Guglielmo Marconi is considered the father of radio, experimenting with Hertzian waves in 1894. In 1901, Marconi received the first trans-Atlantic wireless signal. The US military began using wireless signals and data transmission during WWII. In 1971, the first wireless local area network was established at the University of Hawaii. Bluetooth was developed in the 1990s to allow wireless connectivity between devices like phones, computers, and other electronics. New wireless standards like 802.11n are being developed to increase speeds to over 100MB/sec for wireless networks. Security risks on wireless networks can be minimized through encryption and limiting wireless access.
4. The beginning…The beginning…
Most credit Guglielmo Marconi, “the father of radio”, withMost credit Guglielmo Marconi, “the father of radio”, with
the initiation of wireless technologythe initiation of wireless technology
18941894 Marconi experimented with Hertzian Waves (radioMarconi experimented with Hertzian Waves (radio
waves) to produce and detect waves over long distanceswaves) to produce and detect waves over long distances
18961896 Marconi established the Wireless Telegraph &Marconi established the Wireless Telegraph &
Signal Company, the first radio factorySignal Company, the first radio factory
19011901 St John’s, New Foundland, Marconi received theSt John’s, New Foundland, Marconi received the
first trans-Atlantic wireless signal from Poldhu, Englandfirst trans-Atlantic wireless signal from Poldhu, England
19051905 the first distress signal sent using Morse Codethe first distress signal sent using Morse Code
19191919 Radio Corporation of America (RCA) wasRadio Corporation of America (RCA) was
incorporated, and consumer radio broadcasts for newsincorporated, and consumer radio broadcasts for news
and entertainment soon became popularand entertainment soon became popular
5. US Military jumps into WirelessUS Military jumps into Wireless
During World War II the US Military used wirelessDuring World War II the US Military used wireless
signals with encryption to send battle plans andsignals with encryption to send battle plans and
instructionsinstructions
US Military started the shift to radio data transmissionUS Military started the shift to radio data transmission
technologytechnology
6. Wireless Networking: Birth of theWireless Networking: Birth of the
Wireless NetworkWireless Network
19711971 network technologies met radio technologies whennetwork technologies met radio technologies when
the first wireless Local Area Network (LAN) wasthe first wireless Local Area Network (LAN) was
established at the University of Hawaii during theestablished at the University of Hawaii during the
experiment, ‘ALOHANET’experiment, ‘ALOHANET’
ALOHANET used a bidirectional star topology consistingALOHANET used a bidirectional star topology consisting
of (7) computers over (4) islandsof (7) computers over (4) islands
7. Wireless Networking: CellularWireless Networking: Cellular
19731973 Dr Martin Cooper, Motorola Labs, invented the firstDr Martin Cooper, Motorola Labs, invented the first
personal mobile cellular telephone (weighed 2.5 lbs, 30personal mobile cellular telephone (weighed 2.5 lbs, 30
individual circuit boards, no display screen, 9”x5”x1.75”,individual circuit boards, no display screen, 9”x5”x1.75”,
10 hours to charge for 35 minutes of use)10 hours to charge for 35 minutes of use)
19831983 marked American entry into the commercial cellularmarked American entry into the commercial cellular
service marketservice market
19871987 FCC allows and encourages cellular serviceFCC allows and encourages cellular service
providers to use alternate technologies in the 800Mhzproviders to use alternate technologies in the 800Mhz
radio spectrum to prompt use of digital transmissionradio spectrum to prompt use of digital transmission
8. Wireless Networking: IEEEWireless Networking: IEEE
19901990 IEEE 802 Executive Committee established theIEEE 802 Executive Committee established the
802.11 Working Group to create a wireless LAN802.11 Working Group to create a wireless LAN
standard.standard.
19971997 working group approved IEEE 802.11 as theworking group approved IEEE 802.11 as the
world’s first wireless LAN standardworld’s first wireless LAN standard
New standards are continuously being developed by theNew standards are continuously being developed by the
Institute of Electrical and Electronical EngineersInstitute of Electrical and Electronical Engineers
9. History: TimelineHistory: Timeline
1894 – experiments
began with Hertzian
Waves
1896 – Wireless
Telegraph & Signal
Company
established
1901 – first trans-
Atlantic signal
received
1905 – first distress
signal successful
using Morse Code
1919 – RCA
incorporated
1939-1945 – WWII US
Military initiates radio
data transmission
technology
1971 – ALOHANET
experiment, first
wireless LAN
1973 – Motorola
creates first mobile
cellular telephone
1983 – America
enters cellular
telephone market
1987 – FCC
encourages use of
800Mhz spectrum
1990 – IEEE creates
work group to
establish wireless
LAN standards
1997 – 802.11
established as
wireless LAN
standard
11. Current IEEECurrent IEEE11
StandardsStandards
802.11b- Actually the first of the 802.11 standards.802.11b- Actually the first of the 802.11 standards.
Max Speed 11MB/sec. 128 bit encryption. 2.4 GhzMax Speed 11MB/sec. 128 bit encryption. 2.4 Ghz
operating frequency.operating frequency.
802.11a- Best suited for large businesses concerned802.11a- Best suited for large businesses concerned
with securitywith security
54 MB/sec max speed. 5 Ghz operating frequency. 15254 MB/sec max speed. 5 Ghz operating frequency. 152
or 256 bit level of encryption.or 256 bit level of encryption.
802.11g- Best of both worlds for the average user.802.11g- Best of both worlds for the average user.
2.4 Ghz, 54 MB/sec, 128 bit encryption.2.4 Ghz, 54 MB/sec, 128 bit encryption.
14. Crafting ChangesCrafting Changes
IEEE Fall of ’03IEEE Fall of ’03
Launched a working group to develop new standardLaunched a working group to develop new standard
(802.11n).(802.11n).
Major goal:Major goal:
Increase WLAN throughput toIncrease WLAN throughput to at leastat least 100MB/sec.100MB/sec.
Throughput- Defined as data rate minus IP overhead.Throughput- Defined as data rate minus IP overhead.
15. OverheadOverhead
Typically “overhead” can eat up half of the data rate.Typically “overhead” can eat up half of the data rate.
802.11 b, a, and g-802.11 b, a, and g-
b- 11 MB/sec yields <6MB/sec throughputb- 11 MB/sec yields <6MB/sec throughput
a and g yield 18-22 MB/sec.a and g yield 18-22 MB/sec.
16. 802.11n802.11n
Benefits-Benefits-
To make WLANS “feel like” 100MB/sec.To make WLANS “feel like” 100MB/sec.
Promotes the idea that wireless networks mayPromotes the idea that wireless networks may
someday entirely replace wired ones.someday entirely replace wired ones.
Saves money in the long run by eliminating cablingSaves money in the long run by eliminating cabling
costs.costs.
17. 802.11n802.11n
Challenges-Challenges-
Delivering higher performance while simultaneouslyDelivering higher performance while simultaneously
reducing cost.reducing cost.
Throughput still can be reduced-Throughput still can be reduced-
Wood, metal etc. inside buildings still a factor.Wood, metal etc. inside buildings still a factor.
Skeptics-Skeptics-
Unless one sitting underneath the access point,Unless one sitting underneath the access point,
still won’t get the max throughput.still won’t get the max throughput.
Access points will still need to be hard wired toAccess points will still need to be hard wired to
wiring closets.wiring closets.
18. 802.11n802.11n
Bottom Line-Bottom Line-
Speed is going to happen, just a matter of time.Speed is going to happen, just a matter of time.
Expect to see 802.11n within 18 months.Expect to see 802.11n within 18 months.
Expect your connection at home to “feel” 5 to 10Expect your connection at home to “feel” 5 to 10
times faster than it does right now.times faster than it does right now.
19. Security of Wireless NetworksSecurity of Wireless Networks
Two basic steps:Two basic steps:
•• A host system needs to authenticate the user or deviceA host system needs to authenticate the user or device
that it's communicating with.that it's communicating with.
•• The data must be protected as it travels from the userThe data must be protected as it travels from the user
device to the destination host, whether to preservedevice to the destination host, whether to preserve
confidentiality or to ensure that the message isn'tconfidentiality or to ensure that the message isn't
changed or destroyed en route.changed or destroyed en route.
20. Antenna EffectsAntenna Effects
An intruder must be within range of the signal to causeAn intruder must be within range of the signal to cause
problems.problems.
Proper positioning of an antenna within a building canProper positioning of an antenna within a building can
minimize the possibility of reception by an outsideminimize the possibility of reception by an outside
source.source.
21. Security RisksSecurity Risks
Insertion Attacks -Insertion Attacks - placing unauthorized devices on the wirelessplacing unauthorized devices on the wireless
network without going through a security processnetwork without going through a security process
Interception and Monitoring wireless traffic -Interception and Monitoring wireless traffic - these varythese vary
between sniffer, hijacking a session, broadcast monitoring, and basebetween sniffer, hijacking a session, broadcast monitoring, and base
station cloningstation cloning
Misconfiguration -Misconfiguration - administrators can leave factory settings in tactadministrators can leave factory settings in tact
which are the least securewhich are the least secure
Jamming -Jamming - illegitimate traffic overwhelms frequencies, andillegitimate traffic overwhelms frequencies, and
legitimate traffic can not get throughlegitimate traffic can not get through
Client to Client Attacks -Client to Client Attacks - two wireless clients can talk directly totwo wireless clients can talk directly to
each other by-passing the base stationeach other by-passing the base station
22. Solutions to Minimizing RiskSolutions to Minimizing Risk
Don't use TCP/IP for File and Printer sharing!Don't use TCP/IP for File and Printer sharing!
Follow secure file-sharing practicesFollow secure file-sharing practices
Enable WEP EncryptionEnable WEP Encryption
Use WEP for data and AuthenticationUse WEP for data and Authentication
Use non-obvious WEP keys and periodically changeUse non-obvious WEP keys and periodically change
themthem
Secure your wireless router / Access Point (AP)Secure your wireless router / Access Point (AP)
Disallow router/ AP administration via wirelessDisallow router/ AP administration via wireless
Use MAC address based Access and Association controlUse MAC address based Access and Association control
Don't send the ESSIDDon't send the ESSID
Don't accept "ANY" ESSIDDon't accept "ANY" ESSID
Use VPNUse VPN
http://www.practicallynetworked.com/support/wireless_secuhttp://www.practicallynetworked.com/support/wireless_secu
re.htmre.htm
23. New SecurityNew Security
Research companies continue to look forResearch companies continue to look for
new ways to keep wireless networksnew ways to keep wireless networks
secure.secure.
An example is Wireless Security AuditorAn example is Wireless Security Auditor
(WSA) developed by IBM and described(WSA) developed by IBM and described
at http://www.research.ibm.com/gsal/wsa/at http://www.research.ibm.com/gsal/wsa/
Others are being tested every dayOthers are being tested every day
24. BluetoothBluetooth
A specification adopted by the world's most powerful andA specification adopted by the world's most powerful and
influential communications and computer manufacturers.influential communications and computer manufacturers.
It will enable devices from mobile phones and PCs toIt will enable devices from mobile phones and PCs to
camcorders and cookers to talk to one another.camcorders and cookers to talk to one another.
25.
26. A little bit of history:A little bit of history:
In early 1994, a team of researchers led by SvenIn early 1994, a team of researchers led by Sven
Mattisson and Jaap Haartsen in a vibrant collegeMattisson and Jaap Haartsen in a vibrant college
town called Lund, Sweden, were investigatingtown called Lund, Sweden, were investigating
the possibility of developing a wirelessthe possibility of developing a wireless
connection between an ear-piece and phone. Asconnection between an ear-piece and phone. As
development proceeded, with it came thedevelopment proceeded, with it came the
realization that the potential of such arealization that the potential of such a
technology far exceeded that of a mere cordlesstechnology far exceeded that of a mere cordless
headset. Ericsson decided to further researchheadset. Ericsson decided to further research
the technology and thus, almost by accident thethe technology and thus, almost by accident the
Bluetooth concept was born.Bluetooth concept was born.
27. The Bluetooth SIG set the followingThe Bluetooth SIG set the following
goals:goals:
Global usageGlobal usage
Voice and data handlingVoice and data handling
The ability to establish ad-hoc connectionsThe ability to establish ad-hoc connections
The ability to withstand interference from other sourcesThe ability to withstand interference from other sources
in the open bandin the open band
Very small size, in order to accommodate integration intoVery small size, in order to accommodate integration into
a variety of devicesa variety of devices
Negligible power consumption in comparison to otherNegligible power consumption in comparison to other
devices for similar usedevices for similar use
An open interface standardAn open interface standard
Competitively low cost of all units, as compared to theirCompetitively low cost of all units, as compared to their
non-Bluetooth contemporaries.non-Bluetooth contemporaries.
28. So how does Bluetooth work?So how does Bluetooth work?
Basically, Bluetooth works by finding out what otherBasically, Bluetooth works by finding out what other
Bluetooth devices are nearby and then talking to them asBluetooth devices are nearby and then talking to them as
necessary. It does this by establishing a piconet, wherenecessary. It does this by establishing a piconet, where
one device controls communications with up to sevenone device controls communications with up to seven
others. Many piconets can be linked to form aothers. Many piconets can be linked to form a
scatternet .scatternet .
29. Some ideas on how Bluetooth willSome ideas on how Bluetooth will
ingratiate itself into our lives:ingratiate itself into our lives:
Data synchronization need never again be a problem as your BluetoothData synchronization need never again be a problem as your Bluetooth
enabled PDA, PC or laptop all talk to each other and update theirenabled PDA, PC or laptop all talk to each other and update their
respective files to the most recent ones.respective files to the most recent ones.
Traveling in a plane, a person may write but not send e-mail. When theTraveling in a plane, a person may write but not send e-mail. When the
plane touches down the Bluetooth enabled laptop will communicate withplane touches down the Bluetooth enabled laptop will communicate with
the user's phone and will automatically send them.the user's phone and will automatically send them.
Mice and keyboards will identify themselves to the computer withoutMice and keyboards will identify themselves to the computer without
intervention, or could also be used to command TVs, videos or hi-fis atintervention, or could also be used to command TVs, videos or hi-fis at
the touch.the touch.
Use e-mail while your laptop is still in the briefcase! When your laptopUse e-mail while your laptop is still in the briefcase! When your laptop
receives e-mail, you'll get an alert on your mobile phone. You can alsoreceives e-mail, you'll get an alert on your mobile phone. You can also
browse all incoming e-mails and read those you select in the mobilebrowse all incoming e-mails and read those you select in the mobile
phone's display.phone's display.
A traveling businessperson could ask his laptop computer to locate aA traveling businessperson could ask his laptop computer to locate a
suitable printer as soon as he enters a hotel lobby, and send a printoutsuitable printer as soon as he enters a hotel lobby, and send a printout
to that printer when it has been found.to that printer when it has been found.
30. The Reality CheckThe Reality Check
In truth, Bluetooth is merely complementary to the otherIn truth, Bluetooth is merely complementary to the other
technologies that permeate our lives. A universaltechnologies that permeate our lives. A universal
communicator, in itself it is of little benefit, but combinedcommunicator, in itself it is of little benefit, but combined
with our mobile phones, PDAs and other devices, itwith our mobile phones, PDAs and other devices, it
becomes a potent technology.becomes a potent technology.
31. The Killer App for BluetoothThe Killer App for Bluetooth
The eradication of wire clutterThe eradication of wire clutter
32. SECURITY ISSUESSECURITY ISSUES
Bluetooth’s abilities, for the moment at least, will beBluetooth’s abilities, for the moment at least, will be
limited to domestic use. As unresolved security issueslimited to domestic use. As unresolved security issues
continue to loom, it is only a brave or stupid end-usercontinue to loom, it is only a brave or stupid end-user
that would adopt Bluetooth on anything but a trivialthat would adopt Bluetooth on anything but a trivial
scale.scale.
33. Domestic arena offers Bluetooth aDomestic arena offers Bluetooth a
bright futurebright future
People have a natural and healthy dislike for cablesPeople have a natural and healthy dislike for cables
littering their floors, and a technology that eliminateslittering their floors, and a technology that eliminates
such an eyesore and tedium for not only computers butsuch an eyesore and tedium for not only computers but
other electronic equipment like stereo’s, TV sets, homeother electronic equipment like stereo’s, TV sets, home
kitchen and others.kitchen and others.
34. Data SynchronizationData Synchronization
The bane of those who work on the same projects andThe bane of those who work on the same projects and
files on different devices should be made almostfiles on different devices should be made almost
ridiculously easy by Bluetooth. Merely having theridiculously easy by Bluetooth. Merely having the
different devices - PC, laptop, PDA, whatever - withindifferent devices - PC, laptop, PDA, whatever - within
about 10 meters of each other should suffice as they allabout 10 meters of each other should suffice as they all
automatically update their copy to the most recent one.automatically update their copy to the most recent one.
35. The Radiation IssuesThe Radiation Issues
It is a matter of concern to some that the carrier wavesIt is a matter of concern to some that the carrier waves
used by Bluetooth inhabit the same band as that ofused by Bluetooth inhabit the same band as that of
microwave ovens.microwave ovens.
Fortunately, the transmitting power is far too weak toFortunately, the transmitting power is far too weak to
result in perceptible effects in humans. Moreover, theresult in perceptible effects in humans. Moreover, the
radiation is not concentrated in a single beam; rather, itradiation is not concentrated in a single beam; rather, it
is randomly dispersed in all directions.is randomly dispersed in all directions.
36. Security Issues and BluetoothSecurity Issues and Bluetooth
The three principal security features employed byThe three principal security features employed by
Bluetooth are:Bluetooth are:
Frequency hopping, thus making eavesdropping almostFrequency hopping, thus making eavesdropping almost
impossible.impossible.
Authentication, allowing a user to control connectivity toAuthentication, allowing a user to control connectivity to
specified devices only.specified devices only.
Encryption, utilizing a 0-bit, 40-bit or 64-bit key.Encryption, utilizing a 0-bit, 40-bit or 64-bit key.
Despite considerable investment in this area, significantDespite considerable investment in this area, significant
security holes still exist in the 1.1 implementation ofsecurity holes still exist in the 1.1 implementation of
Bluetooth.Bluetooth.
37. The Real Security ThreatThe Real Security Threat
A more real concern lies in the method needed toA more real concern lies in the method needed to
establish piconets. The necessity of PIN code entry inestablish piconets. The necessity of PIN code entry in
the initialization process of two Bluetooth devices isthe initialization process of two Bluetooth devices is
sloppy at best. The problem is augmented if each devicesloppy at best. The problem is augmented if each device
in a scatternet or larger-sized piconet has to bein a scatternet or larger-sized piconet has to be
independently initialized. It also poses significantindependently initialized. It also poses significant
problems for a network administrator - it is unlikely that aproblems for a network administrator - it is unlikely that a
unique PIN would be assigned to each device, but notunique PIN would be assigned to each device, but not
doing so would seriously compromise network integrity.doing so would seriously compromise network integrity.
It is worth noting that the SIG maintain that hackersIt is worth noting that the SIG maintain that hackers
would have to take "extreme measures" to perform thiswould have to take "extreme measures" to perform this
kind of hacking.kind of hacking.
38. Security Bottom LineSecurity Bottom Line
Bluetooth in its current form is unsuitable for the transferBluetooth in its current form is unsuitable for the transfer
of sensitive data. The Bluetooth SIG is actively seekingof sensitive data. The Bluetooth SIG is actively seeking
to implement more sophisticated security protocols.to implement more sophisticated security protocols.
39. Tech SpecsTech Specs
Frequency RangeFrequency Range
Physical LayerPhysical Layer
Noise ImmunityNoise Immunity
Error ControlError Control
Data TransmissionData Transmission
PowerPower
40. Frequency RangeFrequency Range
Bluetooth devices utilize the 2.4Ghz Industrial, Scientific,Bluetooth devices utilize the 2.4Ghz Industrial, Scientific,
and Medical (ISM) frequency range. Throughout most ofand Medical (ISM) frequency range. Throughout most of
the world this band is free and unregulated.the world this band is free and unregulated.
Encouraged by the Bluetooth SIG, governments world-Encouraged by the Bluetooth SIG, governments world-
wide are now beginning to regulate the 2.4Ghz band,wide are now beginning to regulate the 2.4Ghz band,
thus ensuring that it will remain available for unhinderedthus ensuring that it will remain available for unhindered
use by Bluetooth appliances.use by Bluetooth appliances.
41. Physical LayerPhysical Layer
The Bluetooth hardware is comprised of a single 9*9mmThe Bluetooth hardware is comprised of a single 9*9mm
chip. Inserted into any device it can communicate withchip. Inserted into any device it can communicate with
any other Bluetooth device within a 10m radius, or up toany other Bluetooth device within a 10m radius, or up to
100m if an amplifier is used. The maximum data rate100m if an amplifier is used. The maximum data rate
achievable by 1st generation technology is 1Mbps.achievable by 1st generation technology is 1Mbps.
Bluetooth appliances use Gaussian Frequency ShiftBluetooth appliances use Gaussian Frequency Shift
Keying (GSSK) for radio frequency modulation.Keying (GSSK) for radio frequency modulation.
Judicious use of these modulation techniques shouldJudicious use of these modulation techniques should
allow future generations to achieve a transfer rate ofallow future generations to achieve a transfer rate of
between 2 and 12Mbps.between 2 and 12Mbps.
42. Noise ImmunityNoise Immunity
Frequency Hop (FH) spread spectrum is a method whichFrequency Hop (FH) spread spectrum is a method which
effectively divides the frequency band into a number ofeffectively divides the frequency band into a number of
hop channels. A technology that quickly hops channelshop channels. A technology that quickly hops channels
minimizes potential interference. Bluetooth takesminimizes potential interference. Bluetooth takes
advantage of this technique by incorporating a fastadvantage of this technique by incorporating a fast
frequency hopping technology with a nominal hoppingfrequency hopping technology with a nominal hopping
rate of 1600 hops/second among 79 channels. Afterrate of 1600 hops/second among 79 channels. After
transmitting a packet each device hops to anothertransmitting a packet each device hops to another
frequency as determined by the master. The hoppingfrequency as determined by the master. The hopping
sequence is unique to each piconet and determined bysequence is unique to each piconet and determined by
the Bluetooth Device Address (BDA) of the piconetthe Bluetooth Device Address (BDA) of the piconet
master.master.
44. Error ControlError Control
Another method by which Bluetooth increases its noiseAnother method by which Bluetooth increases its noise
immunity is that of Forward Error Correction (FEC). FECimmunity is that of Forward Error Correction (FEC). FEC
is a method that enables a receiver to not only detect butis a method that enables a receiver to not only detect but
also correct errors in a transmission. This technique isalso correct errors in a transmission. This technique is
especially valuable in limiting the impact of noise on longespecially valuable in limiting the impact of noise on long
distance links. Three error correction techniques havedistance links. Three error correction techniques have
been so far defined in the Bluetooth specification:been so far defined in the Bluetooth specification:
1/3 Rate FEC1/3 Rate FEC
2/3 Rate FEC2/3 Rate FEC
Automatic Repeat Request (ARQ)Automatic Repeat Request (ARQ)
45. Data TransmissionData Transmission
Bluetooth allows for data to be transmitted eitherBluetooth allows for data to be transmitted either
synchronously or asynchronously. The Synchronoussynchronously or asynchronously. The Synchronous
Connection Oriented (SCO) method is used primarily forConnection Oriented (SCO) method is used primarily for
voice while the Asynchronous Connectionless (ACL)voice while the Asynchronous Connectionless (ACL)
method is used for data. Since SCO packets needmethod is used for data. Since SCO packets need
smooth transmission, they are transmitted via reservedsmooth transmission, they are transmitted via reserved
intervals, i.e. packets sent in groups with no interrupts.intervals, i.e. packets sent in groups with no interrupts.
46. PowerPower
Bluetooth is truly admirable for its sparing use of power.Bluetooth is truly admirable for its sparing use of power.
The technology limits the transmitter's power output toThe technology limits the transmitter's power output to
exactly that needed - the signal strength is dynamicallyexactly that needed - the signal strength is dynamically
modified to suit the required range. Power saving modesmodified to suit the required range. Power saving modes
examined in the Bluetooth protocol provide furtherexamined in the Bluetooth protocol provide further
benefits.benefits.
47. Bluetooth Connection ProtocolBluetooth Connection Protocol
The Bluetooth connection protocol describes the set ofThe Bluetooth connection protocol describes the set of
rules by which all Bluetooth devices must abide in orderrules by which all Bluetooth devices must abide in order
to establish a link a communicate with one another.to establish a link a communicate with one another.
The essence of Bluetooth is based upon dynamicallyThe essence of Bluetooth is based upon dynamically
configured units. Hopping very quickly betweenconfigured units. Hopping very quickly between
frequencies, the protocol specifically caters for manyfrequencies, the protocol specifically caters for many
different modes to allow for minimal power consumption.different modes to allow for minimal power consumption.
48. StandbyStandby
Devices not connected in a piconet are in standby mode.Devices not connected in a piconet are in standby mode.
In this mode, they listen for messages every 1.28In this mode, they listen for messages every 1.28
seconds - over 32 hop frequencies (fewer in Japan,seconds - over 32 hop frequencies (fewer in Japan,
Spain, and France due to local bandwidth regulation).Spain, and France due to local bandwidth regulation).
49. Page/InquiryPage/Inquiry
If a device wishes to make a connection with anotherIf a device wishes to make a connection with another
device, it sends out a page message if the address isdevice, it sends out a page message if the address is
known, or an inquiry followed by a page message if it isknown, or an inquiry followed by a page message if it is
unknown. The master unit sends out 16 identical pageunknown. The master unit sends out 16 identical page
messages on 16 hop frequencies to the slave unit. Ifmessages on 16 hop frequencies to the slave unit. If
there is no response, the master retransmits on the otherthere is no response, the master retransmits on the other
16 hop frequencies. The inquiry method requires an16 hop frequencies. The inquiry method requires an
extra response from the slave unit, since the MACextra response from the slave unit, since the MAC
address is unknown to the master unit.address is unknown to the master unit.
51. HoldHold
When either the master or slave wishes, a hold modeWhen either the master or slave wishes, a hold mode
can be established, during which no data is transmitted.can be established, during which no data is transmitted.
The purpose of this is to conserve power. Otherwise,The purpose of this is to conserve power. Otherwise,
there is a constant data exchange. A typical reason forthere is a constant data exchange. A typical reason for
going into hold mode is the connection of severalgoing into hold mode is the connection of several
piconets .piconets .
52. SniffSniff
The sniff mode, applicable only to slave units, is forThe sniff mode, applicable only to slave units, is for
power conservation, though not at as reduced a level aspower conservation, though not at as reduced a level as
hold. During this mode, the slave does not take an activehold. During this mode, the slave does not take an active
role in the piconet, but listens at a reduced level. This isrole in the piconet, but listens at a reduced level. This is
usually a programmable setting.usually a programmable setting.
53. ParkPark
Park mode is a more reduced level of activity than thePark mode is a more reduced level of activity than the
hold mode. During it, the slave is synchronized to thehold mode. During it, the slave is synchronized to the
piconet, thus not requiring full reactivation, but is not partpiconet, thus not requiring full reactivation, but is not part
of the traffic. In this state, they relinquish their MACof the traffic. In this state, they relinquish their MAC
addresses , but only listen enough to keep theiraddresses , but only listen enough to keep their
synchronization with the master and check for broadcastsynchronization with the master and check for broadcast
messages.messages.
54. FUTURE OF BLUETOOTHFUTURE OF BLUETOOTH
Bluetooth was never designed to be a system competingBluetooth was never designed to be a system competing
with LAN. It rather complements LAN, but taken as it is,with LAN. It rather complements LAN, but taken as it is,
Bluetooth is a competent technology offeringBluetooth is a competent technology offering
unparalleled convenience. Ending, it will provide meansunparalleled convenience. Ending, it will provide means
to get rid of connecting wire, and this is a truly a killerto get rid of connecting wire, and this is a truly a killer
app for it.app for it.
55. Future of WirelessFuture of Wireless
Phones/Personal Digital AssistantsPhones/Personal Digital Assistants
LaptopsLaptops
““Digital Mapping”Digital Mapping”
WIFI ExpansionWIFI Expansion
Downside of Expansion/IntegrationDownside of Expansion/Integration
““Objective Force Warrior”Objective Force Warrior”
56. Phones/PDAPhones/PDA
Telephones becoming next computer?Telephones becoming next computer?
Cellular phones and PDAs available today withCellular phones and PDAs available today with
processing power equivalent to mid-1990 PCs whileprocessing power equivalent to mid-1990 PCs while
consuming 100 times less electricityconsuming 100 times less electricity
Phones/PDAs available today with video capability,Phones/PDAs available today with video capability,
GPS antennas, tiny keyboards, access to local “WIFIGPS antennas, tiny keyboards, access to local “WIFI
hotspots”, and slots for additional memory.hotspots”, and slots for additional memory.
57. Phones/PDAPhones/PDA
Phone/PDA trends:Phone/PDA trends:
““Smart-phones currently constitute 5% of overallSmart-phones currently constitute 5% of overall
mobile phone sales, but that figure has been doublingmobile phone sales, but that figure has been doubling
from last year.” (Gartner)from last year.” (Gartner)
Market expectations include a gigabyte or more ofMarket expectations include a gigabyte or more of
flash memory in next two years.flash memory in next two years.
Canesta, firm in San Jose, Ca., is testing a laser plug-Canesta, firm in San Jose, Ca., is testing a laser plug-
in for phones that projects a keyboard onto flatin for phones that projects a keyboard onto flat
surfaces, avail end 2004.surfaces, avail end 2004.
58. LaptopsLaptops
Expansion of WIFI networksExpansion of WIFI networks
Thousands of WIFI hotspots have emerged worldwideThousands of WIFI hotspots have emerged worldwide
in the last four years, and trend is expected toin the last four years, and trend is expected to
continue.continue.
Market expects half of all laptops shipped by end ofMarket expects half of all laptops shipped by end of
2004 to be WIFI-equipped from the factory.2004 to be WIFI-equipped from the factory.
59. ““Digital Mapping”Digital Mapping”
Integration of GPS data with Web information, i.e.Integration of GPS data with Web information, i.e.
“modeling the planet as a living system.” (Environmental“modeling the planet as a living system.” (Environmental
Systems Research Institute)Systems Research Institute)
MetaCarta markets a product that “geo-parses” a webMetaCarta markets a product that “geo-parses” a web
search for any mention of a specific place. The desiredsearch for any mention of a specific place. The desired
effect is search results that have more relevance to aeffect is search results that have more relevance to a
physical location.physical location.
60. WIFI ExpansionWIFI Expansion
WIFI started on an unlicensed portion of the spectrum.WIFI started on an unlicensed portion of the spectrum.
Emergence of powerful adaptations of WIFI, such asEmergence of powerful adaptations of WIFI, such as
meshed networks or “WIMax”.meshed networks or “WIMax”.
MIT Media Lab Project, install WIFI base stations onMIT Media Lab Project, install WIFI base stations on
inter-village buses in India: users can email or downloadinter-village buses in India: users can email or download
files while in transmission range of bus stops.files while in transmission range of bus stops.
61. Key DrawbackKey Drawback
Key drawback is privacy-related issues.Key drawback is privacy-related issues.
Wireless connection coupled with GPS information andWireless connection coupled with GPS information and
tags results in an easy method of tracking an individual’stags results in an easy method of tracking an individual’s
movements. The effect is like a phone record, exceptmovements. The effect is like a phone record, except
the connection log includes the GPS specific spot wherethe connection log includes the GPS specific spot where
that individual logged onto the Web.that individual logged onto the Web.
62. ““Objective Force Warrior”Objective Force Warrior”
DOD-specific application: scheduled for fielding in 2008.DOD-specific application: scheduled for fielding in 2008.
““The Army’s vision for the Objective Force Warrior is aThe Army’s vision for the Objective Force Warrior is a
wirelessly networked soldier within a small combat teamwirelessly networked soldier within a small combat team
and completely integrated into fire support and C4ISRand completely integrated into fire support and C4ISR
components.”components.”
This concept includes UAVs, networked sensor fields,This concept includes UAVs, networked sensor fields,
and robotic cargo transporters, all integrated wirelessly.and robotic cargo transporters, all integrated wirelessly.
63. ReferencesReferences
1.1. Institue of Electrical and Electronics EngineersInstitue of Electrical and Electronics Engineers
(http://www.ieee.org/)(http://www.ieee.org/)
2.2. http://www.iss.net/wireless/WLAN_FAQ.phphttp://www.iss.net/wireless/WLAN_FAQ.php
3.3. http://www.practicallynetworked.com/support/wireless_http://www.practicallynetworked.com/support/wireless_
secure.htmsecure.htm
4.4. http://www.computerworld.com/mobiletopics/mobile/techttp://www.computerworld.com/mobiletopics/mobile/tec
hnology/story/0%2C10801%2C72164%2C00.htmlhnology/story/0%2C10801%2C72164%2C00.html
5.5. http://www.practicallynetworked.com/support/wireless_http://www.practicallynetworked.com/support/wireless_
secure.htmsecure.htm
6.6. COMPUTERS Information Technology in PerspectiveCOMPUTERS Information Technology in Perspective