SlideShare a Scribd company logo
1 of 20
Wireless Technologies
Presented by
Sean Shields
And
Gabriel Taveras
Definition
Term “Wireless” refers to all the communications sent and
received without wires.
So Wireless Technology
Means a technology that use radio waves to transmit or receive
data.
Wi-Fi
Bluetooth
Cellular
Wimax
TYPES OF
TECHNOLOGIES
INTRODUCTION:
Wireless Fidelity termed as Wi-Fi uses the IEEE 802.11
specification to create a wireless local-area network.
A Wi-Fi network basically consists of a wired connection to the
Internet that leads to a wireless router for transmutation and
receiving data from individual devices, connecting them not
only to the outside world but also to each other.
HOW WIFI WORKS?
1. All devices use a wireless adapter to convert request into a
radio signal and broadcasts it into the air.
2. The Wi-Fi device, or wireless router, picks up the signal and
translates it back into its original form.
3. The router passes the request to the Internet using a
hardwired connection.
4. The Internet returns the requested information to the router
across the same connection.
5. The router converts the information into a radio signal and
broadcasts it into the air.
6. The computer or cell phone's wireless adapter picks up the
information and displays it on your screen
WIFI TOPOLOGIES
Wifi have following topologies
AP-based topology (Infrastructure Mode)
Peer-to-peer topology (Ad-hoc Mode)
Point-to-multipoint bridge topology
Wi Fi Network
Wireless Standards
802.11
In 1997, the Institute of Electrical and Electronics Engineers
(IEEE) created the first WLAN standard. They called it 802.11
after the name of the group formed to oversee its development.
Unfortunately, 802.11 only supported a maximum network
bandwidth of 2 Mbps - too slow for most applications. For this
reason, ordinary 802.11 wireless products are no longer
manufactured.
Wireless Standards
802.11b
IEEE expanded on the original 802.11 standard in July 1999,
creating the 802.11b specification. 802.11b supports bandwidth
up to 11 Mbps, comparable to traditional Ethernet.
Wireless Standards
802.11a
Supports bandwidth up to 54 Mbps and signals in a regulated
frequency spectrum around 5 GHz. This higher frequency
compared to 802.11b shortens the range of 802.11a networks.
The higher frequency also means 802.11a signals have more
difficulty penetrating walls and other obstructions.
Wireless Standards
802.11g
Attempts to combine the best of both 802.11a and 802.11b.
802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4
Ghz frequency for greater range. 802.11g is backwards
compatible with 802.11b, meaning that 802.11g access points
will work with 802.11b wireless network adapters and vice
versa.
Wireless Standards
802.11n
The newest IEEE standard in the Wi-Fi category is 802.11n.
802.11n connections support data rates of over 100 Mbps.
802.11n also offers somewhat better range over earlier Wi-Fi
standards due to its increased signal intensity.
Wireless Technologies
Bluetooth
Bluetooth is a wireless technology standard for exchanging
data over short distances from fixed and mobile devices,
creating personal area networks (PANs) with high levels of
security.
Bluetooth supports a very short range (approximately 10 meters)
and relatively low bandwidth (1-3 Mbps) designed for low-
power network devices like handhelds.
Bluetooth
Bluetooth was standardized as IEEE 802.15.1, but the standard
is no longer maintained. The SIG oversees the development of
the specification, manages the qualification program, and
protects the trademarks. To be marketed as a Bluetooth device,
it must be qualified to standards defined by the SIG. A network
of patents is required to implement the technology, which is
licensed only for that qualifying device.
Bluetooth vs. Wi-Fi
Bluetooth and Wi-Fi have some similar applications, setting up
networks, printing, or transferring files. Wi-Fi is intended as a
replacement for high speed cabling for general local area
network access in work areas. Bluetooth was intended for
portable equipment and its applications. Bluetooth is a
replacement for cabling in a variety of personally carried
applications in any setting and also works for fixed location
applications such as smart energy functionality in the home
(thermostats, etc.).
Wi-Fi and Bluetooth are to some extent complementary in their
applications and usage. Wi-Fi is usually access point-centered.
Bluetooth is usually between two Bluetooth devices. Bluetooth
serves well in simple applications where two devices need to
connect with minimal configuration like in headsets and remote
controls, while Wi-Fi suits better in applications where some
degree of client configuration is possible and high speeds are
required.
Wireless Technologies
WiMax
WiMAX (Worldwide Interoperability for Microwave Access) is
a wireless communications standard designed to provide 30 to
40 megabit-per-second data rates, with the 2011 update
providing up to 1 Gbit/s for fixed stations.
WiMax was developed separately from Wi-Fi and is designed
for long-range networking (spanning miles or kilometers) as
opposed to local area wireless networking.
Wireless Technologies
WiMAX is sometimes referred to as “Wi-Fi on steroids” and can
be used for a number of applications including broadband
connections, cellular backhaul, and hotspots. It is similar to Wi-
Fi, but it can enable usage at much greater distances.
Wireless LAN
A wireless local area network (WLAN) links two or more
devices using some wireless distribution method (typically
spread-spectrum or OFDM radio), and usually providing a
connection through an access point to the wider Internet. This
gives users the ability to move around within a local coverage
area and still be connected to the network.
Wireless LAN
A communications network that provides connectivity to
wireless devices within a limited geographic area.
Wi-Fi is the universal standard for wireless networks and is
the wireless equivalent of wired Ethernet networks.
Principles of WLAN
Stations
Basic Server Set
Extended Server Set
Distribution System
Stations
All components that can connect into a wireless medium in a
network are referred to as stations. All stations are equipped
with wireless network interface controllers (WNICs). Wireless
stations fall into one of two categories: access points, and
clients. Access points (APs), normally routers, are base stations
for the wireless network. They transmit and receive radio
frequencies for wireless enabled devices to communicate with.
Stations
Basic service set
The basic service set (BSS) is a set of all stations that can
communicate with each other. Every BSS has an identification
(ID) called the BSSID, which is the MAC address of the access
point servicing the BSS.
There are two types of BSS: Independent BSS and infrastructure
BSS. An independent BSS (IBSS) is an ad hoc network that
contains no access points, which means they can not connect to
any other basic service set.
Basic service set
1)Infrastructure BSS
2) Independent BSS
Extended service set
An extended service set (ESS) is a set of connected BSSs.
Access points in an ESS are connected by a distribution system.
Each ESS has an ID called the SSID which is a 32-byte
(maximum) character string.
Distribution system
A distribution system (DS) connects access points in an
extended service set. The concept of a DS can be used to
increase network coverage through roaming between cells.
Advantages of WLAN
NO WIRES
It is easier to add or move workstations.
It is easier to provide connectivity in areas where it is difficult
to lay cable.
Installation is fast and easy, and it can eliminate the need to
pull cable through walls and ceilings.
Access to the network can be from anywhere within range of an
access point.
WLAN
http://www.youtube.com/watch?v=DAR52r0lEtw
Wireless Personal Area Network
A wireless personal area network is a low-range wireless
network which covers an area of only a few dozen meters. This
sort of network is generally used for linking peripheral devices
to a computer, or just two nearby computers, without using a
hard-wired connection. Eg. printers, cell phones, and home
appliances or (PDA)
WPAN
One such technology is Bluetooth.
Cellular Wide Area Networks
A Cellular Wide Area Network is a wireless network distributed
over land areas called cells, each served by at least one fixed-
location transceiver, known as a cell site or base station. In a
cellular network, each cell uses a different set of frequencies
from neighboring cells, to avoid interference and provide
guaranteed bandwidth within each cell. When joined together
these cells provide radio coverage over a wide geographic area.
Cellular Wide Area Networks
Some cellular modems are used with CardBus slots, or
connect to a USB port. Cellular modems that use the GSM
system require you to activate the SIM card, which contains
subscriber details that identifies the caller to the network
service provider.
Cellular modems that use the CDMA system do not use SIM
cards, but instead use a utility provided by the mobile network
provider to make the connection to the cellular network.
(Global System for Mobile Communications) (Subscriber
Identity Module) (Code Division Multiple Access)
32
Cellular Area Network
Cellular Wide Area Networks
2 G
2G (which stands for second-generation, 1G being the first-
generation which operated at speeds between 2.9KBps and
5.6KBps.) technology was first commercially launched on the
GSM standard in Finland in 1991. 2G data rates range from 56
kbps up to 200 kbps depending upon your location.
Cellular Wide Area Networks
3G (third-generation) mobile communications is specified by
the International Mobile Telecommunications-2000 (IMT-2000)
specification by the International Telecommunication Union. To
meet the IMT-2000 standards, a system is required to provide
peak data rates of at least 200 kbps. Some locations can provide
3G data rates up to 2.5Mbps.
Cellular Wide Area Networks
4G (fourth generation) cellular mobile communications is
specified by the International Mobile Telecommunications-
Advanced (IMT-Advanced) specification. The IMT-Advanced
standards require a peak speed of 100 Mbps for high mobility
communication (such as from trains and cars) and 1 Gbps for
low mobility communication (such as pedestrians and stationary
users).
Satellite Network
Satellite Internet access is Internet access provided through
communications satellites. Modern satellite Internet service is
typically provided to users through geostationary satellites that
can offer high data speeds, with newer satellites achieving
downstream data speeds up to 15 Mbps
Wireless Personal Area Network
A Satellite Network generally relies on three primary
components:
Satellite
Gateway
Antenna dish/modem
Satellite Network
Satellite
A satellite has its own set of antennas to receive communication
signals from Earth and to transmit signals to their target
location. These antennas and transponders are part of the
satellite’s “payload”, which is designed to receive and transmit
signals to and from various places on Earth. What enables this
transmission and reception in the payload transponders is a
repeater subsystem (RF (radio frequency) equipment) used to
change frequencies, filter, separate, amplify and group signals
before routing them to their destination address on Earth.
Gateways
The Gateway is also referred to as a ground station, teleport or
hub. The term is sometimes used to describe just the antenna
dish portion, or it can refer to the complete system with all
associated components. In short, the gateway receives radio
wave signals from the satellite on the last leg of the return or
upstream payload, carrying the request originating from the
end-user’s site.
Antenna dish/modem
Outdoor Unit
At the far-end of the outdoor unit is a small (2–3 foot
diameter), reflective dish-type radio antenna constructed from
and coated with a variety of materials.
There are four characteristic settings used to ensure that the
antenna is configured correctly at the satellite.
Antenna dish/modem
Azimuth,( angular measurement) Elevation, Polarization, (the
orientation of electromagnetic waves which converts electric
power into radio waves, and vice versa), and Skew (It is a
technique to improve the horizontal radiation pattern of a high
power transmitter station).
The combination of these settings gives the outdoor unit a Line-
of-sight to the chosen satellite and makes data transmission
possible.
Antenna dish/modem
Indoor Unit
The Satellite Modem serves as an interface between the outdoor
unit and customer provided equipment (i.e. PC, router) and
controls satellite transmission and reception.
Coaxial cable (COAX) connectivity to the satellite antenna. The
cable carrying electromagnetic satellite signals between the
modem and the antenna generally is limited to be no more than
150 feet in length
Antenna dish/modem
Ethernet connectivity to the computer, carrying the customer’s
data packets to and from the Internet content servers.
Satellite modems employ either the DOCSIS (Data Over Cable
Service Interface Specification) or WiMAX (World
Interoperability for Microwave Access) telecommunication
standard to communicate with the assigned gateway.
Satellite Networks
Examples:
Dish Network
Direct TV
GPS
How a satellite works
http://www.youtube.com/watch?v=zBd4PkCZaUk
Current and Future Wireless APPS
AT & T
New APP
Car to Car
New APP II
AT&T APP
New APP
Car APP
Future wireless APP
Car 2X
Wireless security and Limitation
Wireless data networks are found everywhere. Each time there
is a wireless transmission, you are vulnerable to any wireless
attacks and are subjects to wireless attacks. At first, there were
design flaws in the security mechanisms of the 802.11, however
there have been significant changes in wireless network security
for users to enjoy without the fear of attacks such as
eavesdropping, or tamper with wireless transmissions.
How They Attack
One of the first steps in attacking a wireless network is to
discover the network. Afterwards, an Access Point sends a
signal (beacon frame) to announce its presence and provides the
necessary information to a device who wishes to join the
wireless network. The process is called beaconing to establish
and maintain communications. Attackers will use beaconing to
find wireless networks and then record information about them.
Attacks
War Driving - searching for wireless signals from an automobile
or on foot using a portable computing device.
Some tools are necessary to conduct war driving…
Attacks
War Chalking - After the wireless signal has been detected, the
next step is to document and then advertise the location of the
wireless LANs for others to use. WLANs are identified with
drawings on the walls around the area network.
Attacks
Wireless Protocol Analyzer – wireless traffic can be captured to
decode and analyze its contents by a protocol analyzer device or
a computer that runs protocol analyzer software.
“Parking Lot” Attack - Attackers who actually sit in the
organization's parking lot and try to access internal hosts via the
wireless network. Access points emit radio signals in a circular
pattern, and the signals sometimes extend beyond the physical
boundaries of the area they intend cover. Signals can be
intercepted outside buildings, or even through the floors in
multi-storey buildings.
Service Set Identifier Flaw – Access points come with default
SSIDs and when connecting to a wireless device it generates a
broadcast. An attacker must determine a valid SSID to be
authenticated. Easiest way to do so is to wait for the
transmission of the SSID from the AP to the wireless device or
use an SSID that is already obtained.
Vulnerabilities
MAC Address Filtering
Media Access Control (MAC) address filtering that is a method
for controlling access to a WLAN based on the device’s MAC
address. A wireless device’s MAC address is entered into
software running on the AP, which then is used to permit or
deny a device from connecting to the network. MAC addresses
are initially exchanged between wireless devices and the AP in
an unencrypted format. An attacker using a protocol analyzer
can easily see the MAC address of an approved device and then
substitute it on his own device. Another weakness of MAC
address filtering is that managing a large number of MAC
addresses can pose significant challenges. The sheer number of
users often makes it difficult to manage all of the MAC
addresses. As new users are added to the network and old users
leave, keeping track of MAC address filtering demands almost
constant attention.
Vulnerabilities
SSID Broadcast
Some wireless security sources encourage users to configure
their APs to prevent the beacon frame from including the SSID,
and instead require the user to enter the SSID manually on the
wireless device. Although it provides a weak degree of security
and has several limitations:
● The SSID can be easily discovered even when it is not
contained in beacon frames because it is transmitted in other
management frames sent by the AP. Attackers with protocol
analyzers can still detect the SSID.
● Turning off the SSID broadcast may prevent users from being
able to freely roam from one AP coverage area to another.
● It is not always possible or convenient to turn off SSID
beaconing. SSID beaconing is the default mode in virtually
every AP, and not all APs allow beaconing to be turned off.
Vulnerabilities
WEP
The original encryption protocol developed for wireless
networks. As its name implies, WEP was designed to provide
the same level of security as wired networks. However, WEP
has many well-known security flaws, is difficult to configure,
and is easily broken.
Security Tips
1.Don’t leave your wireless device unattended;
2. Protect your device with passwords: Enable your device’s
power-on login and system login authentication
3. Disable the wireless connection when not in use.
Security Tips
4. Keep wireless network interface card drivers up to date.
5. Use WPA and WPA2 security with TKIP and AES encryption
6. Antenna Placement - For security purposes, the AP and its
antenna should be positioned so that when possible a minimal
amount of signal reaches beyond the security perimeter of the
building or campus
Security Tips
7. the ability to adjust the level of power at which the WLAN
transmits. On devices with that feature, the power can be
adjusted so that less of the signal leaves the premises and
reaches outsiders.
8. Setup wireless virtual LANs
“Automatic communication between various devices within a
small area in a
house or an office makes it possible. When you click on an icon
for a device and you are linked to it, automatically and
transparently”
ADVANTAGES:
Wireless
Low energy consumption
Bluetooth is automatic
DISADVANATAGES:
Slow data rates
Bluetooth Sensors
A wearable computer is a computer that is subsumed into the
personal space of the user, controlled by the user, and has both
operational and interactional constancy, i.e. is always on and
always accessible. Most notably, it is a device that is always
with the user, and into which the user can always enter
commands and execute a set of such entered commands, and in
which the user can do so while walking around or doing other
activities"
Wireless Wearable Computing Devices
Wireless Wearable Computing Devices
References:
Kahn, J.M., et al. Next Century Challenges: Mobile Networking
for Smart Dust. ACM Mobicom, 1999.
Estrin, D. et al. Next Century Challenges: Scalable
Coordination in Sensor Networks. ACM Mobicom, 1999.
https://www.us-cert.gov/ncas/tips/ST05-015
http://compnetworking.about.com/cs/bluetooth/g/bldef_bluetoot
h.htm
http://www.bluetooth.com/Pages/what-is-bluetooth-
technology.aspx
http://www.ti.com/ww/en/wireless_power/12417_New_Landing
_Page_BLE/index.shtml
http://esupport.sony.com/perl/support-info.pl?info_id=66
http://computer.howstuffworks.com/ssid.htm
http://www.dummies.com/how-to/content/wireless-security-
protocols-wep-wpa-and-wpa2.html
THANK YOU

More Related Content

Similar to Wireless TechnologiesPresented bySean Shields AndGabriel.docx

Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Chap 01 introduction to wirelless
Chap 01 introduction to wirelless Chap 01 introduction to wirelless
Chap 01 introduction to wirelless EngkaderAMuse
 
Wi fi and wimax
Wi fi and wimax Wi fi and wimax
Wi fi and wimax Sanjay Hp
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12Rishabh-Rawat
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Praveen Reddy
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networksSweta Kumari Barnwal
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologiesChandrakant Choure
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technologyRavi Rajput
 
Itc lec 12 wired and wireless network
Itc lec 12 wired and wireless networkItc lec 12 wired and wireless network
Itc lec 12 wired and wireless networkAnzaDar3
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networkingM Sabir Saeed
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologyAkhil Kumar
 

Similar to Wireless TechnologiesPresented bySean Shields AndGabriel.docx (20)

Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Chap 01 introduction to wirelless
Chap 01 introduction to wirelless Chap 01 introduction to wirelless
Chap 01 introduction to wirelless
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
Wi fi and wimax
Wi fi and wimax Wi fi and wimax
Wi fi and wimax
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologies
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
Itc lec 12 wired and wireless network
Itc lec 12 wired and wireless networkItc lec 12 wired and wireless network
Itc lec 12 wired and wireless network
 
ITC_lec_12.ppt
ITC_lec_12.pptITC_lec_12.ppt
ITC_lec_12.ppt
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Wireless
WirelessWireless
Wireless
 
Darsh
DarshDarsh
Darsh
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi-fi tecnology
Wi-fi tecnologyWi-fi tecnology
Wi-fi tecnology
 
wifi technology
wifi technologywifi technology
wifi technology
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 

More from alanfhall8953

With regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docxWith regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docxalanfhall8953
 
WIT Financial Accounting Test Ch.docx
WIT                   Financial Accounting Test                 Ch.docxWIT                   Financial Accounting Test                 Ch.docx
WIT Financial Accounting Test Ch.docxalanfhall8953
 
Windows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docxWindows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docxalanfhall8953
 
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0  Supplement to Computer Networking.docxWireshark Lab TCP v6.0  Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docxalanfhall8953
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxalanfhall8953
 
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
Wireshark Lab IP v6.0  Supplement to Computer Networking.docxWireshark Lab IP v6.0  Supplement to Computer Networking.docx
Wireshark Lab IP v6.0 Supplement to Computer Networking.docxalanfhall8953
 
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxWillowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxalanfhall8953
 
Wind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docxWind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docxalanfhall8953
 
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxwinter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxalanfhall8953
 
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docxWinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docxalanfhall8953
 
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxWiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxalanfhall8953
 
Winter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docxWinter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docxalanfhall8953
 
With the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docxWith the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docxalanfhall8953
 
Windows Server 2012 R2 Essentials Windows Server 2012.docx
Windows Server 2012 R2 Essentials  Windows Server 2012.docxWindows Server 2012 R2 Essentials  Windows Server 2012.docx
Windows Server 2012 R2 Essentials Windows Server 2012.docxalanfhall8953
 
Wind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docxWind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docxalanfhall8953
 
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
WilliamStearman_Java301build.xml      Builds, tests, and ru.docxWilliamStearman_Java301build.xml      Builds, tests, and ru.docx
WilliamStearman_Java301build.xml Builds, tests, and ru.docxalanfhall8953
 
Wilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docxWilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docxalanfhall8953
 
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxWilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxalanfhall8953
 
WinARM - Simulating Advanced RISC Machine Architecture .docx
WinARM - Simulating Advanced RISC Machine Architecture   .docxWinARM - Simulating Advanced RISC Machine Architecture   .docx
WinARM - Simulating Advanced RISC Machine Architecture .docxalanfhall8953
 
William PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docxWilliam PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docxalanfhall8953
 

More from alanfhall8953 (20)

With regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docxWith regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docx
 
WIT Financial Accounting Test Ch.docx
WIT                   Financial Accounting Test                 Ch.docxWIT                   Financial Accounting Test                 Ch.docx
WIT Financial Accounting Test Ch.docx
 
Windows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docxWindows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docx
 
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0  Supplement to Computer Networking.docxWireshark Lab TCP v6.0  Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
 
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
Wireshark Lab IP v6.0  Supplement to Computer Networking.docxWireshark Lab IP v6.0  Supplement to Computer Networking.docx
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
 
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxWillowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
 
Wind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docxWind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docx
 
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxwinter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
 
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docxWinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
 
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxWiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
 
Winter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docxWinter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docx
 
With the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docxWith the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docx
 
Windows Server 2012 R2 Essentials Windows Server 2012.docx
Windows Server 2012 R2 Essentials  Windows Server 2012.docxWindows Server 2012 R2 Essentials  Windows Server 2012.docx
Windows Server 2012 R2 Essentials Windows Server 2012.docx
 
Wind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docxWind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docx
 
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
WilliamStearman_Java301build.xml      Builds, tests, and ru.docxWilliamStearman_Java301build.xml      Builds, tests, and ru.docx
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
 
Wilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docxWilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docx
 
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxWilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
 
WinARM - Simulating Advanced RISC Machine Architecture .docx
WinARM - Simulating Advanced RISC Machine Architecture   .docxWinARM - Simulating Advanced RISC Machine Architecture   .docx
WinARM - Simulating Advanced RISC Machine Architecture .docx
 
William PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docxWilliam PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docx
 

Recently uploaded

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 

Wireless TechnologiesPresented bySean Shields AndGabriel.docx

  • 1. Wireless Technologies Presented by Sean Shields And Gabriel Taveras Definition Term “Wireless” refers to all the communications sent and received without wires. So Wireless Technology Means a technology that use radio waves to transmit or receive data. Wi-Fi Bluetooth Cellular Wimax
  • 2. TYPES OF TECHNOLOGIES INTRODUCTION: Wireless Fidelity termed as Wi-Fi uses the IEEE 802.11 specification to create a wireless local-area network. A Wi-Fi network basically consists of a wired connection to the Internet that leads to a wireless router for transmutation and receiving data from individual devices, connecting them not only to the outside world but also to each other. HOW WIFI WORKS? 1. All devices use a wireless adapter to convert request into a radio signal and broadcasts it into the air. 2. The Wi-Fi device, or wireless router, picks up the signal and translates it back into its original form. 3. The router passes the request to the Internet using a hardwired connection. 4. The Internet returns the requested information to the router across the same connection. 5. The router converts the information into a radio signal and broadcasts it into the air. 6. The computer or cell phone's wireless adapter picks up the information and displays it on your screen
  • 3. WIFI TOPOLOGIES Wifi have following topologies AP-based topology (Infrastructure Mode) Peer-to-peer topology (Ad-hoc Mode) Point-to-multipoint bridge topology Wi Fi Network Wireless Standards 802.11 In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the first WLAN standard. They called it 802.11 after the name of the group formed to oversee its development. Unfortunately, 802.11 only supported a maximum network bandwidth of 2 Mbps - too slow for most applications. For this reason, ordinary 802.11 wireless products are no longer manufactured. Wireless Standards 802.11b IEEE expanded on the original 802.11 standard in July 1999, creating the 802.11b specification. 802.11b supports bandwidth
  • 4. up to 11 Mbps, comparable to traditional Ethernet. Wireless Standards 802.11a Supports bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz. This higher frequency compared to 802.11b shortens the range of 802.11a networks. The higher frequency also means 802.11a signals have more difficulty penetrating walls and other obstructions. Wireless Standards 802.11g Attempts to combine the best of both 802.11a and 802.11b. 802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4 Ghz frequency for greater range. 802.11g is backwards compatible with 802.11b, meaning that 802.11g access points will work with 802.11b wireless network adapters and vice versa. Wireless Standards 802.11n The newest IEEE standard in the Wi-Fi category is 802.11n. 802.11n connections support data rates of over 100 Mbps. 802.11n also offers somewhat better range over earlier Wi-Fi standards due to its increased signal intensity. Wireless Technologies Bluetooth Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, creating personal area networks (PANs) with high levels of security.
  • 5. Bluetooth supports a very short range (approximately 10 meters) and relatively low bandwidth (1-3 Mbps) designed for low- power network devices like handhelds. Bluetooth Bluetooth was standardized as IEEE 802.15.1, but the standard is no longer maintained. The SIG oversees the development of the specification, manages the qualification program, and protects the trademarks. To be marketed as a Bluetooth device, it must be qualified to standards defined by the SIG. A network of patents is required to implement the technology, which is licensed only for that qualifying device. Bluetooth vs. Wi-Fi Bluetooth and Wi-Fi have some similar applications, setting up networks, printing, or transferring files. Wi-Fi is intended as a replacement for high speed cabling for general local area network access in work areas. Bluetooth was intended for portable equipment and its applications. Bluetooth is a replacement for cabling in a variety of personally carried applications in any setting and also works for fixed location applications such as smart energy functionality in the home (thermostats, etc.). Wi-Fi and Bluetooth are to some extent complementary in their applications and usage. Wi-Fi is usually access point-centered. Bluetooth is usually between two Bluetooth devices. Bluetooth serves well in simple applications where two devices need to connect with minimal configuration like in headsets and remote controls, while Wi-Fi suits better in applications where some degree of client configuration is possible and high speeds are required.
  • 6. Wireless Technologies WiMax WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide 30 to 40 megabit-per-second data rates, with the 2011 update providing up to 1 Gbit/s for fixed stations. WiMax was developed separately from Wi-Fi and is designed for long-range networking (spanning miles or kilometers) as opposed to local area wireless networking. Wireless Technologies WiMAX is sometimes referred to as “Wi-Fi on steroids” and can be used for a number of applications including broadband connections, cellular backhaul, and hotspots. It is similar to Wi- Fi, but it can enable usage at much greater distances. Wireless LAN A wireless local area network (WLAN) links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an access point to the wider Internet. This gives users the ability to move around within a local coverage area and still be connected to the network. Wireless LAN A communications network that provides connectivity to wireless devices within a limited geographic area. Wi-Fi is the universal standard for wireless networks and is the wireless equivalent of wired Ethernet networks.
  • 7. Principles of WLAN Stations Basic Server Set Extended Server Set Distribution System Stations All components that can connect into a wireless medium in a network are referred to as stations. All stations are equipped with wireless network interface controllers (WNICs). Wireless stations fall into one of two categories: access points, and clients. Access points (APs), normally routers, are base stations for the wireless network. They transmit and receive radio frequencies for wireless enabled devices to communicate with. Stations Basic service set The basic service set (BSS) is a set of all stations that can communicate with each other. Every BSS has an identification (ID) called the BSSID, which is the MAC address of the access point servicing the BSS. There are two types of BSS: Independent BSS and infrastructure BSS. An independent BSS (IBSS) is an ad hoc network that contains no access points, which means they can not connect to any other basic service set. Basic service set
  • 8. 1)Infrastructure BSS 2) Independent BSS Extended service set An extended service set (ESS) is a set of connected BSSs. Access points in an ESS are connected by a distribution system. Each ESS has an ID called the SSID which is a 32-byte (maximum) character string. Distribution system A distribution system (DS) connects access points in an extended service set. The concept of a DS can be used to increase network coverage through roaming between cells. Advantages of WLAN NO WIRES It is easier to add or move workstations. It is easier to provide connectivity in areas where it is difficult to lay cable. Installation is fast and easy, and it can eliminate the need to pull cable through walls and ceilings. Access to the network can be from anywhere within range of an access point. WLAN
  • 9. http://www.youtube.com/watch?v=DAR52r0lEtw Wireless Personal Area Network A wireless personal area network is a low-range wireless network which covers an area of only a few dozen meters. This sort of network is generally used for linking peripheral devices to a computer, or just two nearby computers, without using a hard-wired connection. Eg. printers, cell phones, and home appliances or (PDA) WPAN One such technology is Bluetooth. Cellular Wide Area Networks A Cellular Wide Area Network is a wireless network distributed over land areas called cells, each served by at least one fixed- location transceiver, known as a cell site or base station. In a cellular network, each cell uses a different set of frequencies from neighboring cells, to avoid interference and provide guaranteed bandwidth within each cell. When joined together these cells provide radio coverage over a wide geographic area. Cellular Wide Area Networks Some cellular modems are used with CardBus slots, or connect to a USB port. Cellular modems that use the GSM system require you to activate the SIM card, which contains subscriber details that identifies the caller to the network service provider. Cellular modems that use the CDMA system do not use SIM cards, but instead use a utility provided by the mobile network
  • 10. provider to make the connection to the cellular network. (Global System for Mobile Communications) (Subscriber Identity Module) (Code Division Multiple Access) 32 Cellular Area Network Cellular Wide Area Networks 2 G 2G (which stands for second-generation, 1G being the first- generation which operated at speeds between 2.9KBps and 5.6KBps.) technology was first commercially launched on the GSM standard in Finland in 1991. 2G data rates range from 56 kbps up to 200 kbps depending upon your location. Cellular Wide Area Networks 3G (third-generation) mobile communications is specified by the International Mobile Telecommunications-2000 (IMT-2000) specification by the International Telecommunication Union. To meet the IMT-2000 standards, a system is required to provide
  • 11. peak data rates of at least 200 kbps. Some locations can provide 3G data rates up to 2.5Mbps. Cellular Wide Area Networks 4G (fourth generation) cellular mobile communications is specified by the International Mobile Telecommunications- Advanced (IMT-Advanced) specification. The IMT-Advanced standards require a peak speed of 100 Mbps for high mobility communication (such as from trains and cars) and 1 Gbps for low mobility communication (such as pedestrians and stationary users). Satellite Network Satellite Internet access is Internet access provided through communications satellites. Modern satellite Internet service is typically provided to users through geostationary satellites that can offer high data speeds, with newer satellites achieving downstream data speeds up to 15 Mbps Wireless Personal Area Network A Satellite Network generally relies on three primary components: Satellite Gateway Antenna dish/modem
  • 12. Satellite Network Satellite A satellite has its own set of antennas to receive communication signals from Earth and to transmit signals to their target location. These antennas and transponders are part of the satellite’s “payload”, which is designed to receive and transmit signals to and from various places on Earth. What enables this transmission and reception in the payload transponders is a repeater subsystem (RF (radio frequency) equipment) used to change frequencies, filter, separate, amplify and group signals before routing them to their destination address on Earth. Gateways The Gateway is also referred to as a ground station, teleport or hub. The term is sometimes used to describe just the antenna dish portion, or it can refer to the complete system with all associated components. In short, the gateway receives radio wave signals from the satellite on the last leg of the return or upstream payload, carrying the request originating from the end-user’s site. Antenna dish/modem Outdoor Unit At the far-end of the outdoor unit is a small (2–3 foot diameter), reflective dish-type radio antenna constructed from and coated with a variety of materials. There are four characteristic settings used to ensure that the antenna is configured correctly at the satellite.
  • 13. Antenna dish/modem Azimuth,( angular measurement) Elevation, Polarization, (the orientation of electromagnetic waves which converts electric power into radio waves, and vice versa), and Skew (It is a technique to improve the horizontal radiation pattern of a high power transmitter station). The combination of these settings gives the outdoor unit a Line- of-sight to the chosen satellite and makes data transmission possible. Antenna dish/modem Indoor Unit The Satellite Modem serves as an interface between the outdoor unit and customer provided equipment (i.e. PC, router) and controls satellite transmission and reception. Coaxial cable (COAX) connectivity to the satellite antenna. The cable carrying electromagnetic satellite signals between the modem and the antenna generally is limited to be no more than 150 feet in length Antenna dish/modem Ethernet connectivity to the computer, carrying the customer’s data packets to and from the Internet content servers. Satellite modems employ either the DOCSIS (Data Over Cable Service Interface Specification) or WiMAX (World Interoperability for Microwave Access) telecommunication standard to communicate with the assigned gateway. Satellite Networks
  • 14. Examples: Dish Network Direct TV GPS How a satellite works http://www.youtube.com/watch?v=zBd4PkCZaUk Current and Future Wireless APPS AT & T New APP Car to Car New APP II AT&T APP New APP Car APP Future wireless APP Car 2X Wireless security and Limitation Wireless data networks are found everywhere. Each time there is a wireless transmission, you are vulnerable to any wireless attacks and are subjects to wireless attacks. At first, there were design flaws in the security mechanisms of the 802.11, however there have been significant changes in wireless network security for users to enjoy without the fear of attacks such as
  • 15. eavesdropping, or tamper with wireless transmissions. How They Attack One of the first steps in attacking a wireless network is to discover the network. Afterwards, an Access Point sends a signal (beacon frame) to announce its presence and provides the necessary information to a device who wishes to join the wireless network. The process is called beaconing to establish and maintain communications. Attackers will use beaconing to find wireless networks and then record information about them. Attacks War Driving - searching for wireless signals from an automobile or on foot using a portable computing device. Some tools are necessary to conduct war driving… Attacks War Chalking - After the wireless signal has been detected, the next step is to document and then advertise the location of the wireless LANs for others to use. WLANs are identified with drawings on the walls around the area network.
  • 16. Attacks Wireless Protocol Analyzer – wireless traffic can be captured to decode and analyze its contents by a protocol analyzer device or a computer that runs protocol analyzer software. “Parking Lot” Attack - Attackers who actually sit in the organization's parking lot and try to access internal hosts via the wireless network. Access points emit radio signals in a circular pattern, and the signals sometimes extend beyond the physical boundaries of the area they intend cover. Signals can be intercepted outside buildings, or even through the floors in multi-storey buildings. Service Set Identifier Flaw – Access points come with default SSIDs and when connecting to a wireless device it generates a broadcast. An attacker must determine a valid SSID to be authenticated. Easiest way to do so is to wait for the transmission of the SSID from the AP to the wireless device or use an SSID that is already obtained. Vulnerabilities MAC Address Filtering Media Access Control (MAC) address filtering that is a method for controlling access to a WLAN based on the device’s MAC address. A wireless device’s MAC address is entered into software running on the AP, which then is used to permit or deny a device from connecting to the network. MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format. An attacker using a protocol analyzer can easily see the MAC address of an approved device and then substitute it on his own device. Another weakness of MAC address filtering is that managing a large number of MAC addresses can pose significant challenges. The sheer number of users often makes it difficult to manage all of the MAC
  • 17. addresses. As new users are added to the network and old users leave, keeping track of MAC address filtering demands almost constant attention. Vulnerabilities SSID Broadcast Some wireless security sources encourage users to configure their APs to prevent the beacon frame from including the SSID, and instead require the user to enter the SSID manually on the wireless device. Although it provides a weak degree of security and has several limitations: ● The SSID can be easily discovered even when it is not contained in beacon frames because it is transmitted in other management frames sent by the AP. Attackers with protocol analyzers can still detect the SSID. ● Turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another. ● It is not always possible or convenient to turn off SSID beaconing. SSID beaconing is the default mode in virtually every AP, and not all APs allow beaconing to be turned off. Vulnerabilities WEP The original encryption protocol developed for wireless networks. As its name implies, WEP was designed to provide the same level of security as wired networks. However, WEP has many well-known security flaws, is difficult to configure, and is easily broken. Security Tips
  • 18. 1.Don’t leave your wireless device unattended; 2. Protect your device with passwords: Enable your device’s power-on login and system login authentication 3. Disable the wireless connection when not in use. Security Tips 4. Keep wireless network interface card drivers up to date. 5. Use WPA and WPA2 security with TKIP and AES encryption 6. Antenna Placement - For security purposes, the AP and its antenna should be positioned so that when possible a minimal amount of signal reaches beyond the security perimeter of the building or campus Security Tips 7. the ability to adjust the level of power at which the WLAN transmits. On devices with that feature, the power can be adjusted so that less of the signal leaves the premises and reaches outsiders. 8. Setup wireless virtual LANs “Automatic communication between various devices within a small area in a house or an office makes it possible. When you click on an icon for a device and you are linked to it, automatically and transparently” ADVANTAGES:
  • 19. Wireless Low energy consumption Bluetooth is automatic DISADVANATAGES: Slow data rates Bluetooth Sensors A wearable computer is a computer that is subsumed into the personal space of the user, controlled by the user, and has both operational and interactional constancy, i.e. is always on and always accessible. Most notably, it is a device that is always with the user, and into which the user can always enter commands and execute a set of such entered commands, and in which the user can do so while walking around or doing other activities" Wireless Wearable Computing Devices Wireless Wearable Computing Devices
  • 20. References: Kahn, J.M., et al. Next Century Challenges: Mobile Networking for Smart Dust. ACM Mobicom, 1999. Estrin, D. et al. Next Century Challenges: Scalable Coordination in Sensor Networks. ACM Mobicom, 1999. https://www.us-cert.gov/ncas/tips/ST05-015 http://compnetworking.about.com/cs/bluetooth/g/bldef_bluetoot h.htm http://www.bluetooth.com/Pages/what-is-bluetooth- technology.aspx http://www.ti.com/ww/en/wireless_power/12417_New_Landing _Page_BLE/index.shtml http://esupport.sony.com/perl/support-info.pl?info_id=66 http://computer.howstuffworks.com/ssid.htm http://www.dummies.com/how-to/content/wireless-security- protocols-wep-wpa-and-wpa2.html THANK YOU