Académique Documents
Professionnel Documents
Culture Documents
1
JEN Agenda
• Basics
• Standards
•Data rates
•Operating Modes
• WLAN Models
•Science Stuff
• Antenna Types
• Antenna Selection Criteria
•Topologies
2
SENOING AU THE RIGHT SIGNALS
WIRELESS BASICS
3
Uses
•Temporary Installations
4
4 Seamless Wired and Wireless
With 802.11 wireless ethernet, we can seamlessly, invisibly and reliably integrate
data connectivity into new or existing networks.
5
Nj CSMA/CA
Duplex - Explained
6
BELDEN Access Methods
CSMA/CA is not necessarily the best method of collision avoidance, but it is the fastest with
less latency and overhead. Because of this, it is the default choice on a WLAN, unless
specific problems are detected.
7
m
SENDING All THE BIGHt SIGNALS
L. Hidden Node
s*
’ N
/
x* N •» \
/ \
S
/ S
/ \
/ \
V \
/ '
x •s \
/
\ \
/ / \ \
/ / \ \
/ / / s \
\
/ / /
/
\ \
/ / \
/ \ \ l
/ / S \
/ / \
I I I \
\
I I i / I
l
l
: I l
\ / /
\ \ I I i
\
\ \ s / / / /
\ \ /
\ / / I
\ \ / /
\ \
/ /
\ /
\ s /
\ / /
\ /
\ / /
•
/
/
\ /
/
V /
'
x /
8
m
SENDING All THE BIGHt SIGNALS
L. Hidden Node
s*
’ N
/
x*
N •»
/ x
' S
/ s
/ V
/
V
/ '
x N
/ \
/
/ /
/ /
/ / / s
/ / /
/
/ /
/ \
/ / s
/ / \
I I I
I I i /
l
l
:
\ / /
l \
\ /
\
\ \ s /
\ \ \ /
\ \ /
\ \
\ \ s /
\ \ /
/ /
\ /
\
•
/ /
/
V /
\
'
x /
9
N Wireless Operating Modes
• Access Point
• Access Client
• Point to (Multi) Point
10
BELDEN
StNtXNC AUIHE RttHI SIGNALS
Wireless Operating Modes
• Access Point
11
BELDEN
SEN01NG All THE RIGHT SIGNALS
Wireless Operating Modes
•Access Client
A wireless device designed to connect to a wireless network
(Laptop , tablet PC , barcode scanner or possibly a BAT
configured as an access client)
y
Ah Hoc – 2 clients can connect to each to form a PAN (Personal Area Network)
An infrastructure device (Such as a BAT) running in access client mode is best suited for
applications where a single wired device is connected. Per the 802.11 specification the
client device performs a “MAC masquerading” functionality which may pose some issues in
some layer 2 discovery programs.
12
BELDEN
StNtXNC AUIHE RttHI SIGNALS
Access Client - MAC Masquerading W
Source:
MAC: 00:80:63: AA: BB CC 00:80:63:DD:EE:FF MAC: 00: 80 63 DD EE FF
Destination:
00:00:BC:11:22:33
Source:
Access Access 00:00:BC:44:55:66
Point Destination:
Client 00:00:BC:11:22:33
D9
Si
Si
MAC: 00: 00:BC:11:22:33
II
MAC: 00:00:BC: 44: 55:66
Some discovery programs that operate at the datalink layer (such as HiDiscovery) will not
be able to find more than one device connected to a client due to this MAC masquerading.
Also note, this is NOT a Hirschmann issue, ALL clients perform this function.
If the client AND access point are BAT devices, a proprietary work-around called “Client
Bridge Support” can be used
13
M BSS ( Basic Service Set)
14
BELDEN BSS ( Basic Service Set)
SEN01NG All THE RIGHT SIGNALS
' '
SSID: Hirschmann
Frequency: 2.4GHz
Channel: 1
Encryption: WPA/AES
Encryption key: supersecure
Access
Point
Wireless
i
Wireless
M Wireless Client
Client
'
f Client
In order for a client to connect to a WLAN, at a MINIMUM, the following must match
between the AP and the client:
- SSID
- Frequency/Channel being used for communication
- Encryption type and key
15
m Connection Phases
SENDING AU IHE RIGHT SIGNALS
1 probe request
>
2. probe response
<•
3. authentication open seq:1 _ >
4. authentication open seq:2
<
5. association request
>
6. association response
«
7. data
<
16
M ESS ( Extended Service Set)
17
m L. ESS ( Extended Service Set)
SENDING All THE BIGHI SIGNALS
LAN
APP 3 IAPP
Wireless
1
Wireless Wireless
Client Client Client
18
m L. ESS ( Extended Service Set)
SENDING All THE BIGHI SIGNALS
LAN
APP 3 IAPP
Wireless
1
Wireless Wireless
Client Client Client
Thin AP Model:
- The AP’s search for the WLAN Controller
- Once found, the WLAN Controller will give out a pre-determined config to the AP
- Firmware updates, config changes are all handled through the WLAN Controller
- If an AP fails, upon replacement the new unit finds the WLAN Controller, gets a config
and viola’
- It is also possible to have a Backup WLAN Controller for added redundancy
- From a security aspect, the controller configs can be set so once an AP gets a config it
will maintain this config for a certain amount of time, or until it loses power, or
immediately after losing communication to the controller.
19
4J IBSS (Independent Basic Service Set)
•“ Ad-Hoc mode”
•Decentralized architecture
20
Point to (Multi) Point
21
n L. Point to Point
5GHz
Channel 165
Encryption: WPA2/AES
Master Key: supersecure Slave
P2P Partners: P2P Partners:
Site B Site A
Site A Site B
I
Operation Rado I Performance -
Portto Port Jcientmode
--
f~1Point to Point partnm7H>?P?1 &int te>- Pni .-
PorttoPort flams ;
^ - 1
Enable ths Port -2 -Port charnel
-
Poentto Port operation mode:
Erter the WLAN access port lo be rterconnected via
© Off •TV«s access point can only commirecate vrth moWe Pcrtto-Port connection here
stations
Recognize by.
© On - Ths access port can also comriKneatevrth other access MAE address
ports to connect several local wreless networks
0 Slaton name
a Exclusive • Tho access port can only cornmmcate wth other 1 / Senal autocor/igmticn
access ports, mobfc stations cannot connect to this access
port frxjre WLAN bridge)
you use reeognbon by IMC addess . erter the WLAN
adapters MAC address and not the device MAC iaddess
Station name : SITE-A
oooooooooooo
(y Corfigwethe Portto-Point partners outsrie ties dialog n the
^
cooespondng table
Station name SITE-8
OK | | Cancel .
In a point to Point model, all units are configured as access points. They must share:
- Frequency and channel
- Encryption type and key
SSID is irrelevant in P2P mode
1 unit is defined as the “Master”
The rest are defined as “Slave” units
22
m Point to Multipoint
SENDING AU IHE RIGHT SIGNALS
Slave
P2P Partners:
Site A
5GHz Site B
Channel 165
Encryption: WPA2 /AES
Key: supersecure Slave
P2P Partners:
Site A
Site C
Slave
P2P Partners:
Master Site A
P2P Partners:
Site D
Site B
SiteC Slave
SiteD P2P Partners:
Site E Site A* Site A
Site F Site E
SiteG
Slave
:ll^ J / Site
P2P Partners:
A
Site F
Slave
P2P Partners:
Site A
SiteG
- Up to 6 slave access points can be connected to a single Master access point (as of
HiLCOS 8.52)
- The master and ALL slaves share the same channel, and as such the bandwidth is shared
as well. This is a design criteria that must be paid attention to
- All units share the same encryption type and key as well
23
N WLAN Models - Summary
24
BELPEN
WIRELESS STANDARDS
25
: dI>1: j Wireless Standards
-CT J
802.11a
802.11b
802.11g
802.11n
802.11e
802.11h
802.11i
26
N 802.11a
•5GHz Operation
• Up to 54Mbps data rates
• Up to 12 “ non-overlapping” channels
•20MHz channels
•Very commonly used for wireless “ backbone”
connections
- The 5Ghz frequency band is not very crowded, so the possibility of external interference
is greatly reduced
- Also because all 5GHz channels are “non-overlapping”, if external interference does
become an issue, it is very easy to work around
27
N 802.11b
•2.4GHz Operation
• Up to 11Mbps data rates
• Up to 3 “ non-overlapping” channels
•22MHz channels
•Very inexpensive and requires very little power
- Because 802.11b is very inexpensive and requires very little power, it is still commonly
used in hand-held, battery powered devices such as barcode scanners
- The 2.4Ghz band is very congested with other devices, cordless phones, bluetooth,
microwave ovens… so outside interference can be a big issue. Also as there are a
maximum of 3 non-overlapping channels, this issue can become very hard to work
around
28
N 802.11g
•2.4GHz Operation
• Up to 54Mbps data rates
• Up to 3 “ non-overlapping” channels
•22MHz channels
•Can operate in mixed mode with 802.11b devices
- Very popular for higher end handheld devices, such as smartphones, laptops, tablets…
29
802.11n
•2.4GHz or 5GHz
• Up to 600Mbps data rates
•Supports MiMo (Multiple Input Multiple Output)
•20MHz or 40MHz channels
•Frame Aggregation (increases throughput)
•Works very well in highly reflective areas due to
MiMo support (vs. 802.11a/b/g)
30
802.11e ( WMM/WME)
• 4 priority queues
- AC_BE: Best effort
- ACJ3 K : Background
- AC_VI: Video
- AC_VO: Voice
Originally WMM, later changed to WME, both are one in the same
31
N 802.11h
32
802.11i
33
MiMo
Increases bandwidth
Also improves performance in highly reflective
areas
34
BELDEN
SCNOtNCAUIHEMSHTStSNAlS
MiMo - Multipath
// / / /
A 1
m
•• •
% irr.
M
UIMOAP 802.1 In
*
>.
B 2
\\\\\
- Vs. 802.11a/b/g, MiMo allows for roughly a 10db better signal strength
35
BELDEN
SCNOtNC AU IHE RISHI SIGNALS
Standards Overview
CHANNEL ALLOCATIONS
37
BELDEN
SENDING All IKE RIGHT SIGNALS
2.4GHz Channels
2.412 2.417 2.422 2.427 2.432 2.437 2.442 2.447 2.452 2.457 2.462 2.467 2.472 2.462
I
5
I I
\ I
10
I
il 4
i i i I I
9
I r ri
3 8 13
i i [ i i i i f
2 7 12
i r j i i i i i i i i
1 \ / 6 \ / 1 1
38
.
k
2.412 2.417 2.422 2.427 2.432 2.437 2.442 2.447 2.452 2.457 2.462 2.467 2.472 2.462
1 1 1 1 1 1 1 1 1 1
m mm
5
i ^ HIT O
t 3 |i 8 1
2 U 7 \
] \ / 6 \ / 11 \
39
BELDEN
SEN01NG All THE RIGHT SIGNALS
2.4GHz Channel Usage
**
1 6
11 1
Because of the overlapping with 2.4GHz channels, proper planning and usage is a MUST for
2.4GHz channels
40
n L. 5GHz Channels
41
n L. 5GHz Channels
42
SENDING All THE BIGHt SIGNALS
Channels/Output Powers
_
10 BAT-ti SBS7C0 Confaufor*on
how ulan
Channels Allowed By Regulatory Donain
.
Allowed Channels for 2,4 GHz Operation:
.
ChanneKs ) 1< 2412 HHz ) 2 < 2417 HHz ) 3 < 2422 (1Hz >, 4 < 2427 HHz >, S < 2432 HHz )
>, 12(2467 .
HHz ) 13 < 2472 HHz ):
. .
6 (2437 HHz ), 7 < 2442 HHz ) .
8 < 2447 HHz > 9 < 24S 2 HHz >, 10 < 24S7 HHz ), 1K 2462 HHZ
EIRP linit 18 dBn < CCK >, 20 dBn ( OFDH )
.
Allowed Channels for 5 GHz Operation:
ChanneKs ) 36(5180 HHz ) 40 < S 200 NHz >
EIRP linit 23 dBn
. 44 < S220 HHz ), 48 < S 240 HHz ):
regulatory requirenent < s >:
indoor-only usage
configuration requirenent ( s ):
Indoor -Only-Operation nust be enabled
. .
ChanneKs ) 36(5180 HHz ) 40 < S 200 HHz ), 44 ( 5220 HHz ), 48 ( 5240 HHz ), 52(5260 HHz ), 56(5280 HHz ) 60( 5300 HHz ), 64 ( 5320 HHz ):
EIRP linit 23 dBn
DFS is enabled ( EN301893 -U1.6 on ULAN-1, EN301893 -U1.6 on ULAN-2, load threshold is configured to 80z >
regulatory requirenent ( s ):
indoor - only usage
naxinun frane transnission tine 10000 us
configuration requirenent ( s ):
.
Indoor -Only-Operation nust be disabled
ChanneKs ) 100( 5500 HHz ) 104(5520 HHz ), 108 (5540 HHz ), 112(5560 HHz ), 116(5580 HHz ), 132(5660 HHz >, 136(5680 HHz ), 140(5700 HHz ):
EIRP linit 30 dBn
.
DFS is enabled ( EN301893-U1.6 on ULAN-1 EN301893-U1.6 on ULAN- 2, load threshold is configured to 80x >
regulatory requirenent ( s ):
naxinun frane transnission tine 10000 us
configuration requirenent ( s ):
Indoor -Only-Operation nust be disabled
3
ULAN-1 ULAN-2
20 dBn 20 dBn
20 dBn 20 dBn
20 dBn 20 dBn
20 dBn 20 dBn
20 dBn 20 dBn
20 dBn 20 dBn
18.5 dBn 18.5 dBn
17.5 dBn 17.5 dBn
tate of Aggregation ouer peers
J\ MinSCMMANN OK Cancel
Via CLI:
- Set country code:
cd /setup/WLAN
set country ? (show list of countries)
set country XXX (XXX = number code for the appropriate country)
- Show WLAN Information for specific country code:
show wlan
43
SENOING AU THE RIGHT SIGNALS
ANTENNA SELECTION
44
• Omni directional antenna (Dipole)
• Horizontal 360° , Vertical up to 360°
• Used for mobile installations or cover areas (e.g. mobile phone)
• Lowest antenna gain, passive gain typically 3-6 dB
Sector Antenna:
Typical radiation pattern looks like a pice of cake
Should be placed in the corner of the room, because of it‘s radiation pattern.
Antenna types of this category are Yagi, Grid, Patch and Panel Antennas.
Directional Antenna:
Typical radiation pattern looks like a baseball bat.
There are special types like grid antennas (Yagi or Grid antennas) there biggest advantage is
the resistance to wind.
45
N Antenna Types
•Polarization
46
Omni-Directional
%
R -V y.
l -150
150
Horizontal
150 -150
»
150
Vertical
150
47
Sector
-60
3o
'
eoi *
Horizontal Vertical
48
Nj Medium Directional
T
" Tighter radiation patterns
M
»
•> "" 40 » fa
-
' i
K
*
. / V !
.
/ \
N
«»/
*
:
( i T
3}’
T I
'
v.
» « T
- <
l/J
/ ' ‘
M
> «
-< .
-
>«
Horizontal Vertical
49
Highly Directional
T 1
«»' • » ,w
IX «t IX «
Horizontal Vertical
50
Specialty Antennas
(XM* contactor
iCoeor* too
ln>Mf CO
*
(COOM> <
r>
51
Selection Criteria
• Physical security
52
BELIE EN Gain
Highly Directional
f -
Sector
? -o —
Using the Hirschmann WLAN Distance Calculator or up coming BAT Planner you can
determine what antenna gains may be needed
53
Coverage Pattern
Sector
Antenna 45-
6
90°
Assembly line
Assembly lines may include video control to scan barcodes from parts of the final products.
The antenna should cover the needed area. In this example there is a potential to use a
antenna with much lower horizontal and vertical angel of beam.
BELDEN Coverage Pattern
r
Sector
l rS (
AGVs or normal vehicles
rS 1 rS
v_ y
Antenna 75-
9 °
° n
1 1
1 1
A sector antenna is used to cover the whole hall. The vehicles are using a fixed
omnidirectional antenna e.g. to transmit provisioning data or to steer avgs around the hall.
BELDEN
SEN01NG All THE RIGHT SIGNALS
Physical Security
»
*
Store
IT ClosetI
AP using Omni - directional Antenna
- As an example, assume a store wants to add wifi access for in-store use only. It would be
relatively easy to simply choose an omni-directional antenna to ensure store coverage
- If someone has access to the RF signals, i.e. a hacker, they can then start to try to
penetrate the wifi network
- In this case, the parking lot has very good access to the network and would be an easy
target
56
BELDEN
SEN01NG All THE RIGHT SIGNALS
Physical Security
» »
Store IT Closet
AP using Sector Antenna
By choosing a sector style antenna, we can get just as good store coverage, more than
likely better performance, since the sector style antennas typical have a slightly higher gain
than omni-directional antennas, and also eliminate the unnecessary “bleeding” of the RF
signal into unneeded areas. If a hacker would want to try and penetrate the network in this
scenario, they would more than likely need to be in the building.
57
: qlm
SENDING AU IHE RIGHT SIGNALS
Down -tilt angles
10 Meters
m
Each antennas radiation pattern MUST reach the opposing antenna to facilitate
connectivity. If one antenna is at a higher elevation, the antennas must be angled toward
each other
58
BELDEN
SEN01NG All THE RIGHT SIGNALS
Down-tilt angles
**
In this example, using directional anntennas between 2 points the solution is very easy. But
let’s assume a more complex scenario…
59
BELDEN
SEN01NG All THE RIGHT SIGNALS
Down-tilt angles
**
Repeate
Station
Location 1 Location 2
60
BELDEN
SENOING All THE RIGHT SIGNALS
Down-tilt angles
**
Repeate
Station
Location 1 Location 2
Let’s assume using Omni-directional. This is usually the first thought as it gives good
coverage, and is usually a novices first “catch all” choice
61
RELC EN Down-tilt angles
SENDING All IKE RIGHT SIGNALS
Repeate
Station
Location 1 Location 2
Let’s assume using Omni-directional. This is usually the first thought as it gives good
coverage, and is usually a novices first “catch all” choice
62
BELDEN
SEN01NG All THE RIGHT SIGNALS
Down-tilt angles
**
Repeate
Station
Location 1 Location 2
63
BELDEN
SEN01NG All THE RIGHT SIGNALS
Down-tilt angles
**
Repeate
Station
Location 1 Location 2
- The most efficient solution would be to use medium to highly directional antennas,
angled to ensure proper connectivity
- Also note, at the repeater station, 2 radios would be needed. Either in a single unit (such
as the BAT54-RAIL), or 2 separate units (2x BAT300-RAIL)
- This design also give better performance. Instead of sharing a single radio connection at
the repeater station with both locations. Locations 1 & 2 now have a dedicated link to
the repeater station so the overall throughput would be much better
64
SENOING AU THE RIGHT SIGNALS
DATA RATES
65
M Wireless Data Rates
66
00
m
D
m
73
0)
03
flJ
<• BB
12 Mbps
18 Mbps
24 Mbps
36 Mbps
48 Mbps
54 Mbps
6 Mbps
9 Mbps
3
cn
>
(/
3.
Q
0)
- As the Signal-Noise (SNR) ratio get lower, the receiver must lower its data rates to
maintain connection
- Each device has different characteristics on the receiver sensitivity. Should be found on
data sheet or technical manual for calculation
- SNR can be effected most commonly by:
- Distance from the transmitter (Free Space Path Loss)
- Background noise levels (interference)
- Environmental objects (attenuation)
67
BELDEN
SCNOtNC AU IHE RISHI SIGNALS
802.11 Data Rates
20MHz 40MHz
68
SENOING AU THE RIGHT SIGNALS
RF CHARACTERISTICS
69
RF Fundamentals
Gain A (Lambda)
db
Wavelength
Attenuation
Fresnel Zone
SNR
When designing and troubleshooting RF systems, there are a lot of terms, definitions and
formulas to be aware of. This is just a sample of some of the terms and definitions we will
discuss. Also note that most of these items have an associated mathematical formula as
well.
70
RF Fundamentals - Wavelength
A=clf
A = wavelength
Wavelength is the basis of all RF calculations and theory. With wavelength we can find the
frequency of a waveform, choose proper equipment for an RF system such as cables,
connectors, antennas… we can also calculate theoretical maximum distances and data
rates that will be available in a certain application. With the formula here, we can also find
the wavelength if we know the frequency, as waveform and frequency are inversely but
proportionately related.
Formula:
λ = Lambda
c = Speed of light (because RF signals travel at the speed of light)
f = Frequency
71
RF Fundamentals - Wavelength
Y\ /\ • Wavelength
• Used to calculate:
- Antenna length
- Fresnel Zone
Wavelength is directly used in the design of all RF antennas. Spatial placement is used in
certain applications were there may be certain phenomenon such as reflections for
example. Fresnel Zone is used to determine antenna height in a long distance point to
point application as well as Free Space Path Loss.
72
BELPEN RF Fundamentals - Wavelength
Longer Wavelength
0
1 cycle per second (1Hz)
seconds second
Shorter Wavelength
.
2 cycles per second (2Hz)
seconds s cond
In the first example (Top), we see a signal with a frequency of 1 Hertz. This means that the
RF wave has a cycle period of 1 second or 1 cycle per second.
In the second example (Bottom), we see a signal with a frequency of 2 Hertz. This mean
that this RF wave has a cycle period of ½ a second or 2 cycles per second.
By comparing the two waveforms, we can see the inverse relationship between waveform
and frequency. The 1 Hertz (Top) waveform has a longer waveform than the 2 Hertz
(Bottom) waveform.
73
RF Fundamentals - Frequency
Amplitude
/=c/A
A = wavelength
/ = frequency
74
M RF Fundamentals - Amplitude
•Amplitude
• Strength of an RF waveform
75
BELPEN RF Fundamentals - Amplitude
Higher
Amplitude
Original
Amplitude
Lower
Amplitude
As you can see in the above examples, all three waveforms have the same wavelength and
frequency, but they all three have different amplitudes. Because of this they would all have
different effective distances they could be transmitted.
76
N RF Fundamentals - Phase
•Phase
77
RF Fundamentals - Phase
Original
Waveform Average
Signal
Inverted
Waveform
-2+2=0
In the above example, we have two waveforms of identical frequency and amplitude. The
Inverted (lower) waveform is inverted or known as 180 degrees out of phase in relation to
the original (Top) signal. Because of this Phase difference, if the two signals were both
received by an RF device, the two would have cancelling effects on each other. In the right
example of the two superimposed on top of one another, the effective combined
waveform of the two would be no waveform at all. Just like adding a positive and negative
of the same number. The sum would be zero.
78
RF Fundamentals - Phase
/X
II
i\
r
79
N RF Fundamentals - Free Space Path Loss
Free Space Path loss can be compared to dropping an object into a standing pool of water.
It causes ripples of water to go out in all directions away from the point where the object
entered the water. As the waves travel outwards, they become smaller and smaller, losing
amplitude (or height).
80
• Free Space Path Loss
• Formula:
D = distance in Kilometers
5GHz
4 kilometers
I
117 (db) = 105 + 20 Log (4)
To figure out the free space path loss, we use one of the formulas above.
Note that D = distance in Kilometers, so…
Once we know the frequency, distance and calculate the Free Space Path Loss, we can start
to figure out what or link budget is and what antenna gain or amplification will be needed
for our RF link.
It is a good idea to add a factor of 10 to the Free Space Path loss. While this seems
excessive, tolerances in radio hardware, losses due to math rounding and even weather
make this reserve a good idea.
81
M RF Fundamentals - Gain
•RF Gain
• Passive or Active
• Intentional or Unintentional
82
RF Fundamentals - Gain
Active Gain
100mW
Signal
\37
f
1 Watt
Signal
T 7
\j —
, J
A
''
Access
Point
RF
Amplifier
'
A
^
"
Antenna
Active gain can be compared to sound waves going through a megaphone. The waves of
sound from your voice get amplified and retransmitted through the air with a greater
amplitude than the original waveform.
83
RF Fundamentals - Gain
Passive Gain
Directional
Antei na
Omni-Directional
Antenna
Passive gain is comparable to cupping you hands around your mouth. The sound is not
louder and the amplitude is not greater, but appears to be because the sounds waves are
concentrated in a desired direction. In RF communication this could be caused
unintentionally by objects such as walls. If an antenna was inadvertently mounted too close
to a metal studded wall, this could cause unintentional passive gain.
84
RF Fundamentals - Loss
> Loss
\ / ~\ /X i
1 Watt \ / 1/2 Watt \ _/ ^
Sign3 tVy
' Si9nal A 3dbi
_
Access
..
Point
RF
.
Attenuator
^ ^Antenna
"
Antenna
The FCC states that maximum output of an intended radiator (antenna) is 1 Watt. As we
will see later on, a gain of 3db doubles the output power. In this example, we already have
a 1 Watt signal being transmitted into a 3db antenna, so we must cut the power in half to
stay within FCC regulations. We can do this with an attenuator. Note also that most modern
802.11 radios have settings to reduce output power as well so an external attenuator may
not be necessary.
85
RF Fundamentals - Loss
Point Antenna
Losses introduced through connectors and cabling must be calculated into the overall link
budget also. If using longer RF cabling, ultra low loss cable could be considered to help
reduce unwanted losses. More about choosing the correct cables later on in this course.
86
RF Fundamentals - Reflection
Reflection
Incoming Reflected
RF Wave RF Wave
Reflection is very easily explained in the analogy of looking into a mirror. If you look at the
mirror at an angle, you do not see yourself, but whatever is located at the same angle in
the opposite direction.
87
RF Fundamentals - Scattering
•Scattering
Scattering is nothing more than multiple reflections. These reflections typically happen in a
small area causing the original waveform to be divided into many smaller waveforms, but
can also be reflected at different angles from the original waveform. Scattering can cause
dead areas in an RF coverage area.
88
N RF Fundamentals - Absorption
• Absorption
Absorption is most commonly used and seen in microwave ovens. When an object is
heated in a microwave oven, the water particles present in the object absorb the RF
radiation. Because of this absorption, the object becomes heated, thus allowing us to cook
foods with RF waves. Because of the much lower power outputs used in RF
communication, this phenomenon happens on a much smaller scale.
89
Ilk®
RF MATH AND
MEASUREMENTS
90
Units of Measure - Watt
• Watt
P=IxE
- P = Power in Watts
- I = current in Amps
- E = Voltage
The Watt is named after an 18th century Scottish inventor, James Watt. If either, or both the
volts or amps increase, so does the watts. Most commonly used to measure the output of
a light bulb. A typical household light bulb puts out 60 watts at 120vac. Knowing the Watts
(60) and the Voltage (120v) we know that the light bulb draws .5 amps.
91
M Units of Measure - Milliwatt
•Milliwatt
• Abbreviated as mW
In an RF radio system, only small amounts of power are typically required. Because of this,
the RF waves are typically measured in milliwatts, or thousandths of a watt.
92
M Units of Measure - Decibel (db)
• Decibel (db)
• 1/10 of a Bel
93
BELPEN Units of Measure - Decibel (db)
• Decibel
• Example:
100mW output power from an Access Point
3db cable loss
10db gain antenna
100mw - 3db + 10db = 500mW
The rule of 10’s and 3’s is a very quick an efficient method of finding the output power of
an RF system.
As you can see, a gain of 3db double’s the output power. A loss or reduction by 3db cuts
the power output in half.
For the rule of 10’s, a gain of 10db multiplies the output power by a factor of 10. A
reduction of 10db would be 1/10th of the output power.
94
BELPEN Units of Measure - Decibel (db)
1 + 10 - 3 - 3 - 3
2 + 3 + 3 + 3 + 3 - 10
3 +3
4 + 10 - 3 - 3
5 + 3 + 3 + 3 + 3 + 3 - 10
6 +3+3
7 + 10 -3
8 + 1 0 + 1 0 - 3 -3 - 3 - 3
9 +3+3+3
10 + 10
By using these equations of 10’s and 3’s, we can find the output power of a system without
using any complex physics equations. Give example…
95
BELDEN
SENDING All IKE RIGHT SIGNALS
Units of Measure - dbm
dbm mW dbm
10 10.00
Used for link budget calculations
Formula: 20 13.01
dbm = 10log10(Pmw)
30 14.77
40 16.02
50 16.99
100 20.00
96
M Units of Measure - dbi
•dbi
97
N Units of Measure - SNR
•SNR
Imagine having a conversation in a room full of people. If no one else is talking, your can
converse very easily. As the people in the room begin talking, your conversation starts to
drown out. Because of this, to have your conversation be as loud or effective, you must talk
louder over the background noise.
98
I
m
m SNR - General Figures
99
M Units of Measure - Receive Sensitivity
• Receive Sensitivity
• Listed as dbm
Receive sensitivity is basically how well the receiver can “Listen” for an RF signal. This
determines how far the link can be carried, and at what data rates the link will be at. As
distance increases, the receiver must increase its sensitivity to be able to listen closer,
because of this, when sensitivity is increased, data rate is typically lowered when this
happens. Most RF equipment has a chart listing the sensitivity for the specified data rates
to help in link budget calculations.
100
BELDEN
SCNOtNC AU IHE RISHI SIGNALS
Units of Measure - Fresnel Zone
• Fresnel Zone
101
BELDEN
SENDING All IKE RIGHT SIGNALS
Units of Measure - Fresnel Zone
• Formula:
R = 0.5 x V( A x d)
- 4km -
5GHz
Since the radius of the Fresnel Zone in this example is 7 meters, our antennas would need
to be located at least 7 meters above the highest obstruction in the RF path. This ensures
there will be no interference from reflections and diffractions.
102
: dI>1: Units of Measure - Fresnel Zone
M
Fresnel Zone
- 4km -
5GHz
103
BELPEN
SENDING All IKE RIGHT SIGNALS
Units of Measure - Fresnel Zone
• Formula:
E = d2 x 0.0147
E = 42 x 0.0147
E = 0.24
- 4km —
5GHz
Earth Curvature
We find that the average earth curvature is almost 1/4 meter. We must add this to the
Fresnel Zone calculation for our overall mast height.
104
Units of Measure - Fresnel Zone
Mast Height
^
5 GHz
Earth Curvature
105
l|Li|N Link Budget Calculations
• Link Budget
Link Budget planning is an integral part of designing a point to point RF system. Along with
link budget planning, you will use most of the fundamental units and formulas that have
been covered so far.
106
M Link Budget Calculations
•Link Budget
Before we begin a link budget calculation, we have to have an idea of how much cable will
need to be used between the access point and antenna, attenuation factors of the cable,
surge arrestors and other devices in the hard-wired link. As well as a data sheet for the
access point listing the receive sensitivity for the various available data rates and the
output powers available for the available channels/frequencies.
It is recommended to do a link budget calculation before purchasing any equipment for the
application, as there are quite a few variables that can effect the performance and
reliability of the RF link.
107
SENOING AU THE RIGHT SIGNALS
TOPOLOGIES/ USES
108
Topologies
t;
mo
109
mmm Topologies ( roaming clients , AGV’s,
forklifts...)
M— — (Siy
<em
^
< l
110
mmm Topologies (roaming clients , AGV ’s,
forklifts...)
^^ Tr
77
7 Lu
(?
4 pi) pi) ii
jfd» .
4
^ ^
(i
ii
111
N Multiple SSID’s
112
m L. Multiple SSID’s
SENDING All THE HIGH! SIGNALS
Multiple SSID’s
SSID: Production SSID: Public
Frequency: 2.4GHz Frequency: 2.4GHz
Channel: 1 Channel: 1
Encryption: WPA/AES Encryption: WPA/AES
Encryption key: Encryption key:
supersecure kindofeasytoremember
MCC
SSID: Accounting
( Master )
SSID: Engineering
Frequency: 2.4GHz
Frequency: 2.4GHz
Channel: 1
Channel: 1
Encryption: WPA/AES
Encryption: WPA/AES
Encryption key:
Encryption key:
acavemancouldrememberit
i: supercrypticandrandom
113
SENDING All THE BIGHt SIGNALS
Multiple SSID’s
Network table -- - -
IT P2P 1 4: Pont to Pont 1 4 (No)
1r P2P -1 S: Pont -to -Pont 1 •S (No)
-
This table holds VLAN -related configuration <ems for every port y P2P -1-6: Pont -to -Pont 1 - 6 (No)
OK Cancel the device has y P2P -2-1: Pont -to -Pont 2 1(No)
Port table r y P2P -2-2:Pont -to-Pont 2 2 (No)
T -- - -
P2P 2 3: Pont to Pont 2 3 (No)
VLANtaggng mode 8100
--
T P2P - 2 4: Pont -to -Pont 2 •4 (No)
-
T P2P -2 S: Pont -to Pont 2 •5 (No)
- - - -
'S~ P2P - 2 6: Pont to Pont 2 8 (No)
ft Network 2 (No)
WPA or Private WEP settings
Network 3 (No)
Interface Encryption Method / Key 1 Key 1/passphrase WPA session key type WPA version Authentication DefaJt key dent EAP m < > CK Network 4 (No)
Network 5 (No)
--
Wreless LAN 2 Network 1
Wreless LAN 1 Network 2
Activated
Activated
WEP 128 (104 bit)
WEP128 (104 bit)
0x 149827654381286583492736402 TKIP /AES
L008063FCF 350 TKIP /AES
WPAl
WPA1
Open system
Open system
Key 1
Key 1
US
TLS
Cancel Network 6 (No)
Wreless LAN 1- Network 3 Activated WEP128 (104 bit) L008063FCF 350 TKIP /AfS WPA 1 Open system Key 1 TLS Network 7 (No)
Wreless LAN 1 - Network 4 Activated WEP128 (104 bit) L008063FCF 35D TKIP /AES WPA1 Open system Key 1 US Network 8 (No)
l< I
-
Wreless LAN 1 Network S Activated WEP128 (104 bit) L008063FCE 35D TKIP /AES WPAl Open system Key 1 TLS
>
iv
Network 2 (No)
Network 3 (No)
Edit ... Network 4 (No)
Networks (No)
'i~ WLAN-2-6: Wreless LAN 2 - Network 6 (No)
T" WLAN- 2 -7: Wreless LAN 2 •Network 7 (No)
'3“ WLAN -2 -8: Wreless LAN 2 - Network 8 (No)
These functions can be used to spread or allocate bandwidth to certain devices, limit
access to certain resources and safely provide support for legacy devices (WEP).
114
m L. Multiple SSID’s and VLAN’s
SENDING All THE HIGH! SIGNALS
•»
SSID: Accounting
SSID: Engineering
Frequency: 2.4GHz
Frequency: 2.4GHz
Channel: 1
Channel: 1
Encryption: WPA/AES o tD
Encryption key: ' Encryption: WPA/AES
Encryption key:
acavemancouldrememberit
VLAN3900 C supercrypticandrandom
VLAN200
115
BELDEN Topologies
5GHz
LANA LAN B
B
116
Topologies
\
Slave
L *
z
Slave
4r
Slave
117
BELPEN
SENOING AU THE RIGHT SIGNALS
Topoloqies
U
I
54 Slave
Master
Maste
Slave
Video Server
118
BEIXEN
StNCUNG AU IHE BtGHl SIGNALS
Topologies
Slave Slave
Master | Master |
Master
/ 4
%
> \
Slave
i
%* T *1
|
M
Slave
r »|
[
119
Topologies
5GHz Backbone
4 H
r
Wireless
Repeater
/
Remote Remote
fl
LAN
PLC PLC
120
SENOING AU THE RIGHT SIGNALS
SECURITY
121
BELDEN
SENDING AU THE RIGHT SIGNALS
Security
»
MB
Security features:
* Access-control list
Closed network
WEP
802.1x / EAP
802.11
IPSec
WPA /TKIP
^3
802.11i/AES ( WPA2 )
LEPS
WAN
122
JEN ACL
123
N Closed network
124
M Weaknesses of ACL and closed network
125
WEP (wired equivalent privacy)
126
Structure of WEP encryption
XOR
IV encrypted data
127
N Weaknesses of WEP
128
: dI>1: 802.1x / EAP
M
129
N 802.1 x / EAP
130
IEEE 802.1x/EAP with WEP / WPA /IEEE
802.11i fWPA 9) r * —
Authentication o
EAP-over-LAN
using •4 (EAPOL) 4
RADIUS, Supplicant
802.1x / EAP
•* ** •*
131
BELDEN
SENDING All IKE RIGHT SIGNALS
IEEE 802.1x/EAP with WEP
Client RADIUS-Seiver
5> )
WLAN login
EAP/802. Ixjchallange
- — M
session-key
new session-key
132
m L. Structure of IEEE 802.1x /EAP check
SENDING All THE BIGHt SIGNALS
r* li;-3a
'
A
V EAPoL- TLS
4: Oient
Certificate
WEPikey rollever
*
' LAN Switch
EAPcver RADIUS"
33?
tr- ^KJ
m1 If
' III
' Servers & Printers
Certification RADIUS
Authority Authenticator Server
(user database)
Server
Certificate
133
WM IEEE 802.1x/EAP security
134
Nj IEEE 802.1x/EAP methods
135
BELDEN
SSNOtNG AU THE BIGHT SIGNALS
Integrated Radius server 802.1x
RADSEC service
authorized users to RADSEC port fo
other access points. RADIUS/RADSEC dents
The data ot the cfcents which shal be communeate with the
server can be entered at the folowng table
Clients |
I User database
The data ot the users which shal be authenticated by the
server can be entered at the folowng table
h HWSCHMANN OK | Abbrechen
136
BELDEN
StNOMCAUlHEBtSHTSICNAlS
Integrated Radius server access control list
**
Fler function
information on C Hter out data from the Isted stations, transfer al other data
(
• transfer data from the listed stations, authenticate al other
authorized users to data via RADIUS or Nter it out
..
Stations. I
other access points.
Authentication via RADIUS
Server IP address: |141 1 1.1
Server port: |l.812
Shared secret: r
Source IP address: ||NTRANET 3
Backup server IP address: 1192168 2001
Backup server port: M.812
Backup server secret: r
Source IP address: |DMZ
h MinSCMMAHN | OK | Abbrechen |
137
IPsec over wireless LAN
138
WPA (WiFi protected access)
139
BELCEN TKIP ( temporary key integrity protocol)
140
IEEE 802.11i (WPA 2 )
WPA2 and IEEE802.11i differ. WPA2 was invented again from the WiFi alliance after
the IEEE 802.11i standard was ratified. The HiLCOS based devices support both
authentication methods
141
IEEE 802.11i (WPA 2 )
142
Nj WPA - IEEE 802.11i ( WPA 2)
IEEE 802.11i
WPA version WPA
(WPA 2)
Authentication PSK PSK
Personal
mode Encryption TKIP/ MIC AES-CCMP
802.1x/
Authentication 802.1x/ EAP
Enterprise EAP
mode
Encryption TKIP/ MIC AES-CCMP
143
BELDEN
SENDING All IKE RIGHT SIGNALS
IEEE 802.11i - client to AP
Authentication process:
• Encrypted exchange of
PSK
Pre-Shared
Key.: ******* • Establishment of
encrypted connection
• AES hardware
Pre-Shared / \ Pre-Shared encryption (128bit)
******* \ *******
• Each connection
receives a session key
ID ?
and is thus secure
Pre-Shared
| 0y .
*******
^ ;»
LAN /
Internet
144
Nj IEEE 802.11i - client to AP
Authentication process:
• Encrypted exchange of
PSK
• Establishment of
encrypted connection
• AES hardware encryption
(128bit)
• Each connection receives
a session key and is thus
riDOK?) secure
—
I
L ^jFgjsessionjSgyX,^^
i rZ )
C Internet
^
145
M Security in a wireless LAN
146
Nj Migration from WEP to IEEE 802.11i
147
BELDEN
SENDING AU 1HE RIGHT SIGNALS
Migration
^
from WEP to IEEE 802.11i
Up to 8 SSIDs per wireless LAN interface are possible. This infrastructure can be
facilitated by VLAN tagging in order to assign user groups to the appropriate
security level.
WEP128 security,
to connect as
many
clients as ^ 3
/ ,
possible./ **
*
Maximum security
through 802.11i / AES
< Sy
SP' in
WPA / TKIP acceptable Open network will
security with high encryption.
performance for clients
without AES support.
Bild ersetzten
148
Questions?
149