* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Slide 1
Survey
Document related concepts
Computer security wikipedia , lookup
Extensible Authentication Protocol wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Computer network wikipedia , lookup
Wireless USB wikipedia , lookup
IEEE 802.11 wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Transcript
Wireless Technologies Group Presentation by: Kevin Shaffer Jill Young Dana Wiggins David White Robert Hambly Ali Abedin Douglas Newton Kamal Al-Nasser Kofi Frimpong Standards Bluetooth Wireless Personal Area Networks Business Sector Applications Government Applications Network Challenges Security Costs Future of Wireless Wireless Standards Kevin Shaffer Standardization Increases competition and lowers prices Provides interoperability Improves selection Formal Standards Process is Slow Collaboration may appear to violate anti-trust laws Collusion may occur, but not be caught Influential Groups IEEE http://www.ieee.org/ ANSI http://www.itu.int/ http://www.ansi.org/ ISO UL http://www.ul.com/ FCC http://www.fcc.gov/ WiFi Alliance http://www.wi-fi.org/ http://www.iso.ch/ ITU WLANA http://www.wlana.org/ IETF http://www.ietf.org/ IEEE Wireless Standards 802 Series of Standards for Networking 802.11 WiFi a, b, e, g, i 802.15 WPAN 802.16 BBWA Local Area Networking 802.11b 802.11g 11 Mbps top speed, subject to distance and interference (raw data rate) CSMA/CA 2.4 GHz spectrum, public, microwaves, cordless phones 54 Mbps, compatible with ‘b’ 802.11a 54 Mbps, 5 GHz, also public spectrum Initiatives in Standardization Implementing security for WLAN 802.1X EAP No. of Channels depend on allocations Japan 14 channels Europe 13 US 11 Personal Area Networks PANs and WPANs Jill Young Background The term personal area network (PAN) is meant to describe interconnecting personal devices: notebooks, cell phones, personal digital assistants (PDAs) Untethered version => WPAN, can be viewed as a “personal communications bubble around a person. Within this bubble, which moves as a person moves around, personal devices can connect to one another.” 1 WPAN => mobile (versus, WLAN => portable) WPAN connection lasts only as long as it is needed; has a finite lifespan. Connections created by a mobile device are ad hoc and temporary; previous or future connections may or may not resemble devices to which it was or will be connected. Example: notebook computer may connect to a PDA for a moment; then to a digital camera; then to a cell phone; later it may connect to several of these devices simultaneously WPAN Architecture IEEE Std. 802.15.1-2002 Based on the Bluetooth™ specifications (Bluetooth is an industry specification for short-range radio frequency (RF)-based connectivity for portable personal devices) Defines the lower transport layers [(Logical Link Control and Adaptation Protocol (L2CAP), Link Manager Protocol (LMP), baseband, and radio] of the Bluetooth™ wireless technology. The IEEE 802.15.1 Task Group has reviewed and provided a standard adaptation of the Bluetooth specifications (version 1.1) medium access control (MAC) sublayer of the data link layer (DLL) and physical layer (PHY) (radio) Bluetooth WPAN Technology uses a short-range radio link optimized for small, lightweight devices Supports synchronous for telephony-grade voice communication and asynchronous communication channels for data communication Operates in the 2.4 GHz ISM band, 1600 hops/s using 79 slotted channel packets of 625 ms duration. Each packet is transmitted on a different frequency in the hopping sequence. A packet nominally covers a single slot, but can be extended to three or four. (Figure follows for a general format for a single slot payload). Full duplex is enabled with a fast time division duplex (TDD) scheme Topology - Piconet Can link to 8 devices; Can link to other piconets to form a larger network. Master/Slave relationship - One device designated as the piconet master and the other devices are slaves. The master controls the piconet, scheduling frequencies and access control used by the master and the slaves. All messages are sent from a slave to the master and from the master to a slave. The slaves do not communicate directly with each other. All devices share the same frequency ranges so the network behaves in the same manner as a shared bus topology. The master controls which channel will be used, so the master and the slave with which it is communicating are synchronized so that they both know which frequencies will be used at which point. WPAN Dana Wiggins WPAN A Wireless Personal Area Network is a system that allows independent data devices within mutual communication. (Braley, R., Gifford, I., & Heile, R., 2000) WPAN Personal Network Provides Connection Infrastructure Handles Interactions Between digital Devices (Heile, 2000) WPAN Worldwide 2.4 GHz ISM Band 10 Meters in Diameter Range Range can be extended to 100 meters (Braley, R., Gifford, I., & Heile, R., 2000) WPAN Disadvantages Less Available Power Association Problem Reduced Data Rates (Fiskin, K., Partridge, K., & Chatterjee, S., 2002) WPAN The Institute of Electrical and Electronics Engineers (IEEE) has increased the speed of Wireless Personal Area Networks from 1MBps to 55MBps. (IEEE Increases Speeds for WPAN Networks, 2003) WPAN Speed Increase From 1MBps to 55MBps "We created the standard in response to the strong demand from end users and manufacturers who want to interconnect portable devices without undue expense yet transfer multimedia, still digital images and audio content in home networks,'' said Robert F. Heile, IEEE 802.15 working group chair. (IEEE Increases Speeds for WPAN Networks, 2003) Corporate Wireless Applications and Initiatives David T. White Overview of Industry Utilization and Implementations Corporate Deployments – Strong demand, lagging use University Campus - Represents the highest daily usage Public Retail Usage – Continued growth, next largest Home Wireless - Currently the smallest user base Hewlett-Packard Co. Implementations: Company-Wide Deployment Internally Wireless Access Point Deployment in Common Areas Performance: 11Mbps for a Range of 150 Feet Device Type Usage: Notebooks PDA’s (IPAQ) Blackberry Hewlett-Packard Co. cont. Implementation Benefits and Detail: Limited Hardwiring Needed Immediate Information When Mobile Reduced Response Times for Support Teams Single Signon (Same as Primary Account) Seamless Roaming (Inside Buildings) On-Campus Access Limitations Starbucks Infrastructure from Compaq / HP T-Mobile ISP Access Accounts Wireless access in over 2000 locations VPN company access if available Limitations on IM Security Consumer Wireless Access Points 3044 Access Points Account Cost $29.00 Locations: Borders Books (1000 Locations) Starbucks (2300 Locations) American Airlines Clubs (500 Locations) Access Point Distribution Government Applications Robert Hambly The Basics Mobile, Wireless, Mobile-Wireless Mobile – capable of moving or being moved. Wireless – without wires. Almost all mobile devices are wireless, but wireless devices are not always mobile. 30% of Federal Government Employees are Mobile 2004 – 60% of Federal Government Employees carry or own three (3) mobile devices. 2004 – USASOC (5/7) E-Government 2004 – 6 Billion Wireless Devices (PDA, computers, phones, GPS, etc.) Third World Nations – Bypassing Wired Connections University of Maryland Center for e-Service and Rockbridge Associates (Peoples’ Choice – Government Web Sites) E-Government Strategy Report (OMB-2002) – “primary focus of the ‘expanding E-Government’ initiative is on citizen service – to make it easy for citizens to obtain services…” E-Government Technology Requirements Ubiquitous Interactivity Mobile and Wireless Handy and Available Personal (tracked to an individual vs. department) Location Aware (tracking when on) Technology Implications Accessibility – access to Government services and agencies at any time and from any place. Individuals can be targeted specifically and reached by a Government agency instantaneously. Global War On Terrorism (GWOT). Invasion of Privacy. Strategies for Successful Wireless Adoption Dependent on Four (4) Factors: Extent of Mobility in Target Segment Information Access Needs Security/Privacy Requirements Technology Readiness of the Target Segment Harvest the “Low Hanging Fruit” “Low Hanging Fruit” Sacramento Police Department: 800MHz radio network allowing data networking and helicopter video downlink. New Jersey Parking Enforcement: Hand-held devices print parking tickets and send information directly to DMV database. Edmonton, Alberta: Building Inspectors use mobile devices to enter inspection reports directly into database. Centers for Disease Control (CDC): GPS-equipped devices collect data on bio-terrorism related incidents. Network Challenges Ali Abedin Current Wireless LAN Challenges Security Challenges Roaming User Challenges Configuration Challenges Current Wireless LAN Challenges Security Challenges Infrastructure Vulnerability to potential data thief. Service Set Identifier (SSID) is a weak security. Wired Equivalent Privacy (WEP) algorithm lacks a key management protocol. Current Wireless LAN Challenges Roaming User Challenges Maintaining Network Connectivity. Network Access Permissions across subnets. Current Wireless LAN Challenges Configuration Challenges Multiple different network configurations References White Paper by Tom Fount, Microsoft Corporation, Published: July 2001, Retrieved from World Wide Web: 04/15/2003. http://www.microsoft.com/windowsxp/pro/techinfo/planning/wi relesslan/default.asp The Wireless LAN Alliance: www.alan.com The Wireless LAN Association (WLANA): www.wlana.org Wireless Networking Security Douglas Newton Wireless Networking Security Service Set Identifier (SSID): The SSID, also called the network name, ensures that only wireless network devices configured with the same SSID are permitted access to the network. The SSID name is included in the header of every data packet broadcast in the wireless network’s coverage area. Wireless Networking Security MAC filtering: MAC address filtering is a mechanism that limits user access to the wireless network. Access to the wireless network is limited based on the physical, hard-wired address of the units’ wireless network adapter. A table stored in the wireless access point lists the MAC addresses that are permitted to participate in the wireless network. Wireless Networking Security Wireless Equivalency Privacy (WEP) encryption: WEP encryption must be enabled to ensure that data is secured while in transit over the airwaves. It uses standard 40-bit encryption to scramble data packets. WEP provides a level of authentication based on the wireless node’s MAC address. It works on the Data Link layer and the Physical layer of the OSI model. Wireless Networking Security Wi-Fi Protected Access (WPA): WPA serves as a sort of security protocol upgrade to WEP-enabled devices. It offers security enhancements such as an encryption key integrity-checking feature and user authentication through the industry-standard Extensible Authentication Protocol (EAP). Wireless Cost and Business Justification Kamal Al-Nasser Wireless Cost and Business Justification Overall driver is to lower TCO. Initial construction of network environments. Ongoing maintenance. Increase end-user and IT productivity. Wireless Cost Case Study Interviews for this study were conducted with wireless LAN users in the following industries: Education: In-building K-12, University/College connectivity, Healthcare (Point of Care) Manufacturing:Production, Distribution, Maintenance, Shipping, Receiving. Retail: Point of Sale Financial/Office –Automation: Stock Exchange, Banking, Consulting http://wlana.org/learn/roi.htm Wireless Cost Case Study Real-Time Access to Information. One of the consistent findings of this study was: How end-users benefited from real-time information. 97% of respondents said they either strongly agree or agree that the wireless LAN contributed to the speed in which they completed a task requiring real-time or near real-time access to information. Wireless Cost Case Study 89% of the companies experienced a successful implementation. 92% of respondents interviewed believe there is a definite economic and business benefit after installation. 92% of respondents reported that they will continue to deploy wireless technology in their network through 2000 because of the benefits experienced by end users and/or IT staff. Payback was less than one year, across all industries surveyed. The survey combines both telephone and written responses from 34 organizations Wireless Cost Case Study The percentages for wireless LAN expenses, by category, were as follows: WLAN Hardware/End User Devices: 50% Monthly expenses: 1%% Management expenses: 16% Application development expenses: 16% Outsourcing: 16% Downtime: 1% Wireless Cost Case Study With large investments in wireless LAN technology at approximately $300,000 to $4.2 million dollars per year Organizations implementing an average of 300 client cards reaped annual savings of up to $4.9 million, which translated into per user savings of $15,989. Across all industries, the wireless LAN paid for itself within 12 months time. Future of Wireless Kofi Frimpong Wi-Fi: Wireless Technology That Matters Future Outlook Wi-Fi technology, also called 802.11, provides high-speed wireless Internet access in many locations around the world called Hotspots, including airports, cafes, corporate offices, universities, factories and homes. Providers: Boingo Wireless, HereUAre Communications, Joltage, FatPort, and Surf and Sip. T-Mobile and AT&T Wireless have joined and Sprint PCS and Verizon Wireless say it is an important part of their 3G wireless strategy. Eg. Starbucks, Newark Liberty airport; McDonalds in Idaho ( http://www.iwifi-here.com/WiFiLocations.htm) Recent test – Airport WiFi tested at 205MPH (330kph)in Tokyo by NEC (http://www.macworld.co.uk/news/main_news.cfm?NewsID=7114) Wi-Fi Growth Predictions - Standards 802.11g – variant of 802.11a but uses same 2.4 GHz frequency as current WiFi 802.11i - addresses security weaknesses inherent to the technology 802.11h – aimed at meeting regional needs. Will add some capabilities to 802.11a that allows it to meet certain frequency-regulation requirements in Europe. 802.11j – Also aimed at meeting regional needs. Will adapt 802.11a for Japan. Wi-Fi: Wireless Technology That Matters Wi-Fi Hardware Solutions future developments will be shaped by the following issues: (1) the continued growth and evolution of dual-mode 2.4/5GHz capable equipment, (2) Intel’s ability to push outs its Banias mobile platform, which includes a WiFi mini-PCI solution, and (3)the shift toward 802.11g as the preferred 2.4 GHz WLAN technology. IOGear – the connectivity and peripheral specialist, current and future products. http://www.iogear.com/ Wireless-G USB 2.0 Flex Adapter Rotates 300 degrees in any direction and pivots 180 degrees for optimum reception. Plugs into the USB port to leave your CardBus slots free for other devices. Wireless-G Notebook Network Card Low profile antenna leaves room for other Card Bus connections to operate simultaneously. Software Access Point included for systems running Windows XP. Wireless-G Broadband Gateway/Print Server An all-in-one wireless access point, router and print server for both small and home office users. Surf the Internet, share files, chat with your friends, and print... Wirelessly! Wireless Metropolitan-Area Networking(WiMAN) WirelessMAN IEEE 802.16(a) enable computers to communicate wirelessly over kilometers WiMAX Forum – Industry group of about 25 companies including Intel and Nokia formed to promote the new technology. Compatible product should be available by end of 2004. VOIP on WLANs VOIP involves implementing digital voice telephony over an Internet Protocol (IP) connection, typically a LAN, or the interconnection of LANs carrying voice traffic via WANs. Point-to-point and all-IP through a network connection, or gateways can be used to convert between VOIP signals and traditional telephone conversations. “Point Coordination Function” mechanism of 802.11 standard is being improved by IEEE 802.11e Working Group to further enhance the performance of time-bounded packets within a wireless LAN. Analyst predict VOIP on WLANS will be major driver of WLANS installations over next couple of years. VOIP product already exists from Cisco (Cisco Wireless IP Phone 7920 – uses IEEE 802.11b - http://www.cisco.com/en/US/products/hw/phones/ps379/ps5056/index.html ) Spectralink (Netlink e340 and i640 Wireless Telephones - http://www.spectralink.com/) Telesym(SymPhone System– Delivers high-quality voice communication on Laptops, PCs and Pocket PC mobile devices with 802.11 wireless IP networks). Available http://www.telesym.com/. Wireless Network Initiatives Wireless for the Disabled (Technology Review: MIT ‘s mag., Dec. ’03/Jan. ‘04) Researchers at the Rehabilitation Engineering Research Center on Mobile Wireless Technologies for Persons with Disabilities at the Georgia Institute of Technology are adapting wireless technology to aid millions of disabled people worldwide. Target is on wireless aids for mobility, vision, and hearing impairments. Pharmacy on a chip Captioning device – movie theatres: PDA’s, mini monitor on eye glasses, Remote Gesture Controls – Will allow the manipulation of switches and buttons with a wave of a hand. Audio Navigator – Will help the vision impaired using a GPS sensor mounted with preprogrammed routes. an under-skin pharmacy on a microchip Chip has tiny reservoirs that can hold different types of medicine as well as varying doses of the same medicine Can be programmed to release drugs at specific time intervals, and it could also change the way we think about medical recording. Upcoming Events Wi-Fi Planet Conference & Expo, December 2 - 5, 2003 at the McEnery Convention Center in San Jose, Calif., where Margaret LaBrecque, marketing manager in Intel's Broadband Wireless division and the president of the WiMax Forum, will discuss how WiMax will work in conjunction with 802.11 in a panel called "Fatter Wireless Pipes: How do they Fit into the WiFi Landscape. References Beyond patches and pills: the remarkable future of drug delivery. Available: http://www.eurekalert.org/pub_releases/2002-11/acs-bpa112502.php. Last modified November 25, 2002. Genesis Of An Anthill: Wireless Technology And Self-Organizing Systems http://www.acm.org/ubiquity/views/e_andersen_8.html IEEE Advances Wirelesss MAN Standard. Available: http://www.wifiplanet.com/news/article.php/1577591. Last modified January 31, 2003 McDonald’s WiFi Locations in Idaho. Available http://www.iwifi.us/hotspots/mcdonalds-wifi-locatiions-in-Idaho.htm VOIP on WLANs. http://wireless.itworld.com/4285/031030voip1/page_1.html. Last modified October 31, 2003. WiMAX: The Critical Wireless Standard. Available: http://www.arcchart.com/pr/blueprint/pdf/BluePrint_WiFi_REPORT_I.pdf. Last modified October 2003 Wireless for the Disabled. Available: Technology Review (MIT). December 2003/January 2004. Wireless Technologies Thank You