SlideShare a Scribd company logo
WIRELESS NETWORKWIRELESS NETWORK
TECHNOLOGIESTECHNOLOGIES
Kenneth Paul H. BunielKenneth Paul H. Buniel
TopicsTopics
HistoryHistory
StandardsStandards
SecuritySecurity
BluetoothBluetooth
FutureFuture
History of Wireless TechnologyHistory of Wireless Technology
The beginning…The beginning…
Most credit Guglielmo Marconi, “the father of radio”, withMost credit Guglielmo Marconi, “the father of radio”, with
the initiation of wireless technologythe initiation of wireless technology
18941894 Marconi experimented with Hertzian Waves (radioMarconi experimented with Hertzian Waves (radio
waves) to produce and detect waves over long distanceswaves) to produce and detect waves over long distances
18961896 Marconi established the Wireless Telegraph &Marconi established the Wireless Telegraph &
Signal Company, the first radio factorySignal Company, the first radio factory
19011901 St John’s, New Foundland, Marconi received theSt John’s, New Foundland, Marconi received the
first trans-Atlantic wireless signal from Poldhu, Englandfirst trans-Atlantic wireless signal from Poldhu, England
19051905 the first distress signal sent using Morse Codethe first distress signal sent using Morse Code
19191919 Radio Corporation of America (RCA) wasRadio Corporation of America (RCA) was
incorporated, and consumer radio broadcasts for newsincorporated, and consumer radio broadcasts for news
and entertainment soon became popularand entertainment soon became popular
US Military jumps into WirelessUS Military jumps into Wireless
During World War II the US Military used wirelessDuring World War II the US Military used wireless
signals with encryption to send battle plans andsignals with encryption to send battle plans and
instructionsinstructions
US Military started the shift to radio data transmissionUS Military started the shift to radio data transmission
technologytechnology
Wireless Networking: Birth of theWireless Networking: Birth of the
Wireless NetworkWireless Network
19711971 network technologies met radio technologies whennetwork technologies met radio technologies when
the first wireless Local Area Network (LAN) wasthe first wireless Local Area Network (LAN) was
established at the University of Hawaii during theestablished at the University of Hawaii during the
experiment, ‘ALOHANET’experiment, ‘ALOHANET’
ALOHANET used a bidirectional star topology consistingALOHANET used a bidirectional star topology consisting
of (7) computers over (4) islandsof (7) computers over (4) islands
Wireless Networking: CellularWireless Networking: Cellular
19731973 Dr Martin Cooper, Motorola Labs, invented the firstDr Martin Cooper, Motorola Labs, invented the first
personal mobile cellular telephone (weighed 2.5 lbs, 30personal mobile cellular telephone (weighed 2.5 lbs, 30
individual circuit boards, no display screen, 9”x5”x1.75”,individual circuit boards, no display screen, 9”x5”x1.75”,
10 hours to charge for 35 minutes of use)10 hours to charge for 35 minutes of use)
19831983 marked American entry into the commercial cellularmarked American entry into the commercial cellular
service marketservice market
19871987 FCC allows and encourages cellular serviceFCC allows and encourages cellular service
providers to use alternate technologies in the 800Mhzproviders to use alternate technologies in the 800Mhz
radio spectrum to prompt use of digital transmissionradio spectrum to prompt use of digital transmission
Wireless Networking: IEEEWireless Networking: IEEE
19901990 IEEE 802 Executive Committee established theIEEE 802 Executive Committee established the
802.11 Working Group to create a wireless LAN802.11 Working Group to create a wireless LAN
standard.standard.
19971997 working group approved IEEE 802.11 as theworking group approved IEEE 802.11 as the
world’s first wireless LAN standardworld’s first wireless LAN standard
New standards are continuously being developed by theNew standards are continuously being developed by the
Institute of Electrical and Electronical EngineersInstitute of Electrical and Electronical Engineers
History: TimelineHistory: Timeline
1894 – experiments
began with Hertzian
Waves
1896 – Wireless
Telegraph & Signal
Company
established
1901 – first trans-
Atlantic signal
received
1905 – first distress
signal successful
using Morse Code
1919 – RCA
incorporated
1939-1945 – WWII US
Military initiates radio
data transmission
technology
1971 – ALOHANET
experiment, first
wireless LAN
1973 – Motorola
creates first mobile
cellular telephone
1983 – America
enters cellular
telephone market
1987 – FCC
encourages use of
800Mhz spectrum
1990 – IEEE creates
work group to
establish wireless
LAN standards
1997 – 802.11
established as
wireless LAN
standard
Wireless StandardsWireless Standards
IEEE 802.11nIEEE 802.11n
Current IEEECurrent IEEE11
StandardsStandards
802.11b- Actually the first of the 802.11 standards.802.11b- Actually the first of the 802.11 standards.

Max Speed 11MB/sec. 128 bit encryption. 2.4 GhzMax Speed 11MB/sec. 128 bit encryption. 2.4 Ghz
operating frequency.operating frequency.
802.11a- Best suited for large businesses concerned802.11a- Best suited for large businesses concerned
with securitywith security

54 MB/sec max speed. 5 Ghz operating frequency. 15254 MB/sec max speed. 5 Ghz operating frequency. 152
or 256 bit level of encryption.or 256 bit level of encryption.
802.11g- Best of both worlds for the average user.802.11g- Best of both worlds for the average user.

2.4 Ghz, 54 MB/sec, 128 bit encryption.2.4 Ghz, 54 MB/sec, 128 bit encryption.
IEEE 802.11x
Standards currently being utilized
Crafting ChangesCrafting Changes
IEEE Fall of ’03IEEE Fall of ’03

Launched a working group to develop new standardLaunched a working group to develop new standard
(802.11n).(802.11n).
Major goal:Major goal:

Increase WLAN throughput toIncrease WLAN throughput to at leastat least 100MB/sec.100MB/sec.
Throughput- Defined as data rate minus IP overhead.Throughput- Defined as data rate minus IP overhead.
OverheadOverhead
Typically “overhead” can eat up half of the data rate.Typically “overhead” can eat up half of the data rate.
802.11 b, a, and g-802.11 b, a, and g-

b- 11 MB/sec yields <6MB/sec throughputb- 11 MB/sec yields <6MB/sec throughput

a and g yield 18-22 MB/sec.a and g yield 18-22 MB/sec.
802.11n802.11n
Benefits-Benefits-

To make WLANS “feel like” 100MB/sec.To make WLANS “feel like” 100MB/sec.

Promotes the idea that wireless networks mayPromotes the idea that wireless networks may
someday entirely replace wired ones.someday entirely replace wired ones.
Saves money in the long run by eliminating cablingSaves money in the long run by eliminating cabling
costs.costs.
802.11n802.11n
Challenges-Challenges-

Delivering higher performance while simultaneouslyDelivering higher performance while simultaneously
reducing cost.reducing cost.

Throughput still can be reduced-Throughput still can be reduced-
Wood, metal etc. inside buildings still a factor.Wood, metal etc. inside buildings still a factor.

Skeptics-Skeptics-
Unless one sitting underneath the access point,Unless one sitting underneath the access point,
still won’t get the max throughput.still won’t get the max throughput.
Access points will still need to be hard wired toAccess points will still need to be hard wired to
wiring closets.wiring closets.
802.11n802.11n
Bottom Line-Bottom Line-

Speed is going to happen, just a matter of time.Speed is going to happen, just a matter of time.

Expect to see 802.11n within 18 months.Expect to see 802.11n within 18 months.

Expect your connection at home to “feel” 5 to 10Expect your connection at home to “feel” 5 to 10
times faster than it does right now.times faster than it does right now.
Security of Wireless NetworksSecurity of Wireless Networks
Two basic steps:Two basic steps:
•• A host system needs to authenticate the user or deviceA host system needs to authenticate the user or device
that it's communicating with.that it's communicating with.
•• The data must be protected as it travels from the userThe data must be protected as it travels from the user
device to the destination host, whether to preservedevice to the destination host, whether to preserve
confidentiality or to ensure that the message isn'tconfidentiality or to ensure that the message isn't
changed or destroyed en route.changed or destroyed en route.
Antenna EffectsAntenna Effects
An intruder must be within range of the signal to causeAn intruder must be within range of the signal to cause
problems.problems.
Proper positioning of an antenna within a building canProper positioning of an antenna within a building can
minimize the possibility of reception by an outsideminimize the possibility of reception by an outside
source.source.
Security RisksSecurity Risks
Insertion Attacks -Insertion Attacks - placing unauthorized devices on the wirelessplacing unauthorized devices on the wireless
network without going through a security processnetwork without going through a security process
Interception and Monitoring wireless traffic -Interception and Monitoring wireless traffic - these varythese vary
between sniffer, hijacking a session, broadcast monitoring, and basebetween sniffer, hijacking a session, broadcast monitoring, and base
station cloningstation cloning
Misconfiguration -Misconfiguration - administrators can leave factory settings in tactadministrators can leave factory settings in tact
which are the least securewhich are the least secure
Jamming -Jamming - illegitimate traffic overwhelms frequencies, andillegitimate traffic overwhelms frequencies, and
legitimate traffic can not get throughlegitimate traffic can not get through
Client to Client Attacks -Client to Client Attacks - two wireless clients can talk directly totwo wireless clients can talk directly to
each other by-passing the base stationeach other by-passing the base station
Solutions to Minimizing RiskSolutions to Minimizing Risk
Don't use TCP/IP for File and Printer sharing!Don't use TCP/IP for File and Printer sharing!
Follow secure file-sharing practicesFollow secure file-sharing practices
Enable WEP EncryptionEnable WEP Encryption
Use WEP for data and AuthenticationUse WEP for data and Authentication
Use non-obvious WEP keys and periodically changeUse non-obvious WEP keys and periodically change
themthem
Secure your wireless router / Access Point (AP)Secure your wireless router / Access Point (AP)
Disallow router/ AP administration via wirelessDisallow router/ AP administration via wireless
Use MAC address based Access and Association controlUse MAC address based Access and Association control
Don't send the ESSIDDon't send the ESSID
Don't accept "ANY" ESSIDDon't accept "ANY" ESSID
Use VPNUse VPN
http://www.practicallynetworked.com/support/wireless_secuhttp://www.practicallynetworked.com/support/wireless_secu
re.htmre.htm
New SecurityNew Security
Research companies continue to look forResearch companies continue to look for
new ways to keep wireless networksnew ways to keep wireless networks
secure.secure.
An example is Wireless Security AuditorAn example is Wireless Security Auditor
(WSA) developed by IBM and described(WSA) developed by IBM and described
at http://www.research.ibm.com/gsal/wsa/at http://www.research.ibm.com/gsal/wsa/
Others are being tested every dayOthers are being tested every day
BluetoothBluetooth
A specification adopted by the world's most powerful andA specification adopted by the world's most powerful and
influential communications and computer manufacturers.influential communications and computer manufacturers.
It will enable devices from mobile phones and PCs toIt will enable devices from mobile phones and PCs to
camcorders and cookers to talk to one another.camcorders and cookers to talk to one another.
A little bit of history:A little bit of history:
In early 1994, a team of researchers led by SvenIn early 1994, a team of researchers led by Sven
Mattisson and Jaap Haartsen in a vibrant collegeMattisson and Jaap Haartsen in a vibrant college
town called Lund, Sweden, were investigatingtown called Lund, Sweden, were investigating
the possibility of developing a wirelessthe possibility of developing a wireless
connection between an ear-piece and phone. Asconnection between an ear-piece and phone. As
development proceeded, with it came thedevelopment proceeded, with it came the
realization that the potential of such arealization that the potential of such a
technology far exceeded that of a mere cordlesstechnology far exceeded that of a mere cordless
headset. Ericsson decided to further researchheadset. Ericsson decided to further research
the technology and thus, almost by accident thethe technology and thus, almost by accident the
Bluetooth concept was born.Bluetooth concept was born.
The Bluetooth SIG set the followingThe Bluetooth SIG set the following
goals:goals:
Global usageGlobal usage
Voice and data handlingVoice and data handling
The ability to establish ad-hoc connectionsThe ability to establish ad-hoc connections
The ability to withstand interference from other sourcesThe ability to withstand interference from other sources
in the open bandin the open band
Very small size, in order to accommodate integration intoVery small size, in order to accommodate integration into
a variety of devicesa variety of devices
Negligible power consumption in comparison to otherNegligible power consumption in comparison to other
devices for similar usedevices for similar use
An open interface standardAn open interface standard
Competitively low cost of all units, as compared to theirCompetitively low cost of all units, as compared to their
non-Bluetooth contemporaries.non-Bluetooth contemporaries.
So how does Bluetooth work?So how does Bluetooth work?
Basically, Bluetooth works by finding out what otherBasically, Bluetooth works by finding out what other
Bluetooth devices are nearby and then talking to them asBluetooth devices are nearby and then talking to them as
necessary. It does this by establishing a piconet, wherenecessary. It does this by establishing a piconet, where
one device controls communications with up to sevenone device controls communications with up to seven
others. Many piconets can be linked to form aothers. Many piconets can be linked to form a
scatternet .scatternet .
Some ideas on how Bluetooth willSome ideas on how Bluetooth will
ingratiate itself into our lives:ingratiate itself into our lives:
Data synchronization need never again be a problem as your BluetoothData synchronization need never again be a problem as your Bluetooth
enabled PDA, PC or laptop all talk to each other and update theirenabled PDA, PC or laptop all talk to each other and update their
respective files to the most recent ones.respective files to the most recent ones.
Traveling in a plane, a person may write but not send e-mail. When theTraveling in a plane, a person may write but not send e-mail. When the
plane touches down the Bluetooth enabled laptop will communicate withplane touches down the Bluetooth enabled laptop will communicate with
the user's phone and will automatically send them.the user's phone and will automatically send them.
Mice and keyboards will identify themselves to the computer withoutMice and keyboards will identify themselves to the computer without
intervention, or could also be used to command TVs, videos or hi-fis atintervention, or could also be used to command TVs, videos or hi-fis at
the touch.the touch.
Use e-mail while your laptop is still in the briefcase! When your laptopUse e-mail while your laptop is still in the briefcase! When your laptop
receives e-mail, you'll get an alert on your mobile phone. You can alsoreceives e-mail, you'll get an alert on your mobile phone. You can also
browse all incoming e-mails and read those you select in the mobilebrowse all incoming e-mails and read those you select in the mobile
phone's display.phone's display.
A traveling businessperson could ask his laptop computer to locate aA traveling businessperson could ask his laptop computer to locate a
suitable printer as soon as he enters a hotel lobby, and send a printoutsuitable printer as soon as he enters a hotel lobby, and send a printout
to that printer when it has been found.to that printer when it has been found.
The Reality CheckThe Reality Check
In truth, Bluetooth is merely complementary to the otherIn truth, Bluetooth is merely complementary to the other
technologies that permeate our lives. A universaltechnologies that permeate our lives. A universal
communicator, in itself it is of little benefit, but combinedcommunicator, in itself it is of little benefit, but combined
with our mobile phones, PDAs and other devices, itwith our mobile phones, PDAs and other devices, it
becomes a potent technology.becomes a potent technology.
The Killer App for BluetoothThe Killer App for Bluetooth
The eradication of wire clutterThe eradication of wire clutter
SECURITY ISSUESSECURITY ISSUES
Bluetooth’s abilities, for the moment at least, will beBluetooth’s abilities, for the moment at least, will be
limited to domestic use. As unresolved security issueslimited to domestic use. As unresolved security issues
continue to loom, it is only a brave or stupid end-usercontinue to loom, it is only a brave or stupid end-user
that would adopt Bluetooth on anything but a trivialthat would adopt Bluetooth on anything but a trivial
scale.scale.
Domestic arena offers Bluetooth aDomestic arena offers Bluetooth a
bright futurebright future
People have a natural and healthy dislike for cablesPeople have a natural and healthy dislike for cables
littering their floors, and a technology that eliminateslittering their floors, and a technology that eliminates
such an eyesore and tedium for not only computers butsuch an eyesore and tedium for not only computers but
other electronic equipment like stereo’s, TV sets, homeother electronic equipment like stereo’s, TV sets, home
kitchen and others.kitchen and others.
Data SynchronizationData Synchronization
The bane of those who work on the same projects andThe bane of those who work on the same projects and
files on different devices should be made almostfiles on different devices should be made almost
ridiculously easy by Bluetooth. Merely having theridiculously easy by Bluetooth. Merely having the
different devices - PC, laptop, PDA, whatever - withindifferent devices - PC, laptop, PDA, whatever - within
about 10 meters of each other should suffice as they allabout 10 meters of each other should suffice as they all
automatically update their copy to the most recent one.automatically update their copy to the most recent one.
The Radiation IssuesThe Radiation Issues
It is a matter of concern to some that the carrier wavesIt is a matter of concern to some that the carrier waves
used by Bluetooth inhabit the same band as that ofused by Bluetooth inhabit the same band as that of
microwave ovens.microwave ovens.
Fortunately, the transmitting power is far too weak toFortunately, the transmitting power is far too weak to
result in perceptible effects in humans. Moreover, theresult in perceptible effects in humans. Moreover, the
radiation is not concentrated in a single beam; rather, itradiation is not concentrated in a single beam; rather, it
is randomly dispersed in all directions.is randomly dispersed in all directions.
Security Issues and BluetoothSecurity Issues and Bluetooth
The three principal security features employed byThe three principal security features employed by
Bluetooth are:Bluetooth are:
Frequency hopping, thus making eavesdropping almostFrequency hopping, thus making eavesdropping almost
impossible.impossible.
Authentication, allowing a user to control connectivity toAuthentication, allowing a user to control connectivity to
specified devices only.specified devices only.
Encryption, utilizing a 0-bit, 40-bit or 64-bit key.Encryption, utilizing a 0-bit, 40-bit or 64-bit key.
Despite considerable investment in this area, significantDespite considerable investment in this area, significant
security holes still exist in the 1.1 implementation ofsecurity holes still exist in the 1.1 implementation of
Bluetooth.Bluetooth.
The Real Security ThreatThe Real Security Threat
A more real concern lies in the method needed toA more real concern lies in the method needed to
establish piconets. The necessity of PIN code entry inestablish piconets. The necessity of PIN code entry in
the initialization process of two Bluetooth devices isthe initialization process of two Bluetooth devices is
sloppy at best. The problem is augmented if each devicesloppy at best. The problem is augmented if each device
in a scatternet or larger-sized piconet has to bein a scatternet or larger-sized piconet has to be
independently initialized. It also poses significantindependently initialized. It also poses significant
problems for a network administrator - it is unlikely that aproblems for a network administrator - it is unlikely that a
unique PIN would be assigned to each device, but notunique PIN would be assigned to each device, but not
doing so would seriously compromise network integrity.doing so would seriously compromise network integrity.
It is worth noting that the SIG maintain that hackersIt is worth noting that the SIG maintain that hackers
would have to take "extreme measures" to perform thiswould have to take "extreme measures" to perform this
kind of hacking.kind of hacking.
Security Bottom LineSecurity Bottom Line
Bluetooth in its current form is unsuitable for the transferBluetooth in its current form is unsuitable for the transfer
of sensitive data. The Bluetooth SIG is actively seekingof sensitive data. The Bluetooth SIG is actively seeking
to implement more sophisticated security protocols.to implement more sophisticated security protocols.
Tech SpecsTech Specs
Frequency RangeFrequency Range
Physical LayerPhysical Layer
Noise ImmunityNoise Immunity
Error ControlError Control
Data TransmissionData Transmission
PowerPower
Frequency RangeFrequency Range
Bluetooth devices utilize the 2.4Ghz Industrial, Scientific,Bluetooth devices utilize the 2.4Ghz Industrial, Scientific,
and Medical (ISM) frequency range. Throughout most ofand Medical (ISM) frequency range. Throughout most of
the world this band is free and unregulated.the world this band is free and unregulated.
Encouraged by the Bluetooth SIG, governments world-Encouraged by the Bluetooth SIG, governments world-
wide are now beginning to regulate the 2.4Ghz band,wide are now beginning to regulate the 2.4Ghz band,
thus ensuring that it will remain available for unhinderedthus ensuring that it will remain available for unhindered
use by Bluetooth appliances.use by Bluetooth appliances.
Physical LayerPhysical Layer
The Bluetooth hardware is comprised of a single 9*9mmThe Bluetooth hardware is comprised of a single 9*9mm
chip. Inserted into any device it can communicate withchip. Inserted into any device it can communicate with
any other Bluetooth device within a 10m radius, or up toany other Bluetooth device within a 10m radius, or up to
100m if an amplifier is used. The maximum data rate100m if an amplifier is used. The maximum data rate
achievable by 1st generation technology is 1Mbps.achievable by 1st generation technology is 1Mbps.
Bluetooth appliances use Gaussian Frequency ShiftBluetooth appliances use Gaussian Frequency Shift
Keying (GSSK) for radio frequency modulation.Keying (GSSK) for radio frequency modulation.
Judicious use of these modulation techniques shouldJudicious use of these modulation techniques should
allow future generations to achieve a transfer rate ofallow future generations to achieve a transfer rate of
between 2 and 12Mbps.between 2 and 12Mbps.
Noise ImmunityNoise Immunity
Frequency Hop (FH) spread spectrum is a method whichFrequency Hop (FH) spread spectrum is a method which
effectively divides the frequency band into a number ofeffectively divides the frequency band into a number of
hop channels. A technology that quickly hops channelshop channels. A technology that quickly hops channels
minimizes potential interference. Bluetooth takesminimizes potential interference. Bluetooth takes
advantage of this technique by incorporating a fastadvantage of this technique by incorporating a fast
frequency hopping technology with a nominal hoppingfrequency hopping technology with a nominal hopping
rate of 1600 hops/second among 79 channels. Afterrate of 1600 hops/second among 79 channels. After
transmitting a packet each device hops to anothertransmitting a packet each device hops to another
frequency as determined by the master. The hoppingfrequency as determined by the master. The hopping
sequence is unique to each piconet and determined bysequence is unique to each piconet and determined by
the Bluetooth Device Address (BDA) of the piconetthe Bluetooth Device Address (BDA) of the piconet
master.master.
Frequency Hop (FH) Spread Spectrum
Error ControlError Control
Another method by which Bluetooth increases its noiseAnother method by which Bluetooth increases its noise
immunity is that of Forward Error Correction (FEC). FECimmunity is that of Forward Error Correction (FEC). FEC
is a method that enables a receiver to not only detect butis a method that enables a receiver to not only detect but
also correct errors in a transmission. This technique isalso correct errors in a transmission. This technique is
especially valuable in limiting the impact of noise on longespecially valuable in limiting the impact of noise on long
distance links. Three error correction techniques havedistance links. Three error correction techniques have
been so far defined in the Bluetooth specification:been so far defined in the Bluetooth specification:
1/3 Rate FEC1/3 Rate FEC
2/3 Rate FEC2/3 Rate FEC
Automatic Repeat Request (ARQ)Automatic Repeat Request (ARQ)
Data TransmissionData Transmission
Bluetooth allows for data to be transmitted eitherBluetooth allows for data to be transmitted either
synchronously or asynchronously. The Synchronoussynchronously or asynchronously. The Synchronous
Connection Oriented (SCO) method is used primarily forConnection Oriented (SCO) method is used primarily for
voice while the Asynchronous Connectionless (ACL)voice while the Asynchronous Connectionless (ACL)
method is used for data. Since SCO packets needmethod is used for data. Since SCO packets need
smooth transmission, they are transmitted via reservedsmooth transmission, they are transmitted via reserved
intervals, i.e. packets sent in groups with no interrupts.intervals, i.e. packets sent in groups with no interrupts.
PowerPower
Bluetooth is truly admirable for its sparing use of power.Bluetooth is truly admirable for its sparing use of power.
The technology limits the transmitter's power output toThe technology limits the transmitter's power output to
exactly that needed - the signal strength is dynamicallyexactly that needed - the signal strength is dynamically
modified to suit the required range. Power saving modesmodified to suit the required range. Power saving modes
examined in the Bluetooth protocol provide furtherexamined in the Bluetooth protocol provide further
benefits.benefits.
Bluetooth Connection ProtocolBluetooth Connection Protocol
The Bluetooth connection protocol describes the set ofThe Bluetooth connection protocol describes the set of
rules by which all Bluetooth devices must abide in orderrules by which all Bluetooth devices must abide in order
to establish a link a communicate with one another.to establish a link a communicate with one another.
The essence of Bluetooth is based upon dynamicallyThe essence of Bluetooth is based upon dynamically
configured units. Hopping very quickly betweenconfigured units. Hopping very quickly between
frequencies, the protocol specifically caters for manyfrequencies, the protocol specifically caters for many
different modes to allow for minimal power consumption.different modes to allow for minimal power consumption.
StandbyStandby
Devices not connected in a piconet are in standby mode.Devices not connected in a piconet are in standby mode.
In this mode, they listen for messages every 1.28In this mode, they listen for messages every 1.28
seconds - over 32 hop frequencies (fewer in Japan,seconds - over 32 hop frequencies (fewer in Japan,
Spain, and France due to local bandwidth regulation).Spain, and France due to local bandwidth regulation).
Page/InquiryPage/Inquiry
If a device wishes to make a connection with anotherIf a device wishes to make a connection with another
device, it sends out a page message if the address isdevice, it sends out a page message if the address is
known, or an inquiry followed by a page message if it isknown, or an inquiry followed by a page message if it is
unknown. The master unit sends out 16 identical pageunknown. The master unit sends out 16 identical page
messages on 16 hop frequencies to the slave unit. Ifmessages on 16 hop frequencies to the slave unit. If
there is no response, the master retransmits on the otherthere is no response, the master retransmits on the other
16 hop frequencies. The inquiry method requires an16 hop frequencies. The inquiry method requires an
extra response from the slave unit, since the MACextra response from the slave unit, since the MAC
address is unknown to the master unit.address is unknown to the master unit.
ActiveActive
Simply, data transmission occurs.Simply, data transmission occurs.
HoldHold
When either the master or slave wishes, a hold modeWhen either the master or slave wishes, a hold mode
can be established, during which no data is transmitted.can be established, during which no data is transmitted.
The purpose of this is to conserve power. Otherwise,The purpose of this is to conserve power. Otherwise,
there is a constant data exchange. A typical reason forthere is a constant data exchange. A typical reason for
going into hold mode is the connection of severalgoing into hold mode is the connection of several
piconets .piconets .
SniffSniff
The sniff mode, applicable only to slave units, is forThe sniff mode, applicable only to slave units, is for
power conservation, though not at as reduced a level aspower conservation, though not at as reduced a level as
hold. During this mode, the slave does not take an activehold. During this mode, the slave does not take an active
role in the piconet, but listens at a reduced level. This isrole in the piconet, but listens at a reduced level. This is
usually a programmable setting.usually a programmable setting.
ParkPark
Park mode is a more reduced level of activity than thePark mode is a more reduced level of activity than the
hold mode. During it, the slave is synchronized to thehold mode. During it, the slave is synchronized to the
piconet, thus not requiring full reactivation, but is not partpiconet, thus not requiring full reactivation, but is not part
of the traffic. In this state, they relinquish their MACof the traffic. In this state, they relinquish their MAC
addresses , but only listen enough to keep theiraddresses , but only listen enough to keep their
synchronization with the master and check for broadcastsynchronization with the master and check for broadcast
messages.messages.
FUTURE OF BLUETOOTHFUTURE OF BLUETOOTH
Bluetooth was never designed to be a system competingBluetooth was never designed to be a system competing
with LAN. It rather complements LAN, but taken as it is,with LAN. It rather complements LAN, but taken as it is,
Bluetooth is a competent technology offeringBluetooth is a competent technology offering
unparalleled convenience. Ending, it will provide meansunparalleled convenience. Ending, it will provide means
to get rid of connecting wire, and this is a truly a killerto get rid of connecting wire, and this is a truly a killer
app for it.app for it.
Future of WirelessFuture of Wireless
Phones/Personal Digital AssistantsPhones/Personal Digital Assistants
LaptopsLaptops
““Digital Mapping”Digital Mapping”
WIFI ExpansionWIFI Expansion
Downside of Expansion/IntegrationDownside of Expansion/Integration
““Objective Force Warrior”Objective Force Warrior”
Phones/PDAPhones/PDA
Telephones becoming next computer?Telephones becoming next computer?

Cellular phones and PDAs available today withCellular phones and PDAs available today with
processing power equivalent to mid-1990 PCs whileprocessing power equivalent to mid-1990 PCs while
consuming 100 times less electricityconsuming 100 times less electricity

Phones/PDAs available today with video capability,Phones/PDAs available today with video capability,
GPS antennas, tiny keyboards, access to local “WIFIGPS antennas, tiny keyboards, access to local “WIFI
hotspots”, and slots for additional memory.hotspots”, and slots for additional memory.
Phones/PDAPhones/PDA
Phone/PDA trends:Phone/PDA trends:

““Smart-phones currently constitute 5% of overallSmart-phones currently constitute 5% of overall
mobile phone sales, but that figure has been doublingmobile phone sales, but that figure has been doubling
from last year.” (Gartner)from last year.” (Gartner)

Market expectations include a gigabyte or more ofMarket expectations include a gigabyte or more of
flash memory in next two years.flash memory in next two years.

Canesta, firm in San Jose, Ca., is testing a laser plug-Canesta, firm in San Jose, Ca., is testing a laser plug-
in for phones that projects a keyboard onto flatin for phones that projects a keyboard onto flat
surfaces, avail end 2004.surfaces, avail end 2004.
LaptopsLaptops
Expansion of WIFI networksExpansion of WIFI networks

Thousands of WIFI hotspots have emerged worldwideThousands of WIFI hotspots have emerged worldwide
in the last four years, and trend is expected toin the last four years, and trend is expected to
continue.continue.

Market expects half of all laptops shipped by end ofMarket expects half of all laptops shipped by end of
2004 to be WIFI-equipped from the factory.2004 to be WIFI-equipped from the factory.
““Digital Mapping”Digital Mapping”
Integration of GPS data with Web information, i.e.Integration of GPS data with Web information, i.e.
“modeling the planet as a living system.” (Environmental“modeling the planet as a living system.” (Environmental
Systems Research Institute)Systems Research Institute)
MetaCarta markets a product that “geo-parses” a webMetaCarta markets a product that “geo-parses” a web
search for any mention of a specific place. The desiredsearch for any mention of a specific place. The desired
effect is search results that have more relevance to aeffect is search results that have more relevance to a
physical location.physical location.
WIFI ExpansionWIFI Expansion
WIFI started on an unlicensed portion of the spectrum.WIFI started on an unlicensed portion of the spectrum.
Emergence of powerful adaptations of WIFI, such asEmergence of powerful adaptations of WIFI, such as
meshed networks or “WIMax”.meshed networks or “WIMax”.
MIT Media Lab Project, install WIFI base stations onMIT Media Lab Project, install WIFI base stations on
inter-village buses in India: users can email or downloadinter-village buses in India: users can email or download
files while in transmission range of bus stops.files while in transmission range of bus stops.
Key DrawbackKey Drawback
Key drawback is privacy-related issues.Key drawback is privacy-related issues.
Wireless connection coupled with GPS information andWireless connection coupled with GPS information and
tags results in an easy method of tracking an individual’stags results in an easy method of tracking an individual’s
movements. The effect is like a phone record, exceptmovements. The effect is like a phone record, except
the connection log includes the GPS specific spot wherethe connection log includes the GPS specific spot where
that individual logged onto the Web.that individual logged onto the Web.
““Objective Force Warrior”Objective Force Warrior”
DOD-specific application: scheduled for fielding in 2008.DOD-specific application: scheduled for fielding in 2008.
““The Army’s vision for the Objective Force Warrior is aThe Army’s vision for the Objective Force Warrior is a
wirelessly networked soldier within a small combat teamwirelessly networked soldier within a small combat team
and completely integrated into fire support and C4ISRand completely integrated into fire support and C4ISR
components.”components.”
This concept includes UAVs, networked sensor fields,This concept includes UAVs, networked sensor fields,
and robotic cargo transporters, all integrated wirelessly.and robotic cargo transporters, all integrated wirelessly.
ReferencesReferences
1.1. Institue of Electrical and Electronics EngineersInstitue of Electrical and Electronics Engineers
(http://www.ieee.org/)(http://www.ieee.org/)
2.2. http://www.iss.net/wireless/WLAN_FAQ.phphttp://www.iss.net/wireless/WLAN_FAQ.php
3.3. http://www.practicallynetworked.com/support/wireless_http://www.practicallynetworked.com/support/wireless_
secure.htmsecure.htm
4.4. http://www.computerworld.com/mobiletopics/mobile/techttp://www.computerworld.com/mobiletopics/mobile/tec
hnology/story/0%2C10801%2C72164%2C00.htmlhnology/story/0%2C10801%2C72164%2C00.html
5.5. http://www.practicallynetworked.com/support/wireless_http://www.practicallynetworked.com/support/wireless_
secure.htmsecure.htm
6.6. COMPUTERS Information Technology in PerspectiveCOMPUTERS Information Technology in Perspective

More Related Content

What's hot

Wireless Communication
Wireless CommunicationWireless Communication
Wireless Communication
Awais Alam
 
Yx500 Series Specsheet
Yx500 Series SpecsheetYx500 Series Specsheet
Yx500 Series Specsheet
Ari Zoldan
 

What's hot (20)

Genaration of technology
Genaration of technologyGenaration of technology
Genaration of technology
 
Evolution of mobile cellular communication
Evolution of mobile cellular communicationEvolution of mobile cellular communication
Evolution of mobile cellular communication
 
LTE & Cellular 2015 Catalog
LTE & Cellular 2015 CatalogLTE & Cellular 2015 Catalog
LTE & Cellular 2015 Catalog
 
1 g (First Generation)
1 g (First Generation)1 g (First Generation)
1 g (First Generation)
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Millimeter wave as the future of 5g
Millimeter wave as the future of 5g Millimeter wave as the future of 5g
Millimeter wave as the future of 5g
 
First generation network
First generation networkFirst generation network
First generation network
 
1g
1g1g
1g
 
Wireless communication
Wireless communication Wireless communication
Wireless communication
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Wireless Mesh For Transportation
Wireless Mesh For TransportationWireless Mesh For Transportation
Wireless Mesh For Transportation
 
Wireless Communication
Wireless CommunicationWireless Communication
Wireless Communication
 
Data tele standards-2
Data tele standards-2Data tele standards-2
Data tele standards-2
 
5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY5G NETWORKS and 5G WIRELESS TECHNOLOGY
5G NETWORKS and 5G WIRELESS TECHNOLOGY
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Millimeter Waves (mmWaves)
Millimeter Waves (mmWaves)Millimeter Waves (mmWaves)
Millimeter Waves (mmWaves)
 
Presentation2[1]
Presentation2[1]Presentation2[1]
Presentation2[1]
 
Hybrid F Sona Bridgwave Gig E Wireless
Hybrid   F Sona Bridgwave   Gig E WirelessHybrid   F Sona Bridgwave   Gig E Wireless
Hybrid F Sona Bridgwave Gig E Wireless
 
Yx500 Series Specsheet
Yx500 Series SpecsheetYx500 Series Specsheet
Yx500 Series Specsheet
 

Viewers also liked (6)

Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technology
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 

Similar to Wireless Network Technology

Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
David Livingston J
 
Basic Trainning - Sony Ericsson
Basic Trainning - Sony EricssonBasic Trainning - Sony Ericsson
Basic Trainning - Sony Ericsson
samudra28th
 
2c wired transmission
2c wired transmission2c wired transmission
2c wired transmission
kavish dani
 
Introduction to gsm
Introduction to gsmIntroduction to gsm
Introduction to gsm
sivakumar D
 
Lecture 01 Introduction to WMC.pdf
Lecture 01 Introduction to WMC.pdfLecture 01 Introduction to WMC.pdf
Lecture 01 Introduction to WMC.pdf
ssuser953ee81
 
LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015
LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015
LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015
Mark Niehus, RCDD
 

Similar to Wireless Network Technology (20)

Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Wireless access evolution
Wireless access evolutionWireless access evolution
Wireless access evolution
 
Community Wireless Networks
Community Wireless NetworksCommunity Wireless Networks
Community Wireless Networks
 
Wireless_Communication_PPT_2-_unit_1.pdf
Wireless_Communication_PPT_2-_unit_1.pdfWireless_Communication_PPT_2-_unit_1.pdf
Wireless_Communication_PPT_2-_unit_1.pdf
 
Broadcast Signal Intrusion - Hacking Radio Stations
Broadcast Signal Intrusion - Hacking Radio StationsBroadcast Signal Intrusion - Hacking Radio Stations
Broadcast Signal Intrusion - Hacking Radio Stations
 
History of WiFi TEchnology 802.11a,b,g,n,ac,ax Wimax
History of WiFi TEchnology 802.11a,b,g,n,ac,ax WimaxHistory of WiFi TEchnology 802.11a,b,g,n,ac,ax Wimax
History of WiFi TEchnology 802.11a,b,g,n,ac,ax Wimax
 
Obasan project presentation
Obasan project presentationObasan project presentation
Obasan project presentation
 
Basic Trainning - Sony Ericsson
Basic Trainning - Sony EricssonBasic Trainning - Sony Ericsson
Basic Trainning - Sony Ericsson
 
2c wired transmission
2c wired transmission2c wired transmission
2c wired transmission
 
Radiotelephony History
Radiotelephony HistoryRadiotelephony History
Radiotelephony History
 
Introduction to gsm
Introduction to gsmIntroduction to gsm
Introduction to gsm
 
Intro to gsm
Intro to gsmIntro to gsm
Intro to gsm
 
Basic wireless communication
Basic wireless communicationBasic wireless communication
Basic wireless communication
 
Lecture 01 Introduction to WMC.pdf
Lecture 01 Introduction to WMC.pdfLecture 01 Introduction to WMC.pdf
Lecture 01 Introduction to WMC.pdf
 
Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik
 
1g to 5g technologies
1g to 5g technologies1g to 5g technologies
1g to 5g technologies
 
Wireline to Wireless: Band-Aid or Network Concept 2016
Wireline to Wireless: Band-Aid or Network Concept 2016Wireline to Wireless: Band-Aid or Network Concept 2016
Wireline to Wireless: Band-Aid or Network Concept 2016
 
Introduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless NetworksIntroduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless Networks
 
LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015
LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015
LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 

Wireless Network Technology

  • 3. History of Wireless TechnologyHistory of Wireless Technology
  • 4. The beginning…The beginning… Most credit Guglielmo Marconi, “the father of radio”, withMost credit Guglielmo Marconi, “the father of radio”, with the initiation of wireless technologythe initiation of wireless technology 18941894 Marconi experimented with Hertzian Waves (radioMarconi experimented with Hertzian Waves (radio waves) to produce and detect waves over long distanceswaves) to produce and detect waves over long distances 18961896 Marconi established the Wireless Telegraph &Marconi established the Wireless Telegraph & Signal Company, the first radio factorySignal Company, the first radio factory 19011901 St John’s, New Foundland, Marconi received theSt John’s, New Foundland, Marconi received the first trans-Atlantic wireless signal from Poldhu, Englandfirst trans-Atlantic wireless signal from Poldhu, England 19051905 the first distress signal sent using Morse Codethe first distress signal sent using Morse Code 19191919 Radio Corporation of America (RCA) wasRadio Corporation of America (RCA) was incorporated, and consumer radio broadcasts for newsincorporated, and consumer radio broadcasts for news and entertainment soon became popularand entertainment soon became popular
  • 5. US Military jumps into WirelessUS Military jumps into Wireless During World War II the US Military used wirelessDuring World War II the US Military used wireless signals with encryption to send battle plans andsignals with encryption to send battle plans and instructionsinstructions US Military started the shift to radio data transmissionUS Military started the shift to radio data transmission technologytechnology
  • 6. Wireless Networking: Birth of theWireless Networking: Birth of the Wireless NetworkWireless Network 19711971 network technologies met radio technologies whennetwork technologies met radio technologies when the first wireless Local Area Network (LAN) wasthe first wireless Local Area Network (LAN) was established at the University of Hawaii during theestablished at the University of Hawaii during the experiment, ‘ALOHANET’experiment, ‘ALOHANET’ ALOHANET used a bidirectional star topology consistingALOHANET used a bidirectional star topology consisting of (7) computers over (4) islandsof (7) computers over (4) islands
  • 7. Wireless Networking: CellularWireless Networking: Cellular 19731973 Dr Martin Cooper, Motorola Labs, invented the firstDr Martin Cooper, Motorola Labs, invented the first personal mobile cellular telephone (weighed 2.5 lbs, 30personal mobile cellular telephone (weighed 2.5 lbs, 30 individual circuit boards, no display screen, 9”x5”x1.75”,individual circuit boards, no display screen, 9”x5”x1.75”, 10 hours to charge for 35 minutes of use)10 hours to charge for 35 minutes of use) 19831983 marked American entry into the commercial cellularmarked American entry into the commercial cellular service marketservice market 19871987 FCC allows and encourages cellular serviceFCC allows and encourages cellular service providers to use alternate technologies in the 800Mhzproviders to use alternate technologies in the 800Mhz radio spectrum to prompt use of digital transmissionradio spectrum to prompt use of digital transmission
  • 8. Wireless Networking: IEEEWireless Networking: IEEE 19901990 IEEE 802 Executive Committee established theIEEE 802 Executive Committee established the 802.11 Working Group to create a wireless LAN802.11 Working Group to create a wireless LAN standard.standard. 19971997 working group approved IEEE 802.11 as theworking group approved IEEE 802.11 as the world’s first wireless LAN standardworld’s first wireless LAN standard New standards are continuously being developed by theNew standards are continuously being developed by the Institute of Electrical and Electronical EngineersInstitute of Electrical and Electronical Engineers
  • 9. History: TimelineHistory: Timeline 1894 – experiments began with Hertzian Waves 1896 – Wireless Telegraph & Signal Company established 1901 – first trans- Atlantic signal received 1905 – first distress signal successful using Morse Code 1919 – RCA incorporated 1939-1945 – WWII US Military initiates radio data transmission technology 1971 – ALOHANET experiment, first wireless LAN 1973 – Motorola creates first mobile cellular telephone 1983 – America enters cellular telephone market 1987 – FCC encourages use of 800Mhz spectrum 1990 – IEEE creates work group to establish wireless LAN standards 1997 – 802.11 established as wireless LAN standard
  • 11. Current IEEECurrent IEEE11 StandardsStandards 802.11b- Actually the first of the 802.11 standards.802.11b- Actually the first of the 802.11 standards.  Max Speed 11MB/sec. 128 bit encryption. 2.4 GhzMax Speed 11MB/sec. 128 bit encryption. 2.4 Ghz operating frequency.operating frequency. 802.11a- Best suited for large businesses concerned802.11a- Best suited for large businesses concerned with securitywith security  54 MB/sec max speed. 5 Ghz operating frequency. 15254 MB/sec max speed. 5 Ghz operating frequency. 152 or 256 bit level of encryption.or 256 bit level of encryption. 802.11g- Best of both worlds for the average user.802.11g- Best of both worlds for the average user.  2.4 Ghz, 54 MB/sec, 128 bit encryption.2.4 Ghz, 54 MB/sec, 128 bit encryption.
  • 14. Crafting ChangesCrafting Changes IEEE Fall of ’03IEEE Fall of ’03  Launched a working group to develop new standardLaunched a working group to develop new standard (802.11n).(802.11n). Major goal:Major goal:  Increase WLAN throughput toIncrease WLAN throughput to at leastat least 100MB/sec.100MB/sec. Throughput- Defined as data rate minus IP overhead.Throughput- Defined as data rate minus IP overhead.
  • 15. OverheadOverhead Typically “overhead” can eat up half of the data rate.Typically “overhead” can eat up half of the data rate. 802.11 b, a, and g-802.11 b, a, and g-  b- 11 MB/sec yields <6MB/sec throughputb- 11 MB/sec yields <6MB/sec throughput  a and g yield 18-22 MB/sec.a and g yield 18-22 MB/sec.
  • 16. 802.11n802.11n Benefits-Benefits-  To make WLANS “feel like” 100MB/sec.To make WLANS “feel like” 100MB/sec.  Promotes the idea that wireless networks mayPromotes the idea that wireless networks may someday entirely replace wired ones.someday entirely replace wired ones. Saves money in the long run by eliminating cablingSaves money in the long run by eliminating cabling costs.costs.
  • 17. 802.11n802.11n Challenges-Challenges-  Delivering higher performance while simultaneouslyDelivering higher performance while simultaneously reducing cost.reducing cost.  Throughput still can be reduced-Throughput still can be reduced- Wood, metal etc. inside buildings still a factor.Wood, metal etc. inside buildings still a factor.  Skeptics-Skeptics- Unless one sitting underneath the access point,Unless one sitting underneath the access point, still won’t get the max throughput.still won’t get the max throughput. Access points will still need to be hard wired toAccess points will still need to be hard wired to wiring closets.wiring closets.
  • 18. 802.11n802.11n Bottom Line-Bottom Line-  Speed is going to happen, just a matter of time.Speed is going to happen, just a matter of time.  Expect to see 802.11n within 18 months.Expect to see 802.11n within 18 months.  Expect your connection at home to “feel” 5 to 10Expect your connection at home to “feel” 5 to 10 times faster than it does right now.times faster than it does right now.
  • 19. Security of Wireless NetworksSecurity of Wireless Networks Two basic steps:Two basic steps: •• A host system needs to authenticate the user or deviceA host system needs to authenticate the user or device that it's communicating with.that it's communicating with. •• The data must be protected as it travels from the userThe data must be protected as it travels from the user device to the destination host, whether to preservedevice to the destination host, whether to preserve confidentiality or to ensure that the message isn'tconfidentiality or to ensure that the message isn't changed or destroyed en route.changed or destroyed en route.
  • 20. Antenna EffectsAntenna Effects An intruder must be within range of the signal to causeAn intruder must be within range of the signal to cause problems.problems. Proper positioning of an antenna within a building canProper positioning of an antenna within a building can minimize the possibility of reception by an outsideminimize the possibility of reception by an outside source.source.
  • 21. Security RisksSecurity Risks Insertion Attacks -Insertion Attacks - placing unauthorized devices on the wirelessplacing unauthorized devices on the wireless network without going through a security processnetwork without going through a security process Interception and Monitoring wireless traffic -Interception and Monitoring wireless traffic - these varythese vary between sniffer, hijacking a session, broadcast monitoring, and basebetween sniffer, hijacking a session, broadcast monitoring, and base station cloningstation cloning Misconfiguration -Misconfiguration - administrators can leave factory settings in tactadministrators can leave factory settings in tact which are the least securewhich are the least secure Jamming -Jamming - illegitimate traffic overwhelms frequencies, andillegitimate traffic overwhelms frequencies, and legitimate traffic can not get throughlegitimate traffic can not get through Client to Client Attacks -Client to Client Attacks - two wireless clients can talk directly totwo wireless clients can talk directly to each other by-passing the base stationeach other by-passing the base station
  • 22. Solutions to Minimizing RiskSolutions to Minimizing Risk Don't use TCP/IP for File and Printer sharing!Don't use TCP/IP for File and Printer sharing! Follow secure file-sharing practicesFollow secure file-sharing practices Enable WEP EncryptionEnable WEP Encryption Use WEP for data and AuthenticationUse WEP for data and Authentication Use non-obvious WEP keys and periodically changeUse non-obvious WEP keys and periodically change themthem Secure your wireless router / Access Point (AP)Secure your wireless router / Access Point (AP) Disallow router/ AP administration via wirelessDisallow router/ AP administration via wireless Use MAC address based Access and Association controlUse MAC address based Access and Association control Don't send the ESSIDDon't send the ESSID Don't accept "ANY" ESSIDDon't accept "ANY" ESSID Use VPNUse VPN http://www.practicallynetworked.com/support/wireless_secuhttp://www.practicallynetworked.com/support/wireless_secu re.htmre.htm
  • 23. New SecurityNew Security Research companies continue to look forResearch companies continue to look for new ways to keep wireless networksnew ways to keep wireless networks secure.secure. An example is Wireless Security AuditorAn example is Wireless Security Auditor (WSA) developed by IBM and described(WSA) developed by IBM and described at http://www.research.ibm.com/gsal/wsa/at http://www.research.ibm.com/gsal/wsa/ Others are being tested every dayOthers are being tested every day
  • 24. BluetoothBluetooth A specification adopted by the world's most powerful andA specification adopted by the world's most powerful and influential communications and computer manufacturers.influential communications and computer manufacturers. It will enable devices from mobile phones and PCs toIt will enable devices from mobile phones and PCs to camcorders and cookers to talk to one another.camcorders and cookers to talk to one another.
  • 25.
  • 26. A little bit of history:A little bit of history: In early 1994, a team of researchers led by SvenIn early 1994, a team of researchers led by Sven Mattisson and Jaap Haartsen in a vibrant collegeMattisson and Jaap Haartsen in a vibrant college town called Lund, Sweden, were investigatingtown called Lund, Sweden, were investigating the possibility of developing a wirelessthe possibility of developing a wireless connection between an ear-piece and phone. Asconnection between an ear-piece and phone. As development proceeded, with it came thedevelopment proceeded, with it came the realization that the potential of such arealization that the potential of such a technology far exceeded that of a mere cordlesstechnology far exceeded that of a mere cordless headset. Ericsson decided to further researchheadset. Ericsson decided to further research the technology and thus, almost by accident thethe technology and thus, almost by accident the Bluetooth concept was born.Bluetooth concept was born.
  • 27. The Bluetooth SIG set the followingThe Bluetooth SIG set the following goals:goals: Global usageGlobal usage Voice and data handlingVoice and data handling The ability to establish ad-hoc connectionsThe ability to establish ad-hoc connections The ability to withstand interference from other sourcesThe ability to withstand interference from other sources in the open bandin the open band Very small size, in order to accommodate integration intoVery small size, in order to accommodate integration into a variety of devicesa variety of devices Negligible power consumption in comparison to otherNegligible power consumption in comparison to other devices for similar usedevices for similar use An open interface standardAn open interface standard Competitively low cost of all units, as compared to theirCompetitively low cost of all units, as compared to their non-Bluetooth contemporaries.non-Bluetooth contemporaries.
  • 28. So how does Bluetooth work?So how does Bluetooth work? Basically, Bluetooth works by finding out what otherBasically, Bluetooth works by finding out what other Bluetooth devices are nearby and then talking to them asBluetooth devices are nearby and then talking to them as necessary. It does this by establishing a piconet, wherenecessary. It does this by establishing a piconet, where one device controls communications with up to sevenone device controls communications with up to seven others. Many piconets can be linked to form aothers. Many piconets can be linked to form a scatternet .scatternet .
  • 29. Some ideas on how Bluetooth willSome ideas on how Bluetooth will ingratiate itself into our lives:ingratiate itself into our lives: Data synchronization need never again be a problem as your BluetoothData synchronization need never again be a problem as your Bluetooth enabled PDA, PC or laptop all talk to each other and update theirenabled PDA, PC or laptop all talk to each other and update their respective files to the most recent ones.respective files to the most recent ones. Traveling in a plane, a person may write but not send e-mail. When theTraveling in a plane, a person may write but not send e-mail. When the plane touches down the Bluetooth enabled laptop will communicate withplane touches down the Bluetooth enabled laptop will communicate with the user's phone and will automatically send them.the user's phone and will automatically send them. Mice and keyboards will identify themselves to the computer withoutMice and keyboards will identify themselves to the computer without intervention, or could also be used to command TVs, videos or hi-fis atintervention, or could also be used to command TVs, videos or hi-fis at the touch.the touch. Use e-mail while your laptop is still in the briefcase! When your laptopUse e-mail while your laptop is still in the briefcase! When your laptop receives e-mail, you'll get an alert on your mobile phone. You can alsoreceives e-mail, you'll get an alert on your mobile phone. You can also browse all incoming e-mails and read those you select in the mobilebrowse all incoming e-mails and read those you select in the mobile phone's display.phone's display. A traveling businessperson could ask his laptop computer to locate aA traveling businessperson could ask his laptop computer to locate a suitable printer as soon as he enters a hotel lobby, and send a printoutsuitable printer as soon as he enters a hotel lobby, and send a printout to that printer when it has been found.to that printer when it has been found.
  • 30. The Reality CheckThe Reality Check In truth, Bluetooth is merely complementary to the otherIn truth, Bluetooth is merely complementary to the other technologies that permeate our lives. A universaltechnologies that permeate our lives. A universal communicator, in itself it is of little benefit, but combinedcommunicator, in itself it is of little benefit, but combined with our mobile phones, PDAs and other devices, itwith our mobile phones, PDAs and other devices, it becomes a potent technology.becomes a potent technology.
  • 31. The Killer App for BluetoothThe Killer App for Bluetooth The eradication of wire clutterThe eradication of wire clutter
  • 32. SECURITY ISSUESSECURITY ISSUES Bluetooth’s abilities, for the moment at least, will beBluetooth’s abilities, for the moment at least, will be limited to domestic use. As unresolved security issueslimited to domestic use. As unresolved security issues continue to loom, it is only a brave or stupid end-usercontinue to loom, it is only a brave or stupid end-user that would adopt Bluetooth on anything but a trivialthat would adopt Bluetooth on anything but a trivial scale.scale.
  • 33. Domestic arena offers Bluetooth aDomestic arena offers Bluetooth a bright futurebright future People have a natural and healthy dislike for cablesPeople have a natural and healthy dislike for cables littering their floors, and a technology that eliminateslittering their floors, and a technology that eliminates such an eyesore and tedium for not only computers butsuch an eyesore and tedium for not only computers but other electronic equipment like stereo’s, TV sets, homeother electronic equipment like stereo’s, TV sets, home kitchen and others.kitchen and others.
  • 34. Data SynchronizationData Synchronization The bane of those who work on the same projects andThe bane of those who work on the same projects and files on different devices should be made almostfiles on different devices should be made almost ridiculously easy by Bluetooth. Merely having theridiculously easy by Bluetooth. Merely having the different devices - PC, laptop, PDA, whatever - withindifferent devices - PC, laptop, PDA, whatever - within about 10 meters of each other should suffice as they allabout 10 meters of each other should suffice as they all automatically update their copy to the most recent one.automatically update their copy to the most recent one.
  • 35. The Radiation IssuesThe Radiation Issues It is a matter of concern to some that the carrier wavesIt is a matter of concern to some that the carrier waves used by Bluetooth inhabit the same band as that ofused by Bluetooth inhabit the same band as that of microwave ovens.microwave ovens. Fortunately, the transmitting power is far too weak toFortunately, the transmitting power is far too weak to result in perceptible effects in humans. Moreover, theresult in perceptible effects in humans. Moreover, the radiation is not concentrated in a single beam; rather, itradiation is not concentrated in a single beam; rather, it is randomly dispersed in all directions.is randomly dispersed in all directions.
  • 36. Security Issues and BluetoothSecurity Issues and Bluetooth The three principal security features employed byThe three principal security features employed by Bluetooth are:Bluetooth are: Frequency hopping, thus making eavesdropping almostFrequency hopping, thus making eavesdropping almost impossible.impossible. Authentication, allowing a user to control connectivity toAuthentication, allowing a user to control connectivity to specified devices only.specified devices only. Encryption, utilizing a 0-bit, 40-bit or 64-bit key.Encryption, utilizing a 0-bit, 40-bit or 64-bit key. Despite considerable investment in this area, significantDespite considerable investment in this area, significant security holes still exist in the 1.1 implementation ofsecurity holes still exist in the 1.1 implementation of Bluetooth.Bluetooth.
  • 37. The Real Security ThreatThe Real Security Threat A more real concern lies in the method needed toA more real concern lies in the method needed to establish piconets. The necessity of PIN code entry inestablish piconets. The necessity of PIN code entry in the initialization process of two Bluetooth devices isthe initialization process of two Bluetooth devices is sloppy at best. The problem is augmented if each devicesloppy at best. The problem is augmented if each device in a scatternet or larger-sized piconet has to bein a scatternet or larger-sized piconet has to be independently initialized. It also poses significantindependently initialized. It also poses significant problems for a network administrator - it is unlikely that aproblems for a network administrator - it is unlikely that a unique PIN would be assigned to each device, but notunique PIN would be assigned to each device, but not doing so would seriously compromise network integrity.doing so would seriously compromise network integrity. It is worth noting that the SIG maintain that hackersIt is worth noting that the SIG maintain that hackers would have to take "extreme measures" to perform thiswould have to take "extreme measures" to perform this kind of hacking.kind of hacking.
  • 38. Security Bottom LineSecurity Bottom Line Bluetooth in its current form is unsuitable for the transferBluetooth in its current form is unsuitable for the transfer of sensitive data. The Bluetooth SIG is actively seekingof sensitive data. The Bluetooth SIG is actively seeking to implement more sophisticated security protocols.to implement more sophisticated security protocols.
  • 39. Tech SpecsTech Specs Frequency RangeFrequency Range Physical LayerPhysical Layer Noise ImmunityNoise Immunity Error ControlError Control Data TransmissionData Transmission PowerPower
  • 40. Frequency RangeFrequency Range Bluetooth devices utilize the 2.4Ghz Industrial, Scientific,Bluetooth devices utilize the 2.4Ghz Industrial, Scientific, and Medical (ISM) frequency range. Throughout most ofand Medical (ISM) frequency range. Throughout most of the world this band is free and unregulated.the world this band is free and unregulated. Encouraged by the Bluetooth SIG, governments world-Encouraged by the Bluetooth SIG, governments world- wide are now beginning to regulate the 2.4Ghz band,wide are now beginning to regulate the 2.4Ghz band, thus ensuring that it will remain available for unhinderedthus ensuring that it will remain available for unhindered use by Bluetooth appliances.use by Bluetooth appliances.
  • 41. Physical LayerPhysical Layer The Bluetooth hardware is comprised of a single 9*9mmThe Bluetooth hardware is comprised of a single 9*9mm chip. Inserted into any device it can communicate withchip. Inserted into any device it can communicate with any other Bluetooth device within a 10m radius, or up toany other Bluetooth device within a 10m radius, or up to 100m if an amplifier is used. The maximum data rate100m if an amplifier is used. The maximum data rate achievable by 1st generation technology is 1Mbps.achievable by 1st generation technology is 1Mbps. Bluetooth appliances use Gaussian Frequency ShiftBluetooth appliances use Gaussian Frequency Shift Keying (GSSK) for radio frequency modulation.Keying (GSSK) for radio frequency modulation. Judicious use of these modulation techniques shouldJudicious use of these modulation techniques should allow future generations to achieve a transfer rate ofallow future generations to achieve a transfer rate of between 2 and 12Mbps.between 2 and 12Mbps.
  • 42. Noise ImmunityNoise Immunity Frequency Hop (FH) spread spectrum is a method whichFrequency Hop (FH) spread spectrum is a method which effectively divides the frequency band into a number ofeffectively divides the frequency band into a number of hop channels. A technology that quickly hops channelshop channels. A technology that quickly hops channels minimizes potential interference. Bluetooth takesminimizes potential interference. Bluetooth takes advantage of this technique by incorporating a fastadvantage of this technique by incorporating a fast frequency hopping technology with a nominal hoppingfrequency hopping technology with a nominal hopping rate of 1600 hops/second among 79 channels. Afterrate of 1600 hops/second among 79 channels. After transmitting a packet each device hops to anothertransmitting a packet each device hops to another frequency as determined by the master. The hoppingfrequency as determined by the master. The hopping sequence is unique to each piconet and determined bysequence is unique to each piconet and determined by the Bluetooth Device Address (BDA) of the piconetthe Bluetooth Device Address (BDA) of the piconet master.master.
  • 43. Frequency Hop (FH) Spread Spectrum
  • 44. Error ControlError Control Another method by which Bluetooth increases its noiseAnother method by which Bluetooth increases its noise immunity is that of Forward Error Correction (FEC). FECimmunity is that of Forward Error Correction (FEC). FEC is a method that enables a receiver to not only detect butis a method that enables a receiver to not only detect but also correct errors in a transmission. This technique isalso correct errors in a transmission. This technique is especially valuable in limiting the impact of noise on longespecially valuable in limiting the impact of noise on long distance links. Three error correction techniques havedistance links. Three error correction techniques have been so far defined in the Bluetooth specification:been so far defined in the Bluetooth specification: 1/3 Rate FEC1/3 Rate FEC 2/3 Rate FEC2/3 Rate FEC Automatic Repeat Request (ARQ)Automatic Repeat Request (ARQ)
  • 45. Data TransmissionData Transmission Bluetooth allows for data to be transmitted eitherBluetooth allows for data to be transmitted either synchronously or asynchronously. The Synchronoussynchronously or asynchronously. The Synchronous Connection Oriented (SCO) method is used primarily forConnection Oriented (SCO) method is used primarily for voice while the Asynchronous Connectionless (ACL)voice while the Asynchronous Connectionless (ACL) method is used for data. Since SCO packets needmethod is used for data. Since SCO packets need smooth transmission, they are transmitted via reservedsmooth transmission, they are transmitted via reserved intervals, i.e. packets sent in groups with no interrupts.intervals, i.e. packets sent in groups with no interrupts.
  • 46. PowerPower Bluetooth is truly admirable for its sparing use of power.Bluetooth is truly admirable for its sparing use of power. The technology limits the transmitter's power output toThe technology limits the transmitter's power output to exactly that needed - the signal strength is dynamicallyexactly that needed - the signal strength is dynamically modified to suit the required range. Power saving modesmodified to suit the required range. Power saving modes examined in the Bluetooth protocol provide furtherexamined in the Bluetooth protocol provide further benefits.benefits.
  • 47. Bluetooth Connection ProtocolBluetooth Connection Protocol The Bluetooth connection protocol describes the set ofThe Bluetooth connection protocol describes the set of rules by which all Bluetooth devices must abide in orderrules by which all Bluetooth devices must abide in order to establish a link a communicate with one another.to establish a link a communicate with one another. The essence of Bluetooth is based upon dynamicallyThe essence of Bluetooth is based upon dynamically configured units. Hopping very quickly betweenconfigured units. Hopping very quickly between frequencies, the protocol specifically caters for manyfrequencies, the protocol specifically caters for many different modes to allow for minimal power consumption.different modes to allow for minimal power consumption.
  • 48. StandbyStandby Devices not connected in a piconet are in standby mode.Devices not connected in a piconet are in standby mode. In this mode, they listen for messages every 1.28In this mode, they listen for messages every 1.28 seconds - over 32 hop frequencies (fewer in Japan,seconds - over 32 hop frequencies (fewer in Japan, Spain, and France due to local bandwidth regulation).Spain, and France due to local bandwidth regulation).
  • 49. Page/InquiryPage/Inquiry If a device wishes to make a connection with anotherIf a device wishes to make a connection with another device, it sends out a page message if the address isdevice, it sends out a page message if the address is known, or an inquiry followed by a page message if it isknown, or an inquiry followed by a page message if it is unknown. The master unit sends out 16 identical pageunknown. The master unit sends out 16 identical page messages on 16 hop frequencies to the slave unit. Ifmessages on 16 hop frequencies to the slave unit. If there is no response, the master retransmits on the otherthere is no response, the master retransmits on the other 16 hop frequencies. The inquiry method requires an16 hop frequencies. The inquiry method requires an extra response from the slave unit, since the MACextra response from the slave unit, since the MAC address is unknown to the master unit.address is unknown to the master unit.
  • 50. ActiveActive Simply, data transmission occurs.Simply, data transmission occurs.
  • 51. HoldHold When either the master or slave wishes, a hold modeWhen either the master or slave wishes, a hold mode can be established, during which no data is transmitted.can be established, during which no data is transmitted. The purpose of this is to conserve power. Otherwise,The purpose of this is to conserve power. Otherwise, there is a constant data exchange. A typical reason forthere is a constant data exchange. A typical reason for going into hold mode is the connection of severalgoing into hold mode is the connection of several piconets .piconets .
  • 52. SniffSniff The sniff mode, applicable only to slave units, is forThe sniff mode, applicable only to slave units, is for power conservation, though not at as reduced a level aspower conservation, though not at as reduced a level as hold. During this mode, the slave does not take an activehold. During this mode, the slave does not take an active role in the piconet, but listens at a reduced level. This isrole in the piconet, but listens at a reduced level. This is usually a programmable setting.usually a programmable setting.
  • 53. ParkPark Park mode is a more reduced level of activity than thePark mode is a more reduced level of activity than the hold mode. During it, the slave is synchronized to thehold mode. During it, the slave is synchronized to the piconet, thus not requiring full reactivation, but is not partpiconet, thus not requiring full reactivation, but is not part of the traffic. In this state, they relinquish their MACof the traffic. In this state, they relinquish their MAC addresses , but only listen enough to keep theiraddresses , but only listen enough to keep their synchronization with the master and check for broadcastsynchronization with the master and check for broadcast messages.messages.
  • 54. FUTURE OF BLUETOOTHFUTURE OF BLUETOOTH Bluetooth was never designed to be a system competingBluetooth was never designed to be a system competing with LAN. It rather complements LAN, but taken as it is,with LAN. It rather complements LAN, but taken as it is, Bluetooth is a competent technology offeringBluetooth is a competent technology offering unparalleled convenience. Ending, it will provide meansunparalleled convenience. Ending, it will provide means to get rid of connecting wire, and this is a truly a killerto get rid of connecting wire, and this is a truly a killer app for it.app for it.
  • 55. Future of WirelessFuture of Wireless Phones/Personal Digital AssistantsPhones/Personal Digital Assistants LaptopsLaptops ““Digital Mapping”Digital Mapping” WIFI ExpansionWIFI Expansion Downside of Expansion/IntegrationDownside of Expansion/Integration ““Objective Force Warrior”Objective Force Warrior”
  • 56. Phones/PDAPhones/PDA Telephones becoming next computer?Telephones becoming next computer?  Cellular phones and PDAs available today withCellular phones and PDAs available today with processing power equivalent to mid-1990 PCs whileprocessing power equivalent to mid-1990 PCs while consuming 100 times less electricityconsuming 100 times less electricity  Phones/PDAs available today with video capability,Phones/PDAs available today with video capability, GPS antennas, tiny keyboards, access to local “WIFIGPS antennas, tiny keyboards, access to local “WIFI hotspots”, and slots for additional memory.hotspots”, and slots for additional memory.
  • 57. Phones/PDAPhones/PDA Phone/PDA trends:Phone/PDA trends:  ““Smart-phones currently constitute 5% of overallSmart-phones currently constitute 5% of overall mobile phone sales, but that figure has been doublingmobile phone sales, but that figure has been doubling from last year.” (Gartner)from last year.” (Gartner)  Market expectations include a gigabyte or more ofMarket expectations include a gigabyte or more of flash memory in next two years.flash memory in next two years.  Canesta, firm in San Jose, Ca., is testing a laser plug-Canesta, firm in San Jose, Ca., is testing a laser plug- in for phones that projects a keyboard onto flatin for phones that projects a keyboard onto flat surfaces, avail end 2004.surfaces, avail end 2004.
  • 58. LaptopsLaptops Expansion of WIFI networksExpansion of WIFI networks  Thousands of WIFI hotspots have emerged worldwideThousands of WIFI hotspots have emerged worldwide in the last four years, and trend is expected toin the last four years, and trend is expected to continue.continue.  Market expects half of all laptops shipped by end ofMarket expects half of all laptops shipped by end of 2004 to be WIFI-equipped from the factory.2004 to be WIFI-equipped from the factory.
  • 59. ““Digital Mapping”Digital Mapping” Integration of GPS data with Web information, i.e.Integration of GPS data with Web information, i.e. “modeling the planet as a living system.” (Environmental“modeling the planet as a living system.” (Environmental Systems Research Institute)Systems Research Institute) MetaCarta markets a product that “geo-parses” a webMetaCarta markets a product that “geo-parses” a web search for any mention of a specific place. The desiredsearch for any mention of a specific place. The desired effect is search results that have more relevance to aeffect is search results that have more relevance to a physical location.physical location.
  • 60. WIFI ExpansionWIFI Expansion WIFI started on an unlicensed portion of the spectrum.WIFI started on an unlicensed portion of the spectrum. Emergence of powerful adaptations of WIFI, such asEmergence of powerful adaptations of WIFI, such as meshed networks or “WIMax”.meshed networks or “WIMax”. MIT Media Lab Project, install WIFI base stations onMIT Media Lab Project, install WIFI base stations on inter-village buses in India: users can email or downloadinter-village buses in India: users can email or download files while in transmission range of bus stops.files while in transmission range of bus stops.
  • 61. Key DrawbackKey Drawback Key drawback is privacy-related issues.Key drawback is privacy-related issues. Wireless connection coupled with GPS information andWireless connection coupled with GPS information and tags results in an easy method of tracking an individual’stags results in an easy method of tracking an individual’s movements. The effect is like a phone record, exceptmovements. The effect is like a phone record, except the connection log includes the GPS specific spot wherethe connection log includes the GPS specific spot where that individual logged onto the Web.that individual logged onto the Web.
  • 62. ““Objective Force Warrior”Objective Force Warrior” DOD-specific application: scheduled for fielding in 2008.DOD-specific application: scheduled for fielding in 2008. ““The Army’s vision for the Objective Force Warrior is aThe Army’s vision for the Objective Force Warrior is a wirelessly networked soldier within a small combat teamwirelessly networked soldier within a small combat team and completely integrated into fire support and C4ISRand completely integrated into fire support and C4ISR components.”components.” This concept includes UAVs, networked sensor fields,This concept includes UAVs, networked sensor fields, and robotic cargo transporters, all integrated wirelessly.and robotic cargo transporters, all integrated wirelessly.
  • 63. ReferencesReferences 1.1. Institue of Electrical and Electronics EngineersInstitue of Electrical and Electronics Engineers (http://www.ieee.org/)(http://www.ieee.org/) 2.2. http://www.iss.net/wireless/WLAN_FAQ.phphttp://www.iss.net/wireless/WLAN_FAQ.php 3.3. http://www.practicallynetworked.com/support/wireless_http://www.practicallynetworked.com/support/wireless_ secure.htmsecure.htm 4.4. http://www.computerworld.com/mobiletopics/mobile/techttp://www.computerworld.com/mobiletopics/mobile/tec hnology/story/0%2C10801%2C72164%2C00.htmlhnology/story/0%2C10801%2C72164%2C00.html 5.5. http://www.practicallynetworked.com/support/wireless_http://www.practicallynetworked.com/support/wireless_ secure.htmsecure.htm 6.6. COMPUTERS Information Technology in PerspectiveCOMPUTERS Information Technology in Perspective