Ένας ασύρματος επαναλήπτης (που ονομάζεται επίσης ασύρματος επέκταση εμβέλειας) είναι μια συσκευή που λαμβάνει ένα υπάρχον σήμα από έναν ασύρματο δρομολογητή ή σημείο ασύρματης πρόσβασης και το αναμεταδίδει για να δημιουργήσει ένα δεύτερο δίκτυο. Όταν δύο ή περισσότεροι κεντρικοί υπολογιστές πρέπει να συνδεθούν μεταξύ τους μέσω του IEEE 802.
11 και η απόσταση είναι πολύ μεγάλη για να δημιουργηθεί μια άμεση σύνδεση, ένας ασύρματος επαναλήπτης χρησιμοποιείται για να γεφυρώσει το χάσμα. Μπορεί να είναι μια εξειδικευμένη αυτόνομη συσκευή δικτύωσης υπολογιστών. Επίσης, ορισμένοι ελεγκτές διεπαφών ασύρματου δικτύου (WNIC) s υποστηρίζουν προαιρετικά τη λειτουργία σε μια τέτοια λειτουργία.
Εκτός του πρωτεύοντος δικτύου θα είναι δυνατή η σύνδεση μέσω του νέου "επαναλαμβανόμενου" δικτύου. Ωστόσο, όσον αφορά τον αρχικό δρομολογητή ή το σημείο πρόσβασης, συνδέεται μόνο ο αναμεταδότης MAC, καθιστώντας απαραίτητο να ενεργοποιηθούν τα χαρακτηριστικά ασφαλείας στον ασύρματο επαναλήπτη.
Οι ασύρματες αναμεταδότες χρησιμοποιούνται συνήθως για τη βελτίωση της εμβέλειας σήματος και της αντοχής σε σπίτια και μικρά γραφεία.
point to point
In telecommunications, a point-to-point connection refers to a communications connection between two communication endpoints or nodes. An example is a telephone call, in which one telephone is connected with one other, and what is said by one caller can only be heard by the other. This is contrasted with a point-to-multipoint or broadcast connection, in which many nodes can receive information transmitted by one node. Other examples of point-to-point communications links are leased lines and microwave radio relay.
The term is also used in computer networking and computer architecture to refer to a wire or other connection that links only two computers or circuits, as opposed to other network topologies such as buses or crossbar switches which can connect many communications devices.
Basic data link
A traditional point-to-point data link is a communications medium with exactly two endpoints and no data or packet formatting. The host computers at either end take full responsibility for formatting the data transmitted between them. The connection between the computer and the communications medium was generally implemented through an RS-232 or similar interface. Computers in close proximity may be connected by wires directly between their interface cards.
When connected at a distance, each endpoint would be fitted with a modem to convert analog telecommunications signals into a digital data stream. When the connection uses a telecommunications provider, the connection is called a dedicated, leased, or private line. The ARPANET used leased lines to provide point-to-point data links between its packet-switching nodes, which were called Interface Message Processors.
In modern computer networking, the term point-to-point telecommunications means a wireless data link between two fixed points. The telecommunications signal is typically bi-directional and either time division multiple access (TDMA) or channelized. This can be a microwave relay link consisting of a transmitter which transmits a narrow beam of microwaves with a parabolic dish antenna to a second parabolic dish at the receiver. It also includes technologies such as lasers which transmit data modulated on a light beam. These technologies require an unobstructed line of sight between the two points and thus are limited by the visual horizon to distances of about 40 miles (64 km).[a]
In a local network, repeater hubs or switches provide basic connectivity. A hub provides a point-to-multipoint (or simply multipoint) circuit in which all connected client nodes share the network bandwidth. A switch on the other hand provides a series of point-to-point circuits, via microsegmentation, which allows each client node to have a dedicated circuit and the added advantage of having full-duplex connections.
From the OSI model's layer perspective, both switches and repeater hubs provide point-to-point connections on the physical layer. However, on the data link layer, a repeater hub provides point-to-multipoint connectivity – each frame is forwarded to all nodes – while a switch provides virtual point-to-point connections – each unicast frame is only forwarded to the destination node.
Within many switched telecommunications systems, it is possible to establish a permanent circuit. One example might be a telephone in the lobby of a public building, which is programmed to ring only the number of a telephone dispatcher. "Nailing down" a switched connection saves the cost of running a physical circuit between the two points. The resources in such a connection can be released when no longer needed, for example, a television circuit from a parade route back to the studio.
In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network. The AP usually connects to a router (via a wired network) as a standalone device, but it can also be an integral component of the router itself. An AP is differentiated from a hotspot, which is the physical location where Wi-Fi access to a WLAN is available.
Linksys "WAP54G" 802.11g wireless router
An AP connects directly to a wired local area network, typically Ethernet, and the AP then provides wireless connections using wireless LAN technology, typically Wi-Fi, for other devices to use that wired connection. APs support the connection of multiple wireless devices through their one wired connection.
Wireless data standards
There are many wireless data standards that have been introduced for wireless access point and wireless router technology. New standards have been created to accommodate the increasing need for faster wireless connections. Some wireless routers provide backward compatibility with older Wi-Fi technologies as many devices were manufactured for use with older standards.
Wireless access point vs. ad hoc network
Some people confuse wireless access points with wireless ad hoc networks. An ad hoc network uses a connection between two or more devices without using a wireless access point; The devices communicate directly when in range. Because setup is easy and does not require an access point, an ad hoc network is used in situations such as a quick data exchange or a multiplayer video game. Due to its peer-to-peer layout, ad hoc Wi-Fi connections are similar to connections available using Bluetooth.
Ad hoc connections are generally not recommended for a permanent installation. Internet access via ad hoc networks, using features like Windows' Internet Connection Sharing, may work well with a small number of devices that are close to each other, but ad hoc networks do not scale well. Internet traffic will converge to the nodes with direct internet connection, potentially congesting these nodes. For internet-enabled nodes, access points have a clear advantage, with the possibility of having a wired LAN.
It is generally recommended that one IEEE 802.11 AP should have, at a maximum, 10-25 clients. However, the actual maximum number of clients that can be supported can vary significantly depending on several factors, such as type of APs in use, density of client environment, desired client throughput, etc. The range of communication can also vary significantly, depending on such variables as indoor or outdoor placement, height above ground, nearby obstructions, other electronic devices that might actively interfere with the signal by broadcasting on the same frequency, type of antenna, the current weather, operating radio frequency, and the power output of devices. Network designers can extend the range of APs through the use of repeaters, which amplify a radio signal, and reflectors, which only bounce it. In experimental conditions, wireless networking has operated over distances of several hundred kilometers.
Most jurisdictions have only a limited number of frequencies legally available for use by wireless networks. Usually, adjacent APs will use different frequencies (Channels) to communicate with their clients in order to avoid interference between the two nearby systems. Wireless devices can "listen" for data traffic on other frequencies, and can rapidly switch from one frequency to another to achieve better reception. However, the limited number of frequencies becomes problematic in crowded downtown areas with tall buildings using multiple APs. In such an environment, signal overlap becomes an issue causing interference, which results in signal droppage and data errors.
Wireless networking lags wired networking in terms of increasing bandwidth and throughput. While (as of 2013) high-density 256-QAM (TurboQAM) modulation, 3-antenna wireless devices for the consumer market can reach sustained real-world speeds of some 240 Mbit/s at 13 m behind two standing walls (NLOS) depending on their nature or 360 Mbit/s at 10 m line of sight or 380 Mbit/s at 2 m line of sight (IEEE 802.11ac) or 20 to 25 Mbit/s at 2 m line of sight (IEEE 802.11g), wired hardware of similar cost reaches closer to 1000 Mbit/s up to specified distance of 100 m with twisted-pair cabling in optimal conditions (Category 5 (known as Cat-5) or better cabling with Gigabit Ethernet). One impediment to increasing the speed of wireless communications comes from Wi-Fi's use of a shared communications medium: Thus, two stations in infrastructure mode that are communicating with each other even over the same AP must have each and every frame transmitted twice: from the sender to the AP, then from the AP to the receiver. This approximately halves the effective bandwidth, so an AP is only able to use somewhat less than half the actual over-the-air rate for data throughput. Thus a typical 54 Mbit/s wireless connection actually carries TCP/IP data at 20 to 25 Mbit/s. Users of legacy wired networks expect faster speeds, and people using wireless connections keenly want to see the wireless networks catch up.
By 2012, 802.11n based access points and client devices have already taken a fair share of the marketplace and with the finalization of the 802.11n standard in 2009 inherent problems integrating products from different vendors are less prevalent.
Main article: Wireless LAN Security
Wireless access has special security considerations. Many wired networks base the security on physical access control, trusting all the users on the local network, but if wireless access points are connected to the network, anybody within range of the AP (which typically extends farther than the intended area) can attach to the network.
The most common solution is wireless traffic encryption. Modern access points come with built-in encryption. The first generation encryption scheme, WEP, proved easy to crack; the second and third generation schemes, WPA and WPA2, are considered secure if a strong enough password or passphrase is used.
Opinions about wireless network security vary widely. For example, in a 2008 article for Wired magazine, Bruce Schneier asserted the net benefits of open Wi-Fi without passwords outweigh the risks, a position supported in 2014 by Peter Eckersley of the Electronic Frontier Foundation. The opposite position was taken by Nick Mediati in an article for PC World, in which he advocates that every wireless access point should be protected with a password.
A network bridge is a computer networking device that creates a single aggregate network from multiple communication networks or network segments. This function is called network bridging. Bridging is distinct from routing. Routing allows multiple networks to communicate independently and yet remain separate, whereas bridging connects two separate networks as if they were a single network. In the OSI model, bridging is performed in the data link layer (layer 2). If one or more segments of the bridged network are wireless, the device is known as a wireless bridge.
Transparent bridging uses a table called the forwarding information base to control the forwarding of frames between network segments. The table starts empty and entries are added as the bridge receives frames. If a destination address entry is not found in the table, the frame is flooded to all other ports of the bridge, flooding the frame to all segments except the one from which it was received. By means of these flooded frames, a host on the destination network will respond and a forwarding database entry will be created. Both source and destination addresses are used in this process: source addresses are recorded in entries in the table, while destination addresses are looked up in the table and matched to the proper segment to send the frame to. Digital Equipment Corporation (DEC) originally developed the technology in the 1980s.
In the context of a two-port bridge, one can think of the forwarding information base as a filtering database. A bridge reads a frame's destination address and decides to either forward or filter. If the bridge determines that the destination host is on another segment on the network, it forwards the frame to that segment. If the destination address belongs to the same segment as the source address, the bridge filters the frame, preventing it from reaching the other network where it is not needed.
Transparent bridging can also operate over devices with more than two ports. As an example, consider a bridge connected to three hosts, A, B, and C. The bridge has three ports. A is connected to bridge port 1, B is connected to bridge port 2, C is connected to bridge port 3. A sends a frame addressed to B to the bridge. The bridge examines the source address of the frame and creates an address and port number entry for A in its forwarding table. The bridge examines the destination address of the frame and does not find it in its forwarding table so it floods it to all other ports: 2 and 3. The frame is received by hosts B and C. Host C examines the destination address and ignores the frame. Host B recognizes a destination address match and generates a response to A. On the return path, the bridge adds an address and port number entry for B to its forwarding table. The bridge already has A's address in its forwarding table so it forwards the response only to port 1. Host C or any other hosts on port 3 are not burdened with the response. Two-way communication is now possible between A and B without any further flooding in network.
A simple bridge connects two network segments, typically by operating transparently and deciding on a frame-by-frame basis whether or not to forward from one network to the other. A store and forward technique is typically used so, as part of forwarding, the frame integrity is verified on the source network and CSMA/CD delays are accommodated on the destination network. In contrast to repeaters which simply extend the maximum span of a segment, bridges only forward frames that are required to cross the bridge. Additionally, bridges reduce collisions by creating a separate collision domain on either side of the bridge.
A multiport bridge connects multiple networks and operates transparently to decide on a frame-by-frame basis whether to forward traffic. Additionally a multiport bridge must decide where to forward traffic. Like the simple bridge, a multiport bridge typically uses store and forward operation. The multiport bridge function serves as the basis for network switches.
The forwarding information base stored in content-addressable memory (CAM) is initially empty. For each received ethernet frame the switch learns from the frame's source MAC address and adds this together with an ingress interface identifier to the forwarding information base. The switch then forwards the frame to the interface found in the CAM based on the frame's destination MAC address. If the destination address is unknown the switch sends the frame out on all interfaces (except the ingress interface). This behaviour is called unicast flooding.
Once a bridge learns the addresses of its connected nodes, it forwards data link layer frames using a layer-2 forwarding method. There are four forwarding methods a bridge can use, of which the second through fourth methods were performance-increasing methods when used on "switch" products with the same input and output port bandwidths:
Store and forward: the switch buffers and verifies each frame before forwarding it; a frame is received in its entirety before it is forwarded.
Cut through: the switch starts forwarding after the frame's destination address is received. There is no error checking with this method. When the outgoing port is busy at the time, the switch falls back to store-and-forward operation. Also, when the egress port is running at a faster data rate than the ingress port, store-and-forward is usually used.
Fragment free: a method that attempts to retain the benefits of both store and forward and cut through. Fragment free checks the first 64 bytes of the frame, where addressing information is stored. According to Ethernet specifications, collisions should be detected during the first 64 bytes of the frame, so frame transmissions that are aborted because of a collision will not be forwarded. Error checking of the actual data in the packet is left for the end device.
Shortest Path Bridging
Main article: Shortest Path Bridging
Shortest Path Bridging (SPB), specified in the IEEE 802.1aq standard, is a computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing.
It is a proposed replacement for Spanning Tree Protocol which blocks any redundant paths that could result in a layer 2 loop. SPB allows all paths to be active with multiple equal cost paths. SPB also increases the number of VLANs allowed on a layer 2 network