2. Sejarah Komunikasi Wireless (1)
Bahan Ajar D3 - Teknik Jaringan Komputer -
Pertemuan 1
2
Awal komunikasi radio
— Awal 1800s: Michael Faraday, Joseph Henry, Hans Oersted
bereksperimen tentang aliran arus listrik pada satu kawat yang dapat
menginduksi kawat lain
— 1864: James Maxwell berteori tentang osilasi dari arus listrik yang
dapat menimbulkan medan EM. Medan EM ini berpropagasi dengan
kecepatan cahaya. Cahaya tampak merupakan salah satu fenomena
EM dan merupakan bagian dari spektrum EM
— 1873: Maxwall mempublikasikan persamaan Maxwell yang sangat
findamental. 4 persamaan differensial yang mendeskripsikan
perubahan ruang dan waktu pada medan EM
— 1888: Heinrich Hertz membangun transmitter dan receiver radio yg
pertama untuk mengukur gelombang EM dan membuktikan teori
Maxwell yang mengatakan bahwa gelombang EM bergerak dengan
kecepatan cahaya
3. Sejarah Komunikasi Wireless (2)
Bahan Ajar D3 - Teknik Jaringan Komputer -
Pertemuan 1
3
— 1895: Guglielmo Marconi membangun sistem wireless telegraph
pertama
— 1901: Marconi mentransmisikan transatlantic wireless telegraph
message pertama
— 1906: Reginald Fessenden pertama kali mentransmisikan suara
melalui radio (from Boston to ships in Atlantic)
— 1918: Edwin Armstrong menemukan superheterodyne circuit
untuk receiver radio yg stabil
— 1933: Armstrong menemukan frequency modulation (sebelumnya
yang digunakan adalah amplitude modulation), lebih tahan
terhadap nose dan interferensi
1934: US creates FCC (Federal Commun. Commission) to mengawasi
telekomun ikasi di publik termasuk pengalokasian spektrum
4. Sejarah Komunikasi Wireless (3)
Bahan Ajar D3 - Teknik Jaringan Komputer -
Pertemuan 1
4
1946: AT&T memperkenlkan layanan mobile telephone pertama dgn
menggunakan transmisi radio FM, 120KHz per kanal voice dan terbatas
hanya pada 50 mil dari base station serta menggunakan operator untuk
men-dial
— Pertengahan-1960s: AT&T’s IMTS (Improved Mobile Telephone
Service) menggunakan 30 kHz voice channels, narrowband FM and
direct dialing (tanpa operator)
Generasi pertama telepon selular analog (First generation analog cellular
telephony)
— akhir1940s: AT&T membuat konsep selular untuk frequency reuse
— 1971: AT&T mengajukan High Capacity Mobile Phone Service
kepada FCC
— 1979: US menstandarkan hal itu sebagai AMPS (Advanced Mobile
Phone System) pada daerah 800-900 MHz
• 1983: AT&T me-launchAMPS di Chicago
5. Sejarah Komunikasi Wireless (4)
Bahan Ajar D3 - Teknik Jaringan Komputer -
Pertemuan 1
5
— 1985: Nordic Mobile Telephone (NMT 450) di Scandanavia, Total
Access Communications System (TACS) di UK, C450 di W.
Germany
• Total : 6 incompatible analog cellular systems di Europe
• Motivated Europe to accelerate 2nd generation digital cellular
Generasi Kedua Selular Digital (Second generation digital cellular)
— 1989: Europe membuat standar Global System for Mobile
Communications (GSM)
• 1992: GSM di-launching
— 1990: Japan menstandarkan Japanese Digital Cellular (JDC) yang
sekarang disebut Personal Digital Cellular (PDC)
— 1990: Europe menstandarkan Digital Cellular System at 1800 MHz
(DCS 1800, yang kemudian dinamakan GSM 1800)
• 1993: DCS 1800 di-launching
6. Sejarah Komunikasi Wireless (5)
Bahan Ajar D3 - Teknik Jaringan Komputer -
Pertemuan 1
6
— 1992: TIA/IS-54 TDMA (Digital AMPS) dikembangkan diUS
— 1996: TIA/IS-95 CDMA di US
— 1995: Personal Handphone System (PHS) di Japan, first
widespread low-tier PCS, is hugely successful
1996: AT&T and Sprint offer PCS in major US cities
— Smaller cell sites (0.25 km vs traditional 1-8 km), smaller/lighter
portable handsets, cheaper access points
1998: ITU begins to study proposals for 3rd generation cellular
mid-2000s: UMTS, IMT-2000, W-CDMA, cdma2000, EDGE,...
2010-?: 4th generation?
— Self organizing, ad hoc?
7. Badan Hukum Telekomunikasi
Bahan Ajar D3 - Teknik Jaringan Komputer -
Pertemuan 1
7
Di Indonesia : BRTI
Untuk internasional : FCC (Federal
Communication Commision)
18. Selular vs Wi Fi
Bahan Ajar D3 - Teknik Jaringan Komputer -
Pertemuan 1
18
19. Karakteristik Kanal Wireless
Bahan Ajar D3 - Teknik Jaringan Komputer -
Pertemuan 1
19
Sinyal yang ditransmisikan melalui gelombang
radio akan mengalami fluktuasi akibat
karakteristik medium yang selalu berubah
Selain itu terjadi penurunan daya sinyal
Kesulitan untuk melakukan proses selanjutnya :
demodulasi
22. Karakteristik Kanal Wireless
Bahan Ajar D3 - Teknik Jaringan Komputer -
Pertemuan 1
22
Fluktuasi sinyal tersebut dapat dibagi 2:
Large Scale Fading fading relatif tetap untuk plot
area yg besar
- Refleksi
- Difraksi
- Scattering
Small Scale Fading (Multipath) fading berubah
secara dramatis untuk plot area yg kecil
- Time spreading signal
- Time varying kanal
23. Large Scale Fading
Bahan Ajar D3 - Teknik Jaringan Komputer -
Pertemuan 1
23
Refleksi : mengenai benda rata yg > λ
Difraksi : terhalang oleh permukaan tajam
gelombang semu muncul di belakang
penghalang Shadowing
Scattering : mengenai benda yg < λ
Mengatasi :
- Fading margin (secara defintif) adalah
kenaikan daya pancar yang harus dilakukan
agar penerimaan lebih/sama dengan level
penerimaan minimum yang diijinkan
- Diversitas
- Antena sektoral dan smart antena
25. Small Scale Fading
Bahan Ajar D3 - Teknik Jaringan Komputer -
Pertemuan 1
25
Time Varying : Fluktuasi
amplitudo disebabkan
superposisi konstruktif dan
destruktif dari sinyal yang
diterima
Time spreading :
Perbedaan waktu
kedatangan sinyal akibat
perbedaan lintasan
Flat Slow
Fading
Flat Fast
Fading
Frequency
Selective
Slow
Fading
Frequency
Selective
Fast
Fading
TSym
TSym
T0
m
t
Perioda simbol
Perioda
simbol
85. 85
Topics of Discussion
Making the Decision to go Wireless
Wireless Standards
Wireless Router and Adapter Brands
Fire Walls
Wireless Security
Router Setup
Wireless Adapter Setup
86. 86
Making the Decision to go
Wireless
Why have a network at home?
To share files between computers
To share printers
To share an Internet connection
87. 87
Making the Decision to go
Wireless
Types of Networks used in a Home
Hard Wired
Wireless
88. 88
Types of Networks used in a
Home
Hard Wired
Is the most secure
Faster than wireless
Technology is increasing wireless though put speeds
Increased cost
Cable and connections (electrician)
May have to cut through walls and floors
Can be mitigated using cable raceways on wall surfaces
89. 89
Types of Networks used in a
Home
Wireless
Does not require cable to be run
Easy to install
Easier to add equipment
Equipment is more expensive
You may need to plan for problems
Will be covered in Planning for Your Wireless Router
90. 90
Router/Switch
Devices are connected together on a network using
a router / switch
Router part connects two nodes together
Local-area network (LAN)
Wide-area network (WAN)
Switch parts connects devices on LAN together
Router
Hard wired devices
Access point on a wireless router
91. 91
Special Planning for Wireless
Access
Cordless telephones
Microwaves
Type of construction of your home
Brick
Wood
Metal
Outside interference
Radio or microwave transmission
92. 92
Wireless Standards
802.11a
Speed 54Mbs
Frequency used is 5 gigahertz (Ghz).
802.11b
Speed 11Mbs
Frequency used is 2.4 gigahertz (Ghz).
802.11g
Speed 54Mbs
Frequency used is 2.4 gigahertz (Ghz).
93. 93
Wireless Standards
New and Future Technology
Multiple-Input Multiple-Output (MIMO)
Allows present technology to achieve greater throughput
with the present standards,
In the future 802.11n may be the new standard for
wireless local-area networks
Throughput may reach 540 Mbs
10 times faster than 802.11a or 802.11g
A better operating distance
May include MIMO technology
94. 94
Wireless Standards
802.11a
Speed 54Mbs
Frequency used is 5 gigahertz (Ghz).
802.11b
Speed 11Mbs
Frequency used is 2.4 gigahertz (Ghz).
802.11g
Speed 54Mbs
Frequency used is 2.4 gigahertz (Ghz).
802.11n
Speed 200Mbs (Typ), 540Mps (max)
Frequency used is 2.4 gigahertz (Ghz).
Range indoors is 50m
102. 102
Wireless Router Features
Contain a wireless access point
Allows wireless devices to connect
May use MIMO technology
Increases throughput
Contain a hardware firewall
Stops inbound data unless you request it
Have setup for Wireless security
Keeps strangers from accessing LAN through the
wireless access point
103. 103
Some Wireless Router and
Wireless Adapter Brands
Linksys
D-Link
US Robotics
AirLink
Belkin
Netgear
104. Bahan Ajar D3 - Teknik Jaringan Komputer -
Pertemuan 1
104
105. Bahan Ajar D3 - Teknik Jaringan Komputer -
Pertemuan 1
105
106. Bahan Ajar D3 - Teknik Jaringan Komputer -
Pertemuan 1
106
107. 107
Firewalls
You should have a fire wall on all your
computers that have access to the internet
Two types of fire walls
Hardware fire wall
Used to stop incoming data that is not requested by your
computer
Software firewalls
Zone Alarm is used to keep your computer from sending or
receiving information without your permission.
108. 108
Wireless security
In the Router:
Change the default Service Set Identifier (SSID)
Disable the SSID broadcast
Change the User Name and Passwords on the
wireless router
Set up the wireless encryption
Setup the MAC Filter
Change the routers local IP address
109. 109
Wireless Security – Encryption
Types
Wired Equivalent Privacy ( WEP )
The oldest encryption method
Uses a 64-bit or more secure 128 bit key
Wi-Fi Protected Access ( WPA )
Newer encryption method that uses 256-bit key
Wi-Fi Protected Access 2 ( WPA2 )
Newest encryption method
Backward compatible with WPA
110. 110
Setting up your Wireless Router
Things you need to know
Who is your ISP
What type of Internet connection are you using
User name and password if required
Brand of router
Default local IP address
Default User Name
Default Password
111. 111
Sample default Local IP Address,
User Name, and Password
Brand Local IP
Address
User Name Password
Linksys 192.168.1.1 admin
Belkin 192.168.2.1
D-Link 192.168.0.1 admin
USRobotics 192.168.2.1 Must set up Must set up
Netgear 192.168.0.1 admin password
Air Link 192.168.1.1 admin admin
112. 112
Demonstration on setting up
wireless router
Use setup CD that came with router
If you already have a router installed you should
remove it first. The installation software will try to
determine the type of connection
Or
Bring up browser and access router
Inter routers local IP address in the URL
Inter the default User Name and Password
Setup router
113. 113
Setting up the wireless adapter
in the remote PC
You must know the SSID and encryption KEY
for the network you wish to connect. We
entered these in the router.
Types of wireless networks
Infrastructure
Ad-Hoc
For this demonstration we will be using an
Infrastructure network
114. 114
Description of the networks
for your information
Infrastructure network
Wireless network centered about an access point
Access point
Provides communication with the wired network
Mediates wireless network traffic in the immediate
neighborhood
116. 116
Description of the networks
for your information
Ad-Hoc
Are point-to-point networks
May consist of two or more mobile computers
A collection of computers which propagate the signals. (A to B to C
to A).
May be simple point to point
Hey, how’s
it hanging?
Hello,
hello, is
anyone
there?
118. 118
Description of the networks
for your information
Ad-Hoc
May be a more complex system with multiple entities
119. 119
The type of wireless adapters
Will depend on your wireless PC
For a desktop
PCI adapter
USB adapter
For the laptop
PC card ( PCMCIA card)
USB adapter
Use an adapter that matches your router to get
maximum throughput
120. 120
Installing the wireless adapter
Use the installation instructions that come with
your wireless adapter
Using the correct sequence
Install hardware
Use CD that comes with the hardware
Install the driver
Install the software (utility program)
121. 121
Connecting the wireless
computer to the access point
Have the remote computer scan for networks
Find SSID of your network and select it
enter the encryption key that was used to set up the
wireless part of the router
Confirm key if necessary
Click on connect
You should be connected to the network
122. 122
Finalize Wireless Security as
needed
Disable the SSID broadcast if wanted
Change the User Name and Passwords on the
wireless router
Setup MAC Filter
Change the routers local IP address
123. 123
Additional information
Acronyms
AES Advanced Encryption Standard
DSL Digital Subscriber Line. Usually through your telephone
company
DHCP Dynamic Host Configuration Protocol
HTTP "HyperText Transfer Protocol” This is the protocol used to
format and transfer data over the internet. When you enter a URL in
your browser, this actually sends an HTTP command to the Web
server directing it to fetch and transmit the requested Web page..
IPSEC IP Security
ISP internet service provider
LAN local-area network
L2TP Layer Two (2) Tunneling Protocol. Used with virtual private
network
MANET mobile ad-hoc network
MIMO multiple-input multiple-output
Mbs million bits per second
124. 124
Additional information
Acronyms
PCMCIA Short for Personal Computer Memory Card International
Association. PC card.
PING Packet Internet Groper, A utility to determine whether a specific
IP address is accessible
PPPoE Point-to-Point Protocol over Ethernet
PPTP Point-to-Point Tunneling Protocol. Used with virtual private
network
SSID Service Set Identifier
TKIP Temporal Key Integrity Protocol. Used with virtual private
network
USB Universal Serial Bus
URL An Internet address (example, http://www.google.com or
64.233.187.99 are the sane location)
VPN virtual private network
WAN wide-area network
WEP Wired Equivalent Privacy