wireless network technology

63
WIRELESS NETWORK WIRELESS NETWORK TECHNOLOGIES TECHNOLOGIES Kenneth Paul H. Buniel Kenneth Paul H. Buniel

Upload: kp12-buniel

Post on 20-Jun-2015

198 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Wireless Network Technology

WIRELESS NETWORK WIRELESS NETWORK TECHNOLOGIESTECHNOLOGIES

Kenneth Paul H. BunielKenneth Paul H. Buniel

Page 2: Wireless Network Technology

TopicsTopics

HistoryHistory

StandardsStandards

SecuritySecurity

BluetoothBluetooth

FutureFuture

Page 3: Wireless Network Technology

History of Wireless TechnologyHistory of Wireless Technology

Page 4: Wireless Network Technology

The beginning…The beginning…Most credit Guglielmo Marconi, “the father of radio”, with Most credit Guglielmo Marconi, “the father of radio”, with the initiation of wireless technologythe initiation of wireless technology18941894 Marconi experimented with Hertzian Waves (radio Marconi experimented with Hertzian Waves (radio waves) to produce and detect waves over long distanceswaves) to produce and detect waves over long distances18961896 Marconi established the Wireless Telegraph & Marconi established the Wireless Telegraph & Signal Company, the first radio factorySignal Company, the first radio factory1901 1901 St John’s, New Foundland, Marconi received the St John’s, New Foundland, Marconi received the first trans-Atlantic wireless signal from Poldhu, Englandfirst trans-Atlantic wireless signal from Poldhu, England1905 1905 the first distress signal sent using Morse Codethe first distress signal sent using Morse Code1919 1919 Radio Corporation of America (RCA) was Radio Corporation of America (RCA) was incorporated, and consumer radio broadcasts for news incorporated, and consumer radio broadcasts for news and entertainment soon became popularand entertainment soon became popular

Page 5: Wireless Network Technology

US Military jumps into WirelessUS Military jumps into Wireless

During World War II the US Military used wireless During World War II the US Military used wireless signals with encryption to send battle plans and signals with encryption to send battle plans and instructionsinstructions

US Military started the shift to radio data transmission US Military started the shift to radio data transmission technologytechnology

Page 6: Wireless Network Technology

Wireless Networking: Birth of the Wireless Networking: Birth of the Wireless NetworkWireless Network

1971 1971 network technologies met radio technologies when network technologies met radio technologies when the first wireless Local Area Network (LAN) was the first wireless Local Area Network (LAN) was established at the University of Hawaii during the established at the University of Hawaii during the experiment, ‘ALOHANET’experiment, ‘ALOHANET’ALOHANET used a bidirectional star topology consisting ALOHANET used a bidirectional star topology consisting of (7) computers over (4) islandsof (7) computers over (4) islands

Page 7: Wireless Network Technology

Wireless Networking: CellularWireless Networking: Cellular

1973 1973 Dr Martin Cooper, Motorola Labs, invented the first Dr Martin Cooper, Motorola Labs, invented the first personal mobile cellular telephone (weighed 2.5 lbs, 30 personal mobile cellular telephone (weighed 2.5 lbs, 30 individual circuit boards, no display screen, 9”x5”x1.75”, individual circuit boards, no display screen, 9”x5”x1.75”, 10 hours to charge for 35 minutes of use)10 hours to charge for 35 minutes of use)1983 1983 marked American entry into the commercial cellular marked American entry into the commercial cellular service marketservice market1987 1987 FCC allows and encourages cellular service FCC allows and encourages cellular service providers to use alternate technologies in the 800Mhz providers to use alternate technologies in the 800Mhz radio spectrum to prompt use of digital transmissionradio spectrum to prompt use of digital transmission

Page 8: Wireless Network Technology

Wireless Networking: IEEEWireless Networking: IEEE

19901990 IEEE 802 Executive Committee established the IEEE 802 Executive Committee established the 802.11 Working Group to create a wireless LAN 802.11 Working Group to create a wireless LAN standard.standard.19971997 working group approved IEEE 802.11 as the working group approved IEEE 802.11 as the world’s first wireless LAN standardworld’s first wireless LAN standardNew standards are continuously being developed by the New standards are continuously being developed by the Institute of Electrical and Electronical EngineersInstitute of Electrical and Electronical Engineers

Page 9: Wireless Network Technology

History: TimelineHistory: Timeline

1894 – experiments began with Hertzian

Waves

1896 – Wireless Telegraph & Signal

Company established

1901 – first trans-Atlantic signal

received

1905 – first distress signal successful using Morse Code

1919 – RCA incorporated

1939-1945 – WWII US Military initiates radio

data transmission technology

1971 – ALOHANET experiment, first

wireless LAN

1973 – Motorola creates first mobile cellular telephone

1983 – America enters cellular

telephone market

1987 – FCC encourages use of 800Mhz spectrum

1990 – IEEE creates work group to

establish wireless LAN standards

1997 – 802.11 established as wireless LAN

standard

Page 10: Wireless Network Technology

Wireless StandardsWireless Standards

IEEE 802.11n IEEE 802.11n

Page 11: Wireless Network Technology

Current IEEECurrent IEEE11 Standards Standards

802.11b- Actually the first of the 802.11 standards.802.11b- Actually the first of the 802.11 standards. Max Speed 11MB/sec. 128 bit encryption. 2.4 Ghz Max Speed 11MB/sec. 128 bit encryption. 2.4 Ghz

operating frequency.operating frequency.802.11a- Best suited for large businesses concerned 802.11a- Best suited for large businesses concerned with securitywith security 54 MB/sec max speed. 5 Ghz operating frequency. 152 54 MB/sec max speed. 5 Ghz operating frequency. 152

or 256 bit level of encryption.or 256 bit level of encryption.802.11g- Best of both worlds for the average user.802.11g- Best of both worlds for the average user. 2.4 Ghz, 54 MB/sec, 128 bit encryption.2.4 Ghz, 54 MB/sec, 128 bit encryption.

Page 12: Wireless Network Technology

IEEE 802.11x

Page 13: Wireless Network Technology

Standards currently being utilized

Page 14: Wireless Network Technology

Crafting ChangesCrafting Changes

IEEE Fall of ’03IEEE Fall of ’03 Launched a working group to develop new standard Launched a working group to develop new standard

(802.11n).(802.11n).

Major goal:Major goal: Increase WLAN throughput to Increase WLAN throughput to at leastat least 100MB/sec. 100MB/sec.

Throughput- Defined as data rate minus IP overhead.Throughput- Defined as data rate minus IP overhead.

Page 15: Wireless Network Technology

OverheadOverhead

Typically “overhead” can eat up half of the data rate.Typically “overhead” can eat up half of the data rate.

802.11 b, a, and g-802.11 b, a, and g- b- 11 MB/sec yields <6MB/sec throughputb- 11 MB/sec yields <6MB/sec throughput a and g yield 18-22 MB/sec.a and g yield 18-22 MB/sec.

Page 16: Wireless Network Technology

802.11n802.11n

Benefits-Benefits- To make WLANS “feel like” 100MB/sec.To make WLANS “feel like” 100MB/sec. Promotes the idea that wireless networks may Promotes the idea that wireless networks may

someday entirely replace wired ones. someday entirely replace wired ones.

Saves money in the long run by eliminating cabling Saves money in the long run by eliminating cabling costs.costs.

Page 17: Wireless Network Technology

802.11n802.11n

Challenges-Challenges- Delivering higher performance while simultaneously Delivering higher performance while simultaneously

reducing cost.reducing cost. Throughput still can be reduced-Throughput still can be reduced-

Wood, metal etc. inside buildings still a factor.Wood, metal etc. inside buildings still a factor. Skeptics-Skeptics-

Unless one sitting underneath the access point, Unless one sitting underneath the access point, still won’t get the max throughput.still won’t get the max throughput.

Access points will still need to be hard wired to Access points will still need to be hard wired to wiring closets.wiring closets.

Page 18: Wireless Network Technology

802.11n802.11n

Bottom Line-Bottom Line- Speed is going to happen, just a matter of time.Speed is going to happen, just a matter of time. Expect to see 802.11n within 18 months.Expect to see 802.11n within 18 months. Expect your connection at home to “feel” 5 to 10 Expect your connection at home to “feel” 5 to 10

times faster than it does right now.times faster than it does right now.

Page 19: Wireless Network Technology

Security of Wireless NetworksSecurity of Wireless Networks

Two basic steps: Two basic steps:

• • A host system needs to authenticate the user or device A host system needs to authenticate the user or device that it's communicating with. that it's communicating with.

• • The data must be protected as it travels from the user The data must be protected as it travels from the user device to the destination host, whether to preserve device to the destination host, whether to preserve confidentiality or to ensure that the message isn't confidentiality or to ensure that the message isn't changed or destroyed en route. changed or destroyed en route.

Page 20: Wireless Network Technology

Antenna EffectsAntenna Effects

An intruder must be within range of the signal to cause An intruder must be within range of the signal to cause problems.problems.

Proper positioning of an antenna within a building can Proper positioning of an antenna within a building can minimize the possibility of reception by an outside minimize the possibility of reception by an outside source. source.

Page 21: Wireless Network Technology

Security RisksSecurity Risks

Insertion Attacks - Insertion Attacks - placing unauthorized devices on the wireless placing unauthorized devices on the wireless network without going through a security processnetwork without going through a security process

Interception and Monitoring wireless traffic - Interception and Monitoring wireless traffic - these vary these vary between sniffer, hijacking a session, broadcast monitoring, and base between sniffer, hijacking a session, broadcast monitoring, and base station cloningstation cloning

Misconfiguration - Misconfiguration - administrators can leave factory settings in tact administrators can leave factory settings in tact which are the least securewhich are the least secure

Jamming - Jamming - illegitimate traffic overwhelms frequencies, and illegitimate traffic overwhelms frequencies, and legitimate traffic can not get throughlegitimate traffic can not get through

Client to Client Attacks - Client to Client Attacks - two wireless clients can talk directly to two wireless clients can talk directly to each other by-passing the base stationeach other by-passing the base station

Page 22: Wireless Network Technology

Solutions to Minimizing RiskSolutions to Minimizing Risk

Don't use TCP/IP for File and Printer sharing!Don't use TCP/IP for File and Printer sharing!Follow secure file-sharing practices Follow secure file-sharing practices Enable WEP EncryptionEnable WEP EncryptionUse WEP for data and Authentication Use WEP for data and Authentication Use non-obvious WEP keys and periodically change Use non-obvious WEP keys and periodically change themthemSecure your wireless router / Access Point (AP) Secure your wireless router / Access Point (AP) Disallow router/ AP administration via wirelessDisallow router/ AP administration via wirelessUse MAC address based Access and Association controlUse MAC address based Access and Association controlDon't send the ESSIDDon't send the ESSIDDon't accept "ANY" ESSIDDon't accept "ANY" ESSIDUse VPN Use VPN

http://www.practicallynetworked.com/support/http://www.practicallynetworked.com/support/wireless_secure.htmwireless_secure.htm

Page 23: Wireless Network Technology

New SecurityNew Security

Research companies continue to look for Research companies continue to look for new ways to keep wireless networks new ways to keep wireless networks secure.secure.

An example is Wireless Security Auditor An example is Wireless Security Auditor (WSA) developed by IBM and described (WSA) developed by IBM and described at http://www.research.ibm.com/gsal/wsa/at http://www.research.ibm.com/gsal/wsa/

Others are being tested every dayOthers are being tested every day

Page 24: Wireless Network Technology

BluetoothBluetooth

A specification adopted by the world's most powerful and A specification adopted by the world's most powerful and influential communications and computer manufacturers. influential communications and computer manufacturers. It will enable devices from mobile phones and PCs to It will enable devices from mobile phones and PCs to camcorders and cookers to talk to one another. camcorders and cookers to talk to one another.

Page 25: Wireless Network Technology
Page 26: Wireless Network Technology

A little bit of history: A little bit of history:

In early 1994, a team of researchers led by Sven In early 1994, a team of researchers led by Sven Mattisson and Jaap Haartsen in a vibrant Mattisson and Jaap Haartsen in a vibrant college town called Lund, Sweden, were college town called Lund, Sweden, were investigating the possibility of developing a investigating the possibility of developing a wireless connection between an ear-piece and wireless connection between an ear-piece and phone. As development proceeded, with it came phone. As development proceeded, with it came the realization that the potential of such a the realization that the potential of such a technology far exceeded that of a mere cordless technology far exceeded that of a mere cordless headset. Ericsson decided to further research headset. Ericsson decided to further research the technology and thus, almost by accident the the technology and thus, almost by accident the Bluetooth concept was born. Bluetooth concept was born.

Page 27: Wireless Network Technology

The Bluetooth SIG set the following The Bluetooth SIG set the following goals: goals:

Global usage Global usage Voice and data handling Voice and data handling The ability to establish ad-hoc connections The ability to establish ad-hoc connections The ability to withstand interference from other sources The ability to withstand interference from other sources in the open band in the open band Very small size, in order to accommodate integration into Very small size, in order to accommodate integration into a variety of devices a variety of devices Negligible power consumption in comparison to other Negligible power consumption in comparison to other devices for similar use devices for similar use An open interface standard An open interface standard Competitively low cost of all units, as compared to their Competitively low cost of all units, as compared to their non-Bluetooth contemporaries.non-Bluetooth contemporaries.

Page 28: Wireless Network Technology

So how does Bluetooth work? So how does Bluetooth work?

Basically, Bluetooth works by finding out what other Basically, Bluetooth works by finding out what other Bluetooth devices are nearby and then talking to them as Bluetooth devices are nearby and then talking to them as necessary. It does this by establishing a piconet, where necessary. It does this by establishing a piconet, where one device controls communications with up to seven one device controls communications with up to seven others. Many piconets can be linked to form a others. Many piconets can be linked to form a scatternet . scatternet .

Page 29: Wireless Network Technology

Some ideas on how Bluetooth will Some ideas on how Bluetooth will ingratiate itself into our lives: ingratiate itself into our lives:

Data synchronization need never again be a problem as your Bluetooth Data synchronization need never again be a problem as your Bluetooth enabled PDA, PC or laptop all talk to each other and update their enabled PDA, PC or laptop all talk to each other and update their respective files to the most recent ones.respective files to the most recent ones.Traveling in a plane, a person may write but not send e-mail. When the Traveling in a plane, a person may write but not send e-mail. When the plane touches down the Bluetooth enabled laptop will communicate with plane touches down the Bluetooth enabled laptop will communicate with the user's phone and will automatically send them. the user's phone and will automatically send them. Mice and keyboards will identify themselves to the computer without Mice and keyboards will identify themselves to the computer without intervention, or could also be used to command TVs, videos or hi-fis at intervention, or could also be used to command TVs, videos or hi-fis at the touch. the touch. Use e-mail while your laptop is still in the briefcase! When your laptop Use e-mail while your laptop is still in the briefcase! When your laptop receives e-mail, you'll get an alert on your mobile phone. You can also receives e-mail, you'll get an alert on your mobile phone. You can also browse all incoming e-mails and read those you select in the mobile browse all incoming e-mails and read those you select in the mobile phone's display.phone's display.A traveling businessperson could ask his laptop computer to locate a A traveling businessperson could ask his laptop computer to locate a suitable printer as soon as he enters a hotel lobby, and send a printout suitable printer as soon as he enters a hotel lobby, and send a printout to that printer when it has been found.to that printer when it has been found.

Page 30: Wireless Network Technology

The Reality CheckThe Reality Check

In truth, Bluetooth is merely complementary to the other In truth, Bluetooth is merely complementary to the other technologies that permeate our lives. A universal technologies that permeate our lives. A universal communicator, in itself it is of little benefit, but combined communicator, in itself it is of little benefit, but combined with our mobile phones, PDAs and other devices, it with our mobile phones, PDAs and other devices, it becomes a potent technology. becomes a potent technology.

Page 31: Wireless Network Technology

The Killer App for Bluetooth The Killer App for Bluetooth

The eradication of wire clutter The eradication of wire clutter

Page 32: Wireless Network Technology

SECURITY ISSUESSECURITY ISSUES

Bluetooth’s abilities, for the moment at least, will be Bluetooth’s abilities, for the moment at least, will be limited to domestic use. As unresolved security issues limited to domestic use. As unresolved security issues continue to loom, it is only a brave or stupid end-user continue to loom, it is only a brave or stupid end-user that would adopt Bluetooth on anything but a trivial that would adopt Bluetooth on anything but a trivial scale. scale.

Page 33: Wireless Network Technology

Domestic arena offers Bluetooth a Domestic arena offers Bluetooth a bright futurebright future

People have a natural and healthy dislike for cables People have a natural and healthy dislike for cables littering their floors, and a technology that eliminates littering their floors, and a technology that eliminates such an eyesore and tedium for not only computers but such an eyesore and tedium for not only computers but other electronic equipment like stereo’s, TV sets, home other electronic equipment like stereo’s, TV sets, home kitchen and others. kitchen and others.

Page 34: Wireless Network Technology

Data Synchronization Data Synchronization

The bane of those who work on the same projects and The bane of those who work on the same projects and files on different devices should be made almost files on different devices should be made almost ridiculously easy by Bluetooth. Merely having the ridiculously easy by Bluetooth. Merely having the different devices - PC, laptop, PDA, whatever - within different devices - PC, laptop, PDA, whatever - within about 10 meters of each other should suffice as they all about 10 meters of each other should suffice as they all automatically update their copy to the most recent one. automatically update their copy to the most recent one.

Page 35: Wireless Network Technology

The Radiation Issues The Radiation Issues

It is a matter of concern to some that the carrier waves It is a matter of concern to some that the carrier waves used by Bluetooth inhabit the same band as that of used by Bluetooth inhabit the same band as that of microwave ovens. microwave ovens. Fortunately, the transmitting power is far too weak to Fortunately, the transmitting power is far too weak to result in perceptible effects in humans. Moreover, the result in perceptible effects in humans. Moreover, the radiation is not concentrated in a single beam; rather, it radiation is not concentrated in a single beam; rather, it is randomly dispersed in all directions. is randomly dispersed in all directions.

Page 36: Wireless Network Technology

Security Issues and BluetoothSecurity Issues and Bluetooth

The three principal security features employed by The three principal security features employed by Bluetooth are: Bluetooth are:

Frequency hopping, thus making eavesdropping almost Frequency hopping, thus making eavesdropping almost impossible. impossible.

Authentication, allowing a user to control connectivity to Authentication, allowing a user to control connectivity to specified devices only. specified devices only.

Encryption, utilizing a 0-bit, 40-bit or 64-bit key. Encryption, utilizing a 0-bit, 40-bit or 64-bit key.

Despite considerable investment in this area, significant Despite considerable investment in this area, significant security holes still exist in the 1.1 implementation of security holes still exist in the 1.1 implementation of Bluetooth.Bluetooth.

Page 37: Wireless Network Technology

The Real Security ThreatThe Real Security Threat

A more real concern lies in the method needed to A more real concern lies in the method needed to establish piconets. The necessity of PIN code entry in establish piconets. The necessity of PIN code entry in the initialization process of two Bluetooth devices is the initialization process of two Bluetooth devices is sloppy at best. The problem is augmented if each device sloppy at best. The problem is augmented if each device in a scatternet or larger-sized piconet has to be in a scatternet or larger-sized piconet has to be independently initialized. It also poses significant independently initialized. It also poses significant problems for a network administrator - it is unlikely that a problems for a network administrator - it is unlikely that a unique PIN would be assigned to each device, but not unique PIN would be assigned to each device, but not doing so would seriously compromise network integrity. doing so would seriously compromise network integrity. It is worth noting that the SIG maintain that hackers It is worth noting that the SIG maintain that hackers would have to take "extreme measures" to perform this would have to take "extreme measures" to perform this kind of hacking. kind of hacking.

Page 38: Wireless Network Technology

Security Bottom LineSecurity Bottom Line

Bluetooth in its current form is unsuitable for the transfer Bluetooth in its current form is unsuitable for the transfer of sensitive data. The Bluetooth SIG is actively seeking of sensitive data. The Bluetooth SIG is actively seeking to implement more sophisticated security protocols. to implement more sophisticated security protocols.

Page 39: Wireless Network Technology

Tech SpecsTech Specs

Frequency Range Frequency Range

Physical Layer Physical Layer

Noise Immunity Noise Immunity

Error Control Error Control

Data Transmission Data Transmission

Power Power

Page 40: Wireless Network Technology

Frequency Range Frequency Range

Bluetooth devices utilize the 2.4Ghz Industrial, Scientific, Bluetooth devices utilize the 2.4Ghz Industrial, Scientific, and Medical (ISM) frequency range. Throughout most of and Medical (ISM) frequency range. Throughout most of the world this band is free and unregulated. the world this band is free and unregulated.

Encouraged by the Bluetooth SIG, governments world-Encouraged by the Bluetooth SIG, governments world-wide are now beginning to regulate the 2.4Ghz band, wide are now beginning to regulate the 2.4Ghz band, thus ensuring that it will remain available for unhindered thus ensuring that it will remain available for unhindered use by Bluetooth appliances. use by Bluetooth appliances.

Page 41: Wireless Network Technology

Physical Layer Physical Layer

The Bluetooth hardware is comprised of a single 9*9mm The Bluetooth hardware is comprised of a single 9*9mm chip. Inserted into any device it can communicate with chip. Inserted into any device it can communicate with any other Bluetooth device within a 10m radius, or up to any other Bluetooth device within a 10m radius, or up to 100m if an amplifier is used. The maximum data rate 100m if an amplifier is used. The maximum data rate achievable by 1st generation technology is 1Mbps. achievable by 1st generation technology is 1Mbps. Bluetooth appliances use Gaussian Frequency Shift Bluetooth appliances use Gaussian Frequency Shift Keying (GSSK) for radio frequency modulation. Keying (GSSK) for radio frequency modulation. Judicious use of these modulation techniques should Judicious use of these modulation techniques should allow future generations to achieve a transfer rate of allow future generations to achieve a transfer rate of between 2 and 12Mbps.between 2 and 12Mbps.

Page 42: Wireless Network Technology

Noise Immunity Noise Immunity

Frequency Hop (FH) spread spectrum is a method which Frequency Hop (FH) spread spectrum is a method which effectively divides the frequency band into a number of effectively divides the frequency band into a number of hop channels. A technology that quickly hops channels hop channels. A technology that quickly hops channels minimizes potential interference. Bluetooth takes minimizes potential interference. Bluetooth takes advantage of this technique by incorporating a fast advantage of this technique by incorporating a fast frequency hopping technology with a nominal hopping frequency hopping technology with a nominal hopping rate of 1600 hops/second among 79 channels. After rate of 1600 hops/second among 79 channels. After transmitting a packet each device hops to another transmitting a packet each device hops to another frequency as determined by the master. The hopping frequency as determined by the master. The hopping sequence is unique to each piconet and determined by sequence is unique to each piconet and determined by the Bluetooth Device Address (BDA) of the piconet the Bluetooth Device Address (BDA) of the piconet master.master.

Page 43: Wireless Network Technology

Frequency Hop (FH) Spread Spectrum

Page 44: Wireless Network Technology

Error Control Error Control

Another method by which Bluetooth increases its noise Another method by which Bluetooth increases its noise immunity is that of Forward Error Correction (FEC). FEC immunity is that of Forward Error Correction (FEC). FEC is a method that enables a receiver to not only detect but is a method that enables a receiver to not only detect but also correct errors in a transmission. This technique is also correct errors in a transmission. This technique is especially valuable in limiting the impact of noise on long especially valuable in limiting the impact of noise on long distance links. Three error correction techniques have distance links. Three error correction techniques have been so far defined in the Bluetooth specification:been so far defined in the Bluetooth specification:1/3 Rate FEC 1/3 Rate FEC 2/3 Rate FEC 2/3 Rate FEC Automatic Repeat Request (ARQ)Automatic Repeat Request (ARQ)

Page 45: Wireless Network Technology

Data Transmission Data Transmission

Bluetooth allows for data to be transmitted either Bluetooth allows for data to be transmitted either synchronously or asynchronously. The Synchronous synchronously or asynchronously. The Synchronous Connection Oriented (SCO) method is used primarily for Connection Oriented (SCO) method is used primarily for voice while the Asynchronous Connectionless (ACL) voice while the Asynchronous Connectionless (ACL) method is used for data. Since SCO packets need method is used for data. Since SCO packets need smooth transmission, they are transmitted via reserved smooth transmission, they are transmitted via reserved intervals, i.e. packets sent in groups with no interrupts. intervals, i.e. packets sent in groups with no interrupts.

Page 46: Wireless Network Technology

PowerPower

Bluetooth is truly admirable for its sparing use of power. Bluetooth is truly admirable for its sparing use of power. The technology limits the transmitter's power output to The technology limits the transmitter's power output to exactly that needed - the signal strength is dynamically exactly that needed - the signal strength is dynamically modified to suit the required range. Power saving modes modified to suit the required range. Power saving modes examined in the Bluetooth protocol provide further examined in the Bluetooth protocol provide further benefits. benefits.

Page 47: Wireless Network Technology

Bluetooth Connection ProtocolBluetooth Connection Protocol

The Bluetooth connection protocol describes the set of The Bluetooth connection protocol describes the set of rules by which all Bluetooth devices must abide in order rules by which all Bluetooth devices must abide in order to establish a link a communicate with one another. to establish a link a communicate with one another.

The essence of Bluetooth is based upon dynamically The essence of Bluetooth is based upon dynamically configured units. Hopping very quickly between configured units. Hopping very quickly between frequencies, the protocol specifically caters for many frequencies, the protocol specifically caters for many different modes to allow for minimal power consumption. different modes to allow for minimal power consumption.

Page 48: Wireless Network Technology

Standby Standby

Devices not connected in a piconet are in standby mode. Devices not connected in a piconet are in standby mode. In this mode, they listen for messages every 1.28 In this mode, they listen for messages every 1.28 seconds - over 32 hop frequencies (fewer in Japan, seconds - over 32 hop frequencies (fewer in Japan, Spain, and France due to local bandwidth regulation).Spain, and France due to local bandwidth regulation).

Page 49: Wireless Network Technology

Page/Inquiry Page/Inquiry

If a device wishes to make a connection with another If a device wishes to make a connection with another device, it sends out a page message if the address is device, it sends out a page message if the address is known, or an inquiry followed by a page message if it is known, or an inquiry followed by a page message if it is unknown. The master unit sends out 16 identical page unknown. The master unit sends out 16 identical page messages on 16 hop frequencies to the slave unit. If messages on 16 hop frequencies to the slave unit. If there is no response, the master retransmits on the other there is no response, the master retransmits on the other 16 hop frequencies. The inquiry method requires an 16 hop frequencies. The inquiry method requires an extra response from the slave unit, since the MAC extra response from the slave unit, since the MAC address is unknown to the master unit.address is unknown to the master unit.

Page 50: Wireless Network Technology

Active Active Simply, data transmission occurs. Simply, data transmission occurs.

Page 51: Wireless Network Technology

Hold Hold

When either the master or slave wishes, a hold mode When either the master or slave wishes, a hold mode can be established, during which no data is transmitted. can be established, during which no data is transmitted. The purpose of this is to conserve power. Otherwise, The purpose of this is to conserve power. Otherwise, there is a constant data exchange. A typical reason for there is a constant data exchange. A typical reason for going into hold mode is the connection of several going into hold mode is the connection of several piconets .piconets .

Page 52: Wireless Network Technology

Sniff Sniff

The sniff mode, applicable only to slave units, is for The sniff mode, applicable only to slave units, is for power conservation, though not at as reduced a level as power conservation, though not at as reduced a level as hold. During this mode, the slave does not take an active hold. During this mode, the slave does not take an active role in the piconet, but listens at a reduced level. This is role in the piconet, but listens at a reduced level. This is usually a programmable setting.usually a programmable setting.

Page 53: Wireless Network Technology

Park Park

Park mode is a more reduced level of activity than the Park mode is a more reduced level of activity than the hold mode. During it, the slave is synchronized to the hold mode. During it, the slave is synchronized to the piconet, thus not requiring full reactivation, but is not part piconet, thus not requiring full reactivation, but is not part of the traffic. In this state, they relinquish their MAC of the traffic. In this state, they relinquish their MAC addresses , but only listen enough to keep their addresses , but only listen enough to keep their synchronization with the master and check for broadcast synchronization with the master and check for broadcast messages.messages.

Page 54: Wireless Network Technology

FUTURE OF BLUETOOTHFUTURE OF BLUETOOTH

Bluetooth was never designed to be a system competing Bluetooth was never designed to be a system competing with LAN. It rather complements LAN, but taken as it is, with LAN. It rather complements LAN, but taken as it is, Bluetooth is a competent technology offering Bluetooth is a competent technology offering unparalleled convenience. Ending, it will provide means unparalleled convenience. Ending, it will provide means to get rid of connecting wire, and this is a truly a killer to get rid of connecting wire, and this is a truly a killer app for it.app for it.

Page 55: Wireless Network Technology

Future of WirelessFuture of Wireless

Phones/Personal Digital AssistantsPhones/Personal Digital Assistants

LaptopsLaptops

““Digital Mapping”Digital Mapping”

WIFI ExpansionWIFI Expansion

Downside of Expansion/IntegrationDownside of Expansion/Integration

““Objective Force Warrior”Objective Force Warrior”

Page 56: Wireless Network Technology

Phones/PDAPhones/PDA

Telephones becoming next computer?Telephones becoming next computer? Cellular phones and PDAs available today with Cellular phones and PDAs available today with

processing power equivalent to mid-1990 PCs while processing power equivalent to mid-1990 PCs while consuming 100 times less electricityconsuming 100 times less electricity

Phones/PDAs available today with video capability, Phones/PDAs available today with video capability, GPS antennas, tiny keyboards, access to local “WIFI GPS antennas, tiny keyboards, access to local “WIFI hotspots”, and slots for additional memory.hotspots”, and slots for additional memory.

Page 57: Wireless Network Technology

Phones/PDAPhones/PDA

Phone/PDA trends:Phone/PDA trends: ““Smart-phones currently constitute 5% of overall Smart-phones currently constitute 5% of overall

mobile phone sales, but that figure has been doubling mobile phone sales, but that figure has been doubling from last year.” (Gartner)from last year.” (Gartner)

Market expectations include a gigabyte or more of Market expectations include a gigabyte or more of flash memory in next two years.flash memory in next two years.

Canesta, firm in San Jose, Ca., is testing a laser plug-Canesta, firm in San Jose, Ca., is testing a laser plug-in for phones that projects a keyboard onto flat in for phones that projects a keyboard onto flat surfaces, avail end 2004.surfaces, avail end 2004.

Page 58: Wireless Network Technology

LaptopsLaptops

Expansion of WIFI networks Expansion of WIFI networks Thousands of WIFI hotspots have emerged worldwide Thousands of WIFI hotspots have emerged worldwide

in the last four years, and trend is expected to in the last four years, and trend is expected to continue.continue.

Market expects half of all laptops shipped by end of Market expects half of all laptops shipped by end of 2004 to be WIFI-equipped from the factory.2004 to be WIFI-equipped from the factory.

Page 59: Wireless Network Technology

““Digital Mapping”Digital Mapping”

Integration of GPS data with Web information, i.e. Integration of GPS data with Web information, i.e. “modeling the planet as a living system.” (Environmental “modeling the planet as a living system.” (Environmental Systems Research Institute)Systems Research Institute)MetaCarta markets a product that “geo-parses” a web MetaCarta markets a product that “geo-parses” a web search for any mention of a specific place. The desired search for any mention of a specific place. The desired effect is search results that have more relevance to a effect is search results that have more relevance to a physical location.physical location.

Page 60: Wireless Network Technology

WIFI ExpansionWIFI Expansion

WIFI started on an unlicensed portion of the spectrum.WIFI started on an unlicensed portion of the spectrum.Emergence of powerful adaptations of WIFI, such as Emergence of powerful adaptations of WIFI, such as meshed networks or “WIMax”. meshed networks or “WIMax”. MIT Media Lab Project, install WIFI base stations on MIT Media Lab Project, install WIFI base stations on inter-village buses in India: users can email or download inter-village buses in India: users can email or download files while in transmission range of bus stops.files while in transmission range of bus stops.

Page 61: Wireless Network Technology

Key DrawbackKey Drawback

Key drawback is privacy-related issues.Key drawback is privacy-related issues.

Wireless connection coupled with GPS information and Wireless connection coupled with GPS information and tags results in an easy method of tracking an individual’s tags results in an easy method of tracking an individual’s movements. The effect is like a phone record, except movements. The effect is like a phone record, except the connection log includes the GPS specific spot where the connection log includes the GPS specific spot where that individual logged onto the Web.that individual logged onto the Web.

Page 62: Wireless Network Technology

““Objective Force Warrior”Objective Force Warrior”

DOD-specific application: scheduled for fielding in 2008.DOD-specific application: scheduled for fielding in 2008.

““The Army’s vision for the Objective Force Warrior is a The Army’s vision for the Objective Force Warrior is a wirelessly networked soldier within a small combat team wirelessly networked soldier within a small combat team and completely integrated into fire support and C4ISR and completely integrated into fire support and C4ISR components.”components.”

This concept includes UAVs, networked sensor fields, This concept includes UAVs, networked sensor fields, and robotic cargo transporters, all integrated wirelessly. and robotic cargo transporters, all integrated wirelessly.

Page 63: Wireless Network Technology

ReferencesReferences

1.1. Institue of Electrical and Electronics Engineers Institue of Electrical and Electronics Engineers (http://www.ieee.org/)(http://www.ieee.org/)

2.2. http://www.iss.net/wireless/WLAN_FAQ.phphttp://www.iss.net/wireless/WLAN_FAQ.php

3.3. http://www.practicallynetworked.com/support/http://www.practicallynetworked.com/support/wireless_secure.htmwireless_secure.htm

4.4. http://www.computerworld.com/mobiletopics/mobile/http://www.computerworld.com/mobiletopics/mobile/technology/story/0%2C10801%2C72164%2C00.htmltechnology/story/0%2C10801%2C72164%2C00.html

5.5. http://www.practicallynetworked.com/support/http://www.practicallynetworked.com/support/wireless_secure.htmwireless_secure.htm

6.6. COMPUTERS Information Technology in PerspectiveCOMPUTERS Information Technology in Perspective