Sunteți pe pagina 1din 3

Objectives Chapter 5

Describe a wireless personal area network (WPAN)

A wireless personal area network (WPAN for short) is a low-range wireless network which covers an area of only a few dozen metres. WPAN is designed for short-range wireless communication. This type of network is mainly used in homes and in the office of up and coming small businesses that may not be able to afford the full fledged wireless network. This sort of network is generally used for linking peripheral devices, appliances and other wireless devices to a computer or two computers to each other without using a hard-wired connection. There are several kinds of technology used for WPANs: The main WPAN technology is Bluetooth with HomeRf also becoming a way of connecting users and devices in a low-range wireless network.

List the different WPAN standards and their applications Bluetooth (IEEE 802.15.1) This is used for cell phones, computers, printers, bar code readers , microphones, headsets, sensors and handheld PCs etc. Bluetooth is used for robust short range communications. High-rate WPAN (IEEE 802.15.3) Low power, low cost solutions portability. This standard is used for digital imaging and many multimedia applications. Low-rate WPAN (IEEE 802.15.4) This standard is used for low power, low cost solutions. Low-rate WPAN is used for industrial, agricultural, vehicular, residential and medical purposes and is used for sensors that do not need immense solutions. Coexistence (IEEE 802.15.2) This is the coexistence of Bluetooth and other Wireless networks. The standard focuses on the coexistence of wireless personal
area networks (WPAN) with other wireless devices operating in unlicensed frequency bands such as wireless local area networks (WLAN).

Explain how IrDA, Bluetooth, and ZigBee work


The main WPAN technology is Bluetooth, launched by Ericsson in 1994, which offers a maximum throughput of 1 Mbps over a maximum range of about thirty metres. Bluetooth, also known as IEEE 802.15.1, has the advantage of being very energy-efficient, which makes it particularly well-suited to use in small devices. The Bluetooth RF

transceiver (or physical layer) operates in the unlicensed ISM band centered at 2.4 gigahertz (the same range of frequencies used by microwaves and Wi-Fi). The core system employs a frequency-hopping transceiver to combat interference and fading. Bluetooth devices are managed using an RF topology known as a "star topology." 1. The technology ZigBee (also known as IEEE 802.15.4) can be used to connect devices
wirelessly at a very low cost and with little energy consumption, which makes it

particularly well-suited for being directly integrated into small electronic appliances (like home appliances, stereos, and toys). Zigbee,. provides for the connectivity of simple

fixed and mobile devices that require only low data rates between 20 and 250 Kbps, consume a minimum amount of power, and typically connect at distances of 33 feet (10 meters) to 150 feet (50 meters).

Infrared connections can be used to create wireless connections over a few metres, with speeds than can reach a few megabits per second. This technology is widely used in home electronics (like remote controls), but light waves can interfere with the signal. The

most common infrared connections today are based on the IrDA specifications. The IrDA specifications define both the physical devices and the network protocols. The common characteristics of IrDA compliant devices, including: o Provide walk-up connectivity o Provide a point-to-point method of data transfer between only two devices at a time o Cover a broad range of computing and communicating devices o Inexpensively implemented Describe the security features of low-rate WPAN technology

Low Rate WPAN Security


Security should be of little concern with WPANs. One of the most serious concerns is social engineering. However, designing security in WPANs is much more difficult than in other networking technologies. Low rate WPAN security is provided by the use of a security code or certificate. A public key infrastructure (PKI) as a unique security code, or key, provided by a certificate authority to protects the WPAN by verifying the authenticity of users. This in turn provides some level of security for the WPAN albeit low level. WEEK 6

Write a one page paper or create a powerpoint presentation answering the question What are the benefits of using message integrity verification at the 802.15.3 MAC layer?
WiMedia Protocol Stack group defined two different architectures for the upper layers of the protocol stack. One is used for multimedia audio/visual applications and the other for data transfer applications. The lower two layers of the stack (MAC and PHY) are implemented in hardware 802.15.3 and IEEE standard. The PHY layer Converts data bits into a modulated RF signal 802.15.3 standard uses the ISM 2.4 GHz band.

. Wireless networking is very important in the world that we live in. With the use of wireless technology schools, businesses and health providers thrive. This system though has been touted as being not too secure and susceptible at various levels. At the MAC layer, users can be prevented from accessing the wireless network through the sending of forged protocol messages or by not adhering to certain rules. These attacks have a crippling effect on the network and must be guarded against. This is where the message integrity comes in. It eradicates the man-in-the-middle. It determines whether a packet or message is authentic using the handshaking principle. The message has to meet certain parameters before it can be allowed through the network. In addition, the remaining parts of the network is more secure and is less under threat since this type of security is apparent in the MAC layer. The wimax MAC layer comprises three sub layers: 1. Convergence sub layer: Interfaces layer above i.e. network layer and layer below i.e. MAC CPS. This includes classifying external network service data units (SDUs) and associating them to the proper MAC service flow identifier (SFID) and connection identifier (CID). Hence it takes care of delivery of CS PDU to the MAC SAP associated with the service flow for transport to the peer MAC SAP and receipt of the CS PDU from the peer MAC SAP. The optional feature supported by this layer is Payload header compression. 2. MAC common part sub layer: The core MAC functionality is performed by this sub layer. It takes care of access mechanism of SS with BS, Bandwidth allocation, connection establishment and connection maintenance. 3. Security sub layer: It takes care of security aspects viz. authentication, secure key exchange and encryption.

Week 7
Many commercial APs have the SSID broadcast option enabled by default, so clients can easily detect the presence of an AP. Write a one-page report explaining the security implications of having the SSID broadcast option enabled. Week 8 Lab Activity - Write a report comparing the wired equivalent privacy (WEP) protocol against the Wi-Fi protected access (WPA) protocol and WPA2. Which protocol is strongest?

Also, watch the video on a wireless bridge and explain how this device can improve your wireless experience. You may need to go to the website itself.
http://www.veoh.com/watch/v1317819gQx9Ez4C

S-ar putea să vă placă și