INTRODUCTION
Internet is arguably the most vital and central infrastructure for the daily economic life of every citizen. Few technological enhancements hold as much potential to change the productivity, come up with jobs and enhance life quality of many internet users. With wireless services that are growing by the day, there is a need to have wireless networks. Wireless networks are becoming essential services for many people. With wireless networks comes security. Security is an important factor when connectivity is concerned. Important data is stored in devices that are connected. The whole is advancing to the transforming from the dial up connection to the high-speed broadband internet. This transformation is known as broadband revolution and its effects are immense if utilized in the right manner. Innovations in mobile computing are coming with the promise of delivering internet in amazing speeds. The same is happening to personal computers as individuals take advantage of the improved speeds of internet connection. According to bandwidth is defined as the factor that determines the internet speed of a connection. This quantifies the data that enter into a network in a given time. Usually bandwidth is measured in bits per second. Therefore, an improved data flow in a network signifies a better internet connection and vice versa. Broadband connections provide improved speeds of up to 300 Kbps in contrast with dial up connections that can offer a maximum of 53Kbps. Thus while, sitting in an office utilizing a maximum of 56Kbps modem speeds, time is not only wasted while trying to access the internet but also the resources and the wasted chance of the broadband revolution. In that perspective, the this paper seeks to explore the network design and hardware that makes up the design, transmission media and protocols for implementing the design of a Wireless connection on my office to better the internet connection speeds and optimizing the quality of service. The broadband connection is essential because, unlike, the dial up mechanism, internet connection is initiated by just a double click on the internet browser. Dial up connection require the dialing of a specific number every time an internet connection need to be initiated. The time span of broadband connection is not more than a few seconds compared to a dial up connection.
DESCRIPTION
Broadband internet technology is best chosen by considering the data range of applications. Choosing the right kind enables the user uninterrupted internet speeds.
Wireless broadband access
Wireless network is the latest internet connection technology that utilizes radio signals and air medium for transmission. It provides affordable broadband connectivity and freedom to home or office users. Wireless broadband has the extra advantage of providing high speed internet connectivity without the use of physical cables used in the DSL or digital cable transmission. Wireless connection is mostly useful for laptop users who can change positions in an office while being connected at the same time. They are two kinds of wireless connections that can be chosen from. Mobile broadband is a type of wireless internet connection provided via mobile phone signal. It is synonymous to the mobile internet. Some devices can provide broadband internet access by simply plugging in to the computers. The most prevalent broadband devices are mobile phones, data cards and mobile dongles. Some manufactures have also designed laptops that support 3G and therefore can facilitate internet access. Mobile broadband is currently a technology to watch because of its unique components of on the go internet provision. Basically, mobile broadband is the wireless communication or internet access that is obtained via portable device or a modem.
The mobile broadband uses the third generation network services. This implies that both high speed upload packet access and high speed download packet access technologies are used. The technology uses mobile infrastructure and cellular network. Some of the network standards used utilized my mobile broadband are CDMA, GPRS, WiMAX, UMTS, HSPDA and HSUPA.
- Ad-hoc/Peer-to-peer mode
An ad-hoc or peer-to-peer network is comprised of devices (computers) that can communicate to each other in a direct manner using a central access point or a wireless router. The devices in a wireless ad-hoc connection should have Wi-Fi capability. Thus in case of personal computers in an office, they can be connected top communicate wirelessly through the use of Wi-Fi network adapters.
- Infrastructure mode
This mode is possible with a wireless Access Point or router. The infrastructure mode is used for the connection of multiple wireless network devices in a predetermined range of the area of coverage. The interaction is attained through wireless nodes via an antenna. The wireless access point converts the wired Ethernet data by the use of a bridge that has been located in between the wired LAN and the clients using wirelss spectrum. In order to extend the wireless network coverage, multiple access points are connected via a wired Ethernet backbone. Thus in the office, a user who moves out of the range of one access point will utilize the range of the other. This roaming is seamlessly attained using the Access point domains.
HARDWARE CONFIGURATION
Hardware is the computer components that would be assembled to ensure internet connection. This is in the form of modems and routers among other components. The term modem refers to the device that modulates and demodulates signals that are analogue in nature so that they are able to encode digital information and demodulate the signal to decode the information. Thus, modems convert data which are wireless to radio signals and vice versa. Wireless networking is a mechanism where all the computers in a room are connected to the internet through a wireless network. The wireless network referred to uses radio signals instead of cables to connect each computer to the internet. The wireless connectivity is facilitated by a wireless router that sends signals to each computer using radio signals. The components of a wireless network consist of the following;
• Wired network
• Access point or wireless router
• Client device
• Repeater
Wireless router/Access point
Wireless router performs the functions of authorizing and control of the client devices connection to the wired network. It controls the speed, security features, and devices accessing the network among other functions. Technically, it is the backbone of the Wi-Fi network.
Residential gateways and routers are advanced forms of base stations that promote additional network functionalities. Gateways have the same functions as routers such as access control and application connectivity while routers differ by enabling multiple computer connection on a single broadband connection.
Access controllers are physical devices residing on the wired component of the network and between access points and the protected part of the network. Their main purpose includes the provision of centralized intelligence behind the access points to monitor traffic of the open wireless networks and other resources. This feature is usually implemented in the absence of Quality of Service, and enhanced security and roaming mechanisms for the wireless network standards.
There are two kinds of wireless routers standards, 802.11b and 802.11g. Both of these standards can transmit data at 54Mbps. Data is encoded in a direct-sequence spread spectrum DSSS and transmitted in the unlicensed radio spectrum of 2.5GHz. 802.11b has a maximum transmission rate of 11Mbps, but 802.11g has various auto rate sensing rates of up to 108Mbps. For maximum data rates, the 802.11g standard is chosen.
An example of a wireless router is the Minitar Router Point MWNAPR-1 founded on the 802.11n wireless technology. It is a standardized reliable router that supports optimum rates of up to 300Mbps. It has a WAN interface and an in built NAT that allow multiple PCs to share internet connection. Other notable features include advanced MIMO technology and VPN pass through.
Wired network
Internet connectivity through an ISP is made available to the wireless networks through the Ethernet connection to the router or modem. Ethernet is the standard networking design for home or business users. Ethernet utilizes the CAT5, CATe or CAT6 cables to connect to the LAN.
NIC card
Network interface card is the device that provides the interface between the computer device and the Wi-Fi network infrastructure. It is an inbuilt device in most computers but also available as an external network device that can be plugged and remains outside the computer. This is the case for desktop computers. The NIC card interfaces the wireless network infrastructure of compatible wireless standard. For instance, a LAN NIC will only implement 802.11b standard. Therefore, it is of note for users to choose a compatible network infrastructure and the standard. There are different form factors that are considered to ensure that the chosen NIC complements with the computer device. This includes the industry-standard architecture, the peripheral component interconnect, PC card, MiniPC-1 and CompactFlash.
The NIC within the user’s computer will connect to the nearest access point thereby providing the interface with systems within the infrastructure as well as other user’s linked with other access points. A the user relocates to a position out of one access point and into the range of another the NIC automatically initiates a connection with the closest AP in order to sustain reliable communication.
It is a device that bridges the wireless connection into wired connection. Client bridge works in the reverse mechanism of the access point. This component takes the wireless signal and reverses it into the wired connection to be used by devices that do not support wireless connection. For example, a printer in the office that does not support wireless connection can be made useful by the use of a client bridge. Printers and Xbox can be connected to the network without the use of CAT5 Ethernet cables through the use of client bridge devices.
Repeater
Repeaters function as client bridges, but instead of bridging the wired connection, they bridge another area of a wireless network. In a large office space, a repeater is necessary to extend the wireless link to de ices around the repeater. Repeaters are important in an office setting to extend the wireless signals to distant devices, but the bandwidth and speed are sacrificed. Repeaters use double the bandwidth of a normal client device because it has to capture the information and forward it out of the channel that it received it.
Wireless Antennas
Access points require Wi-Fi antennas to increase the communication range of the wireless radio signals. Usually the antennas are optional and can be removed if a broader signal range is not desired. When need arises, aftermarket add-on antennas are mounted to widen the wireless range of wireless adapters.
TRANSMISSION PROTOCOL
Multichannel Multipoint Distribution system is an analog-based technology that was designed to provide broadband connectivity to small home and office users. It consists of a head-end that is responsible for receiving data from an ISP. The data will be converted into 2.1 and 2.7GHz frequency range and forwarded to microwave towers. The signals are received by the antennas located at the office and home roof tops. From the antenna, the signals are routed to the gateway where re-routing is done to the various devices connected in the network. Local point distribution service functions in the same manner through the propagation of signals via short RF range to multiple users.
Wireless Metropolitan Network is the transmission mechanism developed by IEEE to set up the 802.16 working group. A wireless MAN provides connections through antennas situated in the roof of buildings that are in communication with central radio stations of the service provider. Users in the building will be connected to the wireless MAN through the wireless LAN.
Wireless WAN
The original wireless standard used in wireless communication is the IEEE 802.11. This standard was developed in 1997 and it uses the 2.4GHz ISM band. The data rate attained is 2Mb/s. Further technologies emerged afterwards including 11a and 11b. 11b is the most common system utilized in wireless broadband connection and has 2.4GHz backward compatibility. 11g on the other hand has a 54Mbits/s and uses 2.4GHz band with backward compatibility with 11b version.
PROTOCOL DESCRIPTION
The 802.11 standards originated from IEEE and include different versions that are defined by high-speed communication protocols. 802.11b defines the industry standards for wireless communication via the Ethernet. It is low cost and is therefore preferred among home users. 802.11a improved on the performance of 802.11b with improved speed but is more expensive. 802.11n is the high-speed standard that replaces all the other standards with an improved speed of up to 100Mbps. 802.11n is the preferred standard for high speed connections. It will also offer better signal range in the office environment. It has better throughput, reliability speed and better distance coverage. 802.11n is rated 300Mbps at optimum speeds and is compatible with most hardware configurations of most computers.
The security protocols that are in place to protect broadband wireless connection include WEP,WAP and WAP2. Generally, wireless networks are inherently insecure and therefore sufficient security is essential in order to ensure data integrity, availability and privacy. The broadcasting mechanism of wireless networks makes it potentially dangerous to work with.
Wired Equivalent Privacy
This is the original encryption protocol for wireless networks. It uses the same level of protocol as wired networks but is generally difficult to configure and easily bypassed.
Wi-Fi Protected Access
This protocol was introduced as a security enhancement over WEP during the development of 802.11i security standard. It uses a pre-shared key and a temporal key integrity protocol as an authentication server key.
Wi-Fi Protected Access version 2
This is an improvement of the 802.11i security standard having the Advanced Encryption Standard for encryption. Thus it is superior to WPA and the most favored security standard for this project. Its security features are sufficient to protect sensitive computer data and privacy concerns.
In order to product wireless computers and information contained in it, the most secure step involve the reconfiguration of the default wireless router settings to safeguard the system from the hackers who have gained access to default information of most wireless router companies. Strong passwords are also essential for total protection of the system in addition to firewalls and antivirus software’s. Other measures such as updating the antivirus software’s and shutting down the computer when not are use is beneficial in keeping hackers and sniffing devices out of the computers. In order to secure personal data on the computer systems while using public wireless networks, it is recommended that file sharing features are disabled at all times.
LEARNED LESSONS
In summary, in order to set up speedy connection for office use, the devices required include routers, bridges, and access points. Furthermore, communication protocols are defined. The 802.11n protocol is the preferred choice to provide high speed connectivity and improved security features. Examples of wireless router companies include D-Link, Netgear and Belkin among others. This devices are plugged into the Ethernet cables to act as hub of the wireless network from which radio signals are broadcasted to other devices through the use of access points. The signal can be extended in range by use of the bridges. NIC provides the interface for wireless connection. Most of the personal devices have in-built NICs but external adapters are available from their party vendors. NICs are relatively cheap and have easy installation processes.
Bluetooth is the next wireless technology that has gained major milestones in the past. It is essentially used to transfer information between devices. Future advancements in this line will allow the use of cheap radio waves to share data and information for home and business users. In spite of the security concerns relating to privacy, it is one of the leading ultra-wideband modulations that permit the transmission of very-short duration pulses at extremely high bandwidth values. The recent developments for the standardization of this technology for public and commercial use is on-going and future improvements may imply that UWB will be the next best technology to substitute all wireless technologies. UWB operates under low power and with little interference on other devices thus it is the preferred alternative for the future. In addition, it has the capability to connect all the multimedia devices at home and in the workplace.
Reference
Dean, T. (2009). Network+ Guide to Networks. Cengage Learning.
Deborah Morley, C. S. (2009). Understanding Computers 2009:. Cengage Learning.
Haley, E. P. (2006). Over-the-Road Wireless For Dummies. John Wiley & Sons.
Miller, M. (2011). Special edition using the Internet and Web. Que Publishing.