Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications
|
|
|
- Dustin Moody
- 9 years ago
- Views:
Transcription
1 Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Patrick McCurdy Product Marketing Manager Phoenix Contact Inc. Ira Sharp Product Specialist Phoenix Contact Inc. KEYWORDS Wi-Fi, Wireless Local Area Network, WLAN, Wireless Ethernet, Industrial Wireless, Industrial Ethernet, Wireless Security, Wireless Encryption, IEEE a/b/g, IEEE i ABSTRACT As Ethernet and Internet Protocol (IP) connectivity quickly become the serial port of the future it s clear that wireless technology trends will closely follow. Additionally, recently available spread spectrum technologies are enabling new applications that go beyond simple wire and conduit replacement to more data intensive and bandwidth demanding things such as video surveillance, inplant VoIP, mobile computing, and active RFID asset tracking to name a few. This paper will focus on the industrial use of public standard IEEE technology while providing a broad comparison of different spread spectrum wireless technologies currently deployed in industrial automation applications. Sometimes called Wi-Fi, WLAN, and Wireless Ethernet, devices based on IEEE standards are now part of the IT mainstream with many office and even home installations existing today. Advances in enhanced security features, data transmission reliability and environmental packaging have just recently made, what some thought of as a strictly commercial solution, appropriate for demanding industrial applications. Further more, higher powered industrial solutions and new antenna technology mean high data rates at impressive distances can now be achieved. Several application examples will be shared.
2 Perhaps the biggest concern of industrial automation users regarding public standard technology such as IEEE is if security of their network and automation system will be somehow compromised. Considerable attention will be spent on discussing solutions to these security concerns. Introduction As Ethernet and Internet Protocol (IP) connectivity quickly become the serial port of the future its clear that wireless technology trends will closely follow thereby providing ever greater network and data access. Wireless Ethernet capabilities via technology based on public standard IEEE has gained mass commercial success. A quick look at available wireless networks from your laptop in virtually any public place or even your residential neighborhood is sure to find few. However, because a technology is approaching critical mass in the commercial world is it ready for use in industrial applications? While this question has been asked and answered regarding wired Ethernet (yes) it still remains a viable question regarding wireless applications. In addition to providing a broad comparison of different spread spectrum wireless technologies currently deployed in industrial automation applications, this paper will explore the industrial use of public standard IEEE technology. Some basics of IEEE protocol and application will be reviewed including a detailed discussion of security concerns and solutions. Finally several successful industrial applications of IEEE technology will be discussed. Spread Spectrum Technology Wireless is a shared medium; therefore different techniques must be employed to assure that multiple signals can coexist in the same frequency range. The allocation of frequency for different uses is typically the role of government agencies. In the United States this agency is the Federal Communication Commission (FCC). Typically government agencies set aside some spectrum for public use. This public use must be shared by different users and applications; therefore for unlicensed applications there is typically a limit set for the power that can be transmitted and additionally some type of spectrum spreading technique is necessary. The allocation of frequencies requires sharing of frequencies when at all possible. The requirement for spread spectrum in unlicensed applications is a good thing in terms of robustness and reliability for industrial applications. Spreading the communication over a wider frequency range means that the signal transmission is less effected by EMI or RFI emitted from industrial equipment, from licensed users, or from unlicensed radios. Three spreading or modulation techniques commonly used in spread spectrum radios will be discussed next. These include; Frequency Hopping Spread Spectrum (FHSS), Direct Sequence Spread Spectrum (DSSS), and Orthogonal Frequency Division Multiplexing (OFDM). FHSS radios take a piece of information that needs to be transmitted and divides it up into small packets. The packets are then transmitted across the band by selecting pseudo-random frequencies within the band. The bit of information is transmitted at one frequency and done so with a lot of power, giving it the ability to overcome many sources of noise that may arise. Packets are transmitted
3 as signals on different frequencies and upon receipt the signals are checked for errors. Interference is effectively addressed by the complex transmission of data packets. Although interfering signals can knock a packet out of a FHSS signal s hop pattern, the rest of the updates generally reach the receiver, no matter how powerful the interference. Therefore it s often said that FHSS technology tolerates interference. In addition, transmitting small targets that constantly and randomly jump frequencies makes it almost impossible for someone to tap into the signal. The robustness of the data transmission makes technology based on FHSS very attractive for the high EMI / RFI world of industrial applications. DSSS radios continuously spread data across a wide portion of the frequency band and rely on processing to address interference. The information is again divided into individual packets but now grouped together with a bit sequence which is called the chipping code. This effectively takes the packets of information and divides them up into several segments, essentially making one piece of information become several pieces of information. These pieces of information are then transmitted at the same time across a series of frequencies called a channel. This is done because the series of information can be transmitted at a much lower power then the FHSS technique. With DSSS multiple packets of information are transmitted at the same time therefore faster transmission speeds are possible. If one or more bits are damaged due to interference during transmission, the data will be restored; however, this will likely decrease the transmission speed or overall performance. Providing limited protection against interference, DSSS radios can lose data if excessive noise or other equipment on the same bandwidth interferes with the signal. DSSS moves many bits per second and is typically used for IEEE b high-speed radio applications. Lastly OFDM is done by once again dividing information into packets. Next, those packets are again broken up into smaller packets and transmitted across a series of frequencies similar to DSSS but now in smaller chunks. These smaller chunks of data are transmitted simultaneously allowing for much greater speeds then that of FHSS or DSSS. See Figure 1 for a comparison of FHSS, DSSS, and OFDM modulation techniques. Channels Channels Available Bandwidth Available Bandwidth Available Bandwidth Figure #1 Comparison of Modulation Techniques FHSS Uses the whole band in small intervals DSSS Spreads radio energy over a channel OFDM Multiple transmissions simultaneously over a single channel
4 ISM Frequency Bands In the United States there are 3 frequency bands that are set aside for public use without a FCC license. These are the so called ISM (Industrial, Scientific, and Medical) bands: 902MHz 928MHz, 2.4GHz GHz, and 5.15GHz 5.850GHz. It s important to note that the 2.4Ghz band is generally accepted globally as an unlicensed band with limited transmit power. This power limitation typically equates to 100mW on IEEE products. However, in the U.S. the power allowed is greater which generally means in unlicensed applications output power ratings up to 1Watt are allowed. Industrial IEEE solutions are available in the U.S. with higher power rating then the universally accepted 100mW. In general all three bands have their place in industrial applications each has its potential strengths and weaknesses as reviewed in Figure 2.. Frequency Band Advantages Disadvantages Comments 900MHz ( MHz) * More robust, less 900MHz Interference sources * Lower attenuation, travels further through obstacles. * Low bandwidth prevents larger data transfer means slower speed. * Not available internationally. 2.4GHz ( GHz) 5.8GHz ( GHz) ( GHz) ( GHz) * Higher bandwidth allows large data transfer and faster speed. * Highest bandwidth allowing large data transfer and fast speed. * Least congested unlicensed RF band * Attenuates quickly preventing propagation through obstacles. * Large amount of 2.4GHz traffic. * Attenuates very quickly meaning low propagation through obstacles and requiring special low loss cable and high gain antennas. Figure #2 Comparison of ISM Frequency Bands * Accepted globally meaning typically lower component costs due to economies of scale. * Not available internationally. * Good alternative to 2.4GHz when high 2.4GHz traffic causes interference. Public vs Proprietary Wireless Technologies Interoperability and Wireless Standards are two connected subjects that are often discussed when speaking about Industrial Wireless applications. Interoperability refers to the ability of different devices to communicate and understand the same language between each other even when these devices are from different manufacturers. Industry recognized standards facilitate interoperability among different manufacturer s equipment. Proprietary technology refers to one particular
5 manufacturer s modulation algorithms, interface, and over the air techniques. Therefore, typically one particular manufacturer s proprietary technology equipment will only work with other equipment they manufacture. This creates a formidable security barrier as only insiders have access to the particular technology; however, interoperability does not exist. An example of a proprietary wireless technology is the Phoenix Contact s Omnex Trusted Wireless technology used in Wireless I/O and Serial Data products. Public standards are agreed upon by a governing body that exists to create or certify a specification to guarantee interoperability between manufacturer s devices. Public standards mean that the radio language is known and therefore interoperability should be guaranteed. Since the communication parameters are public information, issues related to security are of a major concern. Therefore, encryption and authentication are the only form of security mechanism for public standard technology. Examples of public standard wireless technology include Bluetooth and IEEE a/b/g. IEEE IEEE a/b/g actually describes three variants of the wireless Ethernet standard currently implemented in commercial and increasingly industrial applications. These three variants are based around the same physical layer of the OSI model and in part define what band the wireless network will use along with the modulation technique. Additional jargon used to describe devices based on IEEE standards include Wi-Fi, W-LAN, and Wireless Ethernet. A brief overview of the differences between a, b, and g are as describes as follows: a. This standard describes operation in the 5GHz band and uses OFDM thereby enabling raw transmission rates up to 54 Mbps. Some countries have other uses (air traffic control and military) defined for this band so it is therefore not globally accepted to be used in ISM applications. In some cases it can be used inside buildings with limited power. In the U.S., the 5GHz band is treated as the other 900MHz and 2.4GHz ISM bands. One advantage of IEEE a is that it operates with the same data rates (54 Mbps) as IEEE g but escapes the sometimes crowded 2.4GHz channels. Less interference in the 5GHz band means the potential for more reliable transmission b. This standard, adopted in 1999 uses the 2.4GHz band with DSSS modulation. The raw transmission rate is limited to 11 Mbps g. This standard adopted the OFDM technology of a in the globally accepted 2.4GHz band. Using the OFDM technique over the air data rates can be increased to 54 Mbps. Its important to note that g is backwards compatible with b and given its increased over the air data rate capability will likely replace b as price points are expected to lower in the future. Figure 3 below summarizes the above differences between the different IEEE a/b/g variants. Which one is the best for a given application, depends on common application issues as speed requirements, 2.4GHz traffic, interoperability with other equipment, and sometimes distance.
6 802.11a b g Frequency 5.8GHz 2.4GHz 2.4GHz Distance * Shortest Longest Long Speed 54Mbps 11Mbps 54Mbps Compatibility a b Backwards to b Usage Least Most Replacing b for speed Pros Cons Unaffected by 2.4GHz traffic and can coexist with 2.4GHz networks. Channels have no overlap. High cable/free space loss at 5.8GHz yields 70% distance of 2.4GHz with same cables and antennas. Very large user base. Long distance with a low cost. Relatively low network speed. DSSS has high multi-path latency. Channels overlap. Higher speed than b using same bandwidth. Low energy per bit, shorter distance than b at same frequency. Channels overlap. * Distance comparison is general based on all installation parameters being equal. Actual performance depends on antenna type, system attenuation, and line of site issues. Figure 3 Comparison of IEEE a/b/g Security / Encryption Explained. With wired communication a physical electrical connection is used for the transmission medium which means that a physical connection, or at least physically close inductive coupling, is required to intercept the signal. Because wireless communication uses an open and shared medium (the air) anyone can technically receive a signal or message after it is transmitted. The sometimes ease of reception of wireless signals is therefore the technical reason security concerns are often a barrier to wireless adoption in industrial applications. When public standard technology such as that based on IEEE standards is used this concern is sometimes greater since the standard for which the technology is based is public information. Wireless technology has been the target for many different types of attacks for many years. These attacks are diverse in scale and reasoning from trying to collect personal information to causing harm in an infrastructure resulting in network downtime potential costing companies hundreds of thousands of dollars in lost productivity. Because of this the need to protect the wireless network and the information that is transmitted on it is essential. In the public standard there are several
7 different levels of security, or encryption as it is referred to, that has evolved over time. When the a/b subsets where first ratified the IEEE struggled with what level of encryption should be required to comply with the standard. WEP or Wired Equivalency Privacy was settled upon. WEP provided the same level of security to the wireless network that was provided by a wired Ethernet network. This level of encryption did not serve as a good level of security in the wireless standard because inherently wireless systems are less secure then wired systems. This variability of the security was prayed upon by wireless attackers. Today this level of encryption is so susceptible to wireless attacks that even the most novice computer user can find the tools online that will allow access to any WEP encrypted network. Therefore a higher level of security needed to be developed. WPA or Wi-Fi Protected Access was introduced to meet this need. WPA is based on the same type of encryption that is used in WEP although advancements where made providing for more secure communications. Two major advancements that WPA provides over WEP are authentication and dynamic keys. The authentication process was added to help restrict rouge client (wireless end devices) access. There are two levels of this authentication PSK (Pre-Shared Key) which is generally used in SOHO (Small Office Home Office) networks where only a low level of security is required. The higher level of authentication security is 802.1x this is a standard that was developed by the IEEE to provide secure communication between the client device and authentication server such as a RADIUS (Remote Authentication Dial In User Service). This server is responsible for verifying client devices and allowing access to the network. This level of authentication is generally used in enterprise networks. Dynamic keys are also a large factor in the security of a wireless network. Keys are the component of a wireless system that encrypts the information being sent. To communicate on a wireless network the key much be known by the client device. A wireless network is considered breached or hacked when an undesired client device gains access to the network which means the key has be found or cracked. One way to keep the network secure is to continuously change the key that is used this is done by using TKIP (Temporal Key Integrity Protocol) which creates dynamic keys or keys that are constantly changing. Overall WPA is a good form of security it provides a high level of protection from many different types of wireless attacks. Although WPA security is still vulnerable to more sophisticated wireless attackers. This is due to the fact that the encryption is based on the pervious WEP standard. Because of this, if a completely secure network is required WPA and WEP are not the suitable security standards. The IEEE committees recognized this problem and developed a new security standard IEEE i also known as WPA2. The new standard WPA2 uses a completely new form of encryption called AES (Advanced Encryption Standard). AES was previously used by the government as a replacement for the DES (Data Encryption Standard) to protect all of the government s wirelessly transmitted information. This new high level of encryption is considered un- hackable by many security experts today. The term unhackable is defined as keeping unauthorized users off the network eliminating their ability to cause harm to the infrastructure and retrieve sensitive information that the wireless system may be communicating. The new WPA2 security also maintains a high level of authentication by employing 802.1x to communicate to an authentication server providing the most secure form of wireless communication. WPA2 offers more then just the highest level of security and allows for preauthentication.
8 Encryption Method WEP WPA WPA2 Description Weak key can be hacked or cracked with little to no security knowledge Based on the same encryption as WEP with added features like authentication. Can be hacked although it takes more time and a higher knowledge of network security Currently the highest level of security available and is considered un-hackable by today s standards. Figure 4 Encryption Comparisons Security Poor Good Best Pre-authentication allows a client device the ability to connect with one access point while becoming authenticated with another. This allows the client to roam from access point to access point seamlessly and will not loss a wireless connection. An example of this would be a laptop being used to monitor network status wirelessly as the laptop is moved around the factory away from one access point towards another the laptop will detect that the signal from the one access point is becoming weaker and the signal from another access point is becoming greater. Rather then the laptop continuing to loss signal strength and slow speed it will switch access points to maintain the best wireless connection. Older security standards like WEP and WPA will allow the wireless signal to become weaker and speed will slow until the network is unusable. Then after losing a connection the laptop will search and reconnect to the network using another access point. This will cause a loss of a network connection and a delay in getting information. Overall WPA2 is currently the best security that can be used to protect wirelessly transmitted information combining an un-hackable encryption with the security from 802.1x authentication and a seamless wireless connection with pre-authentication.
9 User Name: Passwor : Access Point Authentication server Client Network Switch Client tries to join the network Using specific port defined by 802.1x the EAP (Extensible Authentication Protocol) is used to talk to the Authentication Server Because of the 802.1x port protocol nothing can see the authentication process and the client can see nothing on the network Handshaking occurs and the Authentication server ether authorized or denied access to the client Figure 5 - Example of 802.1x Authentication Procedure Industrial Requirements It is generally accepted that limitations on data throughput, performance, and RF behavior mean wireless Ethernet based on IEEE technology is not yet capable of the determinism required for critical process control applications. However, the ability to increase data access via WLANs, provide Ethernet TCP/IP access to remote installations, and bridge networks enables some exciting application possibilities within the industrial space. However, as is often the case industrial applications typically require special hardware and software considerations. On the hardware side of things environmental concerns are typically the most important. Products that are packaged for use in control cabinets or that have IP 67 ratings so they can be mounted stand-alone in the tough environment of the factory floor are often necessary. Additionally increased operation reliability means greater emphasis on filtering of the RF signal and immunity to EMI, RFI, and even influences of lightning then what might be required of an office environment equivalent. The RF environment in an industrial application is also additionally challenged by a phenomenon called multi-path. This is the effect when radio waves strike a very dense object such as metal or stone and are reflected similar to the way a mirror reflects light. Some of the reflected waves will be received by the receiving antenna at different times then the intended signal and therefore out of phase. This effect can seriously degrade, and in some cases,
10 completely cancel the received signal. Since the industrial landscape is typically crowded with large metal structures multi-path interference is especially problematic. The solution to multi-path problems found on industrial solutions is usually described as antenna diversity. Two antenna ports are provided on the receiving unit and an internal circuit selects the antenna that receives the stronger signal. Another issue regarding industrial use of the IEEE is the suitability of the physical and software interface to the industrial application. Solutions need to meet application and interface requirements of both the controls engineer as well as the most involved IT department. As an example, new products on the market allow a control engineer to use an Ethernet radio to address remote I/O via add on modules that can be easily addressed via XML or MODBUS TCP/IP. Since many serial devices still exist in industrial applications its also helpful to have serial gateway functionality as an example to convert MODBUS RTU data (serial port) to MODBUS TCP/IP over the air for network access. Support of Power over Ethernet (PoE) can also be a valuable feature when remote access points are installed. This allows power to be provided to the Ethernet radio via the network cabling. Finally, since many industrial installations have greater physical area to cover then common commercial applications its possible to get industrial solutions with higher power (up to 400mW) and high gain antennas have also proved to be very effective in extending distance. Industrial Applications Many industrial plants and facilities have increased their productivity, security, and network communications capabilities via Industrial Wi-Fi (IEEE ) technology. Listed below are just a few examples of these applications. Mobile Computing (Industrial Hot Spot ). What is becoming a common application for mobile computing is to support workforce management data applications. Basically a hot-spot is created using an industrial IEEE product as an access point. Mobile clients, in this example the laptop or pocket PC of a utility or water / wastewater maintenance personnel, can then roam into a covered zone and access their work orders and service orders from their trucks saving valuable time and scarce office resources. With proper firewalls and using a high level security encryption (described above) this application can also provide remote access to SCADA applications. Video Surveillance. With ever increasing concern and attention about plant security perimeter monitoring and video surveillance have become very important subjects. Recent technological advances in camera technology mean IP access can be provided very easily. The IP camera typically includes embedded set up and control software making access possible from any PC. However, you still have to run expensive data cabling, sometimes to remote areas of your facility. Wireless Ethernet based on IEEE technology can provide more then enough bandwidth to stream video. This many times allows fast and easy installations with relatively minimal cost. Also, when combined with an industrial Ethernet radio that has addressable I/O an application such as gate monitoring and access control can be accomplished with very little design and installation effort. Network Bridging / Remote Access. It s often required to bridge two Ethernet networks, as an example when connecting the networks of two buildings located physically apart from each other.
11 In the case of many industrial applications, it is important to gain network access to remotely located devices via a wireless bridge. An example of this might be an electric generation facility or wastewater treatment facility with remotely located pumps. These pumps are often controlled by Ethernet accessible VFDs (variable frequency drives). Great operational benefit can be achieved by communication to the pumps from the control room network. Trenching and running cable for this could easily approach tens of thousands of dollars; therefore making the project cost prohibitive. Industrial Ethernet radio devices set up as a bridge can easily connect the remotely located asset to the rest of the plant network providing greater monitoring and control capabilities. Conclusion Although Wi-Fi technology has a certain connotation of commercial technology, with appropriate security features, industrial hardware, and industrial interface products based on IEEE technology are becoming viable solutions for many industrial communication and networking applications.
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
Best Practices for Deploying Wireless LANs
Best Practices for Deploying Wireless LANs An overview of special considerations in WLAN implementations As wireless LANs (WLANs) continue to grow in popularity, particularly in enterprise networks, the
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
LTE, WLAN, BLUETOOTHB
LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed
Wireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
802.11b and associated network security risks for the home user
802.11b and associated network security risks for the home user by Michael Osten [email protected] Background ================= Approved in 1997 by the IEEE 802 committee, 802.11 details the framework
TL-WN310G 54M Wireless CardBus Adapter
54M Wireless CardBus Adapter Rev: 1.0.1 1910010042 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and
Wireless Network Policy
Wireless Network Policy Purpose Guide the deployment and integrity of wireless networking on the Kettering University campus to ensure reliable, compatible, and secure operation Protect the security of
Chapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
A White Paper from Laird Technologies
Cisco Compatible Extensions and Medical Devices Originally published: July 2012 Updated: October 2012 A White Paper from Laird Technologies While CCX has been an overwhelming success in the laptop world,
White Paper. Wireless Network Considerations for Mobile Collaboration
White Paper Wireless Network Considerations for Mobile Collaboration Table of Contents I. Introduction... 3 II. Wireless Considerations... 4 Channel Selection... 4 Interference... 4 Coverage... 5 Covering
Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
How To Manage An 802.11 Wireless Network At A University
WIRELESS POLICY 1 INTRODUCTION 1.1 Wireless networking is a fast emerging technology and is set to continue to grow for the foreseeable future. It is recognised that wireless networking could offer benefits
How To Use The Cisco Aironet 1240G Series For A Wireless Network (Wired) And For A Wired Network (Wireless)
Cisco Aironet 1240G Series Access Point Cisco Aironet 1240G Series Access Points provide single-band 802.11g wireless connectivity for challenging RF environments such as factories, warehouses, and large
IEEE 802.11n Enterprise Class Wireless LAN?
Introduction Over the last decade Wi-Fi has advanced from a technology offering a maximum 2Mbps over-theair data rate, to 11Mbps and now to 54Mbps. The technology has been improved to include additions
Getting the Most Out of Your WirelessHART System
Getting the Most Out of Your WirelessHART System A White Paper presented by: Garrett Schmidt Wireless Product Manager Phoenix Contact Americas Business Unit P.O. Box 4100 Harrisburg, PA 17111-0100 Phone:
HP AP8760 Dual Radio 802.11a/b/g Access Point Overview
Overview Models JD016A Key features Simultaneous 802.11a and 802.11b/g support PoE power/data via Category 5/6 data cables WPA/2, AES, TKIP, WEP packet encryption MAC address authentication/filtering WDS
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Cisco Aironet 1130G Series IEEE 802.11g Access Point
Cisco Aironet 1130G Series IEEE 802.11g Access Point Low-profile business-class access point with integrated antennas for easy deployment in offices and similar RF environments Product Overview The Cisco
Concurrent 2.4 and 5 GHz Performance. Backward Compatible. Fast Roaming through 802.1X PMK Caching. Power over Ethernet Port. Secure Communications
High-Power Ceiling Mount Wireless AC1200 Dual-Band Gigabit PoE Access Point 300 Mbps Wireless N (2.4 GHz) + 867 Mbps Wireless AC (5 GHz), WDS, Wireless client isolation, 26 dbm Part No.: 525688 Add performance
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.
Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA
coursemonster.com/uk Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA View training dates» Overview This new market-leading course from us delivers the best in Wireless LAN training,
Understanding and Optimizing 802.11n
Understanding and Optimizing 802.11n Buffalo Technology July 2011 Brian Verenkoff Director of Marketing and Business Development Introduction: Wireless networks have always been difficult to implement
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Output Power (without antenna) 5GHz 2.4GHz
Dual Band High- PoE AP Router Dual Band Concurrent AP Router 11a + 11a/b/g Hi- Radios 802.3af PoE Port 7 Wireless Operation Modes 5/10/20 Variable Channel Width Home Digital Network Application School,
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
Cost-effective Wireless Alternatives to Corporate Leased-line Connectivity. White Paper
Cost-effective Wireless Alternatives to Corporate Leased-line Connectivity White Paper Built-in ROI Effective communication is the life-blood of every business. Broadband wireless point-to-point connectivity
Wi-Fi Protected Access for Protection and Automation
Wi-Fi Protected Access for Protection and Automation a work in progress by CIGRE Working Group B5.22 Dennis K. Holstein on behalf of CIGRE B5.22 This is an interactive discussion Who is CIGRE B5.22 What
How To Get A Power Station To Work With A Power Generator Without A Substation
Wi-Fi Protected Access for Protection and Automation Key Material Authentication Key Presented to: 13 December 2006 Dennis K. Holstein on behalf of CIGRE B5.22 1 The good news and the bad news Who is CIGRE
EKT 331/4 COMMUNICATION NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 331/4 COMMUNICATION NETWORK LABORATORY MODULE LAB 5 WIRELESS ACCESS POINT Lab 5 : Wireless Access Point Objectives To learn
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Key Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode.
802.11a/n Long Range Wireless Outdoor CPE Key Features IEEE 802.11 a/n compliant Up to 300Mbps (5GHz) 24V Proprietary PoE support Waterproof Housing IP65 rated AP/CB/CR/WDS Modes 4 SSIDs support + VLAN
The data can be transmitted through a variety of different communications platforms such as:
COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects
Wireless LAN Networking White Paper
Wireless LAN Networking White Paper Introduction Wireless technology has helped to simplify networking by enabling multiple computer users to simultaneously share resources in a home or business without
Cisco Aironet 1520 Series Lightweight Outdoor Access Points
. Data Sheet Cisco Aironet 1520 Series Lightweight Outdoor Access Points Outdoor Access Points Flexible, Secure Mesh Platform for Demanding Environments Self-configuring and self-healing mesh in response
Motorola Wireless Broadband. Point-to-Multipoint (PMP) Access Network Solutions
Motorola Wireless Broadband Point-to-Multipoint (PMP) Access Network Solutions Motorola Technology is as Simple as it is Powerful Motorola Wireless Broadband Point-to-Multipoint (PMP) solutions are streamlined,
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures
Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures (IEEE 802.11 Wireless Networks) James Burrell Research project submission for the partial fulfillment of the requirements for
LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM
LP-348 LP-Yagy2415 LP-1518 LP-5P LP-510G/550G 54M Wireless Adapter PCMCIA/PCI User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a
ENHWI-N3. 802.11n Wireless Router
ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home
Wi-Fi and Bluetooth - Interference Issues
Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,
Wireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
SmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
What is 802.11? Why are standards important?
What is 802.11? The 802.11 standards are a group of evolving specifications defined by the Institute of Electrical and Electronic Engineers (IEEE). Commonly referred to as Wi Fi the 802.11 standards define
Wireless Remote Video Monitoring
February 2010 Page 1 An Emerson Smart Solution brings visual information into your control room. Increase Plant Safety Comply with Regulations Scalable Reduced Cost Secure and Reliable Communications Full
Wireless Remote Video Monitoring
October 2014 Page 1 An Emerson Smart Solution brings visual information into your control room. Increase plant safety Comply with regulations Scalable Reduced cost Secure and reliable communications Full
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan 2004. Wharf T&T Limited. Version: 1.0 Date: 26 January 2004
Wharf T&T Limited Version: 1.0 Date: 26 January 2004 This document is the property of Wharf T&T Limited who owns the copyright therein. Without the written consent of Wharf T&T Limited given by contract
White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: [email protected]; Web: http://www.dlink-intl.
Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet
Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers The Relay2 Smart Access Point (RA100) is an enterprise-class access point designed for deployment in high-density environments
Cisco WAP200E Wireless-G Exterior Access Point: PoE Cisco Small Business Access Points
Cisco WAP200E Wireless-G Exterior Access Point: PoE Cisco Small Business Access Points High-Speed Wireless Access for Exterior Environments Highlights Extends network to exterior business environments,
Cabling LANs and WANs
Cabling LANs and WANs CCNA 1 v3 Module 5 10/11/2005 NESCOT CATC 1 Cabling the LAN Each media has advantages and disadvantages: Cable length Cost Ease of installation Susceptibility to interference The
Expert Reference Series of White Papers. Wireless Bandwidth Not Necessarily as Advertised 1-800-COURSES. www.globalknowledge.com
Expert Reference Series of White Papers Wireless Bandwidth Not Necessarily as Advertised 1-800-COURSES www.globalknowledge.com Wireless Bandwidth Not Necessarily as Advertised Ted Rohling, Global Knowledge
This KnowledgeShare document addresses the main types of wireless networking today based on the IEEE 802.11 standard.
Wireless Networking Q&A Increased use of laptop computers within the enterprise, and increase in worker mobility have fuelled the demand for wireless networks. Up until recently, wireless technology was
A Division of Cisco Systems, Inc. Wireless A/G. USB Network Adapter. User Guide WIRELESS WUSB54AG. Model No.
A Division of Cisco Systems, Inc. WIRELESS Wireless A/G USB Network Adapter User Guide Model No. WUSB54AG Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered
Municipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
Chapter 3: Spread Spectrum Technologies
Chapter 3: Spread Spectrum Technologies Overview Comprehend the differences between, and explain the different types of spread spectrum technologies and how they relate to the IEEE 802.11 standard's PHY
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Network Security Best Practices
CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual
EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater
EAP9550 is a powerful and multi-functioned 11n Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly at
This tutorial has been prepared for readers to help them understand the concepts related to WiFi.
About the Tutorial is primarily a local area networking (LAN) technology designed to provide in-building broadband coverage. It is based on IEEE 802.11 specification. This tutorial gives you a basic understanding
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Wireless Technologies for Industrial Applications
Wireless Technologies for Industrial Applications Mats Andersson, CTO, connectblue Phone: +46 40 630 71 00 Email: [email protected] Web: www.connectblue.com Version 2.2 February 2013 Abstract
HP M220 802.11n Access Point Series
Data sheet HP M220 802.11n Access Point Series Key features IEEE 802.11a/b/g/n access point Single-radio, dual-band (2.4 GHz or 5 GHz) Simplified wireless LAN administration with clustering technology
Chapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
QuickSpecs. HP M220 802.11n Access Point Series. Models HP M220 802.11n WW Access Point. Key features
Overview HP M220 802.11n Access Point Series Models HP M220 802.11n AM Access Point HP M220 802.11n WW Access Point J9798A J9799A Key features IEEE 802.11a/b/g/n access point Single-radio, dual-band (2.4
Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications
Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications Steve Frank Business Development Manager Moxa Inc. Introduction Cellular technology minimizes site visits
Top Six Considerations
Top Six Considerations for Upgrading to table of contents + Section I: Introduction Understanding...2 + Section II: Uses Cases for... 3 + Section III: Top 6 considerations for...5 + Section IV: Conclusion...
Guide for wireless environments
Sanako Study Guide for wireless environments 1 Contents Sanako Study... 1 Guide for wireless environments... 1 What will you find in this guide?... 3 General... 3 Disclaimer... 3 Requirements in brief...
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE
Optimizing Wireless Networks.
from the makers of inssider Optimizing Wireless Networks. Over the past few years, MetaGeek has created tools to help users optimize their wireless networks. MetaGeek s tools help visualize the physical
Medical Device Connectivity
Medical Device Connectivity Most medical device manufacturers are implementing 802.11x wireless connectivity. This white paper will identify requirements and provide information to help ensure a successful
EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1.
EPI-3601S Wireless LAN PCI Adapter (802.11g & 802.11b up to 108 Mbps) User Manual Version: 1.2 1 TABLE OF CONTENTS 1 INTRODUCTION...3 2 FEATURES...3 3 PACKAGE CONTENTS...4 4 SYSTEM REQUIREMENTS...5 5 INSTALLATION...5
SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS
SECTION 2 TECHNICAL DESCRIPTION OF SYSTEMS 2.1 INTRODUCTION Access equipment consists of injectors (also known as concentrators), repeaters, and extractors. injectors are tied to the backbone via fiber
PCMCIA Wireless LAN Card User s Manual
PCMCIA Wireless LAN Card User s Manual Rev 1.0 Regulatory compliance FCC Warning This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of
Cisco RV 120W Wireless-N VPN Firewall
Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations
WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
TL-WN612AG / TL-WN652AG / TL-WN653AG
TL-WN612AG / TL-WN652AG / TL-WN653AG 108M Dualband(2.4GHz/5GHz) Wireless Adapter Rev: 1.0.1 1910010033 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
Secure Wireless Infrastructure
Secure Wireless Infrastructure Greg Burns Invensys Process Systems Collaborating to Advance Control System Security Secure Wireless Infrastructure Wireless Technologies Applications Case Studies Concerns
Wireless Technologies in Industrial Markets
SOLUTION PAPER Wireless Technologies in Industrial Markets An Examination of Mesh Technologies in Mining Executive Summary Consumers and enterprises around the globe use standards-based 802.11a/b/g/n WiFi
Wireless. Secure. MobileLink wireless ECG communication
GE Healthcare OFFICIAL ECG PARTNER Wireless. Secure. MobileLink wireless ECG communication MobileLink is a wireless, integrated ECG communication solution that helps you capture, transmit and analyze your
