260 likes | 287 Views
新世代無線網路新趨勢 . Pogo Tsai Brand Marketing Division pogo@acctran.com.tw. First Release Date 2002/09/12 Last Modify Date 2002/09/12. WW WLAN Market Trend. WLAN growth up to 60% in 2001 33.4% CAGR growth expected through 2005. Source: IDC, Feb-2002 Unit: thousand.
E N D
新世代無線網路新趨勢 Pogo Tsai Brand Marketing Division pogo@acctran.com.tw First Release Date 2002/09/12 Last Modify Date 2002/09/12
WW WLAN Market Trend WLAN growth up to 60% in 2001 33.4% CAGR growth expected through 2005 Source: IDC, Feb-2002 Unit: thousand
Wireless LAN System MarketComparison of WLAN Market Forecasts WLAN market: a fast growing market Mio units
WLAN Chipset Standard US$M Source: Cahners In-Stat/MDR, 3/2002
Wireless LAN Applications Enterprise Wireless Ethernet Datarate: 11- 54 Mbit/s Vertical Inventory ControlDatarate: 1-11 Mbit/s Wireless LAN ConsumerDatarate: 11- 54 Mbit/s Wireless Bridges Datarate: 11- 54 Mbit/s
902MHz North & South America 902 928 Americas, most of Europe 2.4GHz Japan Spain 2400 2440 2480 2500 France Unlicensed Operation RF Bands • 902MHz • 26MHz BW • Crowded • Worldwide limited • 2.4GHz • 83.5MHz BW • Available worldwide • IEEE802.11 WLANs • 5.1GHz • 300MHz BWdiscontinuous • Developing 5.1GHz Source: Harris Semiconductor U-NII U-NII Japan* Europe HiperLAN2* Europe HiperLAN1 5100 5200 5300 5400 5500 5600 5700 5800 5900 U-NII: Unlicensed National Information Infrastructure *Frequency Allocations are pending
IEEE 802.11x Standard Source: Envara
802.11a 的優勢 – 涵蓋率及速度的比較 100 Rate (Mbps) 802.11a 50 50 45 40 0 AP 35 -50 ft 0 ft 50 ft 100 ft 200 ft 150 ft 30 100 25 802.11b 20 50 15 10 5 0 AP 0
802.11a 的優勢 – SMC 802.11a Turbo Mode • 在不需完全用掉 802.11a 不互相干擾的 8 個 Channel 時, SMC 能把 8 個 Channel 結合成為 3 個 72Mbps 的 高速Channel 運作 Turbo 36 40 44 48 52 56 60 64 42 50 58 3 40MHz Channels 8 20MHz Channels
~5x ~3x 802.11a 的優勢 – Data Rate 的比較 • SMC 802.11a’s supported link rates that are 2 to 5 times • 802.11b at the same distance when tested to 225 feet . Data Link Rate (Mbps) Optimal Data Link Rate in Office Environment Range (ft)
Independent Basic Service Set (IBSS) Extended Service Set (ESS) IEEE 802.11 Topology BSS 1 IBSS AP Distribution System AP ESS BSS 2
Roaming (Inter Access Point Protocol) • Any wireless client moving from one BSS (Basic Service Set) to another BSS required a handover process to remain its connection. • IAPP is an official protocolproposed by IEEE 802.11 group to provide the “reassociation” between APs Purpose:To make access point devices from different vendors to interoperate across a network to keep connection/session alive.
Wireless Bridge Wireless Bridge Master Bridge Access Point AP AP Ethernet Ethernet Ethernet Bridging Access Point • Point to Point • Point to Multi-point
Associate EAP Identity Request EAP Identity Response EAP Identity Response EAP-Success Authentication traffic Normal Data Security: 802.1X Model AP Authentication Server STA EAP Auth Request EAP Auth Request EAP Auth Response EAP Auth Response EAP-Success Port Status:
Market: Indoor Infrastructure For Home, SoHo, Enterprise Access Point Wireless PCI Adapter USB-Wireless Adapter Wireless PC Card Mini-PCI Adapter Wireless Gateway Wireless Broadband Router
3/1/2002 In-Stat: Public Area Access, Hot-spot locations(airport, shopping mall, coffee bars, hotel) in US will grow from 3,700 to 41,000 by 2007, Over 21 million users, generates over U$3 billion in service revenues.(from $1.1m in 2000) Market: Public Hot-Spot Internet Secured IP Enterprise Group Airports, Hotels, Cafes, Restaurants, … Control Gateway Billing Systems ( Access, Authentication, Accounting) Access Point User
Problem: external connection to the Internet Solution: protect the network with a firewall Problem: traffic flowing through public Internet Solution: put the traffic through an encrypted tunnel attack attack attack attack Security and The Internet Connection Internet Corporate Network Corporate Network
You need firewall and encryption here! But remember that users move from here to here to here .. The Blurry Edge! The Wireless Effect Internet Corporate Network
SMC WLAN Security System 的認証原理與架構 Client appears, requests network access CORPORATE LAN Access Manager asks Control server for ok and appropriate rights Authentication Server INTERNET Control Server requests login information from client Control Server/ Rights Manager Access Manager Access Manager Control Server authenticates user via customer’s authentication server Control Server gives user rights to Access Manager for enforcement Client proceeds with network activity
SMC WLAN Security System 的漫遊機制 Client has an active session CORPORATE LAN Client moves to a new Access Manager Authentication Server INTERNET Access Manager verifies user existence and rights with Control Server Control Server/ Rights Manager Access Manager Access Manager Control Server coordinates Access Manager-to-Access Manager communication Existing sessions maintained via tunnels New sessions connected via new Access Manager
Market: Outdoor Backbone • Internet Access Anywhere • Fixed Wireless Broadband Network • Last Mile Connection
*Receiver* A/V Converter (802.11a) Application: Home Entertainment *Sender* Set-Top-Box (802.11a) Internet Internet Movie Consumer Electronics/Home Networking 5GHz for streaming multiple video channels around the house: TV, gaming machines, PCs, video, stereo systems can all interconnecting without wiring systems Projector
Homes Businesses Fiber Campus Fiber Public Access Fiber Application: Metro Area Network