Wireless Technologies
Presented by
Sean Shields
And
Gabriel Taveras
Definition
Term “Wireless” refers to all the communications sent and received without wires.
So Wireless Technology
Means a technology that use radio waves to transmit or receive data.
Wi-Fi
Bluetooth
Cellular
Wimax
TYPES OF
TECHNOLOGIES
INTRODUCTION:
Wireless Fidelity termed as Wi-Fi uses the IEEE 802.11 specification to create a wireless local-area network.
A Wi-Fi network basically consists of a wired connection to the Internet that leads to a wireless router for transmutation and receiving data from individual devices, connecting them not only to the outside world but also to each other.
HOW WIFI WORKS?
1. All devices use a wireless adapter to convert request into a radio signal and broadcasts it into the air.
2. The Wi-Fi device, or wireless router, picks up the signal and translates it back into its original form.
3. The router passes the request to the Internet using a hardwired connection.
4. The Internet returns the requested information to the router across the same connection.
5. The router converts the information into a radio signal and broadcasts it into the air.
6. The computer or cell phone's wireless adapter picks up the information and displays it on your screen
WIFI TOPOLOGIES
Wifi have following topologies
AP-based topology (Infrastructure Mode)
Peer-to-peer topology (Ad-hoc Mode)
Point-to-multipoint bridge topology
Wi Fi Network
Wireless Standards
802.11
In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the first WLAN standard. They called it 802.11 after the name of the group formed to oversee its development. Unfortunately, 802.11 only supported a maximum network bandwidth of 2 Mbps - too slow for most applications. For this reason, ordinary 802.11 wireless products are no longer manufactured.
Wireless Standards
802.11b
IEEE expanded on the original 802.11 standard in July 1999, creating the 802.11b specification. 802.11b supports bandwidth up to 11 Mbps, comparable to traditional Ethernet.
Wireless Standards
802.11a
Supports bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz. This higher frequency compared to 802.11b shortens the range of 802.11a networks. The higher frequency also means 802.11a signals have more difficulty penetrating walls and other obstructions.
Wireless Standards
802.11g
Attempts to combine the best of both 802.11a and 802.11b. 802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4 Ghz frequency for greater range. 802.11g is backwards compatible with 802.11b, meaning that 802.11g access points will work with 802.11b wireless network adapters and vice versa.
Wireless Standards
802.11n
The newest IEEE standard in the Wi-Fi category is 802.11n.
802.11n connections support data rates of over 100 Mbps. 802.11n also offers somewhat better range over earlier Wi-Fi standards due to its increased signal.
1. Wireless Technologies
Presented by
Sean Shields
And
Gabriel Taveras
Definition
Term “Wireless” refers to all the communications sent and
received without wires.
So Wireless Technology
Means a technology that use radio waves to transmit or receive
data.
Wi-Fi
Bluetooth
Cellular
Wimax
2. TYPES OF
TECHNOLOGIES
INTRODUCTION:
Wireless Fidelity termed as Wi-Fi uses the IEEE 802.11
specification to create a wireless local-area network.
A Wi-Fi network basically consists of a wired connection to the
Internet that leads to a wireless router for transmutation and
receiving data from individual devices, connecting them not
only to the outside world but also to each other.
HOW WIFI WORKS?
1. All devices use a wireless adapter to convert request into a
radio signal and broadcasts it into the air.
2. The Wi-Fi device, or wireless router, picks up the signal and
translates it back into its original form.
3. The router passes the request to the Internet using a
hardwired connection.
4. The Internet returns the requested information to the router
across the same connection.
5. The router converts the information into a radio signal and
broadcasts it into the air.
6. The computer or cell phone's wireless adapter picks up the
information and displays it on your screen
3. WIFI TOPOLOGIES
Wifi have following topologies
AP-based topology (Infrastructure Mode)
Peer-to-peer topology (Ad-hoc Mode)
Point-to-multipoint bridge topology
Wi Fi Network
Wireless Standards
802.11
In 1997, the Institute of Electrical and Electronics Engineers
(IEEE) created the first WLAN standard. They called it 802.11
after the name of the group formed to oversee its development.
Unfortunately, 802.11 only supported a maximum network
bandwidth of 2 Mbps - too slow for most applications. For this
reason, ordinary 802.11 wireless products are no longer
manufactured.
Wireless Standards
802.11b
IEEE expanded on the original 802.11 standard in July 1999,
creating the 802.11b specification. 802.11b supports bandwidth
4. up to 11 Mbps, comparable to traditional Ethernet.
Wireless Standards
802.11a
Supports bandwidth up to 54 Mbps and signals in a regulated
frequency spectrum around 5 GHz. This higher frequency
compared to 802.11b shortens the range of 802.11a networks.
The higher frequency also means 802.11a signals have more
difficulty penetrating walls and other obstructions.
Wireless Standards
802.11g
Attempts to combine the best of both 802.11a and 802.11b.
802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4
Ghz frequency for greater range. 802.11g is backwards
compatible with 802.11b, meaning that 802.11g access points
will work with 802.11b wireless network adapters and vice
versa.
Wireless Standards
802.11n
The newest IEEE standard in the Wi-Fi category is 802.11n.
802.11n connections support data rates of over 100 Mbps.
802.11n also offers somewhat better range over earlier Wi-Fi
standards due to its increased signal intensity.
Wireless Technologies
Bluetooth
Bluetooth is a wireless technology standard for exchanging
data over short distances from fixed and mobile devices,
creating personal area networks (PANs) with high levels of
security.
5. Bluetooth supports a very short range (approximately 10 meters)
and relatively low bandwidth (1-3 Mbps) designed for low-
power network devices like handhelds.
Bluetooth
Bluetooth was standardized as IEEE 802.15.1, but the standard
is no longer maintained. The SIG oversees the development of
the specification, manages the qualification program, and
protects the trademarks. To be marketed as a Bluetooth device,
it must be qualified to standards defined by the SIG. A network
of patents is required to implement the technology, which is
licensed only for that qualifying device.
Bluetooth vs. Wi-Fi
Bluetooth and Wi-Fi have some similar applications, setting up
networks, printing, or transferring files. Wi-Fi is intended as a
replacement for high speed cabling for general local area
network access in work areas. Bluetooth was intended for
portable equipment and its applications. Bluetooth is a
replacement for cabling in a variety of personally carried
applications in any setting and also works for fixed location
applications such as smart energy functionality in the home
(thermostats, etc.).
Wi-Fi and Bluetooth are to some extent complementary in their
applications and usage. Wi-Fi is usually access point-centered.
Bluetooth is usually between two Bluetooth devices. Bluetooth
serves well in simple applications where two devices need to
connect with minimal configuration like in headsets and remote
controls, while Wi-Fi suits better in applications where some
degree of client configuration is possible and high speeds are
required.
6. Wireless Technologies
WiMax
WiMAX (Worldwide Interoperability for Microwave Access) is
a wireless communications standard designed to provide 30 to
40 megabit-per-second data rates, with the 2011 update
providing up to 1 Gbit/s for fixed stations.
WiMax was developed separately from Wi-Fi and is designed
for long-range networking (spanning miles or kilometers) as
opposed to local area wireless networking.
Wireless Technologies
WiMAX is sometimes referred to as “Wi-Fi on steroids” and can
be used for a number of applications including broadband
connections, cellular backhaul, and hotspots. It is similar to Wi-
Fi, but it can enable usage at much greater distances.
Wireless LAN
A wireless local area network (WLAN) links two or more
devices using some wireless distribution method (typically
spread-spectrum or OFDM radio), and usually providing a
connection through an access point to the wider Internet. This
gives users the ability to move around within a local coverage
area and still be connected to the network.
Wireless LAN
A communications network that provides connectivity to
wireless devices within a limited geographic area.
Wi-Fi is the universal standard for wireless networks and is
the wireless equivalent of wired Ethernet networks.
7. Principles of WLAN
Stations
Basic Server Set
Extended Server Set
Distribution System
Stations
All components that can connect into a wireless medium in a
network are referred to as stations. All stations are equipped
with wireless network interface controllers (WNICs). Wireless
stations fall into one of two categories: access points, and
clients. Access points (APs), normally routers, are base stations
for the wireless network. They transmit and receive radio
frequencies for wireless enabled devices to communicate with.
Stations
Basic service set
The basic service set (BSS) is a set of all stations that can
communicate with each other. Every BSS has an identification
(ID) called the BSSID, which is the MAC address of the access
point servicing the BSS.
There are two types of BSS: Independent BSS and infrastructure
BSS. An independent BSS (IBSS) is an ad hoc network that
contains no access points, which means they can not connect to
any other basic service set.
Basic service set
8. 1)Infrastructure BSS
2) Independent BSS
Extended service set
An extended service set (ESS) is a set of connected BSSs.
Access points in an ESS are connected by a distribution system.
Each ESS has an ID called the SSID which is a 32-byte
(maximum) character string.
Distribution system
A distribution system (DS) connects access points in an
extended service set. The concept of a DS can be used to
increase network coverage through roaming between cells.
Advantages of WLAN
NO WIRES
It is easier to add or move workstations.
It is easier to provide connectivity in areas where it is difficult
to lay cable.
Installation is fast and easy, and it can eliminate the need to
pull cable through walls and ceilings.
Access to the network can be from anywhere within range of an
access point.
WLAN
9. http://www.youtube.com/watch?v=DAR52r0lEtw
Wireless Personal Area Network
A wireless personal area network is a low-range wireless
network which covers an area of only a few dozen meters. This
sort of network is generally used for linking peripheral devices
to a computer, or just two nearby computers, without using a
hard-wired connection. Eg. printers, cell phones, and home
appliances or (PDA)
WPAN
One such technology is Bluetooth.
Cellular Wide Area Networks
A Cellular Wide Area Network is a wireless network distributed
over land areas called cells, each served by at least one fixed-
location transceiver, known as a cell site or base station. In a
cellular network, each cell uses a different set of frequencies
from neighboring cells, to avoid interference and provide
guaranteed bandwidth within each cell. When joined together
these cells provide radio coverage over a wide geographic area.
Cellular Wide Area Networks
Some cellular modems are used with CardBus slots, or
connect to a USB port. Cellular modems that use the GSM
system require you to activate the SIM card, which contains
subscriber details that identifies the caller to the network
service provider.
Cellular modems that use the CDMA system do not use SIM
cards, but instead use a utility provided by the mobile network
10. provider to make the connection to the cellular network.
(Global System for Mobile Communications) (Subscriber
Identity Module) (Code Division Multiple Access)
32
Cellular Area Network
Cellular Wide Area Networks
2 G
2G (which stands for second-generation, 1G being the first-
generation which operated at speeds between 2.9KBps and
5.6KBps.) technology was first commercially launched on the
GSM standard in Finland in 1991. 2G data rates range from 56
kbps up to 200 kbps depending upon your location.
Cellular Wide Area Networks
3G (third-generation) mobile communications is specified by
the International Mobile Telecommunications-2000 (IMT-2000)
specification by the International Telecommunication Union. To
meet the IMT-2000 standards, a system is required to provide
11. peak data rates of at least 200 kbps. Some locations can provide
3G data rates up to 2.5Mbps.
Cellular Wide Area Networks
4G (fourth generation) cellular mobile communications is
specified by the International Mobile Telecommunications-
Advanced (IMT-Advanced) specification. The IMT-Advanced
standards require a peak speed of 100 Mbps for high mobility
communication (such as from trains and cars) and 1 Gbps for
low mobility communication (such as pedestrians and stationary
users).
Satellite Network
Satellite Internet access is Internet access provided through
communications satellites. Modern satellite Internet service is
typically provided to users through geostationary satellites that
can offer high data speeds, with newer satellites achieving
downstream data speeds up to 15 Mbps
Wireless Personal Area Network
A Satellite Network generally relies on three primary
components:
Satellite
Gateway
Antenna dish/modem
12. Satellite Network
Satellite
A satellite has its own set of antennas to receive communication
signals from Earth and to transmit signals to their target
location. These antennas and transponders are part of the
satellite’s “payload”, which is designed to receive and transmit
signals to and from various places on Earth. What enables this
transmission and reception in the payload transponders is a
repeater subsystem (RF (radio frequency) equipment) used to
change frequencies, filter, separate, amplify and group signals
before routing them to their destination address on Earth.
Gateways
The Gateway is also referred to as a ground station, teleport or
hub. The term is sometimes used to describe just the antenna
dish portion, or it can refer to the complete system with all
associated components. In short, the gateway receives radio
wave signals from the satellite on the last leg of the return or
upstream payload, carrying the request originating from the
end-user’s site.
Antenna dish/modem
Outdoor Unit
At the far-end of the outdoor unit is a small (2–3 foot
diameter), reflective dish-type radio antenna constructed from
and coated with a variety of materials.
There are four characteristic settings used to ensure that the
antenna is configured correctly at the satellite.
13. Antenna dish/modem
Azimuth,( angular measurement) Elevation, Polarization, (the
orientation of electromagnetic waves which converts electric
power into radio waves, and vice versa), and Skew (It is a
technique to improve the horizontal radiation pattern of a high
power transmitter station).
The combination of these settings gives the outdoor unit a Line-
of-sight to the chosen satellite and makes data transmission
possible.
Antenna dish/modem
Indoor Unit
The Satellite Modem serves as an interface between the outdoor
unit and customer provided equipment (i.e. PC, router) and
controls satellite transmission and reception.
Coaxial cable (COAX) connectivity to the satellite antenna. The
cable carrying electromagnetic satellite signals between the
modem and the antenna generally is limited to be no more than
150 feet in length
Antenna dish/modem
Ethernet connectivity to the computer, carrying the customer’s
data packets to and from the Internet content servers.
Satellite modems employ either the DOCSIS (Data Over Cable
Service Interface Specification) or WiMAX (World
Interoperability for Microwave Access) telecommunication
standard to communicate with the assigned gateway.
Satellite Networks
14. Examples:
Dish Network
Direct TV
GPS
How a satellite works
http://www.youtube.com/watch?v=zBd4PkCZaUk
Current and Future Wireless APPS
AT & T
New APP
Car to Car
New APP II
AT&T APP
New APP
Car APP
Future wireless APP
Car 2X
Wireless security and Limitation
Wireless data networks are found everywhere. Each time there
is a wireless transmission, you are vulnerable to any wireless
attacks and are subjects to wireless attacks. At first, there were
design flaws in the security mechanisms of the 802.11, however
there have been significant changes in wireless network security
for users to enjoy without the fear of attacks such as
15. eavesdropping, or tamper with wireless transmissions.
How They Attack
One of the first steps in attacking a wireless network is to
discover the network. Afterwards, an Access Point sends a
signal (beacon frame) to announce its presence and provides the
necessary information to a device who wishes to join the
wireless network. The process is called beaconing to establish
and maintain communications. Attackers will use beaconing to
find wireless networks and then record information about them.
Attacks
War Driving - searching for wireless signals from an automobile
or on foot using a portable computing device.
Some tools are necessary to conduct war driving…
Attacks
War Chalking - After the wireless signal has been detected, the
next step is to document and then advertise the location of the
wireless LANs for others to use. WLANs are identified with
drawings on the walls around the area network.
16. Attacks
Wireless Protocol Analyzer – wireless traffic can be captured to
decode and analyze its contents by a protocol analyzer device or
a computer that runs protocol analyzer software.
“Parking Lot” Attack - Attackers who actually sit in the
organization's parking lot and try to access internal hosts via the
wireless network. Access points emit radio signals in a circular
pattern, and the signals sometimes extend beyond the physical
boundaries of the area they intend cover. Signals can be
intercepted outside buildings, or even through the floors in
multi-storey buildings.
Service Set Identifier Flaw – Access points come with default
SSIDs and when connecting to a wireless device it generates a
broadcast. An attacker must determine a valid SSID to be
authenticated. Easiest way to do so is to wait for the
transmission of the SSID from the AP to the wireless device or
use an SSID that is already obtained.
Vulnerabilities
MAC Address Filtering
Media Access Control (MAC) address filtering that is a method
for controlling access to a WLAN based on the device’s MAC
address. A wireless device’s MAC address is entered into
software running on the AP, which then is used to permit or
deny a device from connecting to the network. MAC addresses
are initially exchanged between wireless devices and the AP in
an unencrypted format. An attacker using a protocol analyzer
can easily see the MAC address of an approved device and then
substitute it on his own device. Another weakness of MAC
address filtering is that managing a large number of MAC
addresses can pose significant challenges. The sheer number of
users often makes it difficult to manage all of the MAC
17. addresses. As new users are added to the network and old users
leave, keeping track of MAC address filtering demands almost
constant attention.
Vulnerabilities
SSID Broadcast
Some wireless security sources encourage users to configure
their APs to prevent the beacon frame from including the SSID,
and instead require the user to enter the SSID manually on the
wireless device. Although it provides a weak degree of security
and has several limitations:
● The SSID can be easily discovered even when it is not
contained in beacon frames because it is transmitted in other
management frames sent by the AP. Attackers with protocol
analyzers can still detect the SSID.
● Turning off the SSID broadcast may prevent users from being
able to freely roam from one AP coverage area to another.
● It is not always possible or convenient to turn off SSID
beaconing. SSID beaconing is the default mode in virtually
every AP, and not all APs allow beaconing to be turned off.
Vulnerabilities
WEP
The original encryption protocol developed for wireless
networks. As its name implies, WEP was designed to provide
the same level of security as wired networks. However, WEP
has many well-known security flaws, is difficult to configure,
and is easily broken.
Security Tips
18. 1.Don’t leave your wireless device unattended;
2. Protect your device with passwords: Enable your device’s
power-on login and system login authentication
3. Disable the wireless connection when not in use.
Security Tips
4. Keep wireless network interface card drivers up to date.
5. Use WPA and WPA2 security with TKIP and AES encryption
6. Antenna Placement - For security purposes, the AP and its
antenna should be positioned so that when possible a minimal
amount of signal reaches beyond the security perimeter of the
building or campus
Security Tips
7. the ability to adjust the level of power at which the WLAN
transmits. On devices with that feature, the power can be
adjusted so that less of the signal leaves the premises and
reaches outsiders.
8. Setup wireless virtual LANs
“Automatic communication between various devices within a
small area in a
house or an office makes it possible. When you click on an icon
for a device and you are linked to it, automatically and
transparently”
ADVANTAGES:
19. Wireless
Low energy consumption
Bluetooth is automatic
DISADVANATAGES:
Slow data rates
Bluetooth Sensors
A wearable computer is a computer that is subsumed into the
personal space of the user, controlled by the user, and has both
operational and interactional constancy, i.e. is always on and
always accessible. Most notably, it is a device that is always
with the user, and into which the user can always enter
commands and execute a set of such entered commands, and in
which the user can do so while walking around or doing other
activities"
Wireless Wearable Computing Devices
Wireless Wearable Computing Devices
20. References:
Kahn, J.M., et al. Next Century Challenges: Mobile Networking
for Smart Dust. ACM Mobicom, 1999.
Estrin, D. et al. Next Century Challenges: Scalable
Coordination in Sensor Networks. ACM Mobicom, 1999.
https://www.us-cert.gov/ncas/tips/ST05-015
http://compnetworking.about.com/cs/bluetooth/g/bldef_bluetoot
h.htm
http://www.bluetooth.com/Pages/what-is-bluetooth-
technology.aspx
http://www.ti.com/ww/en/wireless_power/12417_New_Landing
_Page_BLE/index.shtml
http://esupport.sony.com/perl/support-info.pl?info_id=66
http://computer.howstuffworks.com/ssid.htm
http://www.dummies.com/how-to/content/wireless-security-
protocols-wep-wpa-and-wpa2.html
THANK YOU