated. Wireless suites such as aircrack-ng can crack a weak passphrase in
less than a minute. Other WEP/WPA crackers are AirSnort and Auditor Security
Collection.[7] Still, WPA Personal is secure when used with ‘good’ passphrases or a full
64-character hexadecimal key.
QUESTION 1(C)

The requirements of the respective wireless network as listed down below:

Facility
Provide a facility description that includes the floor plan, type construction, and possible
locations for mounting access points. Find or create building drawings and walk through
the facility to verify accuracy. Also, consider taking photos if the building has multiple
floors or has a complex layout, such as a five story multi-wing hospital. In addition to a
visible inspection, consider performing an RF site survey to complete the facility
assessment. All of this will capture the environment in a way that will help you choose
the right design alternatives

Applications
Ultimately, the wireless LAN must support user applications, so be sure to fully define
them in the requirements. This could be general office applications, such as web
browsing, email, and file transfer. Or it could be wireless patient monitoring in a hospital
or price marking in a retail store. Be as specific as possible by defining information types
(i.e., data, video, voice) and how they will flow throughout the facility. Application
requirements enable you to specify throughput and data rates when designing the
system

User
Don't forget to identify the number of users and where they will use the wireless LAN. Be
sure to identify whether users are mobile or stationary, which provides a basis for
including roaming in the design. Mobile users will move about the facility and possibly
roam across IP domains, creating a need to manage IP addresses dynamically. Some
users, however, may be stationary, such as wireless desktops.
Coverage Areas
This describes where users will need access to the wireless LAN. They might only need
connectivity in their offices and conferences rooms, but they might be able to do without
wireless connectivity inside power utility rooms and the cafeteria. By properly specifying
coverage area, you'll avoid the unnecessary expense of installing access points where
they're not needed. Unless obvious, also identify which country where the wireless LAN
will operate. This impacts channel planning and product availability

Security
Describe the sensitivity of the information being stored and sent over the wireless
network. You might need to identify a need for encryption if users will be transmitting
sensitive information, such as credit card numbers, over the wireless LAN. Be certain to
include protection from "war drivers" who can eavesdrop on your laptop throughout a
wireless LAN by including requirements for personal firewalls. Give security
requirements plenty of thought so that you design a solution that will protect the
company's valuable information

End User Devices


You should specify the end user devices (e.g., hardware and operating system) to
ensure the solution accommodates them. For example, you could specify that users will
have laptops running WindowsXP operating system or a particular brand of PocketPCs
having WindowsCE with CompactFlash interfaces. This provides a basis for deciding on
the type of 802.11 NIC and drivers to use, as well as assessing the type of middleware
that you can use

Battery Longevity
An 802.11 NIC will draw current at a couple hundred milliamps. Batteries under this load
will last from a couple hours to a day or so, depending on the size of the battery. These
are constraints for most applications, but it's beneficial to indicate the amount of battery
life that users will realistically need. In the design, you can utilize this information to
decide whether to activate power management, specify larger batteries, or determine an
effective battery-charging plan
System Interfaces
In most cases, users will need to access information located in servers on the wired-side
of the system. As a result, describe applicable end-systems and interfaces so that you
can properly design the wireless system interfaces. For example, you may find that
users will need to interface with a warehouse management system on an IBM AS/400.
This will later prompt you in the design to consider interface alternatives, such as 5250
terminal emulation and middleware connectivity for interfacing with the AS/400.

Funding
The requirements stage of a wireless LAN project is a good time to ask how much
money is available. If funding limits are known, then you'll know how much you have to
work with when designing the system. In most cases, however, a company will ask how
much the system will cost. You'll then need to first define the requirements and design
the system before giving a cost estimate.

Schematic Diagram for Wireless LAN


QUESTION 1(D)

The available standards and speeds of Wireless LAN technology are:


(a) IEEE 802.11
(b) IEEE 802.11-b
(c) HiperLan
(d) HiperLan II
(e) OpenAir
(f) HomeRF & SWAP
(g) BlueTooth
QUESTION 2(A)

Network equipments which required are:

(a) Repeater

In digital communication systems, a repeater is a device that receives a digital signal


on an electromagnetic or optical transmission medium and regenerates the signal
along the next leg of the medium. In electromagnetic media, repeaters overcome the
attenuation caused by free-space electromagnetic-field divergence or cable loss. A
series of repeaters make possible the extension of a signal over a distance.

Repeaters remove the unwanted noise in an incoming signal. Unlike an analog


signal, the original digital signal, even if weak or distorted, can be clearly perceived
and restored. With analog transmission, signals are restrengthened with amplifiers
which unfortunately also amplify noise as well as information.

Because digital signals depend on the presence or absence of voltage, they tend to
dissipate more quickly than analog signals and need more frequent repeating.
Whereas analog signal amplifiers are spaced at 18,000 meter intervals, digital signal
repeaters are typically placed at 2,000 to 6,000

(b) Bridge or Switch

In a telecommunications network, a switch is a device that channels incoming data


from any of multiple input ports to the specific output port that will take the data
toward its intended destination. In the traditional circuit-switched telephone network,
one or more switches are used to set up a dedicated though temporary connection or
circuit for an exchange between two or more parties. On an Ethernet local area
network (LAN), a switch determines from the physical device (Media Access Control
or MAC) address in each incoming message frame which output port to forward it to
and out of. In a wide area packet-switched network such as the Internet, a switch
determines from the IP address in each packet which output port to use for the next
part of its trip to the intended destination

(c) Router
In packet-switched networks such as the Internet, a router is a device or, in some
cases, software in a computer, that determines the next network point to which a
packet should be forwarded toward its destination. The router is connected to at least
two networks and decides which way to send each information packet based on its
current understanding of the state of the networks it is connected to. A router is
located at any gateway (where one network meets another), including each point-of-
presence on the Internet. A router is often included as part of a network switch
QUESTION 2(B)

There are 4 network cabling technology been used in the respective case. These are
"thick", "thin", "Cat 5E twisted-pair copper" and “single- and multi-mode fiber optic”
Ethernet wiring plants. First at all, it will use the CAT 5E to connect devices to wiring
closets and single- and multi-mode fiber optic cabling between wiring closets and for the
campus backbone. The dominant physical layer access protocol in LAN environments is
Ethernet, although some limited use of Token Ring signaling is in use.

The connectivity for the vast majority of buildings consists of a 1000BaseLX (Gigabit)
single-mode fiber connection to one of the building core locations, and each containing a
“layer-three” switch. The Foundry core switches are interconnected in a meshed
topology, with three to five connections from a core switch. Logical host addressing and
transport management services for inter-networking across the campus backbones are
provided by the TCP/IP protocols. IP packet routing is provided centrally. Wide area
connectivity is provided by PeachNet which provides both commodities Internet 1 as well
as.Internet 2 (I2) services for research and education between I2 members and
sponsored entities.

Physical connectivity is provided to the school buildings on campus via a broadband


coaxial cable trunk system for which the "head-end" is located in one of the major
administration building. This system consists of a few separate legs (segments) serving
distinct geographical regions of the campus. Physical layer networking services are
provided on the trunk segments using the MAP (Manufacturing Application Protocol).
Each campus broadband trunk segment supports three shared 100 Mbps MAP
channels. Bridged connection of the trunk MAP channels to building Ethernet segments
is provided through Hughes LAN bridges. The multiple campus trunk channels are
combined into a common networking addressing space using a high performance
CISCO router located at the head-end
QUESTION 2(C)

As for campus network, the best and suitable network protocol is:

(a) Internet Group Management Protocol (IGMP)

The reason why using Internet Group Management Protocol (IGMP) as the network
protocol in campus network because IGMP snooping allows the switch to discover which
ports have hosts that want to receive multicast traffic especially during many students
download the lectures notes, as well as to send switch-wide requests to the router (or
the next hop switch) so that the upstream devices know that there are hosts that want to
get a specific multicast group. This is much more than just passive "snooping" and is
quite complex to get right.

Furthermore, Prior to IGMP-L2, the only way to get selective IP video multicast traffic
management was to use the long-established standard IGMP. Industry-standard IGMP
takes advantage of what is typically called the “IP Layer” or “Layer 3” of the OSI Basic
Reference Model to define a multicast structure that enables multicast traffic streams to
be selectively managed. Layer 3, and IGMP operating at Layer 3, defines network
addressing and routing protocols that support data delivery between any two nodes in a
network. IGMP utilizes a class of addresses (Class D) with routing information that can
be decoded by a Layer 3 device, such as an office-grade router. A multicast packet is
sent. Once, but can go to multiple users, significantly reducing traffic on the LAN. Three
other classes of addresses (Class A, B, and C) are used to send IP packets with a
specific address to a single remote user, called a unicast address. Under IGMP a Layer
2 switch must pass multicast streams up to a Layer 3 router for decoding and routing of
the particular streams needed to go to their desired destinations. With IGMP, Layer 2
switches have to “snoop” on the decisions made up at Layer 3 in order to understand
how to handle multicast video streams passing through.

Besides that, the respective protocol having a single logical connection per subscriber is
often consistent with the deployed method of delivering high-speed Internet service to
subscribers, minimizing retraining costs. The management also can forward all IGMP
requests to the BSR allows it to dynamically adjust the amount of unicast (best-efforts)
traffic being sent to each subscriber, ensuring that the access link is not over-committed.
The other reason why choose the IGMP as the campus network protocol is the IGMP
Passthrough can supports all types of Access Nodes, whether old or new. Existing
access notes which do not support IGMP do not need to be replaced, and IGMP
awareness does not need to be enabled at the access note.

Due to the campus network, the uses of IGMP will enable the BSR sees all IGMP
requests and can reject requests which would over-subscribe bandwidth to the
subscriber or to the AN. This is the equivalent of a “fast busy” signal in voice networks.
Because there is no need for queues or IGMP functionality in the AN or access
aggregation switches, the operator can select the lowest cost AN today, and even switch
to a different AN later with minimal operational impact.

At the mean time, moving to a pure unicast model in the access network simplifies
Access Notes configuration and eliminates the challenge of troubleshooting IPTV
transmission issues. Lastly, since all IGMP requests are forwarded upstream by the
Access Notes, the BSR can dynamically adjust the bandwidth available to other
applications and can also aggregate information about what channels subscribers are
watching.
QUESTION 2(D)

The best LAN standard for the respective campus network is IEEE 802.11g wireless
LAN. It is because The IEEE 802.11g access points can deliver a network bandwidth of
up to 54Mbps versus 11Mbps of the 802.11b.  Furthermore, the 802.11g WLAN access
points can support 802.11b WLAN cards.  The deployment of the IEEE 802.11g wireless
LAN standard also enable those notebook users with 802.11g WLAN cards to enjoy
higher bandwidth, whereas existing users can still rely on their 802.11b WLAN cards to
connect to the campus network as before. It is very important and vital as we know that
most of the lecturer and students will usually using the notebook to online in order to
search for information and data at their campus area. Therefore, the deployment of IEEE
802.11g will just perfect for the respective lecturer and students.

At the mean time, the latest IEEE 802.11g will be advanced enough to deliver maximum
and better speed especially in senses of bandwidth. Lastly, the respective IEEE 802.11g
will also be able to compatible with other standards like 802.11b standards. Therefore, it
will become easier for the campus management to integrated the different standards in a
same local area network.

You might also like