1 / 66

Wireless Technologies

Wireless Technologies. Group Presentation by:. Kevin Shaffer Standards Jill Young Bluetooth Dana Wiggins Wireless Personal Area Networks David White Business Sector Applications Robert Hambly Government Applications Ali Abedin Network Challenges Douglas Newton Security

vidal
Download Presentation

Wireless Technologies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless Technologies

  2. Group Presentation by: Kevin Shaffer Standards Jill Young Bluetooth Dana Wiggins Wireless Personal Area Networks David White Business Sector Applications Robert Hambly Government Applications Ali Abedin Network Challenges Douglas Newton Security Kamal Al-Nasser Costs Kofi Frimpong Future of Wireless

  3. Wireless Standards Kevin Shaffer

  4. Increases competition and lowers prices Provides interoperability Improves selection Formal Standards Process is Slow Collaboration may appear to violate anti-trust laws Collusion may occur, but not be caught Standardization

  5. IEEEhttp://www.ieee.org/ ANSIhttp://www.ansi.org/ ISOhttp://www.iso.ch/ ULhttp://www.ul.com/ FCChttp://www.fcc.gov/ ITUhttp://www.itu.int/ WiFi Alliancehttp://www.wi-fi.org/ WLANAhttp://www.wlana.org/ IETFhttp://www.ietf.org/ Influential Groups

  6. IEEE Wireless Standards 802 Series of Standards for Networking • 802.11 WiFi • a, b, e, g, i • 802.15 WPAN • 802.16 BBWA

  7. Local Area Networking • 802.11b • 11 Mbps top speed, subject to distance and interference (raw data rate) • CSMA/CA • 2.4 GHz spectrum, public, microwaves, cordless phones • 802.11g • 54 Mbps, compatible with ‘b’ • 802.11a • 54 Mbps, 5 GHz, also public spectrum

  8. Initiatives in Standardization • Implementing security for WLAN • 802.1X • EAP • No. of Channels depend on allocations • Japan 14 channels • Europe 13 • US 11

  9. Personal Area NetworksPANs and WPANs Jill Young

  10. Background • The term personal area network (PAN) is meant to describe interconnecting personal devices: notebooks, cell phones, personal digital assistants (PDAs) • Untethered version => WPAN, can be viewed as a “personal communications bubble around a person. Within this bubble, which moves as a person moves around, personal devices can connect to one another.” 1 • WPAN => mobile (versus, WLAN => portable) WPAN connection lasts only as long as it is needed; has a finite lifespan. Connections created by a mobile device are ad hoc and temporary; previous or future connections may or may not resemble devices to which it was or will be connected. Example: notebook computer may connect to a PDA for a moment; then to a digital camera; then to a cell phone; later it may connect to several of these devices simultaneously

  11. WPAN Architecture • IEEE Std. 802.15.1-2002 • Based on the Bluetooth™ specifications (Bluetooth is an industry specification for short-range radio frequency (RF)-based connectivity for portable personal devices) • Defines the lower transport layers [(Logical Link Control and Adaptation Protocol (L2CAP), Link Manager Protocol (LMP), baseband, and radio] of the Bluetooth™ wireless technology. • The IEEE 802.15.1 Task Group has reviewed and provided a standard adaptation of the Bluetooth specifications (version 1.1) medium access control (MAC) sublayer of the data link layer (DLL) and physical layer (PHY) (radio)

  12. Bluetooth WPAN • Technology uses a short-range radio link optimized for small, lightweight devices • Supports synchronous for telephony-grade voice communication and asynchronous communication channels for data communication • Operates in the 2.4 GHz ISM band, 1600 hops/s using 79 slotted channel packets of 625 ms duration. Each packet is transmitted on a different frequency in the hopping sequence. A packet nominally covers a single slot, but can be extended to three or four. (Figure follows for a general format for a single slot payload). • Full duplex is enabled with a fast time division duplex (TDD) scheme

  13. Topology - Piconet • Can link to 8 devices; Can link to other piconets to form a larger network. • Master/Slave relationship - One device designated as the piconet master and the other devices are slaves. • The master controls the piconet, scheduling frequencies and access control used by the master and the slaves. • All messages are sent from a slave to the master and from the master to a slave. The slaves do not communicate directly with each other. • All devices share the same frequency ranges so the network behaves in the same manner as a shared bus topology. • The master controls which channel will be used, so the master and the slave with which it is communicating are synchronized so that they both know which frequencies will be used at which point.

  14. WPAN Dana Wiggins

  15. WPAN A Wireless Personal Area Network is a system that allows independent data devices within mutual communication. (Braley, R., Gifford, I., & Heile, R., 2000)

  16. WPAN • Personal Network • Provides Connection Infrastructure • Handles Interactions Between digital Devices (Heile, 2000)

  17. WPAN • Worldwide 2.4 GHz ISM Band • 10 Meters in Diameter Range • Range can be extended to 100 meters (Braley, R., Gifford, I., & Heile, R., 2000)

  18. WPAN Disadvantages • Less Available Power • Association Problem • Reduced Data Rates (Fiskin, K., Partridge, K., & Chatterjee, S., 2002)

  19. WPAN The Institute of Electrical and Electronics Engineers (IEEE) has increased the speed of Wireless Personal Area Networks from 1MBps to 55MBps. (IEEE Increases Speeds for WPAN Networks, 2003)

  20. WPAN Speed Increase From 1MBps to 55MBps "We created the standard in response to the strong demand from end users and manufacturers who want to interconnect portable devices without undue expense yet transfer multimedia, still digital images and audio content in home networks,'' said Robert F. Heile, IEEE 802.15 working group chair. (IEEE Increases Speeds for WPAN Networks, 2003)

  21. Corporate Wireless Applications and Initiatives David T. White

  22. Overview of Industry Utilization and Implementations Corporate Deployments – Strong demand, lagging use University Campus - Represents the highest daily usage Public Retail Usage – Continued growth, next largest Home Wireless - Currently the smallest user base

  23. Hewlett-Packard Co. Implementations: • Company-Wide Deployment Internally • Wireless Access Point Deployment in Common Areas • Performance: 11Mbps for a Range of 150 Feet Device Type Usage: • Notebooks • PDA’s (IPAQ) • Blackberry

  24. Hewlett-Packard Co. cont. Implementation Benefits and Detail: • Limited Hardwiring Needed • Immediate Information When Mobile • Reduced Response Times for Support Teams • Single Signon (Same as Primary Account) • Seamless Roaming (Inside Buildings) • On-Campus Access Limitations

  25. Starbucks Infrastructure from Compaq / HP T-Mobile ISP Access Accounts Wireless access in over 2000 locations VPN company access if available Limitations on IM Security

  26. Consumer Wireless Access Points • 3044 Access Points • Account Cost $29.00 Locations: • Borders Books (1000 Locations) • Starbucks (2300 Locations) • American Airlines Clubs (500 Locations)

  27. Access Point Distribution

  28. Government Applications Robert Hambly

  29. The Basics • Mobile, Wireless, Mobile-Wireless • Mobile – capable of moving or being moved. • Wireless – without wires. • Almost all mobile devices are wireless, but wireless devices are not always mobile. • 30% of Federal Government Employees are Mobile • 2004 – 60% of Federal Government Employees carry or own three (3) mobile devices. • 2004 – USASOC (5/7)

  30. E-Government 2004 – 6 Billion Wireless Devices (PDA, computers, phones, GPS, etc.) Third World Nations – Bypassing Wired Connections University of Maryland Center for e-Service and Rockbridge Associates (Peoples’ Choice – Government Web Sites) E-Government Strategy Report (OMB-2002) – “primary focus of the ‘expanding E-Government’ initiative is on citizen service – to make it easy for citizens to obtain services…”

  31. E-Government Technology Requirements • Ubiquitous Interactivity • Mobile and Wireless • Handy and Available • Personal (tracked to an individual vs. department) • Location Aware (tracking when on)

  32. Technology Implications Accessibility – access to Government services and agencies at any time and from any place. Individuals can be targeted specifically and reached by a Government agency instantaneously. Global War On Terrorism (GWOT). Invasion of Privacy.

  33. Strategies for Successful Wireless Adoption • Dependent on Four (4) Factors: • Extent of Mobility in Target Segment • Information Access Needs • Security/Privacy Requirements • Technology Readiness of the Target Segment • Harvest the “Low Hanging Fruit”

  34. “Low Hanging Fruit” Sacramento Police Department: 800MHz radio network allowing data networking and helicopter video downlink. New Jersey Parking Enforcement: Hand-held devices print parking tickets and send information directly to DMV database. Edmonton, Alberta: Building Inspectors use mobile devices to enter inspection reports directly into database. Centers for Disease Control (CDC): GPS-equipped devices collect data on bio-terrorism related incidents.

  35. Network Challenges Ali Abedin

  36. Current Wireless LAN Challenges • Security Challenges • Roaming User Challenges • Configuration Challenges

  37. Current Wireless LAN Challenges • Security Challenges • Infrastructure Vulnerability to potential data thief. • Service Set Identifier (SSID) is a weak security. • Wired Equivalent Privacy (WEP) algorithm lacks a key management protocol.

  38. Current Wireless LAN Challenges • Roaming User Challenges • Maintaining Network Connectivity. • Network Access Permissions across subnets.

  39. Current Wireless LAN Challenges • Configuration Challenges • Multiple different network configurations

  40. References White Paper by Tom Fount, Microsoft Corporation, Published: July 2001, Retrieved from World Wide Web: 04/15/2003. http://www.microsoft.com/windowsxp/pro/techinfo/planning/wirelesslan/default.asp The Wireless LAN Alliance: www.alan.com The Wireless LAN Association (WLANA): www.wlana.org

  41. Wireless Networking Security Douglas Newton

  42. Wireless Networking Security Service Set Identifier (SSID): • The SSID, also called the network name, ensures that only wireless network devices configured with the same SSID are permitted access to the network. • The SSID name is included in the header of every data packet broadcast in the wireless network’s coverage area.

  43. Wireless Networking Security MAC filtering: • MAC address filtering is a mechanism that limits user access to the wireless network. • Access to the wireless network is limited based on the physical, hard-wired address of the units’ wireless network adapter. • A table stored in the wireless access point lists the MAC addresses that are permitted to participate in the wireless network.

  44. Wireless Networking Security Wireless Equivalency Privacy (WEP) encryption: • WEP encryption must be enabled to ensure that data is secured while in transit over the airwaves. • It uses standard 40-bit encryption to scramble data packets. • WEP provides a level of authentication based on the wireless node’s MAC address. • It works on the Data Link layer and the Physical layer of the OSI model.

More Related