Your SlideShare is downloading. ×
0
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
有(.ppt)
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

有(.ppt)

185

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
185
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Based on last year and this year’s shipment We know that the actual shipement is probably 3x the forecast shown here. Therefore the units should be 33 M and if we assume $30 per chipset that will render approximately 1B in WLAN chipset revenue, Ralink’s goal is to cature 20 % or more of this market.
  • Let’s look at it visually. The problem starts with a simple connection from the internal corporate network to the Internet. This exposes the internal network to attacks from the outside. This is solved by blocking the connection point(s) with a firewall. The second problem occurs in the face of remote connections. Now you have valuable and confidential information flowing across a foreign, possibly hostile, network. It is susceptible to eavesdropping attacks. To safeguard against this you implement encryption via a tunnel (VPNs)
  • Transcript

    • 1. First Release Date 2002/09/12 Last Modify Date 2002/09/12 新世代無線網路新趨勢 Pogo Tsai Brand Marketing Division [email_address]
    • 2. WW WLAN Market Trend WLAN growth up to 60% in 2001 33.4% CAGR growth expected through 2005 Source: IDC, Feb-2002 Unit: thousand
    • 3. Wireless LAN System Market Comparison of WLAN Market Forecasts WLAN market: a fast growing market Mio units
    • 4. WLAN Chipset Standard US$M Source: Cahners In-Stat/MDR, 3/2002
    • 5. Wireless Protocol Standards
    • 6. Wireless LAN Applications Wireless LAN Vertical Inventory Control Datarate: 1-11 Mbit/s Wireless Bridges Datarate: 11- 54 Mbit/s Enterprise Wireless Ethernet Datarate: 11- 54 Mbit/s Consumer Datarate: 11- 54 Mbit/s
    • 7. Unlicensed Operation RF Bands <ul><li>902MHz </li></ul><ul><ul><li>26MHz BW </li></ul></ul><ul><ul><li>Crowded </li></ul></ul><ul><ul><li>Worldwide limited </li></ul></ul><ul><li>2.4GHz </li></ul><ul><ul><li>83.5MHz BW </li></ul></ul><ul><ul><li>Available worldwide </li></ul></ul><ul><ul><li>IEEE802.11 WLANs </li></ul></ul><ul><li>5.1GHz </li></ul><ul><ul><li>300MHz BW discontinuous </li></ul></ul><ul><ul><li>Developing </li></ul></ul>Source: Harris Semiconductor *Frequency Allocations are pending U-NII: Unlicensed National Information Infrastructure 5100 5200 5300 5400 5500 5600 5700 5800 5900 U-NII Europe HiperLAN1 U-NII Europe HiperLAN2* Japan* 5.1GHz 902 928 North & South America 902MHz 2400 2500 2480 2440 Americas, most of Europe France Spain Japan 2.4GHz
    • 8. IEEE 802.11x Standard Source: Envara
    • 9. 從晶片發展看無線網路驅勢
    • 10. 802.11a 的優勢 – 涵蓋率及速度的比較 AP -50 ft 0 ft 50 ft 100 ft 150 ft 200 ft 0 50 100 802.11a 0 50 100 802.11b AP Rate (Mbps) 0 5 10 15 20 25 30 35 40 45 50
    • 11. 802.11a 的優勢 – SMC 802.11a Turbo Mode <ul><ul><li>在不需完全用掉 802.11a 不互相干擾的 8 個 Channel 時 , SMC 能把 8 個 Channel 結合成為 3 個 72Mbps 的 高速 Channel 運作 </li></ul></ul>36 40 44 48 52 56 60 64 42 50 58 8 20MHz Channels 3 40MHz Channels Turbo
    • 12. 802.11a 的優勢 – Data Rate 的比較 Data Link Rate (Mbps) Range (ft) Optimal Data Link Rate in Office Environment <ul><li>SMC 802.11a’s supported link rates that are 2 to 5 times </li></ul><ul><li>802.11b at the same distance when tested to 225 feet . </li></ul>~5x ~3x
    • 13. IEEE 802.11 Topology <ul><li>Independent Basic Service Set (IBSS) </li></ul><ul><li>Extended Service Set (ESS) </li></ul>IBSS AP AP ESS BSS 1 BSS 2 Distribution System
    • 14. Roaming (Inter Access Point Protocol ) Purpose: To make access point devices from different vendors to interoperate across a network to keep connection/session alive. <ul><li>Any wireless client moving from one BSS (Basic Service Set) to another BSS required a handover process to remain its connection. </li></ul><ul><li>IAPP is an official protocol proposed by IEEE 802.11 group to provide the “reassociation” between APs </li></ul>
    • 15. Bridging Access Point <ul><li>Point to Point </li></ul><ul><li>Point to Multi-point </li></ul>Access Point Master Bridge Ethernet AP Wireless Bridge Ethernet AP Wireless Bridge Ethernet
    • 16. Security: 802.1X Model EAP-Success STA AP Authentication Server EAP Auth Response EAP Auth Response EAP Auth Request EAP Auth Request Port Status: Associate EAP Identity Request EAP Identity Response EAP Identity Response Authentication traffic Normal Data EAP-Success
    • 17. Market: Indoor Infrastructure Wireless Broadband Router Wireless Gateway Wireless PC Card Mini-PCI Adapter Wireless PCI Adapter USB-Wireless Adapter Access Point For Home, SoHo, Enterprise
    • 18. Market: Public Hot-Spot Billing Systems ( Access, Authentication, Accounting) Control Gateway User Internet Secured IP Enterprise Group Access Point Airports, Hotels, Cafes, Restaurants, … <ul><li>3/1/2002 In-Stat: Public Area Access, Hot-spot locations(airport, shopping mall, coffee bars, hotel) in US will grow from 3,700 to 41,000 by 2007, Over 21 million users, generates over U$3 billion in service revenues. (from $1.1m in 2000) </li></ul>
    • 19. Security and The Internet Connection Corporate Network Internet Corporate Network Solution: protect the network with a firewall Solution: put the traffic through an encrypted tunnel Problem: external connection to the Internet attack attack Problem: traffic flowing through public Internet attack attack
    • 20. The Wireless Effect Corporate Network Internet The Blurry Edge! You need firewall and encryption here! But remember that users move from here to here to here ..
    • 21. SMC WLAN Security System 的認証原理與架構 Control Server/ Rights Manager Access Manager CORPORATE LAN Authentication Server INTERNET Access Manager Client appears, requests network access Access Manager asks Control server for ok and appropriate rights Control Server requests login information from client Control Server authenticates user via customer’s authentication server Control Server gives user rights to Access Manager for enforcement Client proceeds with network activity
    • 22. SMC WLAN Security System 的漫遊機制 Control Server/ Rights Manager Access Manager CORPORATE LAN Authentication Server INTERNET Access Manager Client has an active session Client moves to a new Access Manager Access Manager verifies user existence and rights with Control Server Control Server coordinates Access Manager-to-Access Manager communication Existing sessions maintained via tunnels New sessions connected via new Access Manager
    • 23. Market: Outdoor Backbone <ul><li>Internet Access Anywhere </li></ul><ul><li>Fixed Wireless Broadband Network </li></ul><ul><li>Last Mile Connection </li></ul>
    • 24. Application: Home Entertainment Internet *Sender* Set-Top-Box (802.11a) Internet Movie Projector Consumer Electronics/Home Networking 5GHz for streaming multiple video channels around the house: TV, gaming machines, PCs, video, stereo systems can all interconnecting without wiring systems *Receiver* A/V Converter (802.11a)
    • 25. Application: Metro Area Network Fiber Fiber Businesses Homes Public Access Fiber Campus
    • 26. Thank You !! Q & A

    ×