Tecnologías Inalámbricas.
|
|
|
- Rodney Collins
- 9 years ago
- Views:
Transcription
1 Tecnologías Inalámbricas.
2 Why is Wireless Security Different? There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints
3 Secure Mobile Devices Characteristics Relatively low computing power Limited cryptographic algorithm repertory Limited Storage capabilities Power conservation Fundamental restrictions on bandwidth, error rate, latency, etc. Limited display capabilities
4 Cellular Networks Transmission ranges Cordless Phones Cellular Phones Band Radios FM radio Station Television Station Less than 100 meters Several thousand meters Several kilometers 40 to 150 Kilometers One Hundred miles
5 Spread Spectrum Code Division Multiple Access (CDMA). Transmission frequency from 824 to 894 Time Division Multiple Access (TDMA). Transmission Frequency: several bands: GSM 400. From 450 MHz to 460 MHz GSM 900. From 880 to 915 MHz GSM from 1850 to 1910 MHz
6 Fourth-Generation Wireless (4G) Support interactive multimedia services: teleconferencing, wireless internet, etc. Wider Bandwidths, higher bit rates Global mobility and Service portability Low Cost Scalability of mobile Networks All network elements are digital Tighter Network Security
7 Mobile Devices
8 Mobile Devices
9 Mobile Devices: Smart Cards
10 Mobile Devices: Handhelds
11 Mobile Devices: RFIDs
12 Mobile Devices: Wearable Computing
13 Mobile Devices: Wearable Computing
14 WLANs
15 The Wireless Local Area Networks A wireless local area network (WLAN) is a flexible data communication system implemented as an extension to, or as an alternative for, a wired LAN. WLANs transmit and receive data over the air via RF technology, minimizing the need for any wired connection and combining data connectivity with user mobility.
16 IEEE IEEE is the WLAN standard
17 IEEE x
18 Frequency Channels for IEEE a
19 Frequency Channels for IEEE a
20 Frequency Channels for IEEE b
21 Frequency Channels for IEEE b
22 Channel Distribution for b: An example
23 Este estándar especifica los parámetros de dos capas del modelo OSI: la capa física (PHY) y la capa MAC. La capa MAC tiene tres funciones principales: controlar el canal de acceso, (PCF) mantener la QoS, y proveer seguridad PHY Layer
24 Caso de Estudio: (2) La arquitectura de una WLAN IEEE consiste de un conjunto de servicios básicos (BSS) que se interconectan a un sistema de distribución (DS) para formar un conjunto de servicios extendidos (ESS) ESS
25 Wireless LAN Topology: Ad hoc Mode
26 Wireless LAN Topology: Infrastructure Mode
27 Authentication in The standard IEEE specifies two layers of the OSI Model: Physical Layer (PHY) And Medium Access Control Layer (MAC)
28 Standard WEP Encryption
29 VPN
30 BlueTooth
31 Bluetooth named after a Danish Viking and King, Harald Blåtand it is a cable-replacement technology: new technology using short-range radio links, intended to replace the cable(s) connecting portable and/or fixed electronic devices conceived initially by Ericsson in 1994, set to commercially come out in bulk around 2002
32 Bluetooth a standard for a small, cheap radio chip to be plugged into computers, printers, mobile phones, etc The Bluetooth Special Interest Group (SIG) was founded by Ericsson, IBM, Intel, Nokia and Toshiba in February 1998, to develop an open specification for short-range wireless connectivity
33 Bluetooth Bluetooth radio modules operate in the unlicensed ISM band centered at at 2.45GHz. RF channels:2420+k MHZ, k= Bluetooth devices within 10m of each other can share up to 720kbps of capacity Projected cost for a Bluetooth chip is ~$5. Plus its low power consumption, means you could literally place one anywhere.
34 Bluetooth Can operate on both circuit and packet switching modes, providing both synchronous and asynchronous data services It is intended to support an open-ended list of applications, including data, audio, graphics and even video.
35 Bluetooth Bluetooth must be able to: Recognize any other Bluetooth device in radio range Permit easy connection of these devices Be aware of the device types Support service discovery Support connectivity aware applications
36 Bluetooth Examples of Bluetooth uses: Briefcase access while the PC is still in the briefcase; when PC receives an , you are notified thru the mobile phone. Use the mobile phone to browse the . Cordless desktop: connect your desktop/laptop cordlessly to printers, scanner, keyboard, mouse, etc.
37 Bluetooth Architecture Up to 8 devices can communicate in a small network, called piconet. 10 piconets can coexist in the same coverage range of the Bluetooth radio. Each piconet has 1 MASTER and the rest serve as SLAVES. SLAVES within a piconet only have links to the MASTER. Multi-hop communication is obtained thru the scatternet.
38 Bluetooth Architecture
39
40 Physical Links Synchronous Connection Oriented (SCO) : allocates a fixed bw between a point-to-point connection involving the master and one slave. The master reserves slots periodically. It primarily supports time-bounded information like voice. SCO packets do not include a CRC and are never retransmitted. The master can support up to 3 simultaneous SCO links Asynchronous connectionless (ACL) : a point-to-multipoint link between the master and all slaves in the piconet. Packet-switch style of connection No bw reservation possible Delivery may be guaranteed thru error detection and retransmission Only single ACL link can exist
41 Connection Establishment States Standby: the default state; a low power state in which only the native clock is running. Connection: the device is connected to the piconet as a master or slave.
42 Connection Establishment States Page: device has issued a page. Used by the master to activate and connect to a slave. Master sends page msg by transmitting slave s DAC (device access code) in different hop channels. Page Scan: device is listening for a page with its own DAC Master response: master receives a page response from a slave. The master can enter the connection state or return to the page state to page for other slaves. Slave response: a slave responds to a page from the master. If connection setup succeeds, device enters connection state, otherwise page scan state
43 Connection Establishment States Inquiry: device has issued an inquiry to find the identity of the devices within range Inquiry scan: device is listing for an inquiry Inquiry response: a device that has issued an inquiry receives an inquiry response
44 Connection State The slave can be in following modes of operation: Active: the slave actively participate in the piconet by listening, transmitting and receiving pkts. The master periodically transmits to the slaves for to maintain synchronization Sniff: The slave listens on specified slots for its msgs. It can operate in a reduced-power status the rest of the time. The master designates a reduced no. of time slots for transmitting to a specific slave
45 Connection State Hold: the device can participate only in SCO pkt exchanges and runs in reduced-power status. While it is no active, the device can participate in another piconet. Park: a low power mode with very little activity. Used when a slave does not need to participate in a piconet, but still is retain as part of it. The device is changing AM_ADDR PM_ADDR. With this mode, a piconet may have more than 7 slaves.
46 Connection Establishment in Bluetooth STANDBY PAGE PAGE SCAN INQUIRY SCAN INQUIRY MASTER RESPONSE SLAVE RESPONSE INQUIRY RESPONSE CONNECTION Seguridad Computacional BLUETOOTH II State Transition Diagram
47 Security - Authentication 4 parameters used for security: unit address 48 bits device addr, publicly known Secret authentication key a secret 128 bit key Secret privacy key a secret key with length Random number a 128 bit random no. derived from a pseudorandom generator alg., executed in the Bluetooth unit.
48 Security - Encryption Only the pkt payload is encrypted For each pkt, a new encryption key is generated E 0 is a LFSR ( Linear Feedback Shift Register )
49 Security - Authentication
50 Bluetooth Limitations Does not address routing, most network functions are pushed into the link layer Does not support multi-hop multicasting Does not address how to cope with mobility! The MASTER node is the bottleneck No. of nodes in piconet is limited Does not address power-saving methods done at upper layers, above the link-layer
51 Bluetooth Limitations Bluetooth is a global, RF-based (ISM band: 2.4GHz), short-range, connectivity solution for portable, personal devices it is not just a radio, it is an end-to-end solution Implanting Bluetooth technology in a single chip will allow many devices to be Bluetooth-enabled Limitations of Bluetooth need to be addressed The impact of Bluetooth is still to be seen
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
Wireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
Recent technological innovations and declining prices for personal computers (PCs) and
Chapter 2 Bluetooth Transmission Technology 2.1 Introduction Recent technological innovations and declining prices for personal computers (PCs) and wireless phones are resulting in an emerging trend coined
WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
CHAPTER 1 1 INTRODUCTION
CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful
Bluetooth wireless technology basics
Bluetooth wireless technology basics Abstract... 2 Introduction... 2 How Bluetooth wireless technology works... 3 BWT network topologies... 4 BWT security... 5 Establishing BWT connections... 6 Activating
Bluetooth Wireless Technology
Bluetooth Wireless Technology Jamel Lynch Sr.Consultant/ Architect, IBM [email protected] 919 543 6421 Agenda Bluetooth Overview What is Bluetooth? What isn t Bluetooth? Bluetooth Air Interface Bluetooth
TDM & FDM Overlays on Bluetooth
TDM & FDM Overlays on Bluetooth Abdelshakour Abuzneid, Sarosh Patel Viqar U.Mohammed, Varun Kumar Godula Department of Computer Science & Engineering University of Bridgeport {abuzneid, saroshp,vmohamme,vgodula}@bridgeport.edu
Electromagnetic Spectrum (3kHz 300GHz)
Wireless Communication Serial communication Allocated a frequency of operation Could be a range of frequencies Regulated by FCC (Federal Communications Commission) in US Unfortunately, allocations are
Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07.
Network Standards and Technologies for Wireless Sensor Networks Karsten Knuth 16.07.2008 Index 1. Motivation 2. Introduction 3. Bluetooth 4. ZigBee 5. nanonet 6. Roundup 16.07.2008 Network Standards 2
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
Hello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
Mobile Services (ST 2010)
Mobile Services (ST 2010) Chapter 2: Mobile Networks Axel Küpper Service-centric Networking Deutsche Telekom Laboratories, TU Berlin 1 Mobile Services Summer Term 2010 2 Mobile Networks 2.1 Infrastructure
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna
ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
Wireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
Wireless Technologies for Automation
Wireless Technologies for Automation Prof. Dr.-Ing. Jörg F. Wollert Wireless Technologies for Automation Why using wireless communication? Pros and cons in wireless networks Embedded Wireless Hardware
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
ECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
Wi-Fi and Bluetooth - Interference Issues
Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
CHAPTER. Wireless Networking
11 CHAPTER Wireless Networking CHAPTER OUTLINE 11-1 Introduction 11-2 The IEEE 802.11 Wireless LAN Standard 11-3 802.11 Wireless Networking 11-4 Bluetooth, WiMAX, and RFID 11-5 Securing Wireless LANs 11-6
IEEE802.11 Wireless LAN
IEEE802.11 The broadband wireless Internet Maximilian Riegel wlan-tutorial.ppt-1 (28.11.2000) WLAN Dream Finally Seems to Happen... Recently lots of serious WLAN activities have been announced Big players
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
Lecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
Introduction to Ad hoc Networks
Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University Amitabh Mishra & Baruch Awerbuch
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
Chapter 6 Telecommunications, Networks, and Wireless. Computing
Chapter 6 Telecommunications, Networks, and Wireless Computing Essay Questions: 1. Define a hub, switch, and a router. 2. List the challenges associated with managing contemporary telecommunications and
IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.
IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,
1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
LTE, WLAN, BLUETOOTHB
LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Henrich C. Poehls Master s Thesis M.Sc. in Information Security Information Security Group Royal Holloway,
Mobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
Bluetooth usage with Architecture view & security measures
Bluetooth usage with Architecture view & security measures Savan K. Patel Assi.Professor AMPICS Dept Ganpat University Kherva, Gujarat, India Hiral R.Patel Assi.Professor Department of CS, Ganpat University
WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013
WiLink 8 Solutions Coexistence Solution Highlights Oct 2013 1 Products on market with TI connectivity 2004 2007 2009-11 2013 Use cases: BT voice, WLAN data Features: TDM based operation Strict protection
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Routing Protocol for Mobile Ad-hoc Wireless Networks
86 I. M. BACARREZA NOGALES, ROUTING PROTOCOL FOR MOBILE AD-HOC WIRELESS NETWORKS Routing Protocol for Mobile Ad-hoc Wireless Networks Ivris Marcelo BACARREZA NOGALES Dept. of Radio Electronics, Czech Technical
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 [email protected]
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES Gene Robinson E.A.Robinsson Consulting 972 529-6395 [email protected] 9 March 1999 IEEE802 N-WEST STANDARDS MEETING FOR BROADBAND WIRELESS ACCESS SYSTEMS
Chapter 1: Introduction
Chapter 1: Introduction Jyh-Cheng Chen and Tao Zhang IP-Based Next-Generation Wireless Networks Published by John Wiley & Sons, Inc. January 2004 This material is protected under all Copyright Laws as
Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures
Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures (IEEE 802.11 Wireless Networks) James Burrell Research project submission for the partial fulfillment of the requirements for
ENHWI-N3. 802.11n Wireless Router
ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home
Mobile Communications
Mobile Communications Vincent Roca (2001-10) Claude Castelluccia (1998-2001) INRIA [email protected] [email protected] http://planete.inrialpes.fr/~roca/ Overview of the Course! Part 1:
Chapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna
Chapter 3 Cellular Networks Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna Objectives! Understand Cellular Phone Technology! Know the evolution of evolution network! Distinguish
IEEE 802.15.1 Simulation and BER Analysis under the Interference
IEEE 802.15.1 Simulation and BER Analysis under the Interference Zahir Aalam, S Vhatkar, B. K. Mishra Thakur College of Engineering & Technology, Kandivali (E), Mumbai 101, M.S. India ABSTRACT There is
Wireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
Logitech Advanced 2.4 GHz Technology
Logitech Advanced 2.4 GHz Technology Revision 1.1H March 2, 2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN FEATURES...4 3 ASSOCIATION MODEL... 5 4 ENCRYPTION...
SBrT 299. J = J 0 + ( D(i 1,i) J 0)
VI INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM (ITS2006), SEPTEMBER 3-6, 2006, FORTALEZA-CE, BRAZIL Evaluation of Wireless Links in a Hybrid Network Structure for Mobile VoIP Services D. F. S. Santos, J.
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
Wireless Local Area Networking For Device Monitoring
Wireless Local Area Networking For Device Monitoring by Colin Goldsmith Supervised By Professor Wendi Heinzelman A thesis submitted in partial fulfillment of the Requirements for the Degree of Masters
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
Overview of 802.11 Networks and Standards
Overview of 802.11 Networks and Standards Mauri Kangas, Helsinki University of Technology, 17.02.2004 Mauri Kangas 17.2.2004 Page 1 (34) Family of 802.xx Standards ISO/IEC 8802-xx = IEEE 802.xx IEEE 802.1
802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
Wireless Network Policy
Wireless Network Policy Purpose Guide the deployment and integrity of wireless networking on the Kettering University campus to ensure reliable, compatible, and secure operation Protect the security of
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE
Industrial Networks & Databases
Industrial Networks & Databases LONWORKS KNX 1 HVAC and BEMS HVAC - Heating, Ventilation & Air Conditioning BEMS - Building & Energy Management Systems 2 3 4 LONWORKS (Local Operating Networks) Open solution
The Increasing Use of Cordless Handheld Bar Code Readers, Technology, and Applications. A White Paper by Datalogic Scanning, Inc.
The Increasing Use of Cordless Handheld Bar Code Readers, Technology, and Applications A White Paper by Datalogic Scanning, Inc. Copyright Datalogic Scanning, Inc. 2007-2008. All rights reserved. Protected
White Paper ON Dual Mode Phone (GSM & Wi-Fi)
White Paper ON Dual Mode Phone (GSM & Wi-Fi) Author: N Group 1.0 Abstract Dual Mode Handset is in demand for converged Network, Access, Billing, and Operation environment. Dual mode handsets provide cost
Chapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
PCMCIA Wireless LAN Card User s Manual
PCMCIA Wireless LAN Card User s Manual Rev 1.0 Regulatory compliance FCC Warning This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of
Wireless Telephone System Product Comparison
TM Wireless Telephone System Product Comparison SpectraLink PCS 150E SpectraLink PCS 150E x 4 SpectraLink PCS 3000 Publication Information Toshiba America Information Systems, Inc., Telecommunication Systems
COMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
TL-WN310G 54M Wireless CardBus Adapter
54M Wireless CardBus Adapter Rev: 1.0.1 1910010042 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and
Portable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
CSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets
What s so smart about Smart-hopping?
What s so smart about Smart-hopping? A closer look at some of the key technology decisions behind the IntelliVue Smart-hopping WMTS band Introduction The IntelliVue Smart-hopping WMTS band opens up a world
Wireless LAN Networking White Paper
Wireless LAN Networking White Paper Introduction Wireless technology has helped to simplify networking by enabling multiple computer users to simultaneously share resources in a home or business without
802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
PAN networks. 01.08.2005 Ilkka Korhonen / Copyright Elektrobit 2005 1
PAN networks 01.08.2005 Ilkka Korhonen / Copyright Elektrobit 2005 1 01.08.2005 Ilkka Korhonen / Copyright Elektrobit 2005 2 Elektrobit Plc. Elektrobit Group's business idea is to improve the competitiveness
Bluetooth Tutorial. Dennis Sweeney Center for Wireless Telecommunications. [email protected]
Bluetooth Tutorial Dennis Sweeney Center for Wireless Telecommunications [email protected] Max Robert Mobile and Portable Radio Research Group DotMobile, Inc. [email protected] June 14, 2000 Overview
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
The Basics of Wireless Local Area Networks
The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of
Mobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
