Friday, May 6, 2011

Network operations center

A network operations center (or NOC, pronounced like the word "knock") is one or more locations from which control is exercised over a computer, television broadcast , or telecommunications network.

Large organizations may operate more than one NOC, either to manage different networks or to provide geographic redundancy in the event of one site being unavailable or offline.

NOCs are responsible for monitoring the telecommunication network for alarms or certain conditions that may require special attention to avoid impact on the network's performance. For example, in a telecommunications environment, NOCs are responsible for monitoring for power failures, communication line alarms (such as bit errors, framing errors, line coding errors, and circuits down) and other performance issues that may affect the network. NOCs analyse problems, perform troubleshooting, communicate with site technicians and other NOCs, and track problems through resolution. If necessary, NOCs escalate problems to the appropriate personnel. For severe conditions that are impossible to anticipate – such as a power failure or optical fiber cable cut – NOCs have procedures in place to immediately contact technicians to remedy the problem.

NOCs are frequently laid out with several rows of desks, all facing a video wall, which typically shows details of highly significant alarms, ongoing incidents and general network performance; a corner of the wall is sometimes used for showing a news or weather TV channel, as this can keep the NOC technicians aware of current events which may have an impact on the network or systems they are responsible for.

The back wall of the NOC is sometimes glazed; there may be a room attached to this wall which is used by members of the team responsible for dealing with serious incidents to meet while still able to watch events unfolding within the NOC.

Individual desks are generally assigned to a specific network, technology or area. A technician may have several computer monitors on their desk, with the extra monitors used for monitoring the systems or networks covered from that desk.

NOCs often escalate issues in a hierarchic manner, so if an issue is not resolved in a specific time frame, the next level is informed to speed up problem remediation. Many NOCs have multiple "tiers", which define how experienced/skilled a NOC technician is. A newly-hired NOC technician might be considered a "tier 1", whereas a technician that has been there for several years may be considered a "tier 3" or "tier 4". As such, some problems are escalated within a NOC before a site technician or other network engineer is contacted.

Additionally, the NOC staff may perform extra duties; a network with equipment in public areas (such as a mobile network Base Transceiver Station) may be required to have a telephone number attached to the equipment for emergencies; as the NOC may be the only continuously staffed part of the business, these calls will often be answered there.

The term NOC is normally used when referring to telecommunications providers, although a growing number of other organizations such as public utilities (e.g., SCADA) and private companies also have such centers, both to manage their internal networks and to provide monitoring services.

The location housing a NOC may also contain many or all of the primary servers and other equipments essential to running the network, although it is not uncommon for a single NOC to monitor and control a number of geographically dispersed sites.

Saturday, April 30, 2011

BlackBerry

BlackBerry is a line of mobile e-mail and smartphone devices developed and designed by Canadian company Research In Motion (RIM) since 1999.

BlackBerry phones function as a personal digital assistants and portal media player. BlackBerry phones are primarily known for their ability to send and receive (push). Internet e-mail wherever mobile network service coverage is present, or through Wi-Fi connectivity. BlackBerry phones support a large array of instant messaging features, including BlackBerry Messanger.

BlackBerry commands a 14.8% share of worldwide smartphone sales, making it the fifth most popular device manufacturer after Nokia,Samsung,LG and Apple. The consumer BlackBerry Internet Service is available in 91 countries worldwide on over 500 mobile service operators using various mobile technologies.

Modern GSM-based BlackBerry handhelds incorporate an ARM 7, 9 or ARM 11 processor, while older BlackBerry 950 and 957 handhelds used Mudit 80386 processors. The latest GSM BlackBerry models (9100, 9300 and 9700 series) have an Intel PXA930 624 MHz processor, 256 MB (or 4 GB in the Torch 9800) flash memory and 265 MB SDRAM. CDMA BlackBerry smartphones are based on Qualcomm MSM6x00 chipsets which also include the ARM 9-based processor and GSM 900/1800 roaming (as the case with the 8830 and 9500) and include up to 256MB flash memory. The CDMA Bold 9650 is the first to have 512MB flash memory for applications. All BlackBerrys being made as of 2011 support up to 32 GB microSD cards.

File:Blackberry Storm.JPG


The first BlackBerry device, the 850, was introduced in 1999 as a two-way pager in Munich, Germany. In 2002, the more commonly known smartphone BlackBerry was released, which supports push e-mail, mobile telephone, text messaging, Internet faxing, Web browsing and other wireless information services. It is an example of a convergent device. The original BlackBerry devices, the RIM 850 and 857, used the DataTac network.

BlackBerry first made headway in the marketplace by concentrating on e-mail. RIM currently offers BlackBerry e-mail service to non-BlackBerry devices, such as the Palm treo, through its BlackBerry Connect software.

The original BlackBerry device had a monochrome display, but all current models have color displays. All models except for the Storm, series had a built-in QWERTY keyboard, optimized for "thumbling", the use of only the thumbs to type. The Storm 1 and Storm 2 include a SURE TYPE keypad for typing. Originally, system navigation was achieved with the use of a scroll wheel mounted on the right side of phones prior to the 8700. The trackwheel was replaced by the trackball with the introduction of the Pearl series which allowed for 4 way scrolling. The trackball was replaced by the optical trackpad with the introduction of the Curve 8500 series. Models made to use iDEN networks such as NEXTEL and Mike also incorporate a push-to-talk (PTT) feature, similar to a two-way-radio.

Operating System

The operating system used by BlackBerry devices is a proprietary multitasking environment developed by RIM. The operating system is designed for use of input devices such as the track wheel, track ball, and track pad. The OS provides support for Java MIDP 1.0 and WAP 1.2. Previous versions allowed wireless synchronization with Microsoft Exchange Server e-mail and calendar, as well as with Lotus Domino e-mail. The current OS 5.0 provides a subset of MIDP 2.0, and allows complete wireless activation and synchronization with Exchange e-mail, calendar, tasks, notes and contacts.,

Third-party developers can write software using these APIs, and proprietary BlackBerry APIs as well. Any application that makes use of certain restricted functionality must be digitally signed so that it can be associated to a developer account at RIM. This signing procedure guarantees the authorship of an application but does not guarantee the quality or security of the code. RIM provides tools for developing applications and themes for BlackBerry. Applications and themes can be loaded onto BlackBerry devices through BlackBerry App World, Over The Air (OTA) through the BlackBerry mobile browser, or through BlackBerry Desktop Manager.

CPU

Early BlackBerry devices used Intel 80386-based processors. BlackBerry 8000 series smartphones, such as the 8700 and the Pearl, are based on the 312 MHz ARM XScale ARMv5TE PXA900. An exception to this is the BlackBerry 8707 which is based on the 80 MHz Qualcomm 3250 chipset; this was due to the PXA900 chipset not supporting 3G networks. The 80 MHz processor in the BlackBerry 8707 meant the device was often slower to download and render web pages over 3G than the 8700 was over EDGE networks. In May 2008 RIM introduced the BlackBerry 9000 series which are equipped with XScale 624 MHz processors. The BlackBerry Curve 8520 features a 512 MHz processor, while the Bold 9700 features a newer version of the Bold 9000's processor, but is clocked at the same speed

Thursday, April 21, 2011

Design and implementation of the Virtual LAN

Virtual LANs (VLANs) are used to break up broadcast domains in a Layer 2 switched internetwork. As VLANs promote efficient use of network resources, it is wise to beef up your knowledge of this technology. In this Daily Drill Down, I will explain how to implement the VLAN technology using Cisco routers and Layer 2 switches.

The collapsed-backbone network
A common LAN network design implemented in the last 10 years or so is called a collapsed backbone. Basically, it connected all floors or rooms in a building to a network where the company's shared servers were located. The typical collapsed-backbone network would look something like Figure A.



Fiber Distributed Data Interface (FDDI) works great as a backbone.

Here you can see that all floors of the building use a fast transport called Fiber Distributed Data Interface (FDDI) as a backbone. FDDI has been around for many years and it works great. The bad news with FDDI comes in the form of expense. In this network, FDDI was connected to the server room on the first floor and created connection points to each floor in the building. Since FDDI is a physical-ring topology, the fiber must connect from the first floor to each consecutive floor and then finally back to the first floor again. A second ring provides redundancy, if warranted.

Each floor has a 10BaseT hub connecting via a twisted-pair cable to the desktop. All this was just peachy and worked beautifully until users started using their desktop PCs for more then just a simple print job or small (<1 MB) file transfers. In the mid 1990s, this design began to result in ghastly network bottlenecks because not only is this network a huge broadcast domain, it's one enormous collision domain as well. That's because FDDI is only a physical-layer topology; it doesn't break up collision or broadcast domains.

The popular solution to this dilemma was the practice of installing bridges on each floor. The new design looked like Figure B.


When each floor has a separate collision domain, network traffic will improve significantly.

Each floor is now a separate collision domain, which really helped—for a while. But look again—this network is still one immense broadcast domain. As networks grew and more and more network services became available to users, this design became saturated, resulting in lame response time for the users. But by the mid 1990s, Cisco routers became more cost-effective. (Prior to that, they were cost prohibitive for smaller companies, even though they had been available since the late 1980s.)

With the advent of router affordability, the solution to the monstrous broadcast domain issue was to use a Cisco router to break up both collision and broadcast domains. The new and cool network now looked like the one shown in Figure C. The fiber was not discarded but used in point-to-point connections from each floor to the router.


A single router has replaced all the bridges.

In this network, a single router has replaced the bridges. For many years, I would still find bridges installed at my clients’ locations because the administrators didn't understand the purpose of installing a router—that the router breaks up collision and broadcast domains and that this replaces bridges; it doesn't just add to their functionality. In fact, the bridge, if left in the network, only slowed the network down (created latency issues).

A single router connecting all the floors really worked. As long as users kept their data on the local network 80 percent of the time and only crossed the router 20 percent of the time or less, response time truly soared. This type of network design was implemented worldwide, and Ethernet became the de facto standard that ran to each desktop. But for this design to work properly, that 80/20 rule had to be observed. If the network traffic crossing the router exceeded 20 percent, network response issues would rear their ugly heads once again.

This type of network has been discussed, worked, and reworked. Most of the problems that typically surface have to do with physical location. In other words, for the network to work as designed, you create physical networks and assign subnets to these physical networks. Users are then placed in a physical location by job function. As long as everyone on the same floor performed the same job and shared the same network resources, the network sang. But flies land in the ointment en masse when users with disparate functions and needs are placed on the same floor. The problems created by this scenario can include:
  • Users with different job functions sharing the same broadcast domain.
  • Anomaly users (those with needs and/or functions not common to a given broadcast domain) required that all their data (packets) cross a Layer 3 device to communicate with the network resources they needed.
  • Bandwidth usage quickly became an issue because too many users were placed in the same broadcast/collision domain.

A good solution to this dilemma really didn't exist. There are a few solutions (workarounds) typically configured on the network:
  • Adding another broadcast domain by configuring another router port with another hub connected to the floor: This keeps the new users off the existing broadcast domain, but all these new users must still cross a Layer 3 device to get to the network services they use.
  • Running a cable from the workstations to the correct broadcast domain: This one actually works pretty well (as long as you don't exceed the distance constraints), but there are dollars involved in running the cables.
  • Moving the whole group to another part of the building that has enough room for everyone: Believe it or not, this was the most common solution.

Enter Layer 2 switching and VLANs
Bridges were the precursor to Layer 2 LAN switching. Switches were basically designed to perform the same function as a bridge but with more ports. A typical bridge only had two ports, although you could buy bridges that had up to 16. A LAN switch can have hundreds of ports, and LAN switches are more intelligent.

LAN switches filter the network by hardware address, break up collision domains, provide port security, and can create VLANs. This has changed network design 100 percent from the world of collapsed backbones. Instead of having to worry about creating networks by physical location, VLANs turned the network-design world on its ear by providing options and flexibility like never before to fit any business model. The only design constraint in this type of network is the network administrator's lack of imagination.

Let's take a look at our previous network design and use VLANs instead of routers to break up our networks. Two VLANs were created for this example (see Figure D)



This network is easy to maintain and create security on, and best of all, the physical location of a user is completely irrelevant. Regardless of where users are located, they can be placed in any broadcast domain (VLAN).

Let's take a look at a network design from a client of mine in the San Francisco Bay area. Figure E shows the network design that was in place when I arrived. Hubs were used to connect all the rooms. A fiber connection was used to connect the basement and the 15th floor


Here, 500 users were in the same broadcast domain and collision domain.

The problem with this design is that 500 users were not only in the same broadcast domain but in the same collision domain as well. When they ran out of IP addresses in the network, the administrator just added a secondary network to the router interface. Unfortunately, this is a solution that too many administrators use, and it's a nasty one. Why? Because instead of breaking up collision and broadcast domains, adding a secondary IP subnet to the same broadcast domain just puts more users on the same physical network, making it run like a sleeping mule. Here's the output of the router's interface that had two subnets assigned to the same network:
interface FastEthernet0/0
ip address 10.1.1.1 255.255.255.0 secondary
ip address 10.1.0.1 255.255.255.0


This customer has an ADSL T1 connection to the Internet, but the connection speed acted more like a 33.6-Kbps dial-up line. This wasn't only because of that secondary network, it was also because of the utter lack of physical network segmentation.

After studying the customer's business requirements by talking with both users and management, I was able to come up with a very cool network that took only a few hours to implement. Figure F shows the new network.


Naming conventions for VLANs often use names of rooms or departments.

In Figure F, MA through ML are the names of the rooms in the building; I named the VLANs after the rooms. This allowed the administrators to easily identify and locate the VLANs. Also, the IP subnet scheme was designed after the floor and room numbers, since the rooms were also numbered. 151 would be floor 15, room 1. I called the basement floor 1 and created the VLANs as 11, 12, 13, etc. VLAN 1 is the Administrative and Sales VLAN.

The IP network I used was 10.1.x.0/24. The third octet in this design is the subnet number. By looking at an IP address on a machine, the network administrator could tell which floor, room, and VLAN this device was a member of. Cool, huh?

The customer already owned two Cisco 24-port 2900 switches that were bought from a salesman who also sold this customer a dozen or so Cisco FastHubs. Although the Cisco FastHubs are a great product, they're expensive little numbers, and, well, a hub is a hub, folks. I used the hubs in each room to connect all the users and then connected each hub into the switch. I assigned each port to a specific VLAN.

I put one 2900 switch in the basement and configured it as the Virtual Trunk Protocol (VTP) Server. I placed the other 2900 on the 15th floor and put it to work as a VTP Client. That way, the 15th floor 2900 would learn about VLANs from the VTP server. (VTP is a protocol that sends VLAN information between switches.) Doing this really streamlined implementation because it meant I only had to create my VLANs on the basement 2900, which would then broadcast the information to the 15th-floor switch.

Creating VLANs by location more than quadrupled the customer's response time. (This makes you very popular.) Plus, since they already had the switches, this network cost my client very little, was elegantly easy to implement, and was designed to make it very simple for the administrators to add new users. (This makes you extremely popular.) Need selling points for this type of design? It can help:
  • Solve your client's problem efficiently.
  • Give your client better-than-expected results.
  • Save time and money.
  • Create something the client can readily understand, control, and scale for growth (making him/her feel competent and confident).

If you do these things, you can't lose. An important thing to understand in this example is that all users need to get to VLAN 1 because of a shared database. (By the way, I found out this information by asking the users questions about their day-to-day activities before I changed the network.) This means that the users must leave their broadcast domain (VLAN) and get information from the NT Server hosting the database. To do this, I had to configure a router. Luckily, my client already had some good switches and routers. I used the 2600 router to provide Inter-Switch Link (ISL) routing. (ISL routing is a proprietary Cisco method of allowing hosts on different VLANs to communicate through one router interface. Cisco calls this “router on a stick.”) Though this can create a bottleneck for the network, if it becomes a problem, the design allows for an easy upgrade of the router to make the network run even faster.

Here's the output from a 2621 router that shows the ISL configuration:
[output cut]
interface FastEthernet0/0
ip address 10.1.1.1 255.255.255.0
!
interface FastEthernet0/0.11
encapsulation isl 11
ip address 10.1.11.1 255.255.255.0
!
interface FastEthernet0/0.12
encapsulation isl 12
ip address 10.1.12.1 255.255.255.0
!
interface FastEthernet0/0.13
encapsulation isl 13
ip address 10.1.13.1 255.255.255.0
[output cut]


In this configuration, subinterfaces were used to allow all VLANs to be connected to one router interface. In this example, the interface used is FastEthernet 0/0. I made the subinterfaces the same number as the VLAN number for easy identification. The first command under the subinterface is the encapsulation command, which is used to direct the router to the VLAN number of the subinterface and to use ISL inter-VLAN routing.

After the encapsulation command was used to define the VLAN and inter-VLAN routing type (ISL), I added the IP address assigned to the subinterface. The hosts in each VLAN would use the IP address assigned to this interface as their default gateway. For example, users in VLAN 12 would be configured to use 10.1.12.1 as their default gateway. This allowed the users to get out of their own VLAN and to access company shared services, as well as the Internet.

Conclusion
I hope the real-world example I gave you in this Daily Drill Down helped you to understand how valuable using VLAN technology in an internetwork can be and that you now have a clearer picture of how to create them. Even though the largest benefit of creating VLANs in an internetwork is that you are no longer confined to a physical location, this real-life example involved creating VLANs by physical location because that was what was best for the customer.

I can't say enough about how important it is to be fully aware of an individual client's business requirements before you implement any network. Even though I thoroughly discussed the project with every person I could in the company before I performed the upgrade, I still ran into unforeseen problems because the client just forgot to mention a certain application. You can only prepare so much; after that, you must rely on your troubleshooting skills. Hone them well!

Sunday, March 6, 2011

Wi-Fi Technology

CURRENT WIRELESS TECHNOLOGY

In the smallest range, we have a Bluetooth [2] example. It is a wireless network technology that has its own development direction other than the 802.11 family. Bluetooth supports a very short range in the region of 10 meters and relatively low bandwidth roughly around 1-3 Mbps. It is designed for low-power network devices like portable or handheld gadgets. Nowadays it is a normal feature for handheld devices which include notebook to have a built-in Bluetooth support.

In the medium range, the popularity of the wireless Fidelity (Wi-Fi) has developed the market for unregulated band or unlicensed client-access radios in a wide variety of applications. This technology is one of the last-mile wireless broadband and narrowband services. However, the current main type of the last-mile deployment is the large-area coverage normally called hot-spots. Wireless last-mile coverage is based on IEEE 802.11 standard [1] which uses the high-gain antennas, while hot spots use the modified version of the IEEE 802.11 apparatus which is called a mesh operation. Wi-Fi resembles the wireless local area network.

In 2005, for a wider range, the Worldwide Interoperability for Microwave Access (WiMAX) certified the IEEE 802.16-2004 standard [3] for fixed-position radios. WiMAX will provide the point-to-multi-point and point-to-point wireless broadband devices in both the regulated and unregulated bands. Then, the IEEE 802.16e standard [4] for portable devices has been approved in 2006, regulating the client radio frequencies in licensed and unlicensed bands. This promising technology will provide service providers an additional layer of services benefits.

WiMAX actually resembles a wireless metropolitan-area network segment which provides broadband wireless connectivity to portable, fixed and roaming users. Its designed target is for long-range networking as opposed to local area wireless networking and the research in this field still continues. It is developed independently from Wi-Fi, providing additional distance up to 50 kilometers with total data rates can be up to 75 Mbps, providing sufficient bandwidth to support hundreds concurrent users using a single radio base station. WiMAX has been said to provide many wireless access advantageous to the remote and isolated area.

WIRELESS DEPLOYMENTS

The current trends show that the price of the wireless gadgets keep decreasing with the every advent of new technologies. The affordability makes wireless as a popular and practical alternative. Wireless deployment can be as simple as connecting two adjacent computers wirelessly. More complicated deployment will have hundreds or thousands of devices with centralized servers and distributed APs. Basically, wireless network can be structured into two different modes, based on the coverage size needed. These two modes are

  1. Ad-hoc mode: This mode is a temporary, as is basis type. There is no AP in this mode and the devices are directly sharing their resources when in the range. The shared resources available as long as the devices are running. Bluetooth is one of the examples.

  2. Infrastructure: This mode resembles the wired network. In this mode the AP is used for the wireless devices to communicate each other and it is dominant mode that can be found in residential, corporate building, university campus and plants. The wireless devices can keep connecting as long as they are directly connected to and within the wireless network coverage. Wireless security elements could be enforced on all the wireless devices and users such as through policies, authentication, encryption and many more.

Currently the wireless deployment still dominated in the last mile coverage. This is because of the unregulated frequency availability which lowered the cost of deployment and maintenance. Furthermore, the mass introduction of the cheaper consumer wireless devices makes it an attractive offer. Other than providing an alternative mode of communication medium, the main reason of the adoption is based on the mobility nature of the devices. However, in term of deployments, we can categorize them into four main segments of utilization as listed below.

1. The Wireless Personal area networks (WPAN – 802.16).

2. The Wireless Local area networks (WLAN).

3. The Wireless Metropolitan area networks (WMAN).

4. The Wireless Wide area networks (WWAN).

WIRELESS PERSONAL AREA NETWORK

WPAN can cover a range up to 30 feet or around 10m. Although this seems absurdly small, but this range allows wireless devices to be connected wirelessly to other nearby wireless devices [6]. WPAN provides a very short distant and for small group or community that can share resources wirelessly. Bluetooth which based on the IEEE 802.15.1 standard [7] for example, is mostly used for short range computing and communication peripherals, such as a PDA to a computer or a hand phones. It is normal that the new Bluetooth version can provide data rate performance up to 1Mbps. Another example is the ultra-wide band (UWB) which is designed for multimedia services transmission. The related standard for UWB is IEEE 802.15.3 which can support a data rate up to 400Mbps which equivalent to the DVD video quality standard. In this case the WPAN becomes a high-speed personnel area network. Other usage includes the ad-hoc network where a local area network in which computers and network devices are in close proximity to others in similar subnet. These devices are connected temporarily and as is basis. The receiver and transmitter used are built-in type devices.

However there is no independent pre-existing network for WPAN. All the devices in WPAN communicate based on the ad-hoc network, can be connected when within the range and disconnected when out of range. Better built-in devices can be designed in the future to provide non ad-hoc network. Other similar scenario can be found when using the Infrared (IR) to exchange data between laptops. The nature of wireless devices discovering each other and in many situation it is automatic, is a very big issue in wireless security field.

2.2.2 WIRELESS LOCAL AREA NETWORK

Similar to its counterpart, LAN in fixed line, WLANs can provide coverage larger than WPAN but still limited. Typical coverage areas can be found in a campus, a corporate building, a hospital, or a manufacturing plant [8]. Take note that, the traditional wired LAN can be expanded using wireless through the wireless Access Points (APs) for example, creating a heterogeneous network. The standards-based WLAN typically serve more users and applications compared to WPAN and can serve a distance up to 10 meters or more although this depend on the physical environment such as walls and frequency reflectors. The legacy and new wireless standards that have been released associated with WLAN are included the following three major revisions.

  1. 802.11n - bandwidth speeds up to 600 Mbps (2009).

  2. 802.11g - bandwidth speeds up to 54 Mbps.

  3. 802.11b - bandwidth speeds up to 11 Mbps.

  4. 802.11a - bandwidth speeds up to 54 Mbps.

On the service provider part which normally called Wireless Internet Service Providers (WISPs) usually use the existing Wi-Fi mesh topologies or the directional antennas for better signal and larger coverage. For example those deployments can increase the performance beyond the 54Mbps with 10 kilometers in range while still obeying the 802.11 standard. The increased range creates the WLAN and WMAN segments as shown in Figure 1. However there are many more variables such as the APs to user’s distance, the number of users and topologies which actually define the WLAN and WWAN.



Figure 1: Wireless technologies target segments

METROPOLITAN AREA NETWORK AND WIRELESS WIDE AREA NETWORK

The WMAN is the third usage segment shown in Figure 2. The WLANs collection makes the WMAN and the range can be up to 50 km. The implementation examples in this segment include the WiMAX, DSL/ADSL and DOCSIS legacy coppered wired technologies.


Figure 2: Wireless networks categories

The fourth usage segment shown in Figure 2 is the WWAN. WWAN aggregates WMANs and the range can cover the area up to 50 km. Compared to the previous wireless technology, this is a large area coverage which makes the backhaul or core network possible. In order to cater for the big amount of traffic, WWAN still utilizes various type of existing technology such as fiber optic links and terrestrial microwaves as a complement which normally acts as the backhaul for inter-WWAN connections. Depending on the type of traffic (data, voice or video), the performance can goes up to 10Gbps.

There must be very compelling reasons for deploying wireless communication in all the segment usage because the traditional wired communication already existed long time ago. In the WPAN and WLAN, the main reason of deployment is the mobility while in the WMAN and WWAN it is more on the cost per user, for example, deployment in remote area with less user population. In this case there should be no landline and Radio Base Station (RBS). However the real requirements for each segment are based on a variety of variables as listed below:

  1. The distance and power of the signal.

  2. The topology including the user location.

  3. The bandwidth needs.

  4. The services offered.

  5. The security features.

Figure 1 also shows the wireless standards, standards bodies and their features such as distance and bandwidth which mapped to the four usage segments previously explained. Regarding the standard, there are three main bodies involved in wireless technology as listed below:

  1. European Telecommunications Standards Institute (ETSI) [9]

  2. Institute of Electrical and Electronics Engineers (IEEE) [10]

  3. Third-Generation Partnership Project (3GPP) [11]

The IEEE and ETSI standards are interoperable and concentrate mainly on wireless packet-based networking. However, ESTI is concentrated more on the technology and standard for the European countries. The 3GPP standard focuses on cellular and third-generation mobile systems and very apparent in the mobile sectors.

Wireless Mesh Topology

A wireless network as described in this document is a network of wireless local area networks (LAN) connected together to form a metropolitan network (MAN), usually located in one geographical area, such as a city or small town. Several wireless interface standards currently exist, some operate within licensed and others within unlicensed spectrum, some point to point, others point to multi-point, and yet others more flexible. The most common readily available standard at the moment is the 802.11 family (802.11, 802.11a, 802.11b and 802.11g]). This is consumer equipment that operates on an unlicensed radio frequency. Each wireless network is composed of various nodes connected together. A node is a collection of various PCs or other equipment connected together directly using the IP network and within direct radio range. A node consists of at least one router and one of more clients. The clients normally require little configuration and talk only to the router, whilst the router will route it’s own data and that of its clients to the rest of the network. It will also participate in exchange routing information with other nodes to ensure it always knows how to reach the rest of the network. The nodes can be connected together by radio links or by other means. The term node can loosely be associated with the router/host which manages each node’s own local network. Due to the limited range of the radio signals a large number of nodes will be required to provide coverage to a whole town, thus requiring a complex mesh of connections between the nodes to provide a robust network.
The network’s clients, the people who connect to the nodes from their home or office, make up the complete network. The nodes without clients form each group’s network infrastructure.

Wireless Mesh Topology


A wireless mesh network is made up of three or more wireless access points, working in harmony with each other while sharing each other routing protocols, in a collection of cross-connect links to create an interconnected electronic pathway for the transmission between two or more computers. When a wireless mesh is form it creates a single name identifier for access and the signals between wireless access points are used with each other to clearly distinguishable from another network. The organization of sharing access points working in harmony is known as the mesh topology. The defined mesh topology of a given area defined by the access points is known as mesh cloud. Access to this mesh cloud is dependent on the network created by the access points.

There are three types of mesh networks:

Fixed wireless installations that connect multiple locations using Ad-hoc mode,
Mobile, peer-to-peer, ad-hoc networks that have variable availability and a potentially ever changing set of nodes and finally
Node-to-node infrastructure network that connect multiple locations and combine with mobile giving the best of the both world.

Fixed mesh networks are generally built with the expectation that many nodes have no direct backhaul, network, or Internet access. In fact, if each location had some kind of enterprise or Internet access, distributing service by wireless would be almost unnecessary.

In a fixed installation, locations for nodes are chosen with an eye for providing the right overall level of bandwidth with the fewest points. Fixed mesh networks also can effectively offer non-line-of-sight service by ringing an obstacle -- a tall building, a hill, a cluster of trees, an area of known interference -- with enough nodes to bypass it. These fixed networks are typically directional enough over each link to avoid major security risks.

In contrast, peer-to-peer mobile mesh networks -- which are a long way from actual deployment -- rely on individual devices connecting to each other through devices within radio range. Scalability can be an issue because each device has to manage known optimal paths, which can change from millisecond to millisecond. When an uplink of some kind is added via cell, satellite, or wire, the network becomes dynamically aware and can handle queued interactions.

Node-to-node network utilizes a fixed mesh network with mobile mesh network in an infrastructure mode. Node-to-node connects each node using infrastructure mode and it provides a network cloud that none-nodes or clients using 802.11b or g can roam in the network. It is has the benefits of both mobile mesh and fixed installations. Clients have the ability to roam the network similar to roaming a cellular network.

Roaming in Node-to-node

There are two methods of roaming in a node-to-node configuration: Patchwork roaming and Mobile Mesh roaming.

Nodes in a mobile mesh by their very nature roam in and out of coverage and between networks.

With Patchwork roaming, wireless connection between client’s hardware and mesh network, a wireless data networks, public Wi-Fi hotspots, and enterprise WLAN’s, are difficult to operate at best. The clients using Ipv4 that do not automatically change the IP address when moving between mesh nodes and wireless nodes. Manual intervention may be required. With Patchwork seamless roaming can be achieve; however, it requires DHCP to set every few seconds. The solution will be wait until Ipv6.

Mobile meshes implements self-contained dynamic addressing and rendezvous technologies to simplify address management and enable true nomadic operation without reliance on external clients hardware. Mobile devices can join and leave a mobile mesh and/or connect to public or private fixed infrastructure, all while retaining connectivity to critical services.

Wireless Mesh topology every node has a connection to every other node in the network realm. There is two types of mesh topologies: full mesh and partial mesh.

Full wireless mesh topology occurs when every node in a realm is connected to every other node in a network. Full mesh is yields the greatest amount of redundancy, so in the event that one of those nodes fails, network traffic can be directed to any of the other nodes. Full wireless mesh is difficult to achieve on a large scale using MeshAP; however, small-scale area like offices or small campus may be ideal. One should note that it is difficult to deploy a full mesh topology.

Partial mesh topology yields less redundancy than full mesh topology. With partial mesh, some nodes are organized in a full mesh scheme but others are only connected to one or more nodes in the network realm. Partial mesh topology is commonly found in either small or large networks or fulfilling the last mile connection to a full meshed backbone.

There are 4 main types of partial wireless mesh nodes topologies:

  1. Point-to-point
  2. Point-to-multipoint or Multipoint-to-point, and
  3. Multipoint-to-multipoint,
  4. Metropolitan

Point-to-point and point-to-multipoint networks have long been the standard for fixed wireless deployments and some 802.11 based networks. In testing of mesh networks have proven to be most versatile, overcoming a number of disadvantages in traditional wireless topologies. This section will detail the fundamentals of MeshAP and its inherent advantages.

Point-to-Point nodes topology

A point-to-point network is the simplest form of wireless network, composed of two radio and two high gain antennas in direct communication with each other. Point to point links are often used to provide high-performance, dedicated connections or high-speed interconnect links. These links are quick to deploy individually, but do not easily scale to create a large network. Client used these nodes in a site-to-site configuration.

Point to Multipoint nodes topology

A point-to multipoint or a Multipoint to point nodes share link between an uplink node with omni directional antenna and repeater nodes or downlink nodes with high gain directional antennas. This type of network is easier to deploy than Point to point network because adding a new subscriber only requires equipment deployment at the subscriber site, not at the uplink node; however, each remote site must be within range and clear line of sight of the base station. Trees, hills and other line of sight obstruction make point to multipoint nods impractical for residential and home office coverage. A Point to Multipoint network is suited for either backhaul operations or customers that need reliable, high-speed connections, but are not willing to pay for dedicated capacity that may go unused. The nodes performed as a bridge to the uplink network and are generally in wired configuration for the clients. The problem with point to Multipoint node topology is that they are not design to mesh with other nodes due to the directional antenna.

Multipoint nodes topology

Multipoint to multipoint networks creates a routed mesh topology that mirrors the structure of a wired Internet. To build a mesh network, indoor or outdoor Internet access is first established with the deployment of an access switch connected to a wired ISP. Additional access routers are then deployed throughout the coverage area until a maximum density is achieved. Each access router not only provides access for attached users, but also become part of the network infrastructure by routing traffic through the network over multiple hops. This allows any client to join the network at any point of the mesh, even if the clients are not using a node. Client can access the entire mesh wireless or wired making this the best choice to deploy for areas that require larger coverage MeshAP.

Metropolitan nodes topology

Metropolitan node topology uses the two mesh type networks. They are Backhaul and Last Mile.

Backhaul are either a Point-to-Point or Point-to-Multipoint topology. It design is to provide a backbone to the uplink nodes (see MeshAP configuration.) The nodes use dual antennas one being directional to the uplink the other providing connection to the last mile. The last mile antenna tends to be omni directional. Backhaul Wiana configuration uses two different realms, channels, and ESSID. Clients do not use the backhaul as an access point. The prime mission is to bring bandwidth to different part of the last mile. The uplink nodes in backhaul provide multi redundant connections to the wired Internet and have more capacity than 11 MBPS. Depending on the size of the area cover numerous backhaul points maybe required to cover a large city.

Last Mile is a Multipoint-to-Multipoint topology is nodes that have single radio cards with omni antennas and are linked to the backhauls omni antenna. The difference between Last Mile and Multipoint-to-Multipoint topology is that Internet connection does not come from a wired router but through the backhaul mesh via a central point.

These are just a few examples of the type of topology that a LocustWorld MeshAP can configure. The complexity increases when adding a second wireless radio card to a node and adding different types of antennas.

Mixed node topology

A mixed node network is the complex form of wireless network, composed of two radio and two high gain antennas in direct communication with each other and a third party wireless bridge/repeater. Mixed Nodes are often used to provide high-performance, dedicated connections or high-speed interconnect links. These links are quick to deploy individually, but do not easily scale to create a large network. Client used these bridge/repeater nodes in an indoor environment. The main benefit is that the indoor unit is a low cost commercial product.

Mixed Node Indoor topology

Similar to a mixed node network is the complex form of wireless network, composed of two radio and two high gain antennas in direct communication with each other and a series of third party wireless bridge/repeater. Mixed Nodes are often used to provide high-performance, dedicated connections or high-speed interconnect links. These links are quick to deploy individually, although they do not easily scale to create a large outdoor network they do scale to become a large indoor network. Client used these bridge/repeater nodes in an indoor environment. The main benefit is that the indoor unit is a low cost commercial product.

Mesh Structure

Rectangular Mesh Structure

The rectangular mesh structure, is the original topology proposed for a digital wave guide mesh. The main problem with this structure is the direction-dependent dispersion, which increases with frequency.

Triangle Mesh

Alternative sampling lattices have been studied to obtain more uniform wave propagation characteristics in all directions. When the sampling of the surface is hexagonal, the triangular digital wave guide mesh is obtained. This structure has better dispersion characteristics than the rectangular mesh. The same dispersion analysis as presented for the rectangular mesh is valid for the triangular mesh.

Saturday, March 5, 2011

Network Topologies

Some of the most common topologies in use today include:

  • Bus - Each node is daisy-chained (connected one right after the other) along the same backbone, similar to Christmas lights. Information sent from a node travels along the backbone until it reaches its destination node. Each end of a bus network must be terminated with a resistor to keep the signal that is sent by a node across the network from bouncing back when it reaches the end of the cable.
Bus network topology

Bus network topology
  • Ring - Like a bus network, rings have the nodes daisy-chained. The difference is that the end of the network comes back around to the first node, creating a complete circuit. In a ring network, each node takes a turn sending and receiving information through the use of a token. The token, along with any data, is sent from the first node to the second node, which extracts the data addressed to it and adds any data it wishes to send. Then, the second node passes the token and data to the third node, and so on until it comes back around to the first node again. Only the node with the token is allowed to send data. All other nodes must wait for the token to come to them.
lan switch

Ring network topology
  • Star - In a star network, each node is connected to a central device called a hub. The hub takes a signal that comes from any node and passes it along to all the other nodes in the network. A hub does not perform any type of filtering or routing of the data. It is simply a junction that joins all the different nodes together.
Star network topology

Star network topology
  • Star bus - Probably the most common network topology in use today, star bus combines elements of the star and bus topologies to create a versatile network environment. Nodes in particular areas are connected to hubs (creating stars), and the hubs are connected together along the network backbone (like a bus network). Quite often, stars are nested within stars, as seen in the example below:
A typical star bus network

A typical star bus network

LAN Switch

How LAN Switches Work

If you have read other HowStuffWorks articles on networking or the internet, then you know that a typical network consists of:
  • nodes (computers)
  • a connecting medium (wired or wireless)
  • specialized network equipment like routers or hubs.

In the case of the Internet, all of these pieces work together to allow your computer to send information to another computer that could be on the other side of the world!

­Switches are another fundamental part of many networks because they speed things up. Switches allow different nodes (a network connection point, typically a computer) of a network to communicate directly with one another in a smooth and efficient manner.

There are many different types of switches and networks. Switches that provide a separate connection for each node in a company's internal network are called LAN switches. Essentially, a LAN switch creates a series of instant networks that contain only the two devices communicating with each other at that particular moment. In this article, we will focus on Ethernet networks that use LAN switches. You will learn what a LAN switch is and how transparent bridging works, as well as about VLANs, trunking and spanning trees.

Networking Basics

Here are some of the fundamental parts of a network:


LAN Switch
  • Network - A network is a group of computers connected together in a way that allows information to be exchanged between the computers.

  • Node - A node is anything that is connected to the network. While a node is typically a computer, it can also be something like a printer or CD-ROM tower.

  • Segment - A segment is any portion of a network that is separated, by a switch, bridge or router, from other parts of the network.

  • Backbone - The backbone is the main cabling of a network that all of the segments connect to. Typically, the backbone is capable of carrying more information than the individual segments. For example, each segment may have a transfer rate of 10 Mbps (megabits per second), while the backbone may operate at 100 Mbps.

  • Topology - Topology is the way that each node is physically connected to the network (more on this in the next section).

  • Local Area Network (LAN) - A LAN is a network of computers that are in the same general physical location, usually within a building or a campus. If the computers are far apart (such as across town or in different cities), then a Wide Area Network (WAN) is typically used.

  • Media Access Control (MAC) address - This is the physical address of any device -- such as the NIC in a computer -- on the network. The MAC address, which is made up of two equal parts, is 6 bytes long. The first 3 bytes identify the company that made the NIC. The second 3 bytes are the serial number of the NIC itself.

  • Unicast - A unicast is a transmission from one node addressed specifically to another node.

  • Multicast - In a multicast, a node sends a packet addressed to a special group address. Devices that are interested in this group register to receive packets addressed to the group. An example might be a Cisco router sending out an update to all of the other Cisco routers.

  • Broadcast - In a broadcast, a node sends out a packet that is intended for transmission to all other nodes on the network.