0
Wireless Technologies
Group Presentation by: Kevin Shaffer  Standards Jill Young  Bluetooth Dana Wiggins  Wireless Personal Area Networks David ...
Wireless Standards Kevin Shaffer
Standardization <ul><li>Increases competition and lowers prices </li></ul><ul><li>Provides interoperability </li></ul><ul>...
Influential Groups <ul><li>IEEE http:// www.ieee.org /   </li></ul><ul><li>ANSI http:// www.ansi.org /   </li></ul><ul><li...
IEEE Wireless Standards <ul><li>802 Series of Standards for Networking </li></ul><ul><ul><li>802.11  WiFi </li></ul></ul><...
Local Area Networking <ul><li>802.11b </li></ul><ul><ul><li>11 Mbps top speed, subject to distance and interference (raw d...
Initiatives in Standardization <ul><li>Implementing security for WLAN </li></ul><ul><ul><li>802.1X </li></ul></ul><ul><ul>...
Personal Area Networks PANs and WPANs Jill Young
Background <ul><li>The term  personal area network  (PAN) is meant to describe interconnecting personal devices: notebooks...
 
WPAN Architecture   <ul><li>IEEE Std. 802.15.1-2002 </li></ul><ul><li>Based on the Bluetooth™ specifications (Bluetooth is...
Bluetooth WPAN <ul><li>Technology uses a short-range radio link optimized for small, lightweight devices </li></ul><ul><li...
 
 
 
Topology - Piconet   <ul><li>Can link to 8 devices; Can link to other piconets to form a larger network.  </li></ul><ul><l...
 
 
WPAN Dana Wiggins
WPAN <ul><li>A Wireless Personal Area Network is a system that allows independent data devices within mutual communication...
WPAN <ul><li>Personal Network </li></ul><ul><li>Provides Connection Infrastructure </li></ul><ul><li>Handles Interactions ...
WPAN <ul><li>Worldwide 2.4 GHz ISM Band </li></ul><ul><li>10 Meters in Diameter Range </li></ul><ul><li>Range can be exten...
WPAN <ul><li>Disadvantages </li></ul><ul><ul><li>Less Available Power </li></ul></ul><ul><ul><li>Association Problem </li>...
WPAN <ul><li>The Institute of Electrical and Electronics Engineers (IEEE) has increased the speed of Wireless Personal Are...
WPAN <ul><li>Speed Increase From 1MBps to 55MBps </li></ul>&quot;We created the standard in response to the strong demand ...
Corporate Wireless  Applications and Initiatives David T. White
Overview of Industry Utilization and Implementations Corporate Deployments – Strong demand, lagging use University Campus ...
Hewlett-Packard Co.   <ul><li>Implementations : </li></ul><ul><li>Company-Wide Deployment Internally </li></ul><ul><li>Wir...
Hewlett-Packard Co.   cont. <ul><li>Implementation Benefits and Detail: </li></ul><ul><li>Limited Hardwiring Needed </li><...
Starbucks <ul><li>Infrastructure from Compaq / HP </li></ul><ul><li>T-Mobile ISP Access Accounts </li></ul><ul><li>Wireles...
<ul><li>3044 Access Points </li></ul><ul><li>Account Cost $29.00 </li></ul><ul><li>Locations : </li></ul><ul><li>Borders B...
Access Point Distribution
Government Applications Robert Hambly
The Basics <ul><li>Mobile, Wireless, Mobile-Wireless </li></ul><ul><ul><li>Mobile – capable of moving or being moved. </li...
E-Government <ul><li>2004 – 6 Billion Wireless Devices (PDA, computers, phones, GPS, etc.) </li></ul><ul><li>Third World N...
E-Government Technology Requirements <ul><li>Ubiquitous Interactivity </li></ul><ul><ul><li>Mobile  and  Wireless </li></u...
Technology Implications <ul><li>Accessibility – access to Government services and agencies at any time and from any place....
Strategies for Successful Wireless Adoption <ul><li>Dependent on Four (4) Factors: </li></ul><ul><ul><li>Extent of Mobilit...
“ Low Hanging Fruit” <ul><li>Sacramento Police Department:  800MHz radio network allowing data networking and helicopter v...
Network Challenges Ali Abedin
Current Wireless LAN Challenges <ul><li>Security Challenges </li></ul><ul><li>Roaming User Challenges </li></ul><ul><li>Co...
Current Wireless LAN Challenges <ul><li>Security Challenges </li></ul><ul><ul><li>Infrastructure Vulnerability to potentia...
Current Wireless LAN Challenges <ul><li>Roaming User Challenges </li></ul><ul><ul><li>Maintaining Network Connectivity. </...
Current Wireless LAN Challenges <ul><li>Configuration Challenges </li></ul><ul><ul><li>Multiple different network configur...
References White Paper by Tom Fount, Microsoft Corporation, Published: July 2001, Retrieved from World Wide Web: 04/15/200...
Wireless Networking Security Douglas Newton
Wireless Networking Security  <ul><li>Service Set Identifier (SSID): </li></ul><ul><ul><li>The SSID, also called the netwo...
Wireless Networking Security  <ul><li>MAC filtering: </li></ul><ul><ul><li>MAC address filtering is a mechanism that limit...
Wireless Networking Security  <ul><li>Wireless Equivalency Privacy (WEP) encryption: </li></ul><ul><ul><li>WEP encryption ...
Wireless Networking Security  <ul><li>Wi-Fi Protected Access (WPA): </li></ul><ul><ul><li>WPA serves as a sort of security...
Wireless Cost and  Business Justification Kamal Al-Nasser
Wireless Cost and  Business Justification <ul><li>Overall driver is to lower TCO. </li></ul><ul><ul><li>Initial constructi...
Wireless Cost Case Study <ul><li>Interviews for this study were conducted with wireless LAN users in the following industr...
Wireless Cost Case Study <ul><li>Real-Time Access to Information.  One of the consistent findings of this study was:  </li...
Wireless Cost Case Study <ul><li>89% of the companies experienced a successful implementation.  </li></ul><ul><li>92% of r...
Wireless Cost Case Study <ul><li>The percentages for wireless LAN expenses, by category, were as follows:  </li></ul><ul><...
Wireless Cost Case Study <ul><li>With large investments in wireless LAN technology at approximately $300,000 to $4.2 milli...
Future of Wireless Kofi Frimpong
Wi-Fi: Wireless Technology That Matters <ul><li>Future Outlook </li></ul><ul><ul><li>Wi-Fi technology, also called  802.11...
Wi-Fi: Wireless Technology That Matters <ul><ul><li>Wi-Fi Hardware Solutions </li></ul></ul><ul><ul><ul><li>future develop...
Wireless Metropolitan-Area Networking(WiMAN) <ul><li>WirelessMAN </li></ul><ul><ul><li>IEEE 802.16(a) enable computers to ...
VOIP on WLANs <ul><li>VOIP involves implementing digital voice telephony over an Internet Protocol (IP) connection, typica...
Wireless Network Initiatives <ul><li>Wireless for the Disabled  (Technology Review: MIT ‘s mag., Dec. ’03/Jan. ‘04) </li><...
References <ul><li>Beyond patches and pills: the remarkable future of drug delivery.  Available:  http://www. eurekalert ....
Wireless Technologies Thank You
Upcoming SlideShare
Loading in...5
×

Wireless Technologies Group Presentation by:

1,217

Published on

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,217
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
37
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • The 802 series of standards promulgated by the IEEE support networking at the physical and data link layers of the OSI model. 802.11 is the familiar 11 Mbps or 54 Mbps WiFi standards. The ‘g’ is backward compatible with ‘b’, using the same frequency. ‘a’ is at a different frequency. WPAN is Wireless Personal Area Networking and BBWA is the Broad Band Wireless Access standards group. The 802.11 series is widely deployed and well known.
  • Figures and technical information from Specifications for WPANS , Retrieved on October 7, 2003 from http://standards.ieee.org/getieee802/download/802.15.1-2002_sectionone.pdf Retrieved on October 7, 2003 from http://standards.ieee.org/getieee802/download/802.15.1-2002_sectionone.pdf
  • 1.Specifications for WPANs, p.19 Retrieved on October 7, 2003 from http://standards.ieee.org/getieee802/download/802.15.1-2002_sectionone.pdf
  • Mapping OSI model to IEEE 802 AND 802.15.1 Standards
  • Radio: DSSS and FHSS operate at 2 Mbps in the 2.5 GHz band and provide a distance that can cover a small campus area (10 meters) Power consumption: 1 mW of transmit power The two most common kinds of radiated media used in wireless LANs are spread-spectrum radio (SSR) and infrared light ; SSR is the most widely used; there are two major types of SSR ( Frequency hopping and Direct sequencing) : Frequency hopping : this SSR technique changes the transmission frequency at regular intervals over a fixed spectrum; data are transmitted at one frequency, then the data are transmitted at a different frequency. Each piece of data is transmitted over several frequencies to increase the probability that it will be successfully received. Both Bluetooth and HomeRF rely on frequency hopping SSR Direct sequencing : this SSR transmission technique simultaneously transmits the same data on different frequencies in order to increase the probability of success. Most 802.11 WLANs use direct sequencing
  • The range is divided into 79 separate 1MHz channels. Each channel transmits a signal There are usually 1600 channel changes (called hops) per second
  • Format of an over the air payload bearing Bluetooth WPAN packet
  • Multi-slot packets
  • Time Division Duplexing (TDD) and timing
  • This approach minimizes interference because if one frequency channel suffers from interference, it will soon be avoided. Potential problem with DSSS interference if Bluetooth piconets are within 2 meters of an 802.11b NIC or Access Point
  • Meant to show WPAN applications. Also shows a LAN attached gateway (AG) Applications: Large warehouse floor; Disney/Epcot Center, hotel lobby Bluetooth enables devices such as printers, laptops, headsets, and fax machines to communicate Bluetooth chip – enables travelers to avoid carrying cords/cables for connectivity
  • A Wireless Personal Area Network is a wireless network composed of a number of independent data devices with in mutual communication range of each other (Braley, R., Gifford, I., &amp; Heile, R., 2000). Braley, R., Gifford, I., &amp; Heile, R. (2000). Wireless Personal Area Networks: An Overview of the IEEE P802.15 Working Group. ACM Sigmobile Mobile Computing and Communications Review, 4 (1), 26-33.
  • In effect a Wireless Personal Area Network is a personal network for a single individual, handling the person’s interactions with other digital devices, and provides the connection infrastructure between the various personal, home and office electronic systems that a person uses daily. The aim of a Wireless Personal Area Network is to address the problem of seamlessly getting information between devices (Heile, 2000). Heile, B. (2000, February 14). Wireless PANs Tie Data into Home. Electronic Engineering Times, 1100 , 110 – 111.
  • Due to general availability worldwide and low cost radio solutions, the 2.4 GHZ Industrial, Scientific and Medical band is the frequency of interest for Wireless Personal Area Network since no governmental approval is needed for transmission (Braley, R., Gifford, I., &amp; Heile, R., 2000; Thinkative Ltd., 1999-2002). Wireless Personal Area Network can operate in an area up to 10 meters in diameter. However, the range can be extended to 100 meters in order to support the home environment as well as for other uses (Braley, R., Gifford, I., &amp; Heile, R., 2000). Braley, R., Gifford, I., &amp; Heile, R. (2000). Wireless Personal Area Networks: An Overview of the IEEE P802.15 Working Group. ACM Sigmobile Mobile Computing and Communications Review, 4 (1), 26-33. Thinkative Ltd. (1999-2002). Wireless Glossary . Retrieved October19, 2003, from http://www.thinkative.com/wireless/glossary.html
  • Small devices are often limited to battery power, which limits wireless transfer of data. Research however is being conducted in ways to reduce power consumption. Another problem is with device association. If for example, two components are near each other, are they part of the same wireless network? With a wired network the answer is simple, with a wireless network the answer is not as clear. Also, data rates are reduced. Maximum data rates for a wired network far outstrip a wireless connection. However, many wireless applications have modest data rate requirements (Fiskin, K., Partridge, K., &amp; Chatterjee, S., 2002). Fiskin, K., Partridge, K., &amp; Chatterjee, S. (2002). Wireless User Interface Components for Personal Area Networks. Pervasive Computing, 1 (4), 49-55.
  • The Institute of Electrical and Electronics Engineers has increased the speed of Wireless Personal Area Networks from 1 Megabytes Per Second to 55 Megabytes Per Second for broad use of multimedia, digital imagery, high-quality audio and other high-bandwidth applications (IEEE Increases Speeds for WPAN Networks, 2003). IEEE Increases Speeds for WPAN Networks. (2003). RCR Wireless News, 22 (32), 13.
  • To quote the IEEE 802.15 Working Group Chair, quote “ We created the standard in response to the strong demand from end users and manufacturers who want to interconnect portable devices without undue expense yet transfer multimedia, still digital images and audio content in home networks”, end quote. IEEE Increases Speeds for WPAN Networks. (2003). RCR Wireless News, 22 (32), 13.
  • Corporate Deployments: Recent declines in earning have stalled corporate implementations. Demand is still strong for mobile workers for productivity, mail, Intranet, Internet, Custom Software Strong use by students in university campus environments. Contained environment within campus’ Public Usage: Retail – Starbucks. Flexible, requires an additional ISP account. Home Usage: Functional but limited in overall need. Low ROI. Low implementation cost.
  • Campus wide deployment: Conference rooms, common areas, most office have a moderate signal. Primary use is for conference rooms: Meetings, Training, Project Teams Signal is generally strong with moderate conflicts.
  • Future Use : Dedicated wireless user instead of only roaming usage Peripherals on wireless Mobile and Temp office usage for Home office working on campus temporarily Technology Upgrades for Performance
  • Overview of Compaq deployment and partnership with Starbucks
  • ISP for Starbucks and multiple others.
  • T-Mobiles North America wireless access point distribution. Goal – To show the full spectrum of HW Vendor to Retail Customer to Service Customer for the retail customers. Deployment for internal usage and retail usage for customers continues to gain acceptance and usefullness which will drive additional implementations.
  • There are always new challenges when a new networking medium is introduced into a new environment. Some of these challenges occur from the differences between wired LANs and wireless LANs. For example, there is a measure of security inherent in a cabled network where the data is contained by the cable plant. However, Wireless networks present new challenges, since data is traveling thru the air on radio waves. Other challenges arise out of the unique capabilities of wireless networking. With the freedom of movement gained by removing the wire, users are free to roam from room to room, building to building, city to city and so on, expecting uninterrupted connectivity all the time.
  •   With a wired network there is an inherent security in that a potential data thief has to gain access to the network through a wired connection, usually meaning physical access to the network cable plant. On top of this physical access, other security mechanisms can be layered. When wires no longer contain the network, the freedom gained by the users of the network can also be extended to the potential data thief. The network now may become available in the hallways, insecure waiting areas, even outside of the building. In a home environment, your network could extend to your neighbors houses if the proper security mechanisms aren’t adopted by the networking gear or used properly. Since its inception, 802.11 has provided some basic security mechanisms to make this enhanced freedom less of a potential threat. For example, Wi-Fi access points (or sets of access points) can be configured with a service set identifier (SSID). This SSID must also be known by the NIC in order to associate with the AP and thus proceed with data transmission and reception on the network. This is very weak security if at all because: • The SSID is well known by all NICs and APs • The SSID is sent through the air in the clear (even beaconed by the AP) • Whether the association is allowed if the SSID is not known can be controlled by the NIC/Driver locally • No encryption is provided through this scheme While there may be other problems with this scheme, already this is enough to stop none but the most casual of hacker. Additional security is provided through the 802.11 specifications through the Wired Equivalent Privacy (WEP) algorithm. WEP provides 802.11 with authentication and encryption services. The WEP algorithm defines the use of a 40-bit secret key for authentication and encryption and many IEEE 802.11 implementations also allow 104-bit secret keys. This algorithm provides mostly protection against eavesdropping and physical security attributes comparable to a wired network. A principal limitation to this security mechanism is that the standard does not define a key management protocol for distribution of the keys. This presumes that the secret, shared keys are delivered to the IEEE 802.11 wireless station via a secure channel independent of IEEE 802.11. This becomes even more challenging when a large number of stations are involved such as on a corporate campus. To provide a better mechanism for access control and security the inclusion of a key management protocol in the specification is required. The 802.1X standard, which is described later in this paper, was developed specifically to address this issue.
  •   As a user or station roams from access point to access point, an association must be maintained between the NIC and an access point for network connectivity to be maintained. This can present an especially difficult problem if the network is large and the user must cross subnet boundaries or realms of administrative control. If the user crosses a subnet boundary, the IP address originally assigned to the station may no longer be appropriate for the new subnet. If the transition involves a crossing of administrative domains, it is possible that the station may no longer be allowed to access the network in the new domain based on their credentials. Beyond simply roaming within a corporate campus, several other roaming user scenarios are very real. With airports and restaurants adding wireless connectivity to the Internet and wireless networks becoming popular networking solutions for the home. Now it becomes more likely the user could leave the office to meet with someone from another company that also has a compatible wireless network. On the way to this meeting the user could find himself in a train station, restaurant or airport with wireless access and need to retrieve files from the home office. It would be useful for this user to be authenticated and use this connection to access their corporate network. When the user arrives at their destination they he may not be allowed access to the local corporate network he is visiting. It would be fortuitous however, if the user could be provided access to the Internet in this foreign environment. This access could then be used to create a virtual private network connection to his corporate network. The user might then leave for home and wish to connect to his home network to upload or print files to work on that evening. The user has now roamed into a new wireless network, possibly even running in ad hoc mode. For the example above, roaming is a situation that must be carefully thought through. Configuration becomes an issue for the roaming user as multiple different network configurations could cause a challenge if the user’s wireless station is not somewhat self-configuring.
  • Now that we have a wireless network connection and the added complexity, there are potentially many more things to configure. For example we might need to configure the SSID of the network we are connecting to. Or, we might need to configure a set of WEP keys for security; possibly multiple sets if we have multiple networks to connect to. We might need to have a configuration for work where we have a network operating in infrastructure mode and a configuration for home where we are operating in ad hoc mode. Then we might need to choose which of these configurations to use based on where we are at this time.
  • Wi-Fi technology, also called 802.11, has emerged as an increasingly popular technology that provides high-speed wireless Internet access in many locations around the world (NAN,MAN), including airports, cafes, corporate offices, universities, factories and homes. Concourse Communications Reports in Sept. a surge in Airport WiFi Usage 19% increase in 30 days. In July 2003, there were about 15 airports in North America equipped with airport-wide WiFi including, LaGuardia, JFK, Newark Liberty, Detroit Wayne County Metropolitan Airport and the Minneapolis/St. Paul International Airport. These systems support wireless voice, data and video services offered by commercial wireless service providers, airport operators and their airline tenants. For more information, please visit www. concoursecommunications .com There will be around 12.8 million users of public WLAN services in the USA by 2007, with the total number of hotspots reaching 57 000 in locations such as airports, hotels and restaurants, according to Public Wireless LAN Access in Western Europe and the USA: market analysis and forecasts, a report published by Analysys, the global adviser on telecoms and new media. A wireless community, also called a Neighborhood Area Network (NAN) or a Metropolitan Area Network (MAN), lets you connect to the Internet cheaply and quickly. NANs are created when one or more people put up an 802.11b access point (AP), to cover a small geographic area. The coverage of a standard AP such as the Apple &amp;quot;AirPort&amp;quot; usually covers only one hundred square meters or so, but this can be extended up to 1 kilometer in radius if the AP owner uses an omnidirectional antenna. Neighbors participating in the NAN would then use a directional antenna pointed back at the AP, set up their own AP and then their neighbors will point back to them to connect and then they set up ...and so on, and so on, until you have the beginnings of a Metropolitan Area Network. (http://www.pdacortex.com/802_11b.htm) Researchers at NEC have taken Wi-Fi wireless connectivity to new levels by successfully demonstrating handovers between access points while traveling past them at bullet-train speed. The test involved four IEEE802.11b (the technology standard behind Apple&apos;s AirPort for Macs) access points placed at 500-metre intervals along a portion of the Japan Automobile Research Institute&apos;s test track in Ibaraki prefecture
  • IOGEAR, the connectivity and peripheral specialist, has announced that it will expand its product line to include Wi-Fi hardware solutions. Gartner estimates that by 2006, more than 99 million end-users will have Wi-Fi equipped devices. IOGEAR will enter the Wi-Fi market with the introduction of a number of innovative Wi-Fi access products, including USB 2.0 flex adapters, routers and CardBus cards. Worldwide wireless LAN hardware revenue is projected to grow to $3.2 billion in 2003, up about 100% from $1.6 billion in 2002, according to Infonetics Research&apos;s quarterly worldwide market share and forecast service, Wireless LAN Hardware.
  • 3. The 802.16a Standard WiMAX – Not just another standard Broadband wireless access provides more capacity at lower cost than DSL or cable for extending the fibre networks and supporting multimedia and fast internet applications in the enterprise or home. But it has been held back by the lack of a standard, so that solutions have been based on proprietary, single-vendor efforts. Standardization through the IEEE 802.16 specification raises the potential to: • Stall wired broadband and make wireless the key platform of the future • Extend the range of Wi-Fi so that the myth of ubiquitous wireless can become a reality • Provide an alternative or complement to 3G • Provide an economically viable communications infrastructure for developing countries and mobile blackspot regions in developed nations IEEE earlier this year passed a key amendment (IEEE 802.16a) to the 802.16 Standard which was approved in April, 2002. The 802.16 standard specifies the WirelessMAN-SC air interface, a single-carrier (SC) modulation scheme designed to operate in the 10-66 GHz spectrum. This opens the door for the creation of fixed Broadband Wireless Access (BWA), which could provide network access support to buildings with speeds that approach those offered by high-speed fiber optic networks. The new 802.16a standard defines three physical layer modes. It retains the single-carrier access method for special-purpose networks, but adds a 256-carrier orthogonal frequency division multiplexed , or OFDM, layer which splits the radio signal into multiple smaller sub-signals that are then transmitted simultaneously at different frequencies to the receiver, allowing for the transmission of large amounts of digital data and reducing multipath (reflections of a signal -- caused when the signal bounces off metal obstructions -- which can create interference). The standard also defines a 2,048-carrier OFDMA, or orthogonal frequency division multiple access, layer, which offers advanced multiplexing in tiered MANs and supports selective multicast applications.
  • There&apos;s been a lot of talk about voice over IP (VOIP) on wireless LANs (WLANs), but term &amp;quot;Wi-Fi&amp;quot; is really taking over lately. VOIP involves implementing digital voice telephony over an Internet Protocol (IP) connection, typically a LAN (sometimes with Internet connectivity as well, such as the services offered by Vonage and Net2Phone ), or the interconnection of LANs carrying voice traffic via WANs. Connections can be point-to-point and all-IP through a network, or gateways can be used to convert between VOIP signals and traditional telephone connections. Many believe that VOIP will eventually constitute all telephony, but if it happens, it is many years away. There are a lot of copper loops in the world, and these are by no means obsolete just because we can do voice over IP.
  • Researchers at the Rehabilitation Engineering Research Center on Mobile Wireless Technologies for Persons with Disabilities at the Georgia Institute of Technology are adapting wireless technology to aid millions of disabled people worldwide. Target is on wireless aids for mobility, vision, and hearing impairments. Captioning device – movie theatres: PDA’s, mini monitor on eye glasses, Remote Gesture Controls – Will allow the manipulation of switches and buttons with a wave of a hand. Audio Navigator – Will help the vision impaired using a GPS sensor mounted with preprogrammed routes. Pharmacy on a chip -- Having trouble remembering to take your medicine? Langer and others are developing a microchip that can be implanted under the skin to deliver drugs on cue. The chip has tiny reservoirs that can hold different types of medicine as well as varying doses of the same medicine. It can be programmed to release drugs at specific time intervals, and it could also change the way we think about medical recording. &amp;quot;Every time you take a drug, it could actually transmit that information from the chip to the computer at your house, to the doctor&apos;s office or hospital,&amp;quot; Langer says. (American Chemical Society&apos;s Pro Spectives Conference, &amp;quot;Future Directions of Drug Delivery Technologies,&amp;quot; in Boston in October - Robert Langer, Ph.D., a professor of chemical and biomedical engineering at Massachusetts Institute of Technology). Public release date: 25-Nov-2002 ,
  • Transcript of "Wireless Technologies Group Presentation by:"

    1. 1. Wireless Technologies
    2. 2. Group Presentation by: Kevin Shaffer Standards Jill Young Bluetooth Dana Wiggins Wireless Personal Area Networks David White Business Sector Applications Robert Hambly Government Applications Ali Abedin Network Challenges Douglas Newton Security Kamal Al-Nasser Costs Kofi Frimpong Future of Wireless
    3. 3. Wireless Standards Kevin Shaffer
    4. 4. Standardization <ul><li>Increases competition and lowers prices </li></ul><ul><li>Provides interoperability </li></ul><ul><li>Improves selection </li></ul><ul><li>Formal Standards Process is Slow </li></ul><ul><li>Collaboration may appear to violate anti-trust laws </li></ul><ul><li>Collusion may occur, but not be caught </li></ul>
    5. 5. Influential Groups <ul><li>IEEE http:// www.ieee.org / </li></ul><ul><li>ANSI http:// www.ansi.org / </li></ul><ul><li>ISO http:// www.iso.ch / </li></ul><ul><li>UL http:// www.ul.com / </li></ul><ul><li>FCC http:// www.fcc.gov / </li></ul><ul><li>ITU http:// www.itu.int / </li></ul><ul><li>WiFi Alliance http://www.wi-fi.org / </li></ul><ul><li>WLANA http:// www.wlana.org / </li></ul><ul><li>IETF http:// www.ietf.org / </li></ul>
    6. 6. IEEE Wireless Standards <ul><li>802 Series of Standards for Networking </li></ul><ul><ul><li>802.11 WiFi </li></ul></ul><ul><ul><ul><li>a, b, e, g, i </li></ul></ul></ul><ul><ul><li>802.15 WPAN </li></ul></ul><ul><ul><li>802.16 BBWA </li></ul></ul>
    7. 7. Local Area Networking <ul><li>802.11b </li></ul><ul><ul><li>11 Mbps top speed, subject to distance and interference (raw data rate) </li></ul></ul><ul><ul><li>CSMA/CA </li></ul></ul><ul><ul><li>2.4 GHz spectrum, public, microwaves, cordless phones </li></ul></ul><ul><li>802.11g </li></ul><ul><ul><li>54 Mbps, compatible with ‘b’ </li></ul></ul><ul><li>802.11a </li></ul><ul><ul><li>54 Mbps, 5 GHz, also public spectrum </li></ul></ul>
    8. 8. Initiatives in Standardization <ul><li>Implementing security for WLAN </li></ul><ul><ul><li>802.1X </li></ul></ul><ul><ul><li>EAP </li></ul></ul><ul><li>No. of Channels depend on allocations </li></ul><ul><ul><li>Japan 14 channels </li></ul></ul><ul><ul><li>Europe 13 </li></ul></ul><ul><ul><li>US 11 </li></ul></ul>
    9. 9. Personal Area Networks PANs and WPANs Jill Young
    10. 10. Background <ul><li>The term personal area network (PAN) is meant to describe interconnecting personal devices: notebooks, cell phones, personal digital assistants (PDAs) </li></ul><ul><li>Untethered version => WPAN, can be viewed as a “personal communications bubble around a person. Within this bubble, which moves as a person moves around, personal devices can connect to one another.” 1 </li></ul><ul><li>WPAN => mobile (versus, WLAN => portable) WPAN connection lasts only as long as it is needed; has a finite lifespan. Connections created by a mobile device are ad hoc and temporary; previous or future connections may or may not resemble devices to which it was or will be connected. Example: notebook computer may connect to a PDA for a moment; then to a digital camera; then to a cell phone; later it may connect to several of these devices simultaneously </li></ul>
    11. 12. WPAN Architecture <ul><li>IEEE Std. 802.15.1-2002 </li></ul><ul><li>Based on the Bluetooth™ specifications (Bluetooth is an industry specification for short-range radio frequency (RF)-based connectivity for portable personal devices) </li></ul><ul><li>Defines the lower transport layers [(Logical Link Control and Adaptation Protocol (L2CAP), Link Manager Protocol (LMP), baseband, and radio] of the Bluetooth™ wireless technology. </li></ul><ul><li>The IEEE 802.15.1 Task Group has reviewed and provided a standard adaptation of the Bluetooth specifications (version 1.1) medium access control (MAC) sublayer of the data link layer (DLL) and physical layer (PHY) (radio) </li></ul>
    12. 13. Bluetooth WPAN <ul><li>Technology uses a short-range radio link optimized for small, lightweight devices </li></ul><ul><li>Supports synchronous for telephony-grade voice communication and asynchronous communication channels for data communication </li></ul><ul><li>Operates in the 2.4 GHz ISM band, 1600 hops/s using 79 slotted channel packets of 625  s duration. Each packet is transmitted on a different frequency in the hopping sequence. A packet nominally covers a single slot, but can be extended to three or four. (Figure follows for a general format for a single slot payload). </li></ul><ul><li>Full duplex is enabled with a fast time division duplex (TDD) scheme </li></ul>
    13. 17. Topology - Piconet <ul><li>Can link to 8 devices; Can link to other piconets to form a larger network. </li></ul><ul><li>Master/Slave relationship - One device designated as the piconet master and the other devices are slaves. </li></ul><ul><li>The master controls the piconet, scheduling frequencies and access control used by the master and the slaves. </li></ul><ul><li>All messages are sent from a slave to the master and from the master to a slave. The slaves do not communicate directly with each other. </li></ul><ul><li>All devices share the same frequency ranges so the network behaves in the same manner as a shared bus topology. </li></ul><ul><li>The master controls which channel will be used, so the master and the slave with which it is communicating are synchronized so that they both know which frequencies will be used at which point. </li></ul>
    14. 20. WPAN Dana Wiggins
    15. 21. WPAN <ul><li>A Wireless Personal Area Network is a system that allows independent data devices within mutual communication. </li></ul>(Braley, R., Gifford, I., & Heile, R., 2000)
    16. 22. WPAN <ul><li>Personal Network </li></ul><ul><li>Provides Connection Infrastructure </li></ul><ul><li>Handles Interactions Between digital Devices </li></ul>(Heile, 2000)
    17. 23. WPAN <ul><li>Worldwide 2.4 GHz ISM Band </li></ul><ul><li>10 Meters in Diameter Range </li></ul><ul><li>Range can be extended to 100 meters </li></ul>(Braley, R., Gifford, I., & Heile, R., 2000)
    18. 24. WPAN <ul><li>Disadvantages </li></ul><ul><ul><li>Less Available Power </li></ul></ul><ul><ul><li>Association Problem </li></ul></ul><ul><ul><li>Reduced Data Rates </li></ul></ul>(Fiskin, K., Partridge, K., & Chatterjee, S., 2002)
    19. 25. WPAN <ul><li>The Institute of Electrical and Electronics Engineers (IEEE) has increased the speed of Wireless Personal Area Networks from 1MBps to 55MBps. </li></ul>(IEEE Increases Speeds for WPAN Networks, 2003)
    20. 26. WPAN <ul><li>Speed Increase From 1MBps to 55MBps </li></ul>&quot;We created the standard in response to the strong demand from end users and manufacturers who want to interconnect portable devices without undue expense yet transfer multimedia, still digital images and audio content in home networks,'' said Robert F. Heile, IEEE 802.15 working group chair. (IEEE Increases Speeds for WPAN Networks, 2003)
    21. 27. Corporate Wireless Applications and Initiatives David T. White
    22. 28. Overview of Industry Utilization and Implementations Corporate Deployments – Strong demand, lagging use University Campus - Represents the highest daily usage Public Retail Usage – Continued growth, next largest Home Wireless - Currently the smallest user base
    23. 29. Hewlett-Packard Co. <ul><li>Implementations : </li></ul><ul><li>Company-Wide Deployment Internally </li></ul><ul><li>Wireless Access Point Deployment in Common Areas </li></ul><ul><li>Performance: 11Mbps for a Range of 150 Feet </li></ul><ul><li>Device Type Usage : </li></ul><ul><li>Notebooks </li></ul><ul><li>PDA’s (IPAQ) </li></ul><ul><li>Blackberry </li></ul>
    24. 30. Hewlett-Packard Co. cont. <ul><li>Implementation Benefits and Detail: </li></ul><ul><li>Limited Hardwiring Needed </li></ul><ul><li>Immediate Information When Mobile </li></ul><ul><li>Reduced Response Times for Support Teams </li></ul><ul><li>Single Signon (Same as Primary Account) </li></ul><ul><li>Seamless Roaming (Inside Buildings) </li></ul><ul><li>On-Campus Access Limitations </li></ul>
    25. 31. Starbucks <ul><li>Infrastructure from Compaq / HP </li></ul><ul><li>T-Mobile ISP Access Accounts </li></ul><ul><li>Wireless access in over 2000 locations </li></ul><ul><li>VPN company access if available </li></ul><ul><li>Limitations on IM Security </li></ul>
    26. 32. <ul><li>3044 Access Points </li></ul><ul><li>Account Cost $29.00 </li></ul><ul><li>Locations : </li></ul><ul><li>Borders Books (1000 Locations) </li></ul><ul><li>Starbucks (2300 Locations) </li></ul><ul><li>American Airlines Clubs (500 Locations) </li></ul>Consumer Wireless Access Points
    27. 33. Access Point Distribution
    28. 34. Government Applications Robert Hambly
    29. 35. The Basics <ul><li>Mobile, Wireless, Mobile-Wireless </li></ul><ul><ul><li>Mobile – capable of moving or being moved. </li></ul></ul><ul><ul><li>Wireless – without wires. </li></ul></ul><ul><ul><li>Almost all mobile devices are wireless, but wireless devices are not always mobile. </li></ul></ul><ul><li>30% of Federal Government Employees are Mobile </li></ul><ul><li>2004 – 60% of Federal Government Employees carry or own three (3) mobile devices. </li></ul><ul><li>2004 – USASOC (5/7) </li></ul>
    30. 36. E-Government <ul><li>2004 – 6 Billion Wireless Devices (PDA, computers, phones, GPS, etc.) </li></ul><ul><li>Third World Nations – Bypassing Wired Connections </li></ul><ul><li>University of Maryland Center for e-Service and Rockbridge Associates (Peoples’ Choice – Government Web Sites) </li></ul><ul><li>E-Government Strategy Report (OMB-2002) – “primary focus of the ‘expanding E-Government’ initiative is on citizen service – to make it easy for citizens to obtain services…” </li></ul>
    31. 37. E-Government Technology Requirements <ul><li>Ubiquitous Interactivity </li></ul><ul><ul><li>Mobile and Wireless </li></ul></ul><ul><ul><li>Handy and Available </li></ul></ul><ul><li>Personal (tracked to an individual vs. department) </li></ul><ul><li>Location Aware (tracking when on) </li></ul>
    32. 38. Technology Implications <ul><li>Accessibility – access to Government services and agencies at any time and from any place. </li></ul><ul><li>Individuals can be targeted specifically and reached by a Government agency instantaneously. </li></ul><ul><li>Global War On Terrorism (GWOT). </li></ul><ul><li>Invasion of Privacy. </li></ul>
    33. 39. Strategies for Successful Wireless Adoption <ul><li>Dependent on Four (4) Factors: </li></ul><ul><ul><li>Extent of Mobility in Target Segment </li></ul></ul><ul><ul><li>Information Access Needs </li></ul></ul><ul><ul><li>Security/Privacy Requirements </li></ul></ul><ul><ul><li>Technology Readiness of the Target Segment </li></ul></ul><ul><li>Harvest the “Low Hanging Fruit” </li></ul>
    34. 40. “ Low Hanging Fruit” <ul><li>Sacramento Police Department: 800MHz radio network allowing data networking and helicopter video downlink. </li></ul><ul><li>New Jersey Parking Enforcement: Hand-held devices print parking tickets and send information directly to DMV database. </li></ul><ul><li>Edmonton, Alberta: Building Inspectors use mobile devices to enter inspection reports directly into database. </li></ul><ul><li>Centers for Disease Control (CDC): GPS-equipped devices collect data on bio-terrorism related incidents. </li></ul>
    35. 41. Network Challenges Ali Abedin
    36. 42. Current Wireless LAN Challenges <ul><li>Security Challenges </li></ul><ul><li>Roaming User Challenges </li></ul><ul><li>Configuration Challenges </li></ul>
    37. 43. Current Wireless LAN Challenges <ul><li>Security Challenges </li></ul><ul><ul><li>Infrastructure Vulnerability to potential data thief. </li></ul></ul><ul><ul><li>Service Set Identifier (SSID) is a weak security. </li></ul></ul><ul><ul><li>Wired Equivalent Privacy (WEP) algorithm lacks a key management protocol. </li></ul></ul>
    38. 44. Current Wireless LAN Challenges <ul><li>Roaming User Challenges </li></ul><ul><ul><li>Maintaining Network Connectivity. </li></ul></ul><ul><ul><li>Network Access Permissions across subnets. </li></ul></ul>
    39. 45. Current Wireless LAN Challenges <ul><li>Configuration Challenges </li></ul><ul><ul><li>Multiple different network configurations </li></ul></ul>
    40. 46. References White Paper by Tom Fount, Microsoft Corporation, Published: July 2001, Retrieved from World Wide Web: 04/15/2003. http://www.microsoft.com/windowsxp/pro/techinfo/planning/wirelesslan/default.asp The Wireless LAN Alliance: www.alan.com The Wireless LAN Association (WLANA): www.wlana.org
    41. 47. Wireless Networking Security Douglas Newton
    42. 48. Wireless Networking Security <ul><li>Service Set Identifier (SSID): </li></ul><ul><ul><li>The SSID, also called the network name, ensures that only wireless network devices configured with the same SSID are permitted access to the network. </li></ul></ul><ul><ul><li>The SSID name is included in the header of every data packet broadcast in the wireless network’s coverage area. </li></ul></ul>
    43. 49. Wireless Networking Security <ul><li>MAC filtering: </li></ul><ul><ul><li>MAC address filtering is a mechanism that limits user access to the wireless network. </li></ul></ul><ul><ul><li>Access to the wireless network is limited based on the physical, hard-wired address of the units’ wireless network adapter. </li></ul></ul><ul><ul><li>A table stored in the wireless access point lists the MAC addresses that are permitted to participate in the wireless network. </li></ul></ul>
    44. 50. Wireless Networking Security <ul><li>Wireless Equivalency Privacy (WEP) encryption: </li></ul><ul><ul><li>WEP encryption must be enabled to ensure that data is secured while in transit over the airwaves. </li></ul></ul><ul><ul><li>It uses standard 40-bit encryption to scramble data packets. </li></ul></ul><ul><ul><li>WEP provides a level of authentication based on the wireless node’s MAC address. </li></ul></ul><ul><ul><li>It works on the Data Link layer and the Physical layer of the OSI model. </li></ul></ul>
    45. 51. Wireless Networking Security <ul><li>Wi-Fi Protected Access (WPA): </li></ul><ul><ul><li>WPA serves as a sort of security protocol upgrade to WEP-enabled devices. </li></ul></ul><ul><ul><li>It offers security enhancements such as an encryption key integrity-checking feature and user authentication through the industry-standard Extensible Authentication Protocol (EAP). </li></ul></ul>
    46. 52. Wireless Cost and Business Justification Kamal Al-Nasser
    47. 53. Wireless Cost and Business Justification <ul><li>Overall driver is to lower TCO. </li></ul><ul><ul><li>Initial construction of network environments. </li></ul></ul><ul><ul><li>Ongoing maintenance. </li></ul></ul><ul><li>Increase end-user and IT productivity. </li></ul>
    48. 54. Wireless Cost Case Study <ul><li>Interviews for this study were conducted with wireless LAN users in the following industries: </li></ul><ul><li>Education: In-building K-12, University/College connectivity, Healthcare (Point of Care) </li></ul><ul><li>Manufacturing: Production, Distribution, Maintenance, Shipping, Receiving. </li></ul><ul><li>Retail: Point of Sale </li></ul><ul><li>Financial/Office –Automation: Stock Exchange, Banking, Consulting </li></ul><ul><li>http://wlana.org/learn/roi.htm </li></ul>
    49. 55. Wireless Cost Case Study <ul><li>Real-Time Access to Information. One of the consistent findings of this study was: </li></ul><ul><ul><li>How end-users benefited from real-time information. </li></ul></ul><ul><ul><li>97% of respondents said they either strongly agree or agree that the wireless LAN contributed to the speed in which they completed a task requiring real-time or near real-time access to information. </li></ul></ul>
    50. 56. Wireless Cost Case Study <ul><li>89% of the companies experienced a successful implementation. </li></ul><ul><li>92% of respondents interviewed believe there is a definite economic and business benefit after installation. </li></ul><ul><li>92% of respondents reported that they will continue to deploy wireless technology in their network through 2000 because of the benefits experienced by end users and/or IT staff. </li></ul><ul><li>Payback was less than one year, across all industries surveyed. </li></ul><ul><li>The survey combines both telephone and written responses from 34 organizations </li></ul>
    51. 57. Wireless Cost Case Study <ul><li>The percentages for wireless LAN expenses, by category, were as follows: </li></ul><ul><ul><li>WLAN Hardware/End User Devices: 50% </li></ul></ul><ul><ul><li>Monthly expenses: 1%% </li></ul></ul><ul><ul><li>Management expenses: 16% </li></ul></ul><ul><ul><li>Application development expenses: 16% Outsourcing: 16% Downtime: 1% </li></ul></ul>
    52. 58. Wireless Cost Case Study <ul><li>With large investments in wireless LAN technology at approximately $300,000 to $4.2 million dollars per year </li></ul><ul><li>Organizations implementing an average of 300 client cards reaped annual savings of up to $4.9 million, which translated into per user savings of $15,989. </li></ul><ul><li>Across all industries, the wireless LAN paid for itself within 12 months time. </li></ul>
    53. 59. Future of Wireless Kofi Frimpong
    54. 60. Wi-Fi: Wireless Technology That Matters <ul><li>Future Outlook </li></ul><ul><ul><li>Wi-Fi technology, also called 802.11 , provides high-speed wireless Internet access in many locations around the world called Hotspots , including airports, cafes, corporate offices, universities, factories and homes. </li></ul></ul><ul><ul><li>Providers: Boingo Wireless, HereUAre Communications, Joltage, FatPort, and Surf and Sip. T-Mobile and AT&T Wireless have joined and Sprint PCS and Verizon Wireless say it is an important part of their 3G wireless strategy. </li></ul></ul><ul><ul><ul><li>Eg. Starbucks, Newark Liberty airport; McDonalds in Idaho ( http://www. iwifi -here.com/ WiFi -Locations. htm ) </li></ul></ul></ul><ul><ul><ul><li>Recent test – Airport WiFi tested at 205MPH (330kph)in Tokyo by NEC (http://www. macworld .co. uk /news/main_news. cfm ? NewsID =7114) </li></ul></ul></ul><ul><ul><li>Wi-Fi Growth Predictions - Standards </li></ul></ul><ul><ul><ul><li>802.11g – variant of 802.11a but uses same 2.4 GHz frequency as current Wi-Fi </li></ul></ul></ul><ul><ul><ul><li>802.11i - addresses security weaknesses inherent to the technology </li></ul></ul></ul><ul><ul><ul><li>802.11h – aimed at meeting regional needs. Will add some capabilities to 802.11a that allows it to meet certain frequency-regulation requirements in Europe. </li></ul></ul></ul><ul><ul><ul><li>802.11j – Also aimed at meeting regional needs. Will adapt 802.11a for Japan. </li></ul></ul></ul>
    55. 61. Wi-Fi: Wireless Technology That Matters <ul><ul><li>Wi-Fi Hardware Solutions </li></ul></ul><ul><ul><ul><li>future developments will be shaped by the following issues: (1) the continued growth and evolution of dual-mode 2.4/5GHz capable equipment, (2) Intel’s ability to push outs its Banias mobile platform, which includes a Wi-Fi mini-PCI solution, and (3)the shift toward 802.11g as the preferred 2.4 GHz WLAN technology. </li></ul></ul></ul><ul><ul><li>IOGear – the connectivity and peripheral specialist, current and future products. http://www. iogear .com/ </li></ul></ul> Wireless-G USB 2.0 Flex Adapter Rotates 300 degrees in any direction and pivots 180 degrees for optimum reception. Plugs into the USB port to leave your CardBus slots free for other devices. Wireless-G Notebook Network Card Low profile antenna leaves room for other Card Bus connections to operate simultaneously. Software Access Point included for systems running Windows XP. Wireless-G Broadband Gateway/Print Server An all-in-one wireless access point, router and print server for both small and home office users. Surf the Internet, share files, chat with your friends, and print... Wirelessly!
    56. 62. Wireless Metropolitan-Area Networking(WiMAN) <ul><li>WirelessMAN </li></ul><ul><ul><li>IEEE 802.16(a) enable computers to communicate wirelessly over kilometers </li></ul></ul><ul><ul><li>WiMAX Forum – Industry group of about 25 companies including Intel and Nokia formed to promote the new technology. </li></ul></ul><ul><ul><li>Compatible product should be available by end of 2004. </li></ul></ul>
    57. 63. VOIP on WLANs <ul><li>VOIP involves implementing digital voice telephony over an Internet Protocol (IP) connection, typically a LAN, or the interconnection of LANs carrying voice traffic via WANs. </li></ul><ul><li>Point-to-point and all-IP through a network connection, or gateways can be used to convert between VOIP signals and traditional telephone conversations. </li></ul><ul><li>“ Point Coordination Function” mechanism of 802.11 standard is being improved by IEEE 802.11e Working Group to further enhance the performance of time-bounded packets within a wireless LAN. </li></ul><ul><li>Analyst predict VOIP on WLANS will be major driver of WLANS installations over next couple of years. </li></ul><ul><li>VOIP product already exists from </li></ul><ul><ul><li>Cisco (Cisco Wireless IP Phone 7920 – uses IEEE 802.11b - http://www. cisco .com/en/US/products/hw/phones/ps379/ps5056/index.html ) </li></ul></ul><ul><ul><li>Spectralink (Netlink e340 and i640 Wireless Telephones - http://www. spectralink .com/) </li></ul></ul><ul><ul><li>Telesym(SymPhone System– Delivers high-quality voice communication on Laptops, PCs and Pocket PC mobile devices with 802.11 wireless IP networks). Available http://www. telesym .com/ . </li></ul></ul>
    58. 64. Wireless Network Initiatives <ul><li>Wireless for the Disabled (Technology Review: MIT ‘s mag., Dec. ’03/Jan. ‘04) </li></ul><ul><li>Researchers at the Rehabilitation Engineering Research Center on Mobile Wireless Technologies for Persons with Disabilities at the Georgia Institute of Technology are adapting wireless technology to aid millions of disabled people worldwide. Target is on wireless aids for mobility, vision, and hearing impairments. </li></ul><ul><ul><li>Captioning device – movie theatres: PDA’s, mini monitor on eye glasses, </li></ul></ul><ul><ul><li>Remote Gesture Controls – Will allow the manipulation of switches and buttons with a wave of a hand. </li></ul></ul><ul><ul><li>Audio Navigator – Will help the vision impaired using a GPS sensor mounted with preprogrammed routes. </li></ul></ul><ul><li>Pharmacy on a chip - an under-skin pharmacy on a microchip </li></ul><ul><ul><li>Chip has tiny reservoirs that can hold different types of medicine as well as varying doses of the same medicine </li></ul></ul><ul><ul><li>Can be programmed to release drugs at specific time intervals, and it could also change the way we think about medical recording. </li></ul></ul><ul><li>Upcoming Events </li></ul><ul><ul><li>Wi - Fi Planet Conference & Expo , December 2 - 5, 2003 at the McEnery Convention Center in San Jose, Calif., where Margaret LaBrecque, marketing manager in Intel's Broadband Wireless division and the president of the WiMax Forum, will discuss how WiMax will work in conjunction with 802.11 in a panel called &quot;Fatter Wireless Pipes: How do they Fit into the Wi-Fi Landscape . </li></ul></ul>
    59. 65. References <ul><li>Beyond patches and pills: the remarkable future of drug delivery. Available: http://www. eurekalert .org/pub_releases/2002-11/ acs -bpa112502. php . Last modified November 25, 2002. </li></ul><ul><li>Genesis Of An Anthill: Wireless Technology And Self-Organizing Systems http://www.acm.org/ubiquity/views/e_andersen_8.html </li></ul><ul><li>IEEE Advances Wirelesss MAN Standard. Available: http://www. wi - fiplanet .com/news/article. php /1577591 . Last modified January 31, 2003 </li></ul><ul><li>McDonald’s WiFi Locations in Idaho. Available http://www. iwifi .us/hotspots/ mcdonalds - wifi - locatiions -in-Idaho. htm </li></ul><ul><li>VOIP on WLANs. http://wireless.itworld.com/4285/031030voip1/page_1.html . Last modified October 31, 2003. </li></ul><ul><li>WiMAX: The Critical Wireless Standard. Available: http://www. arcchart .com/pr/blueprint/ pdf / BluePrint _ WiFi _REPORT_I. pdf . Last modified October 2003 </li></ul><ul><li>Wireless for the Disabled. Available: Technology Review (MIT). December 2003/January 2004. </li></ul>
    60. 66. Wireless Technologies Thank You
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×