Write summary

MLA format, summary of this power point

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Wireless Technologies

Presented by

Sean Shields

And

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Gabriel Taveras

Definition
Term “Wireless” refers to all the communications sent and received without wires.

So Wireless Technology
Means a technology that use radio waves to transmit or receive data.

Wi-Fi
Bluetooth
Cellular
Wimax

TYPES OF
TECHNOLOGIES

INTRODUCTION:
Wireless Fidelity termed as Wi-Fi uses the IEEE 802.11 specification to create a wireless local-area network.
A Wi-Fi network basically consists of a wired connection to the Internet that leads to a wireless router for transmutation and receiving data from individual devices, connecting them not only to the outside world but also to each other.

HOW WIFI WORKS?
1. All devices use a wireless adapter to convert request into a radio signal and broadcasts it into the air.
2. The Wi-Fi device, or wireless router, picks up the signal and translates it back into its original form.
3. The router passes the request to the Internet using a hardwired connection.
4. The Internet returns the requested information to the router across the same connection.
5. The router converts the information into a radio signal and broadcasts it into the air.
6. The computer or cell phone’s wireless adapter picks up the information and displays it on your screen

WIFI TOPOLOGIES

Wifi have following topologies
AP-based topology (Infrastructure Mode)
Peer-to-peer topology (Ad-hoc Mode)
Point-to-multipoint bridge topology

Wi Fi Network

Wireless Standards
802.11
In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the first WLAN standard. They called it 802.11 after the name of the group formed to oversee its development. Unfortunately, 802.11 only supported a maximum network bandwidth of 2 Mbps – too slow for most applications. For this reason, ordinary 802.11 wireless products are no longer manufactured.

Wireless Standards
802.11b
IEEE expanded on the original 802.11 standard in July 1999, creating the 802.11b specification. 802.11b supports bandwidth up to 11 Mbps, comparable to traditional Ethernet.

Wireless Standards
802.11a
Supports bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz. This higher frequency compared to 802.11b shortens the range of 802.11a networks. The higher frequency also means 802.11a signals have more difficulty penetrating walls and other obstructions.

Wireless Standards
802.11g
Attempts to combine the best of both 802.11a and 802.11b. 802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4 Ghz frequency for greater range. 802.11g is backwards compatible with 802.11b, meaning that 802.11g access points will work with 802.11b wireless network adapters and vice versa.

Wireless Standards
802.11n
The newest IEEE standard in the Wi-Fi category is 802.11n.
802.11n connections support data rates of over 100 Mbps. 802.11n also offers somewhat better range over earlier Wi-Fi standards due to its increased signal intensity.

Wireless Technologies
Bluetooth
Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, creating personal area networks (PANs) with high levels of security.
Bluetooth supports a very short range (approximately 10 meters) and relatively low bandwidth (1-3 Mbps) designed for low-power network devices like handhelds.

Bluetooth
Bluetooth was standardized as IEEE 802.15.1, but the standard is no longer maintained. The SIG oversees the development of the specification, manages the qualification program, and protects the trademarks. To be marketed as a Bluetooth device, it must be qualified to standards defined by the SIG. A network of patents is required to implement the technology, which is licensed only for that qualifying device.

Bluetooth vs. Wi-Fi
Bluetooth and Wi-Fi have some similar applications, setting up networks, printing, or transferring files. Wi-Fi is intended as a replacement for high speed cabling for general local area network access in work areas. Bluetooth was intended for portable equipment and its applications. Bluetooth is a replacement for cabling in a variety of personally carried applications in any setting and also works for fixed location applications such as smart energy functionality in the home (thermostats, etc.).
Wi-Fi and Bluetooth are to some extent complementary in their applications and usage. Wi-Fi is usually access point-centered. Bluetooth is usually between two Bluetooth devices. Bluetooth serves well in simple applications where two devices need to connect with minimal configuration like in headsets and remote controls, while Wi-Fi suits better in applications where some degree of client configuration is possible and high speeds are required.

Wireless Technologies
WiMax
WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide 30 to 40 megabit-per-second data rates, with the 2011 update providing up to 1 Gbit/s for fixed stations.
WiMax was developed separately from Wi-Fi and is designed for long-range networking (spanning miles or kilometers) as opposed to local area wireless networking.

Wireless Technologies
WiMAX is sometimes referred to as “Wi-Fi on steroids” and can be used for a number of applications including broadband connections, cellular backhaul, and hotspots. It is similar to Wi-Fi, but it can enable usage at much greater distances.

Wireless LAN
A wireless local area network (WLAN) links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an access point to the wider Internet. This gives users the ability to move around within a local coverage area and still be connected to the network.

Wireless LAN
A communications network that provides connectivity to wireless devices within a limited geographic area.
Wi-Fi is the universal standard for wireless networks and is the wireless equivalent of wired Ethernet networks.

Principles of WLAN
Stations
Basic Server Set
Extended Server Set
Distribution System

Stations
All components that can connect into a wireless medium in a network are referred to as stations. All stations are equipped with wireless network interface controllers (WNICs). Wireless stations fall into one of two categories: access points, and clients. Access points (APs), normally routers, are base stations for the wireless network. They transmit and receive radio frequencies for wireless enabled devices to communicate with.

Stations

Basic service set
The basic service set (BSS) is a set of all stations that can communicate with each other. Every BSS has an identification (ID) called the BSSID, which is the MAC address of the access point servicing the BSS.
There are two types of BSS: Independent BSS and infrastructure BSS. An independent BSS (IBSS) is an ad hoc network that contains no access points, which means they can not connect to any other basic service set.

Basic service set
1)Infrastructure BSS
2) Independent BSS

Extended service set
An extended service set (ESS) is a set of connected BSSs. Access points in an ESS are connected by a distribution system. Each ESS has an ID called the SSID which is a 32-byte (maximum) character string.

Distribution system
A distribution system (DS) connects access points in an extended service set. The concept of a DS can be used to increase network coverage through roaming between cells.

Advantages of WLAN
NO WIRES
It is easier to add or move workstations.
It is easier to provide connectivity in areas where it is difficult to lay cable.
Installation is fast and easy, and it can eliminate the need to pull cable through walls and ceilings.
Access to the network can be from anywhere within range of an access point.

WLAN

Wireless Personal Area Network
A wireless personal area network is a low-range wireless network which covers an area of only a few dozen meters. This sort of network is generally used for linking peripheral devices to a computer, or just two nearby computers, without using a hard-wired connection. Eg. printers, cell phones, and home appliances or (PDA)

WPAN
One such technology is Bluetooth.

Cellular Wide Area Networks
A Cellular Wide Area Network is a wireless network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station. In a cellular network, each cell uses a different set of frequencies from neighboring cells, to avoid interference and provide guaranteed bandwidth within each cell. When joined together these cells provide radio coverage over a wide geographic area.

Cellular Wide Area Networks
Some cellular modems are used with CardBus slots, or connect to a USB port. Cellular modems that use the GSM system require you to activate the SIM card, which contains subscriber details that identifies the caller to the network service provider.
Cellular modems that use the CDMA system do not use SIM cards, but instead use a utility provided by the mobile network provider to make the connection to the cellular network.

(Global System for Mobile Communications) (Subscriber Identity Module) (Code Division Multiple Access)
32

Cellular Area Network

Cellular Wide Area Networks
2 G
2G (which stands for second-generation, 1G being the first-generation which operated at speeds between 2.9KBps and 5.6KBps.) technology was first commercially launched on the GSM standard in Finland in 1991. 2G data rates range from 56 kbps up to 200 kbps depending upon your location.

Cellular Wide Area Networks
3G (third-generation) mobile communications is specified by the International Mobile Telecommunications-2000 (IMT-2000) specification by the International Telecommunication Union. To meet the IMT-2000 standards, a system is required to provide peak data rates of at least 200 kbps. Some locations can provide 3G data rates up to 2.5Mbps.

Cellular Wide Area Networks
4G (fourth generation) cellular mobile communications is specified by the International Mobile Telecommunications-Advanced (IMT-Advanced) specification. The IMT-Advanced standards require a peak speed of 100 Mbps for high mobility communication (such as from trains and cars) and 1 Gbps for low mobility communication (such as pedestrians and stationary users).

Satellite Network
Satellite Internet access is Internet access provided through communications satellites. Modern satellite Internet service is typically provided to users through geostationary satellites that can offer high data speeds, with newer satellites achieving downstream data speeds up to 15 Mbps

Wireless Personal Area Network

A Satellite Network generally relies on three primary components:
Satellite
Gateway
Antenna dish/modem

Satellite Network

Satellite
A satellite has its own set of antennas to receive communication signals from Earth and to transmit signals to their target location. These antennas and transponders are part of the satellite’s “payload”, which is designed to receive and transmit signals to and from various places on Earth. What enables this transmission and reception in the payload transponders is a repeater subsystem (RF (radio frequency) equipment) used to change frequencies, filter, separate, amplify and group signals before routing them to their destination address on Earth.

Gateways
The Gateway is also referred to as a ground station, teleport or hub. The term is sometimes used to describe just the antenna dish portion, or it can refer to the complete system with all associated components. In short, the gateway receives radio wave signals from the satellite on the last leg of the return or upstream payload, carrying the request originating from the end-user’s site.

Antenna dish/modem
Outdoor Unit
At the far-end of the outdoor unit is a small (2–3 foot diameter), reflective dish-type radio antenna constructed from and coated with a variety of materials.
There are four characteristic settings used to ensure that the antenna is configured correctly at the satellite.

Antenna dish/modem
Azimuth,( angular measurement) Elevation, Polarization, (the orientation of electromagnetic waves which converts electric power into radio waves, and vice versa), and Skew (It is a technique to improve the horizontal radiation pattern of a high power transmitter station).
The combination of these settings gives the outdoor unit a Line-of-sight to the chosen satellite and makes data transmission possible.

Antenna dish/modem
Indoor Unit
The Satellite Modem serves as an interface between the outdoor unit and customer provided equipment (i.e. PC, router) and controls satellite transmission and reception.
Coaxial cable (COAX) connectivity to the satellite antenna. The cable carrying electromagnetic satellite signals between the modem and the antenna generally is limited to be no more than 150 feet in length

Antenna dish/modem
Ethernet connectivity to the computer, carrying the customer’s data packets to and from the Internet content servers.
Satellite modems employ either the DOCSIS (Data Over Cable Service Interface Specification) or WiMAX (World Interoperability for Microwave Access) telecommunication standard to communicate with the assigned gateway.

Satellite Networks
Examples:
Dish Network
Direct TV
GPS

How a satellite works

Current and Future Wireless APPS
AT & T
New APP
Car to Car

New APP II
AT&T APP

New APP
Car APP

Future wireless APP
Car 2X

Wireless security and Limitation
Wireless data networks are found everywhere. Each time there is a wireless transmission, you are vulnerable to any wireless attacks and are subjects to wireless attacks. At first, there were design flaws in the security mechanisms of the 802.11, however there have been significant changes in wireless network security for users to enjoy without the fear of attacks such as eavesdropping, or tamper with wireless transmissions.

How They Attack
One of the first steps in attacking a wireless network is to discover the network. Afterwards, an Access Point sends a signal (beacon frame) to announce its presence and provides the necessary information to a device who wishes to join the wireless network. The process is called beaconing to establish and maintain communications. Attackers will use beaconing to find wireless networks and then record information about them.

Attacks
War Driving – searching for wireless signals from an automobile or on foot using a portable computing device.
Some tools are necessary to conduct war driving…

Attacks
War Chalking – After the wireless signal has been detected, the next step is to document and then advertise the location of the wireless LANs for others to use. WLANs are identified with drawings on the walls around the area network.

Attacks
Wireless Protocol Analyzer – wireless traffic can be captured to decode and analyze its contents by a protocol analyzer device or a computer that runs protocol analyzer software.
“Parking Lot” Attack – Attackers who actually sit in the organization’s parking lot and try to access internal hosts via the wireless network. Access points emit radio signals in a circular pattern, and the signals sometimes extend beyond the physical boundaries of the area they intend cover. Signals can be intercepted outside buildings, or even through the floors in multi-storey buildings.
Service Set Identifier Flaw – Access points come with default SSIDs and when connecting to a wireless device it generates a broadcast. An attacker must determine a valid SSID to be authenticated. Easiest way to do so is to wait for the transmission of the SSID from the AP to the wireless device or use an SSID that is already obtained.

Vulnerabilities
MAC Address Filtering
Media Access Control (MAC) address filtering that is a method for controlling access to a WLAN based on the device’s MAC address. A wireless device’s MAC address is entered into software running on the AP, which then is used to permit or deny a device from connecting to the network. MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format. An attacker using a protocol analyzer can easily see the MAC address of an approved device and then substitute it on his own device. Another weakness of MAC address filtering is that managing a large number of MAC addresses can pose significant challenges. The sheer number of users often makes it difficult to manage all of the MAC addresses. As new users are added to the network and old users leave, keeping track of MAC address filtering demands almost constant attention.

Vulnerabilities
SSID Broadcast
Some wireless security sources encourage users to configure their APs to prevent the beacon frame from including the SSID, and instead require the user to enter the SSID manually on the wireless device. Although it provides a weak degree of security and has several limitations:
● The SSID can be easily discovered even when it is not contained in beacon frames because it is transmitted in other management frames sent by the AP. Attackers with protocol analyzers can still detect the SSID.
● Turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another.
● It is not always possible or convenient to turn off SSID beaconing. SSID beaconing is the default mode in virtually every AP, and not all APs allow beaconing to be turned off.

Vulnerabilities
WEP
The original encryption protocol developed for wireless networks. As its name implies, WEP was designed to provide the same level of security as wired networks. However, WEP has many well-known security flaws, is difficult to configure, and is easily broken.

Security Tips

1.Don’t leave your wireless device unattended;
2. Protect your device with passwords: Enable your device’s power-on login and system login authentication
3. Disable the wireless connection when not in use.

Security Tips
4. Keep wireless network interface card drivers up to date.
5. Use WPA and WPA2 security with TKIP and AES encryption
6. Antenna Placement – For security purposes, the AP and its antenna should be positioned so that when possible a minimal amount of signal reaches beyond the security perimeter of the building or campus

Security Tips
7. the ability to adjust the level of power at which the WLAN transmits. On devices with that feature, the power can be adjusted so that less of the signal leaves the premises and reaches outsiders.
8. Setup wireless virtual LANs

“Automatic communication between various devices within a small area in a
house or an office makes it possible. When you click on an icon for a device and you are linked to it, automatically and transparently”

ADVANTAGES:

Wireless
Low energy consumption
Bluetooth is automatic

DISADVANATAGES:
Slow data rates

Bluetooth Sensors

A wearable computer is a computer that is subsumed into the personal space of the user, controlled by the user, and has both operational and interactional constancy, i.e. is always on and always accessible. Most notably, it is a device that is always with the user, and into which the user can always enter commands and execute a set of such entered commands, and in which the user can do so while walking around or doing other activities”
Wireless Wearable Computing Devices

Wireless Wearable Computing Devices

References:
Kahn, J.M., et al. Next Century Challenges: Mobile Networking for Smart Dust. ACM Mobicom, 1999.
Estrin, D. et al. Next Century Challenges: Scalable Coordination in Sensor Networks. ACM Mobicom, 1999.

https://www.us-cert.gov/ncas/tips/ST05-015

http://compnetworking.about.com/cs/bluetooth/g/bldef_bluetooth.htm

http://www.bluetooth.com/Pages/what-is-bluetooth-technology.aspx

http://www.ti.com/ww/en/wireless_power/12417_New_Landing_Page_BLE/index.shtml

http://
esupport.sony.com/perl/support-info.pl?info_id=66

http://
computer.howstuffworks.com/ssid.htm

http://www.dummies.com/how-to/content/wireless-security-protocols-wep-wpa-and-wpa2.html
 

THANK YOU

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER