PPT-File (10 MB)


Published on

1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

PPT-File (10 MB)

  1. 2. Agenda <ul><li>Introduction </li></ul><ul><ul><li>Positioning of PAN/LAN/WAN </li></ul></ul><ul><ul><li>Wireless Local Area Network (WLAN) and 802.11 </li></ul></ul><ul><ul><li>Personal Area Networks (PAN) and Bluetooth </li></ul></ul><ul><li>Future Wireless Technologies </li></ul><ul><li>IBM Mobile Wireless Technology </li></ul>
  2. 3. Penetration of Technology Opportunities for Connection
  3. 4. Technology Positioning Person Space (office, briefcase, person) On-campus (Office, School, Airport, Hotel) Off-campus (Open areas) Cellular (Kilometers) 802.11b (10’s-100’s of meters) Bluetooth (meters to 10’s of meters) Geography Nomenclature Wireless Technology PAN LAN WAN
  4. 5. 1. Wireless Local Area Networks (WLAN) 2. WLAN Components 3. IEEE 802.11 ? 4. Mixing Vendor Equipment 5. Wireless and wired LAN interoperability 6. WLAN Range 7. Access Points 8. Roaming 9. Using a WLAN to Interconnect two LANs 10. WLAN Scenarios 11. Security 12. Technology Comparisons WLAN Augment Wired LANs LAN Access Point Peer-to-peer collaboration Infrastructure Ad hoc
  5. 6. Worldwide WLAN Sales ($ in Millions)
  6. 7. Wireless Local Area Networks (WLAN) <ul><li>Two or more computers connected wirelessly using standard network protocols </li></ul><ul><li>The current buzzword however generally refers to wireless LANs (WLAN). </li></ul><ul><li>Controlled by a standards committee (IEEE 802.11) </li></ul><ul><li>WLAN solutions for: </li></ul><ul><ul><li>Business </li></ul></ul><ul><ul><li>Education </li></ul></ul><ul><ul><li>Applications where network wiring is impossible </li></ul></ul><ul><ul><ul><li>Warehousing </li></ul></ul></ul><ul><ul><ul><li>Point-of-sale handheld equipment. </li></ul></ul></ul>
  7. 8. WLAN Topologies <ul><li>There are two kinds of wireless networks: </li></ul><ul><li>1) An ad-hoc, or peer-to-peer wireless networks </li></ul><ul><ul><li>Each computer communicates directly with each other to: send files, share printers, work collaboratively </li></ul></ul><ul><ul><li>They may not be able to access wired LAN resources, unless one of the computers acts as a bridge to the wired LAN using special software. </li></ul></ul><ul><li>2) Infrastructure wireless networks (access points, hardware or software) </li></ul><ul><ul><li>Access point acts like a hub, providing connectivity for the wireless computers. It can connect (or &quot;bridge&quot;) the wireless LAN to a wired LAN, allowing wireless computer access to LAN resources, such as file servers or the Internet. </li></ul></ul>
  8. 9. Infrastructure Dedicated hardware access points (HAP) Server Wired Network Wireless Network Wireless Clients Access Point Wired Client
  9. 10. Infrastructure Software Access Points which run on a computer equipped with a wireless network interface card as used in an ad-hoc or peer-to-peer wireless network Wireless Client Server Wired Network Wireless Network Wireless Client Software Access Point Wired Client
  10. 11. IEEE 802.11 <ul><li>Wireless networking hardware requires the use of underlying technology that deals with radio frequencies as well as data transmission . </li></ul><ul><li>The most widely used standard is 802.11 produced by the Institute of Electrical and Electronic Engineers (IEEE). </li></ul><ul><li>This is a standard defining all aspects of Radio Frequency Wireless networking. </li></ul><ul><li>802.11 was ratified in 1997 at speeds of 1- 2 Mb/s </li></ul><ul><li>The 802.11b extension runs at 1, 2, 5.5 and 11 Mb/s </li></ul>
  11. 12. IEEE 802.11 <ul><li>802.11a is a proposed spec running in the 5GHz IBM band with speeds of 54Mb/s scheduled for 2002 </li></ul><ul><ul><li>But range is less (more like 10m) </li></ul></ul><ul><li>The 802.15 Coexistence Task Group is addressing interoperability between low-power wireless devices (Bluetooth) and 802.11b. Completion is scheduled for 2001 </li></ul><ul><li>IBM is a member of 802.11 and 802.15 </li></ul>
  12. 13. Mixing vendor equipment <ul><li>Because most wireless networking hardware vendors support the 802.11 standard they can inter-operate. </li></ul><ul><li>Verification is recommended because there are two different modulation techniques: </li></ul><ul><ul><li>Frequency Hopping Spread Spectrum (FHSS) </li></ul></ul><ul><ul><li>Direct Sequence Spread Spectrum (DSSS) </li></ul></ul><ul><ul><li>They are not interoperable. </li></ul></ul><ul><li>When purchasing wireless networking hardware from separate vendors be sure to obtain guarantees from the vendors that the hardware will inter-operate and follows the standards. </li></ul>
  13. 14. Mixing vendor equipment <ul><li>Within a short time all new wireless cards, like Ethernet cards, will become inexpensive, ubiquitous and totally interoperable . </li></ul><ul><li>The latest version of the standard (802.11b) defines 11mbps with support for the older standard of 1mbps and 2mbps speeds. This provides compatibility with different or older equipment. </li></ul><ul><li>Note that this new standard covers DS-type Networks, not FH types . </li></ul><ul><li>At this point mixing Access Points is not recommended, unless it has the Wi-Fi (Wireless Fidelity) </li></ul><ul><li>logo from WECA (Wireless Ethernet Compatibility Association) </li></ul>
  14. 15. Wireless and Wired LAN Interoperability <ul><li>The Access Point acts as a “Bridge” between the wireless and wired networks </li></ul><ul><li>Hardware access points are available with various types of network interfaces, such as Ethernet or Token Ring </li></ul><ul><li>Software access point may also be used </li></ul>
  15. 16. WLAN Range <ul><li>Each access point has a finite range </li></ul><ul><li>The distance varies depending upon the environment; indoor, outdoor, building construction. </li></ul><ul><li>Operating at the limits of the range reduces performance . </li></ul><ul><li>Typical indoor ranges are 20-50 meters, outdoor are 100-200 meters </li></ul><ul><li>Longer ranges are possible; performance will degrade with distance. </li></ul><ul><li>Using multiple Access Points will extend the range </li></ul>
  16. 17. Access Points <ul><li>Inexpensive access points have a recommended limit of 10 </li></ul><ul><li>More expensive access points support up to 100 wireless connections. </li></ul><ul><li>Using more computers than recommended will degrade performance and reliability </li></ul><ul><li>Multiple access points can be connected to a wired LAN, or to a second WLAN. </li></ul><ul><li>Functions vary by manufacturer </li></ul>
  17. 18. Roaming <ul><li>A wireless computer can &quot;roam&quot; from one access point to another </li></ul><ul><li>Completely transparent to the user </li></ul><ul><li>Some access point configurations require security authentication when swapping access points, usually in the form of a password dialog box. </li></ul><ul><li>Access points are required to have overlapping wireless areas to achieve this. </li></ul>
  18. 19. Using a WLAN to interconnect two LANs <ul><li>WLAN offers a cost-effective solution to users with difficult physical installations such as: </li></ul><ul><ul><li>campuses </li></ul></ul><ul><ul><li>hospitals </li></ul></ul><ul><ul><li>businesses with more than one location in immediate proximity but separated by public thoroughfare. </li></ul></ul><ul><li>This type of installation requires two access points . </li></ul><ul><li>Each access point acts as a bridge or router connecting its own LAN to the wireless connection. </li></ul><ul><li>The wireless connection allows the two access points to communicate with each other, and therefore interconnect the two LAN's. </li></ul>
  19. 20. WLAN Scenarios <ul><li>Mobile users , both on and off “campus” </li></ul><ul><li>Where physical wiring is difficult or impossible </li></ul><ul><li>Connecting small groups to a larger work environment. </li></ul><ul><li>Wireless networking in these environments is a very cost effective alternative </li></ul><ul><li>Temporary wireless LANs can easily be created for exhibitions, school or business projects, all without any trailing cabling. </li></ul>
  20. 21. Security <ul><li>Potential security issues; physical access not required. </li></ul><ul><li>802.11 wireless communications cannot be received nor decoded by simple scanners or short wave receivers. </li></ul><ul><li>However, eavesdropping is possible using special equipment. </li></ul><ul><li>802.11 WLAN have a function called WEP (Wired Equivalent Privacy); a form of encryption. </li></ul><ul><li>Access Points can control access via unique MAC addresses. </li></ul><ul><li>Virtual Private Networking (VPN) techniques will work over wireless networks in the same way as traditional wired networks. This is the best approach. </li></ul>
  21. 22. WLAN Security: SSID <ul><li>Network access control can be implemented using an SSID associated with an AP or group of APs. </li></ul><ul><li>The SSID provides a mechanism to &quot;segment&quot; a wireless network into multiple networks serviced by one or more APs. </li></ul><ul><li>Each AP is programmed with an SSID corresponding to a specific wireless network. </li></ul><ul><li>To access this network, client computers must be configured with the correct SSID. </li></ul><ul><li>The SSID acts as a simple password </li></ul>
  22. 23. WLAN Security: MAC Filtering <ul><li>A client computer can be identified by the unique MAC address of its 802.11 network card. </li></ul><ul><li>Each AP can be programmed with a list of MAC addresses associated with the client computers allowed to access the AP. </li></ul><ul><li>If a client's MAC address is not included in this list, the client is not allowed to associate with the AP.   </li></ul><ul><li>MAC address filtering provides good security , but is best suited to small networks. </li></ul><ul><li>Each AP must be manually programmed with a list of MAC addresses, and the list must be kept up-to-date. </li></ul>
  23. 24. WLAN Security: WEP <ul><li>WEP provides encrypted communication </li></ul><ul><li>All clients and APs on a wireless network use the same key </li></ul><ul><li>The key resides in the client computer and in each AP </li></ul><ul><li>Support for WEP is standard </li></ul><ul><li>WEP specifies the use of a 64-bit encryption key </li></ul><ul><li>Implementations of non-Wi-Fi 128-bit key encryption exists </li></ul><ul><li>The 802.11 standard does not specify a key management protocol, so all keys on a network must be managed manually </li></ul>
  24. 25. WLAN Security: VPN <ul><li>A VPN solution for wireless access is the most suitable alternative to WEP and MAC address filtering. </li></ul><ul><li>VPN solutions are already widely deployed to provide remote workers with secure access to the network via the Internet. </li></ul><ul><li>In this remote user application, the VPN provides a secure , dedicated path (or &quot;tunnel&quot;) over an &quot;untrusted&quot; network-in this case, the Internet. </li></ul><ul><li>Various tunneling protocols are used in conjunction with standard, centralized authentication solutions,such as Remote Authentication Dial-In User Service ( RADIUS ) servers. </li></ul>
  25. 26. WLAN Security: VPN <ul><li>VPN technology can also be used for secure wireless access ; the &quot;untrusted&quot; network is the wireless network. </li></ul><ul><li>The APs are configured for open access with no WEP encryption , but wireless access is isolated from the enterprise network by the VPN server and a VLAN between the APs and the VPN servers. </li></ul><ul><li>The APs should still be configured with SSIDs for segmentation. </li></ul><ul><li>Authentication and full encryption over the wireless network is provided through the VPN servers that also act as gateways. </li></ul><ul><li>Unlike the WEP key and MAC address filtering approaches, the VPN-based solution is scalable to a very large number of users.   </li></ul>Section End
  26. 27. Personal Area Networks (PAN) and Bluetooth 1. What is Bluetooth? 2. Characteristics? 3. Usage scenarios: Today/Tomorrow? 4. 802.11 vs. Bluetooth vs. IR 5. Security 6. IBM’s Contribution Cell phone Modem Access Point Peripherals ThinkPad Personal Area “Connectivity” WorkPad
  27. 28. What is Bluetooth.... Defacto standard for wireless Personal Connectivity technology Specification for small -form factor, low -cost, short range radio links between mobile PCs, mobile phones and other portable devices. The Bluetooth Special Interest Group (SIG) is an industry group consisting of leaders in the telecommunications and computing industries that are driving development of the technology and bringing it to market. IBM, Toshiba, Ericsson, Nokia, Intel - Motorola, Microsoft, Lucent and 3Com - plus 2000+ other companies
  28. 29. Bluetooth Market Potential W/W Bluetooth Enabled Equipment Forecast (Units in Millions) Source : Cahners In Stat July 2000
  29. 30. Characteristics <ul><li>Operates in the 2.4 GHz Industrial-Scientific-Medical (ISM) band at a data rate of 721Kb/s </li></ul><ul><li>Uses Frequency Hopping (FH) spread spectrum , which divides the frequency band into a number of channels (2.402 - 2.480 GHz yielding 79 channels). 1600 hops/sec. </li></ul><ul><li>During a connection, radio transceivers hop from one channel to another in a pseudo-random fashion, determined by the Master . </li></ul><ul><li>Supports up to 8 devices in a piconet (1 master and up to 7 slaves sharing a channel). </li></ul><ul><li>Up to 10 piconets can combine to form scatternets (scaling). </li></ul>
  30. 31. Piconets/Scatternets <ul><li>A collection of devices </li></ul><ul><li>Connected via Bluetooth in an ad hoc fashion. </li></ul><ul><li>Starts with two devices, and may grow to eight (including the master) </li></ul><ul><li>Master sets the clock and hopping pattern. </li></ul><ul><li>However, when establishing a piconet, one unit will act as a master and the other(s) as slave (s) for the duration of the piconet connection. </li></ul><ul><li>A Scatternet is the linking of multiple co-located piconets through the sharing of common master or slave devices. </li></ul>
  31. 32. Characteristics <ul><li>Built-in security. </li></ul><ul><li>Non line-of-sight transmission through walls and briefcases . </li></ul><ul><li>Omni-directional . </li></ul><ul><li>Supports both voice and data services; easy integration of Serial links and TCP/IP for networking </li></ul><ul><li>Regulated by governments worldwide, even France ! </li></ul><ul><li>Supports both one-to-one and one-to-many networking topologies </li></ul><ul><li>Devices must be in a 10 meter radius for communications to occur. </li></ul>
  32. 33. Bluetooth Protocol Stack WAE WAP vCard/vCal Obex TCP/ UDP IP PPP RFComm Service Discovery Audio L2CAP BaseBand Telephony Control Radio HCI LMP Lower Transport Upper Transport Middleware Adopted
  33. 34. Network Topologies <ul><li>One-to-one </li></ul><ul><li>One-to-many </li></ul>(generally Serial mode) (generally TCP/IP mode)
  34. 35. Key Notebook Usage Models Dial-up Networking Synchronization File Transfer <ul><li>Bluetooth Usage Models for Notebooks </li></ul><ul><ul><li>Dial-Up Networking via cell phone </li></ul></ul><ul><ul><li>Syncing </li></ul></ul><ul><ul><li>File Transfer </li></ul></ul><ul><li>Target Devices </li></ul><ul><ul><li>Cellphone </li></ul></ul><ul><ul><li>Desktop </li></ul></ul><ul><ul><li>Handheld </li></ul></ul><ul><ul><li>Other Notebook </li></ul></ul>
  35. 36. Key Handheld Usage Models Dial-up Networking Synchronization File Transfer <ul><li>Bluetooth Usage Models for Handhelds </li></ul><ul><ul><li>Dial-up Networking via Cell phone </li></ul></ul><ul><ul><li>Syncing </li></ul></ul><ul><ul><li>File Transfer (business cards) </li></ul></ul><ul><ul><li>Target Devices </li></ul></ul><ul><ul><li>Cell phone </li></ul></ul><ul><ul><li>Desktop </li></ul></ul><ul><ul><li>Notebook </li></ul></ul><ul><ul><li>Other handheld </li></ul></ul>
  36. 37. Key Desktop Usage Models Synchronization File Transfer <ul><li>Bluetooth Usage Models for Desktop </li></ul><ul><ul><li>Syncing </li></ul></ul><ul><ul><li>File Transfer </li></ul></ul><ul><ul><li>Lan Access for </li></ul></ul><ul><ul><li>devices </li></ul></ul><ul><li>Target Devices </li></ul><ul><ul><li>Handheld </li></ul></ul><ul><ul><li>Notebook </li></ul></ul>
  37. 38. Other Usage Scenarios Telephony Infrastructure Data Access Points Headset
  38. 39. Bluetooth Access to WAN <ul><li>A computer network that spans a relatively large geographical area. </li></ul><ul><li>Typically, a WAN consists of two or more local-area networks (LANs). </li></ul><ul><li>Computers connected to a WAN are often connected through PSTNs . They can also be connected through leased lines or satellites . The largest WAN in existence is the Internet . </li></ul>
  39. 40. Future Usage Scenarios Personal Area Networking Automotive Wake on Bluetooth Human Interface Devices Audio/Visual Walk-up Printing Hidden Computing Instant Postcard Multi-Piconet Cordless Computer Intercom FAX LAN Access Headset Multi-Point Dial-Up Networking File Transfer Synchronization Point to Point Ease-of-Use Today Tomorrow The Future
  40. 41. Future Usage Scenarios Adds weight and cost Decreases reliability Standard Connectivity <ul><li>Today: Many Cable Connections </li></ul><ul><ul><li>Serial </li></ul></ul><ul><ul><li>Parallel </li></ul></ul><ul><ul><li>Mouse </li></ul></ul><ul><ul><li>Keyboard </li></ul></ul><ul><ul><li>Floppy </li></ul></ul><ul><ul><li>Audio </li></ul></ul><ul><ul><li>IR </li></ul></ul><ul><ul><li>USB </li></ul></ul><ul><ul><li>Video </li></ul></ul><ul><ul><li>Docking </li></ul></ul><ul><ul><li>Power </li></ul></ul>
  41. 42. Future Usage Scenarios Adds weight and cost Decreases reliability <ul><li>Tomorrow: Fewer Cables </li></ul><ul><li>Bluetooth </li></ul><ul><ul><li>USB </li></ul></ul><ul><ul><li>Video </li></ul></ul><ul><ul><li>Docking </li></ul></ul><ul><ul><li>Power </li></ul></ul>Reduces weight and cost Increases reliability Standard Connectivity <ul><li>Today: Many Cable Connections </li></ul><ul><ul><li>Serial </li></ul></ul><ul><ul><li>Parallel </li></ul></ul><ul><ul><li>Mouse </li></ul></ul><ul><ul><li>Keyboard </li></ul></ul><ul><ul><li>Floppy </li></ul></ul><ul><ul><li>Audio </li></ul></ul><ul><ul><li>IR </li></ul></ul><ul><ul><li>USB </li></ul></ul><ul><ul><li>Video </li></ul></ul><ul><ul><li>Docking </li></ul></ul><ul><ul><li>Power </li></ul></ul>
  42. 43. Future Usage Scenarios Personal Area Networking <ul><li>Spontaneous / ad-hoc networking </li></ul><ul><ul><li>Computer Supported Cooperative Work </li></ul></ul><ul><ul><li>(CSCW) environments </li></ul></ul><ul><ul><li>Workgroup collaboration </li></ul></ul><ul><li>Between many different devices </li></ul><ul><ul><li>PC, PDA, Printer, </li></ul></ul><ul><ul><li>Mobile phone , Communicator, </li></ul></ul><ul><ul><li>Digital Camera (Still & Video) </li></ul></ul><ul><ul><li>Digital TV, MP3 Player </li></ul></ul><ul><ul><li>etc… </li></ul></ul><ul><li>Slave-to-slave communication </li></ul><ul><li>is through the master </li></ul>
  43. 44. Prototype work by Pervasive group <ul><li>Walk up “push” of adverts and services. </li></ul><ul><li>Demo uses IBM Research Blue Drekar stack available from Alphaworks. </li></ul><ul><li>Contact Yook Siong Chin. </li></ul>
  44. 45. Location Aware Services <ul><li>NOT Location Based Services </li></ul><ul><ul><li>eg - Where is nearest xyz ? </li></ul></ul><ul><ul><li>Pay for vending. </li></ul></ul><ul><li>But AWARE of the user </li></ul><ul><ul><li>anticipate needs </li></ul></ul><ul><ul><li>prepare and be ready to interact </li></ul></ul><ul><ul><li>only need to know that the user is present </li></ul></ul><ul><ul><ul><li>or indeed no longer present </li></ul></ul></ul><ul><ul><li>Bluetooth device eg Phone or PDA is ideal. </li></ul></ul><ul><ul><ul><li>Carried with user </li></ul></ul></ul><ul><ul><ul><li>Individual </li></ul></ul></ul>
  45. 46. Total effect = real ease of use <ul><li>Come into office </li></ul><ul><ul><li>PC unlocks </li></ul></ul><ul><ul><li>Buddy status says user at desk </li></ul></ul><ul><ul><li>Phone calls go to desk phone </li></ul></ul><ul><li>Go to lab </li></ul><ul><ul><li>Office PC locks up </li></ul></ul><ul><ul><li>Buddy status says away from desk </li></ul></ul><ul><ul><li>Lab lights turn on </li></ul></ul><ul><ul><li>Phone calls go to lab </li></ul></ul><ul><li>Go to lunch </li></ul><ul><ul><li>lab lights go off </li></ul></ul><ul><ul><li>phone calls go to mobile </li></ul></ul><ul><li>Go back to office </li></ul><ul><ul><li>PC unlocks </li></ul></ul><ul><ul><li>Buddy status says user at desk </li></ul></ul><ul><ul><li>Phone calls go to desk phone </li></ul></ul><ul><li>etc... </li></ul>Without pressing a single button !
  46. 47. Security <ul><li>Unique MAC address for every Bluetooth device </li></ul><ul><li>Bluetooth has built-in encryption and authentication </li></ul><ul><li>In addition a frequency-hopping scheme with 1600 hops/sec is employed. </li></ul><ul><li>All of this, together with an automatic output power adaptation to reduce the range exactly to requirement, makes the system extremely difficult to eavesdrop </li></ul>
  47. 48. <ul><li>Security mode 1 (non-secure). </li></ul><ul><ul><li>A device does not initiate any security procedures. </li></ul></ul><ul><li>Security mode 2 (service-level enforcement security). </li></ul><ul><ul><li>A device does not initiate security procedures before channel establishment at the service level. This mode allows different and flexible access policies for applications, and is used especially for running applications with different security requirements in parallel. </li></ul></ul><ul><li>Security mode 3 (link-level enforced security). </li></ul><ul><ul><li>A device allows only authenticated connections. </li></ul></ul><ul><li>Bluetooth technology has three security attributes </li></ul><ul><ul><li>Authorization </li></ul></ul><ul><ul><li>Authentication </li></ul></ul><ul><ul><li>Encryption. </li></ul></ul>Security Implementations
  48. 49. <ul><li>Authorization </li></ul><ul><ul><li>Database of services which a device has authorization to use </li></ul></ul><ul><li>Authentication </li></ul><ul><ul><li>The user can choose to &quot;auto&quot; trust devices or &quot;manually&quot; trust devices. </li></ul></ul><ul><ul><li>Authentication is accomplished using a challenge-response scheme using symmetric link keys. </li></ul></ul><ul><ul><li>If the devices do not share a link key, one is created through a process called &quot;pairing&quot; and based on a shared secret association, like a PIN code . </li></ul></ul><ul><ul><li>If a device does not have a mechanism to enter a PIN, a restricted form link key, called a unit key, is generated based on the device's address and random number. </li></ul></ul><ul><li>Encryption can only be activated after authentication. Encryption is based on a stream cipher easily implemented in hardware or software. </li></ul>Security Implementations
  49. 50. IBM's Contribution to the SIG Section End <ul><li>IBM is one of the original 5 founding members. </li></ul><ul><li>IBM authored the discovery protocol (discovery protocol is a method to explore and discovery Bluetooth devices and services within range) </li></ul><ul><li>IBM contributed to the lower layer protocol that makes up the entire Bluetooth protocol stack (link level protocol) </li></ul><ul><li>IBM contributed to the Bluetooth world-wide regulatory working bodies to harmonize the 2.4GHz frequency spectrum use for Bluetooth and other government agency requirements. </li></ul><ul><li>IBM funds and contributes to many of the the organization’s events. </li></ul><ul><li>IBM is leading the effort to standardize IEEE 802.15, which will embrace Bluetooth as a short range wireless standard. </li></ul>
  50. 51. 802.11 vs. BT vs. IR vs. HRF
  51. 52. Which Technology is Better? For connecting devices in your What do you want to do? For connecting clients to your ) ) ) Campus wide or someone else’s “ Personal Domain”... Bluetooth is the right choice LAN Infrastructure... ) ) ) Airport/Hotel or a public one 802.11b WLAN is the right choice
  52. 53. Which Technology is Better? For creating an ad hoc Peer-to-Peer Network Either would suffice Bluetooth: One-to-many 802.11b: Many-to-many <ul><li>Consider: </li></ul><ul><ul><li>Technology install base </li></ul></ul><ul><ul><li>Size of the workgroup </li></ul></ul><ul><ul><li>Extent of the CSCW effort </li></ul></ul>(Computer Supported Cooperative Work)
  53. 54. Other Wireless Technologies http://www.research.ibm.com/journal/sj/384/zimmerman.html Infrared Data Association (IrDA) for laptops Directional or high power Simple, inexpensive, no regulations 1 1000 Light Optical infrared (high data rate) Home remote control Directional Simple, very inexpensive, no regulations 10 10 Light Optical infrared (low data rate) Data networking Cost, power International, fast 10-100 1000 2400 RF microwave ISM Access control, telecommand Local regulations Low cost, efficient for distance 30 40 300-500 RF UHF Picocells data messaging Antenna size Signal goes through body, international use 6 250 5 Magnetic field Identification Signal blocked by body, grounded objects Capacitive coupling limits range, data transmitted by touch, international use 2 20 0.1-1 Electric field Application Problems Advantages Range (m) Maximum Bit Rate (Kbps) Carrier Frequency ( MHz )
  54. 55. UWB – Impulse Radio <ul><li>Ultra Wide Band </li></ul><ul><ul><li>Uses picosecond mono-pulses </li></ul></ul><ul><ul><ul><li>Creates very wide radio spectrum </li></ul></ul></ul><ul><ul><ul><li>Down in noise floor (-30 to -60dB) </li></ul></ul></ul><ul><ul><li>Requires very accurate timebase </li></ul></ul><ul><ul><ul><li>Normally based on PPM techniques </li></ul></ul></ul><ul><ul><li>But can deliver high data rates (80+ Mbs) </li></ul></ul><ul><ul><li>At very low power ( µ W) </li></ul></ul>Fourier Transform of infinitely narrow pulse = infinitely wide frequency spectrum t f ≡
  55. 56. Example: Pulse-LINK ™ Pulse~LINK, Inc. http://www.pulselink.net/ <ul><li>80Mbs </li></ul><ul><li>150m </li></ul>
  56. 57. UWB <ul><li>Currently used in military applications </li></ul><ul><li>Squirt radios </li></ul><ul><ul><li>Difficult to detect / intercept </li></ul></ul><ul><ul><li>Low power for data rate means more portable </li></ul></ul><ul><li>Pulsed Radar </li></ul><ul><ul><li>Can “see through” obstacles </li></ul></ul><ul><ul><li>Difficult to detect and protect against </li></ul></ul><ul><li>Not licensed for public use </li></ul><ul><ul><li>Cuts across most currently licensed bands </li></ul></ul><ul><ul><li>Backers claim no need as there will be no interference to normal equipment </li></ul></ul><ul><ul><li>Others doubt that – they say the background noise will increase and some frequencies may be more impacted than others as pulses are not true impulse shape </li></ul></ul>
  57. 58. UWB <ul><li>Wide frequency range helps with transmission through obstacles </li></ul><ul><ul><li>Like bodies, walls, furniture </li></ul></ul><ul><ul><li>Harder to shield against </li></ul></ul><ul><ul><li>Helps Omni-directional transmission </li></ul></ul><ul><li>No studies on health implications </li></ul><ul><ul><li>Although very low power – what are the effects of continuous impulses across wide freq range ? </li></ul></ul>
  58. 59. Smart Dust <ul><li>Target is sub mm sized devices </li></ul><ul><li>Free floating in air </li></ul><ul><li>Containing sensors </li></ul><ul><ul><li>Temp, acceleration, pressure, chemical, etc </li></ul></ul><ul><li>And communications to other particles </li></ul><ul><ul><li>5 – 10 m range </li></ul></ul><ul><ul><li>20kbs </li></ul></ul><ul><ul><li>900MHz radio </li></ul></ul><ul><ul><li>Or km range via laser </li></ul></ul>http://robotics.eecs.berkeley.edu/~pister/SmartDust/
  59. 60. The Challenge for Wearables <ul><li>Need to interconnect components </li></ul><ul><li>& connect within PAN to other devices </li></ul><ul><li>& connect outside of PAN </li></ul>UWB has lots of promise – low power – data rates high enough But no real interoperability standards between devices Not many off the shelf components – expensive (for now) Hign frequencies mean CMOS fab unlikely Probably needs to support existing standards Most likely Bluetooth But devices may will switch to UWB or similar Definitely needs to support existing standards Maybe via CPU point 802.11b/a too power hungry for WAN wearable use Section End
  60. 61. IBM Wireless Technologies 1) Bluetooth: PC Card and ThinkPad UltraPort 2) 802.11b PC Card, ThinkPad UltraPort and Access Point 3) ThinkPad and WorkPad Proven products 4) Other products “available”
  61. 62. 802.11b IBM High Rate Wireless LAN Access Point <ul><li>£127 list price - 128bit </li></ul><ul><li>£105 list price - 64 bit </li></ul><ul><li>Plugs into the ThinkPad’s CardBus slot </li></ul><ul><li>Provides wireless access to corporate LAN from anywhere within a 45-90m radius </li></ul><ul><li>Supports speeds from 2 to 11 Mbps </li></ul><ul><li>64 bit encryption (WEP) or 128 bit </li></ul>IBM High Rate Wireless LAN PC Card <ul><li>£486 IBM Web price </li></ul><ul><li>Bridges to the wired corporate LAN </li></ul><ul><li>Allows the user to roam within coverage area </li></ul><ul><li>Can support multiple users </li></ul>
  62. 63. Bluetooth Bluetooth PC Card For Legacy Devices 09n9812 Bluetooth UltraPort For Optimal Performance 09n9811 <ul><li>Designed to replace peripheral cables for PDAs, printers, cameras, etc. </li></ul><ul><li>Designed for personal space connectivity </li></ul><ul><li>Connectivity range of 10 meters </li></ul><ul><li>Nominal data rate of 1 Mb/s </li></ul><ul><li>Built-in encryption </li></ul>Ann: 9/5 GA: October Ann: 1Q 2001 £143 list price £127 list price
  63. 64. Cellular Phone BT Options <ul><li>Wireless access to Internet and corporate networks </li></ul><ul><li>Wireless connection to ThinkPad </li></ul><ul><li>Non-directional; phone can be in your briefcase </li></ul><ul><li>Wirelessly update your phone’s address book from your system </li></ul><ul><li>Insulates you from rapid changes in cellular networks </li></ul>Ericsson Cell Phone Bluetooth Module Ericsson Headset R520m, T39m
  64. 65. Bluetooth Options Section End Nokia Bluetooth “ battery” for 6210 & CF 1 card GN Netcom 9000 Headset TDK Blue5 clip for PalmV
  65. 66. IBM Research Protoype This is NOT a product Linux based watch / pda “ Watchpad” <ul><li>Runs X-clock really well ! </li></ul><ul><li>Also now includes Bluetooth </li></ul><ul><li>Supports Sync , DUN and Audio </li></ul><ul><li>Current demos include PIM sync, and control of PC. </li></ul>
  66. 67. Shrinking Components – Disk Drives <ul><li>1 GB is : </li></ul><ul><ul><li>2500 high resolution photos, or </li></ul></ul><ul><ul><li>1000 200 page books, or </li></ul></ul><ul><ul><li>18 hours high quality music. </li></ul></ul><ul><li>1980 – IBM Launches 1 st GB Disk </li></ul><ul><ul><li>Size of a Refrigerator </li></ul></ul><ul><ul><li>Weighs 250 kg </li></ul></ul><ul><ul><li>Costs $40,000 </li></ul></ul><ul><li>2000 – IBM Launches 1 st GB Micro Drive </li></ul><ul><ul><li>Size of Coin </li></ul></ul><ul><ul><li>Weighs 25 g </li></ul></ul><ul><ul><li>Costs < $500 </li></ul></ul>
  67. 68. Devices that Answer Back . . . ! <ul><li>Standard Palm Pilot </li></ul><ul><li>Speech Co-Processor </li></ul><ul><ul><li>Speech to Text </li></ul></ul><ul><ul><li>Text to Speech </li></ul></ul><ul><li>Technology Demonstrator </li></ul><ul><li>Progressing with Device Manufacturers </li></ul><ul><li>Now runs on standard hPaq </li></ul>Replies by Showing & Speaking Information Ask Question
  68. 69. IBM Prototype wearable
  69. 70. Visual Interaction <ul><li>Vision Pad prototype: </li></ul><ul><ul><li>Transparent head mounted display </li></ul></ul><ul><ul><li>Handheld controller </li></ul></ul><ul><ul><li>Speech input </li></ul></ul><ul><li>Augmented reality concept – sign recognition and translation </li></ul>
  70. 71. Resources <ul><li>IBM Pervasive Computing </li></ul><ul><ul><li>http://www.ibm.com/pvc </li></ul></ul><ul><li>Bluetooth SIG </li></ul><ul><ul><li>http://www.bluetooth.com </li></ul></ul><ul><li>Shameless Plug for Book </li></ul><ul><ul><li>Bluetooth Revealed, published by Prentice-Hall, September 2000 </li></ul></ul><ul><li>AU-Systems - good Bluetooth White Paper </li></ul><ul><ul><li>http://www.ausys.se/servlet/PSPDownloadServlet?iListItemId=6833 </li></ul></ul><ul><li>UWB – Impulse Radio </li></ul><ul><ul><li>http:// www.uwb.org </li></ul></ul>
  71. 72. Questions ? ? ? ? ?