The document provides information on the history and types of wireless LANs and mobile networks. It discusses:
- The early development of wireless technologies from 1971 including ALOHAnet and experimental wireless networks. Standards like IEEE 802.11 were introduced from 1997.
- Types of wireless LANs including infrared, spread spectrum, and narrowband microwave networks. Key standards are also discussed like IEEE 802.11, HiperLAN, Bluetooth, and HomeRF.
- Challenges for wireless networks including improving data rates, addressing security and interference issues, and ensuring system interoperability. Seamless handoff between access points is also discussed.
Introduction to Wireless Local Area Networks (WLANs). Cover IEEE 802.11a, 802.11b, 802.11g, 802.11n, 802.11i, 802.11x, and deployment & security issues
Bluetooth is an open standard for short-range
digital radio to interconnect a variety of devices Cell
phones, PDA, notebook computers, modems,
cordless phones, pagers, laptop computers, printers,
cameras by developing a single-chip, low-cost,
radio-based wireless network technology.
Introduction to Wireless Local Area Networks (WLANs). Cover IEEE 802.11a, 802.11b, 802.11g, 802.11n, 802.11i, 802.11x, and deployment & security issues
Bluetooth is an open standard for short-range
digital radio to interconnect a variety of devices Cell
phones, PDA, notebook computers, modems,
cordless phones, pagers, laptop computers, printers,
cameras by developing a single-chip, low-cost,
radio-based wireless network technology.
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
Chapter 7 : CCNA Cisco Academy: LAN Switching and Wireless.
This chapter discusses the basic wireless concepts:
- Comparison between WLAN and LAN.
- The difference between wireless PAN, LAN, MAN and WAN.
- Infrared and Radio Frequency (RF).
- Benefits and limitations of the wireless technology.
- Difference between licensed and unlicensed bands.
- Wi-Fi and the key organizations influencing WLAN standards.
- Wireless infrastructure components which are the wireless NIC, Wireless Access Points and wireless routers.
- The Hidden node problem.
- Configuration parameters SSID, network modes and channels.
- Wireless 802.11 typologies: Ad hoc (IBSS), BSS and ESS.
Client and Access Point Association: Beacons, probe, authenticate and associate.
- Threats to Wireless Security- Unauthorized Access: War Drivers, Hackers and employees.
- Man-in-the-Middle Attacks, Denial of Service.
- Wireless Security Protocol Overview: open authentication, WEP authentication.
- Encryption – TKIP and AES.
- Configuring the Wireless Access Point
- Configuring security: personal and enterprise (AAA and EAP ).
- WLAN Troubleshooting: Incorrect Channel Settings, Solving RF Interference, Access Point Misplacement and Authentication and Encryption
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationAbdelkhalik Mosa
This chapter starts with discussing the key elements of ethernet/802.3 networks such as CSMA/CD, communication using unicast, multicast, and broadcast, the ethernet frame, MAC address, duplex settings, half-duplex and full-duplex, switch port settings, auto-MDIX, and the switch MAC table.
After that, there is a discussion about the design considerations for Ethernet networks such as bandwidth, throughput, goodput, collision domains, broadcast domains, LAN segmentation, and network latency.
Switch forwarding modes: store and forward and cut-through and the difference between symmetric and asymmetric switching.
Memory Buffering: port-based memory and shared memory.
The difference between layer 3 switches and routers.
Cisco switch CLI commands, accessing the history, switch boot sequence and recovering from system crash.
Managing the MAC address table, dynamic MAC addresses and static MAC addresses and backing configuration files to a TFTP server.
Configuring switch passwords and password recovery, configuring telnet and SSH.
Common Security Attacks such as MAC address flooding, spoofing attacks, CDP attacks and telnet attacks.
Switch port security, sticky port security and security violation modes: protect, restrict and shutdown and verifying poert security
Transport layer is responsible for the overall end-to-end transfer of application data.
Because different applications have different requirements, there are multiple Transport layer protocols.
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
TCP and UDP headers.
Port Addressing, socket pair.
Types of port numbers: Well Known Ports (0 to 1023), Registered Ports (1024 to 49151) and Dynamic or Private ‘Ephemeral’ Ports (49152 to 65535).
Netstat command : examines the open connections on a host.
Transport Layer Functions.
TCP Connection Establishment (3-way handshake).
Connection Management - Flow Control through buffering, congestion avoidance, and windowing.
Flow Control – Reducing the window size .
TCP Connection Termination (4-way Handshake).
Overview
WLAN Technologies - Infrared LANs, Spread Spectrum LANs, Narrowband Microwave LANs
IEEE 802.11 – Architecture, protocols, MAC layer, MAC Frame, MAC Management
Infra Red
Gi-Fi stands for Gigabit Wireless. GIFI or Gigabit Wireless is the world’s first transceiver integrated at 60GHz a wireless transmission system which is ten times faster than WI-FI.
It is fabricated using (CMOS) technology, the technology used to print silicon chips.
Wireless communication is a communication method that utilizes the characteristics of electromagnetic wave signals propagating in free space to exchange information. Wireless communication technology has many advantages and low cost. Wireless communication technology does not need to establish physical lines, and it does not need a lot of manpower to lay cables. Moreover, wireless communication technology is not limited by the industrial environment, and it has strong ability to resist environmental changes. Also relatively easy, compared to the traditional wired communication setup and maintenance, wireless network maintenance can be completed through remote diagnosis, more convenient; scalability is strong, when the network needs to be expanded, wireless communication does not need to expand the wiring; flexibility, wireless The network is not limited by the terrain of the environment, and when the use environment changes, the wireless network can be adapted to the requirements of the new environment with little adjustment.
Wireless networks are computer networks that are not connected by cables of any kind. Using this technology we can establish network which is more flexible, intangible and easy to access.
C program to find factorial of number using recursion as well as iteration ,
Calculate power of a number program in c using Recursion and Iteration, Write a C program to count digits of a number using Recursion and Iteration, Write a C program to find sum of first n natural numbers using Recursion, C program to print sum of digits of a given number using recursion ,Write a C program to find nth term in Fibonacci Series using Recursion, C program to find out the GCD (Greatest Common Divisor )of the two numbers using recursion,
Write a C program to find the first upper case letter in the given string using recursion, write C program to calculate length of the string using Recursion ,
Write a program in C to count number of divisors of a given number using recursion, Recursive program to check whether a given number is prime or composite,
C program to displays integers 100 through 1 using Recursion and Iteration, Write a program in C to convert a decimal number to binary using recursion,
Recursion Stack of factorial of 3 Recursion stack of 4th term of Fibonacci
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
1. Wireless LAN
================================================================
1. History of Wireless LAN[1]
Norman Abramson, a professor at the University of Hawaii,
developed the world’s first wireless computer communication network,
ALOHAnet (operational in 1971), using low-cost ham-like radios. The
system included seven computers deployed over four islands to
communicate with the central computer on the Oahu Island without using
phone lines.
In 1979, F.R. Gfeller and U. Bapst published a paper in the IEEE Proceedings reporting an
experimental wireless local area network using diffused infrared communications.
In 1980, P. Ferrert reported on an experimental application of a single code spread spectrum
radio for wireless terminal communications in the IEEE National Telecommunications
Conference.
Later on, M. Kavehrad reported on an experimental wireless PBX system using code division
multiple access. These efforts prompted significant industrial activities in the development of
a new generation of wireless local area networks and it updated several old discussions in the
portable and mobile radio industry.
European Telecommunications Standards Institute, ETSI, ratified in1996 with High
Performance Radio LAN (HiperLAN 1) standard. Later, ETSI, rolled out in June 2000, an
flexible Radio LAN standard called HiperLAN 2, designed to provide high speed access
54Mbps than HiperLAN 1(20 Mbps)
The IEEE finalized the initial standard for wireless LANs, IEEE 802.11 in June 1997. This
initial standard specifies a 2.4 GHz operating frequency with data rates of 1 and 2 Mbps.
With this standard, one could choose to use either FHSS or DSSS (two non compatible forms
of spread spectrum modulation).
Because of relatively low data rates (as compared to Ethernet), products based on the initial
standard did not flourish as many had hoped. In late 1999, the IEEE published two
supplements to the initial 802.11 standard: 802.11a and 802.11b (Wi-Fi).
The unlicensed PCS Unlicensed Personal Communications Services and the proposed
SUPERNet, later on renamed as U-NII, bands also presented new opportunities.
A HomeRF group formed in 1997 to promote a technology aimed for residential use, but it
disbanded at the end of 2002
Bluetooth is an industry specification for short-range RF-based connectivity for portable
personal devices with its functional specification released out in 1999 by Bluetooth Special
Interest Group. Bluetooth communicates on a frequency of 2.45 gigahertz.
In 2009 802.11n was added to 802.11. It operates in both the 2.4 GHz and 5 GHz bands at a
maximum data transfer rate of 300 Mbit/s. Most newer routers are able to utilise both
wireless bands, known as dualband. This allows data communications to avoid the crowded
2. 2.4 GHz band, which is also shared with Bluetooth devices and microwave ovens. The 5 GHz
band is also wider than the 2.4 GHz band, with more channels.
2. Types of Wireless LANs:
Local area networks can be constructed in wireless fashion mainly so that wireless users
moving within a certain organization, such as a university campus, can access a backbone
network.
Wireless LANs are generally categorized according to the transmission technique that is
used. All current wireless LAN products fall into one of the following categories:
a) Infrared (IR) LANs
b) Spread spectrum LANs
c) Narrowband microwave LANs
a) Infrared LANs[2] :
Infrared communication technology is used in several home devices, such as television
remote controls.
Advantages of Infrared LANs[2]
The bandwidth for infrared communication is large and can therefore can achieve high
data rates.
IR light is diffusely reflected by light-coloured objects; thus it is possible to use ceiling
reflections to achieve coverage of an entire room.
IR light does not penetrate walls or other opaque objects. This has two advantages:
- IR communications can be more easily secured against eavesdropping than
microwave
- A separate IR installation can be operated in every room in buildings without
interference, enabling the construction of very large IR LANs
Equipment for infrared communication is relatively inexpensive and simple.
The one major disadvantage of infrared technology is that background radiation from sunlight
and indoor lighting can cause interference at the infrared receivers.
There are three alternative transmission techniques commonly used for IR data transmissions:
Direct beam Configuration
Omni directional Configuration
Diffused Configuration
Direct beam Configuration:[2]
This configuration involves point-to-point connections. The range of communications is
limited by the transmitted power and the direction of focus. With proper focusing, ranges up
to a kilometre can be achieved. This technology can be used in token-ring LANs and
interconnections between buildings as shown below
3. Omni directional configuration[2]
This configuration consists of a single base station that is normally used on ceilings. The base
station sends an omnidirectional signal, which is picked up by all transceivers. The
transceivers in turn use a directional beam focused directly at the base-station unit.
Diffused-Configuration
In this the infrared transmitters direct the transmitted signal to a diffused reflected ceiling.
The signal is reflected in all directions from this ceiling. The receivers can then pick up the
transmitted signal.
b) Spread-Spectrum LANs[2]
The spread-spectrum techniques use three different frequency bands: 902-928 MHz, 2.4
GHz-2.4835 GHz and 5.725 GHz-5.825GHz. Higher-frequency ranges offer greater
bandwidth capability. However, the higher-frequency equipment is more expensive. The
spread-spectrum LANs makes use of multiple adjacent cells arrangement. Adjacent cells
make use of different centre frequencies within the same band to avoid interference. Within
each of these cells, a star or peer-to-peer topology can be deployed.
If a star topology is used, a hub as a network center is mounted on the ceiling. This hub acts
as an interface between wired and wireless LANs, can be connected to other wired LANs. All
users in the wireless LAN transmit and receive signals from the hub.
A peer to peer topology is one in which there is no hub. A MAC algorithm such as CSMA is
used to control access. This topology is appropriate for ad hoc LANs.
c) Narrowband RF LANs[2]
Narrowband radio frequency LANs use a very narrow bandwidth. These LANs can be either
licensed or unlicensed. In licensed narrowband RF, a licensed authority assigns the radio
frequency band. Most geographic areas are limited to a few licenses. Adjacent cells use
different frequency bands. The transmissions are encrypted to prevent attacks. The licensed
narrowband LANs guarantee communication without interference. The unlicensed
narrowband RF LANs use the unlicensed spectrum and peer-to-peer LAN topology.
3. Wireless LAN Standards
a) IEEE 802.11 Wireless Standard:
802.11 networks use free frequency bands (ISM: Industrial, Science, Medical). Thus
everybody can run 802.11 devices without licensing a frequency band.
802.11 Pros and Cons:
Mobility
4. Flexible configuration
Relatively cheap
Weak security (WEP Wired Equivalent Protection, but fixed with WPA Wired
Protection Access)
Relatively low bandwidth for data (compared to wired networks)
Electromagnetic interference with other devices (Bluetooth)
Simple installation, but high skills needed for exploitation of full potential of
technology
Different 802.11standards:
802.11a: 6, 9, 12, 18, 24, 36, 48, 54 Mbps (5 GHz band) uses OFDM
802.11b: Up to 11Mbps, simple (cheap) technology uses DSSS.
802.11g: Up to 54Mbps and uses OFDM,DSSS
802.11n: <600Mbps (MIMO=Multiple In Multiple Out antenna technology, uses
multi-path transmission for better signal recovery at the receiver) uses OFDM
802.11ac: Forthcoming standard for higher throughput (802.11n enhancements).
802.11ad: Standard in progress, even higher throughput (<7Gpbs).
Operation modes of 802.11: Below picture taken from copyrighted content of Peter. R.
Egli[4]
Each wireless LAN user has a wireless LAN adapter for communication over the wireless
medium. This adapter is responsible for authentication, confidentiality and data delivery. To
send data to a user in the wired LAN, a user in the wireless LAN first sends the data packet to
the access point. The access point recognizes the wireless user through a unique ID called the
SSID. SSID is like a password protection system that enables any wireless client to join the
wireless LAN. Once the wireless user is authenticated, the access point forwards data packets
to the desired wired user through the switch or hub.
Access points build a table of association that contains the MAC addresses of all users in the
wireless network.
b) HiperLAN 1/2: HiperLAN 1 standard provides highspeed communications (20Mbps)
between portable devices in the 5GHz range. Similar to IEEE802.11, HiperLAN/1 adopts
CSMA to connect end user devices together. On top of that, HiperLAN/1 supports
isochronous traffic for different type of data such as video, voice, text, etc.
5. HIPERLAN/2 has a very high transmission rate (up to 54 Mbps at PHY layer) to a variety of
networks including 3G mobile core networks, ATM networks and IP based networks, and
also for private use as a wireless LAN system. This is achieved by making use of a
modularization method called Orthogonal Frequency Digital Multiplexing (OFDM).
c) Bluetooth: One of the ways Bluetooth devices avoid interfering with other systems is by
sending out very weak signals of 1 milliwatt. The low power limits the range of a Bluetooth
device to about 10 meters, cutting the chances of interference between a computer system and
a portable telephone or television. Bluetooth operates at 2.4 GHz frequency band and
supports data rates of 1 Mbps, with next generation products allowing anywhere from 2 to 12
Mbps, to be determined at a later date.
d) HomeRF: HomeRF is an open industry specification developed by Home Radio
Frequency Working Group that defines how electronic devices such as PCs, cordless phones
and other peripherals share and communicate voice, data and streaming media in and around
the home. HomeRF-compliant products operate in the license-free 2.4GHz frequency band
and utilize frequency-hopping spread spectrum RF technology for secure and robust wireless
communications with data rates of up to 1 Mbps (HomeRF1). Unlike Wi-Fi, HomeRF
already has quality-of-service support for streaming media and is the only wireless LAN to
integrate voice.
3. Challenges[3]:
The key challenges in wireless networks are:
a) Data Rate Enhancements.
b) Low power networking.
c) Security.
d) Radio Signal Interference.
e) System Interoperability.
a) Enhancing Data Rate: Improving the current data rates to support future high speed
applications is essential, especially, if multimedia service are to be provided. Data rate is a
function of various factors such as the data compression algorithm, interference mitigation
through error-resilient coding, power control, and the data transfer protocol. Therefore, it is
imperative that manufacturers implement a well thought out design that considers these
factors in order to achieve higher data rates.
b) Low Power Design: The size and battery power limitation of wireless mobile devices
place a limit on the range and throughput that can be supported by a wireless LAN. The
complexity and hence the power consumption of wireless devices vary significantly
depending on the kind of spread spectrum technology being used to implement the wireless
LAN. Normally, direct sequence spread spectrum (DSSS) based implementations require
large and power-hungry hardware compared to frequency hopped spread spectrum (FHSS).
They tend to consume about two to three times the power of an equivalent FHSS system. But,
the complex circuitry provides better error recovery capability to DSSS systems compared to
FHSS. The right time has come for researchers and developers to approach these issues in
wireless LAN technologies together and from a global perspective.
c) Security: Security is a big concern in wireless networking, especially in e-commerce
applications. Mobility of users increases the security concerns in a wireless network. Current
wireless networks employ authentication and data encryption techniques on the air interface
to provide security to its users. The IEEE 802.11 standard describes wired equivalent privacy
(WEP) that defines a method to authenticate users and encrypt data between the PC card and
the wireless LAN access point. In large enterprises, an IP network level security solution
6. could ensure that the corporate network and proprietary data are safe. Virtual private network
(VPN) is an option to make access to fixed access networks reliable. Since hackers are
getting smarter, it is imperative that wireless security features must be updated constantly.
d) Radio Signal Interference: Interference can take on an inward or outward direction. A
radio-based LAN, for example, can experience inward interference either from the harmonics
of transmitting systems or from other products using similar radio frequencies in the local
area. Microwave ovens operate in the S band (2.4GHz) that many wireless LANs use to
transmit and receive. These signals result in delays to the user by either blocking
transmissions from stations on the LAN or causing bit errors to occur in data being sent.
Newer products that utilize Bluetooth radio technology also operate in the 2.4GHz band and
can cause interference with wireless LANs, especially in fringe areas not well covered by a
particular wireless LAN access point. The other issue, outward interference, occurs when a
wireless network’s signal disrupts other systems, such as adjacent wireless LANs and
navigation equipment on aircraft.
e) System Interoperability: With wireless LANs, interoperability is taken as a serious issue.
There are still pre-802.11 (proprietary) wireless LANs, both frequency-hopping and direct
sequence 802.11 versions, and vendor-specific enhancements to 802.11-compliant products
that make interoperability questionable. To ensure interoperability with wireless LANs, it is
best to implement radio cards and access points from the same vendor, if possible.
Handoff: Handoff is the mechanism by which an ongoing connection between a Mobi lehost
(MH) and a corresponding Access point (AP) is transferred from one access point to the
other. Handoff occurs during cell boundary crossing, weak signal reception and while a QoS
deterioration occurs in the current cell. Present handoff mechanisms are based only on signal
strength and do not take into account the load of the new cell. There is no negotiation of QoS
characteristics with the new AP to ensure smooth carryover from the old AP to new AP.
Now, several methods are proposed by researchers to have a seamless handoff between
access points.
4. Future Researchareas:
FutureWLANs must have to mature in the following areas
Higher Speeds
Improved Security
Seamless end-to-end protocols
Better Error control
Long distance Coverage
Better interoperability
Global networking
Anywhere, anytime, any-form connectivity
7. Mobile Networks
================================================================
1. History of Mobile Networks
You can get very nice information at http://www.indigoo.com/dox/itdp/12_MobileWireless/
2. MANET[5]:
The concept of mobile ad hoc networking is not a new one and its origins can be traced back
to the DARPA Packet Radio Network project in 1972. Infrastructured wireless networks
require a fixed network infrastructure with centralised administration is required for their
operation, potentially consuming a lot of time and money for set-up and maintenance.
Furthermore, an increasing number of devices such as laptops, personal digital assistants
(PDAs), pocket PCs, tablet PCs, smart phones, MP3 players, digital cameras, etc. are
provided with short-range wireless interfaces. In addition, these devices are getting smaller,
cheaper, more user friendly and more powerful. This evolution is driving a new alternative
way for mobile communication, in which mobile devices form a self creating, self-organising
and self-administering wireless network, called a mobile ad hoc network.
Nodes that lie within each other’s send range can communicate directly and are responsible
for dynamically discovering each other. In order to enable communication between nodes
that are not directly within each other’s send range, intermediate nodes act as routers that
relay packets generated by other nodes to their destination. These nodes are often energy
constrained— that is, battery-powered— devices with a great diversity in their capabilities.
Furthermore, devices are free to join or leave the network and they may move randomly,
possibly resulting in rapid and unpredictable topology changes.
8. 3. Challenges:
MANETs impose challenges in all layers of protocol stack. The physical layer must deal
with rapid changes in link characteristics. The media access control (MAC) layer needs to
allow fair channel access, minimise packet collisions and deal with hidden and exposed
terminals. At the network layer, nodes need to cooperate to calculate paths. The transport
layer must be capable of handling packet loss and delay characteristics that are very different
from wired networks. Applications should be able to handle possible disconnections and
reconnections.
The Key Challenges are:
a) Routing
b) Service or resource discovery
c) Addressing or internet connectivity
d) Security and node co-operation
a) Routing: As mobile ad hoc networks are characterised by a multi-hop network topology
that can change frequently due to mobility, efficient routing protocols are needed to establish
communication paths between nodes, without causing excessive control traffic overhead or
computational burden on the power constrained devices.
9. A number of proposed solutions attempt to have an up-to-date route to all other nodes at all
times. To this end, these protocols exchange routing control information periodically and on
topological changes. These protocols, which are called proactive routing protocols, are
typically modified versions of traditional link state or distance vector routing protocols
encountered in wired networks, adapted to the specific requirements of the dynamic mobile
ad hoc network environment.
Most of the time, it is not necessary to have an up-to-date route to all other nodes. Therefore,
reactive routing protocols only set up routes to nodes they communicate with and these routes
are kept alive as long as they are needed.
Combinations of proactive and reactive protocols, where nearby routes (for example,
maximum two hops) are kept up-to-date proactively, while far-away routes are set up
reactively, are also possible and fall in the category of hybrid routing protocols.
A completely different approach is taken by the location-based routing protocols, where
packet forwarding is based on the location of a node’s communication partner. Location
information services provide nodes with the location of the others, so that packets can be
forwarded.
b) Service and resource discovery: MANET nodes may have little or no knowledge at all
about the capabilities or services offered by each other. Therefore, service and resource
discovery mechanisms, which allow devices to automatically locate network services and to
advertise their own capabilities to the rest of the network are an important aspect of self-
configurable networks. Possible services or resources include storage, access to databases or
files, printer, computing power, Internet access, etc.
Directory-less service and resource discovery mechanisms, in which nodes reactively request
services when needed and/or nodes proactively announce their services to others, seem an
attractive approach for infrastructureless networks.
The alternative scheme is directory-based and involves directory agents where services are
registered and service requests are handled. This implies that this functionality should be
statically or dynamically assigned to a subset of the nodes and kept up-to-date. Existing
directory-based service and resource discovery mechanisms such as UPnP or Salutation are
unable to deal with the dynamics in ad hoc networks.
Currently, no mature solution exists, but it is clear that the design of these protocols should be
done in close cooperation with the routing protocols and should include context-awareness
(location, neighbourhood, user profile, etc.) to improve performance.
Also, when ad hoc networks are connected to fixed infrastructure (for example, Internet,
cellular network, etc.), protocols and methods are needed to inject the available external
services offered by service and content providers into the ad hoc network.
c) Addressing and Internet connectivity: In order to enable communication between nodes
within the ad hoc network, each node needs an address. In stand-alone ad hoc networks, a
unique MAC addresses could be used to address nodes. However, all current applications are
based on TCP/IP or UDP/IP. In addition, as future mobile ad hoc networks will interact with
IP-based networks and will run applications that use existing Internet protocols such as
10. transmission control protocol (TCP) and user datagram protocol (UDP), the use of IP
addresses is inevitable.
Unfortunately, an internal address organisation with prefixes and ranges like in the fixed
Internet is hard to maintain in mobile ad hoc networks due to node mobility and overhead
reasons and other solutions for address assignment are thus needed.
One solution is based on the assumption (and restriction) that all MANET nodes already have
a static, globally unique and pre-assigned IPv4 or IPv6 address. This solves the whole issue
of assigning addresses, but introduces new problems when interworking with fixed networks.
Connections coming from and going to the fixed network can be handled using mobile IP,
where the pre-assigned IP address serves as the mobile node’s home address (HoA). All
traffic sent to this IP address will arrive at the node’s home agent (HA) . When the node in
the ad hoc network advertises to its home agent the IP address of the Internet gateway as its
careof- address (CoA), the home agent can tunnel all traffic to the ad hoc network , on which
it is delivered to the mobile node using an ad hoc routing protocol . For outgoing connections,
the mobile node has to route traffic to an Internet gateway, and for internal traffic an ad hoc
routing protocol can be used.
The main problem with this approach is that a MANET node needs an efficient way to figure
out if a certain address is present in the MANET or if it is necessary to use an Internet
gateway, without flooding the entire network.
Another solution is the assignment of random, internally unique addresses. This can be
realised by having each node picking a more or less random address from a very address
detection (DAD) techniques in order to impose address uniqueness within the MANET.
Strong DAD techniques will always detect duplicates, but are difficult to scale in large
networks. Weak DAD approaches can tolerate duplicates as long as they do not interfere with
each other; that is, if packets always arrive at the intended destination. If interconnection to
the Internet is desirable, outgoing connections could be realised using network address
translation (NAT), but incoming connections still remain a problem if random, not globally
routable, addresses are used. Also, the use of NAT remains problematic when multiple
Internet gateways are present. If a MANET node switches to another gateway, a new IP
address is used and ongoing TCP connections will break.
Another possible approach is the assignment of unique addresses that all lie within one subnet
(comparable to the addresses assigned by a dynamic host configuration protocol (DHCP)
server). When attached to the Internet, the ad hoc network can be seen as a separate routable
subnet. This simplifies the decision if a node is inside or outside the ad hoc network.
However, no efficient solutions exist for choosing dynamically an appropriate, externally
routable and unique network prefix (for example, special MANET prefixes assigned to
Internet gateways), handling the merging or splitting of ad hoc networks, handling multiple
points of attachment to the Internet, etc.
The above discussion makes clear that, although many solutions are being investigated, no
common adopted solution for addressing and Internet connectivity is available yet. New
approaches using host identities, where the role of IP is limited to routing and not addressing,
combined with dynamic name spaces, could offer a potential solution.
11. d) Security and node cooperation: The wireless mobile ad hoc nature of MANETs brings
new security challenges to the network design. As the wireless medium is vulnerable to
eavesdropping and ad hoc network functionality is established through node cooperation,
mobile ad hoc networks are intrinsically exposed to control packets or data packets. Securing
ad hoc networks against malicious attacks is difficult to achieve.
Preventive mechanisms include among others authentication of message sources, data
integrity and protection of message sequencing, and are typically based on key-based
cryptography. Incorporating cryptographic mechanisms is challenging, as there is no
centralised key distribution centre or trusted certification authority. These preventative
mechanisms need to be sustained by detection techniques that can discover attempts to
penetrate or attack the network.
The previous problems were all related to malicious nodes that intentionally damage or
compromise network functionality. However, selfish nodes, which use the network but do not
cooperate to routing or packet forwarding for others in order not to spill battery life or
network bandwidth, constitute an important problem as network functioning entirely relies on
the cooperation between nodes and their contribution to basic network functions.
To deal with these problems, the self-organising network concept must be based on an
incentive for users to collaborate, thereby avoiding selfish behaviour. Existing solutions aim
at detecting and isolating selfish nodes based on watchdog mechanisms, which identify
misbehaving nodes, and reputation systems, which allow nodes to isolate selfish nodes.
Another promising approach is the introduction of a billing system into the network based on
economical models to enforce cooperation. Using virtual currencies or micro-payments,
nodes pay for using other nodes forwarding capabilities or services and are remunerated for
making theirs available. This approach certainly has potential in scenarios in which part of
the ad hoc network and services is deployed by companies or service providers.
Also, when ad hoc networks are interconnected to fixed infrastructures by gateway nodes,
which are billed by a telecom operator (for example, UMTS, hot-spot access, etc.), billing
mechanisms are needed to remunerate these nodes for making these services available.
Questions such as who is billing, to whom and for what, need to be answered and will lead to
complex business models.
We may conclude that in some ad hoc network scenarios, the network organisation can
completely or partially rely on a trust relationship between participating nodes (for example,
PANs). In many others security mechanisms, mechanisms to enforce cooperation between
nodes or billing methods are needed and will certainly be an important subject of future
research.
[1]en.wikipedia.org/wiki/Wireless_LAN
[2]Wireless Communications and Standards, Second Edition, William Stallings
[3]Chandramouli, Vijay. "A detailed study on wireless LAN technologies." URL: h
ttp://crystal. uta. edu/~ kumar/cse6392/termpapers/Vijay_paper. pdf# search='A%
20Detailed% 20St udy% 20on% 20Wireless% 20LAN% 20Technologies (2002).
[4]http://www.indigoo.com/dox/itdp/12_MobileWireless/
[5]Hoebeke, Jeroen, et al. "An overview of mobile ad hoc networks: Applications and
challenges." Journal-Communications Network 3.3 (2004): 60-66.
12. Keywords
Cellular networks versus mobile adhoc networks, mobile adhoc network enabling
technologies, Challenges in MANET, MANET, History of Mobile Networks, Mobile
Networks, Future Research areas in WLANs, challenges in wireless networks,
HomeRF, Bluetooth, HiperLAN ½, Operation modes of 802.11, Different
802.11standards, IEEE 802.11 Wireless Standard:, Wireless LAN Standards, Diffused
Configuration, Omni directional Configuration, Direct beam Configuration,
Narrowband microwave LANs, Spread spectrum LANs, Infrared (IR) LANs , Types of
Wireless LANs, History of Wireless LAN.