Sunteți pe pagina 1din 105

Scribd Upload a Document

Top of Form

Search Documents Explore Documents Bottom of Form

Books - Fiction Books - Non-fiction Health & Medicine Brochures/Catalogs Government Docs How-To Guides/Manuals Magazines/Newspapers Recipes/Menus School Work + all categories Featured Recent Authors Students Researchers Publishers Government & Nonprofits Businesses Musicians Artists & Designers Teachers + all categories Most Followed Popular Sign Up | Log In

People

1 First Page Previous Page Next Page / 44

Sections not available Zoom Out Zoom In Fullscreen Exit Fullscreen Select View Mode View Mode SlideshowScroll Top of Form

Bottom of Form Readcast Add a Comment Embed & Share

Reading should be social! Post a message on your social networks to let others know what you're reading. Select the sites below and start sharing. Readcast this Document Top of Form

Login to Add a Comment

Bottom of Form Share & Embed Add to Collections Download Auto-hide: on

Wireless Network Research project Table of Contents:

Abstract..... 3Introduction... ...............3How it started?... ......3The wireless networks components... .......5Wireless Network Technology: Overview and Applications .....5Types of Wireless Networks... ....9Comparing Wireless LAN with Wireless WAN. ..15Wireless Standards. ...17IEEE standard 802.11...17Architecture of IEEE 802.11 standard....18The independent BSS as an ad hoc network....18The IEEE 802.11 subsets.....19IEEE standard 802.15...20IEEE standard 802.16...21Wireless Home...21Wireless Mesh Network.23Wireless Networks Software.26Wireless Networks Security..29Societal Implications of Wireless Connectivity..32The Politics of Wireless Networking33Conclusion . ... 35References... ...36Abbreviations List...39Glossary ..40 April2008 2 | P a g e Abstraction U ndoubtedly, Wireless networks are changing the way people connect to each other and that very fast. This kind of networks has become popular since the first days of introduction and use. I b e l i e v e t h a t t h i s w a s o u r p r i m a r y r e a s o n , w h y w e a s a t e a m h a v e c h o s e n t h i s t o p i c a s o u r Research Project. Through him (RP), we think to cover some important details and necessary things which have to know everyone who thinks to use this kind of network. T he Project includes an introduction part and overview; skip through general types of wirelessnetworks and their applications to wireless standards, to later on continue with wireless softwareand also with the wireless security. Our idea was to cover also the impact of this new technology in the modern world and changes made. With the paper, comes everything which fulfils normal Research Project standards. We suppose that time spent on reading it, wont be a wasted time. Introduction Any sufficiently advanced technology isindistinguishable from magic. Arthur C. Clark If you want to make a call from your mobile, if you want to check your email from your PDA, if you want to receive a message in your pager, if you want to make data portable and if you dontwant to have cable problems than all you need is WIRELESS NETWORK. How it started? Wireless Network started as a research project of the University of Hawaii. It has been surprisingly around for a little over 30 years.In Hawaii Islands, people there needed a wireless network to connect universities in 4 Islands.The result of the researchers was Alohanet which was predecessor of nowadays WLAN. Eventhat Alohanet it was a mess of networks it still reached the goal and achieved data transmission12Mbps which was very impressive for that time.O v e r t h e l a s t c o u p l e o f y e a r s W i r e l e s s N e t w o r k h a s b e g u n t o s e e v a r i o u s i n c r e m e n t a l enhancements and adaptations to the protocol as it grows to meet industrys needs 1

.Wireless technologies are increasingly becoming popular in our everyday lives. Governmentagencies, public places, businesses are using it more and more in their environment.D e v i c e s c o m m o n l y u s e d f o r w i r e l e s s n e t w o r k i n g i n c l u d e p o r t a b l e c o m p u t e r s , d e s k t o p computers, hand-held computers, personal digital assistants (PDAs), cellular phones, pen-basedcomputers, and pagers.You may also ask why wireless instead of wired networks? Because in the simplest sense wired networks are for communication between fixed locations and wireless is for communicationbetween devices, so this means that we are not anymore dependable on the location.Also the air is free so why dont we use itSo, as we said the basic idea behind the wireless network is network connections without wires.Less wiring means greater flexibility, portability, increased efficiency, and reduced wiring costs.Wireless technologies cover a broad range of differing capabilities oriented toward different usesand needs. They range from global voice and data networks, which allow users to establishwireless connections across long distances, to infrared light and radio frequency technologies that are optimized for short-range wireless connections. 1 Introduction to 802.11 Wireless Networks standard ; CyberScience laboratory; May 2003

April2008 3 | P a g e Components of Wireless Networks (as we can see from the configuration in the figure 1 2 ) areall directly replacing the common wired network components one per one where wireless networkcard replaces the wired network card; radio waves replaces Ethernet cabling, plugs and jacks anda wireless network access point unit replaces the Ethernet hub. Fig 1. Wired network components replaced by wireless network component This figure contains the simplest network configuration and it doesnt show the network addressing and configuration details-IP addresses, gateways, DNS etc. 2 Aspinwall,Jim

Installing, troubleshooting and repairing wireless networks USA 2003:McGraw-Hill

April2008

4 | P a g e The wireless networks components It is consisted of two types of equipment:Wireless station (it can be laptop, notebook personal computer, desktop PC, PDA, barcodescanner etc)Access point (it functions as a base station for wireless network, aggregating multiple wireless stations onto wired network.Theoretical ranges for wireless LAN 802.11 are from 29 meters (for 11 Mbps) in a closed officearea to 485 meters (for 1 Mbps) in an open area.However, through empirical analysis, the typical range for connectivity of 802.11 equipment isapproximately 50 meters (about 163 ft.) indoors. A range of 400 meters, nearly mile, makes WLAN the ideal technology for many campus applications. It is important to recognize that specialhigh-gain antennas can increase the range to several miles. 3 Figure 2. Typical Range of 802.11 WLANUse of Wireless Networks in real-life Wireless networks can be used anywhere. Its very useful in university campuses wherestudents can sit under the tree and read mail or search library for books, it is of great value to fleets of trucks, taxis, delivery vehicles, and repairpersons for keeping in contact with home, arealso important to the military, wireless parking meters, important use also is for food, drink, andother vending machines Once you begin using wireless data, you'll wonder how you ever lived without it. Wireless Network Technology: Overview and Applications It is obvious that Wireless Networks are making a big mess for the other and older kind of networking technologies. Researches try to make that kind of connection even more secure, which is another thing that does wireless technology to proliferate as a fire.S o , m a k i n g a w i r e l e s s n e t w o r k s f r o m a s i d e o f t h e b i g g e s t c i t i e s i n t h e w o r l d i t i s n o t accidentally. 3 Karygiannis,Tom ; Owens.Les ; Wireless Network Security 802.11, Bluetooth and Handheld Devices Gaithersburg,November 2002.

April2008 5 | P a g e A New York Times article (Scheisel, 2005) recently reported that more than 10 million homesin the United States employ a wireless router to access the Internet, up from virtually none in theyear

2000.Legislative battles rage over the right of municipalities to provide free or inexpensive wirelessInternet access to citizens. The technology to support wireless networking continues to evolve ata rapid pace, promising that faster, cheaper, more pervasive wireless computing solutions will bea v a i l a b l e t o b u s i n e s s e s a n d c o n s u m e r s w h o w i l l r e q u i r e a l w a y s - o n , s e a m l e s s , w i r e l e s s computing experiences. Wireless networks clearly offer an array of advantages over traditionalwired networking solutions to users in all types of networks and industries. These advantages include mobility, ease of installation, reduced cost of ownership and scalability, which in turn leadto increased productivity and interpersonal communication. 4 In this project will be discussed in deeper way about the history, types of wireless networks,their applications, the standards used today for this kind of network. We wont forget also to m e n t i o n s o m e t h i n g a b o u t t h e s e c u r i t y a s p e c t , w h i c h i s o n e o f t h e u n p l e a s a n t s i d e s f o r t h e wireless technology. This paper will also outline an interesting part which deals with installing,troubleshooting and possible repairing of the network. WPAN WPAN technologies enable users to establish ad hoc, wireless communications for devices(such as PDAs, cellular phones, or laptops) that are used within a personal operating space (POS). A POS is the space surrounding a person, up to a distance of 10 meters. Currently, thetwo key WPAN technologies are Bluetooth and infrared light. Bluetooth is a cable replacementtechnology that uses radio waves to transmit data to a distance of up to 30 feet. Bluetooth datacan be transferred through walls, pockets, and briefcases. Technology development for Bluetoothis driven by the Bluetooth Special Interest Group (SIG), which published the Bluetooth version 1.0specification in 1999. Alternatively, to connect devices at a very close range (1 meter or less), users can create infrared links.To standardize the development of WPAN technologies, IEEE has established the 802.15working group for WPANs. This working group is developing a WPAN standard, based on theBluetooth version 1.0 specification. Key goals for this draft standard are low complexity, low power consumption, interoperability, and coexistence with 802.11 networks. 5 WLAN At this point in time, wireless connectivity solutions can be grouped into three main categories.All three use Radio Frequency (RF) technology to transmit data through the air. The first category,wireless local area networking (WLAN), transmits data between a wired network and a mobile user or users (Types, 2005). Its origins lie in the encrypted radio signals sent by allied operativesacross enemy lines during World War II. Referred to as spread spectrum technology, the wartime messages paved the way for the first computational wireless network, which was createdin 1971 at the University of Hawaii. The project, called ALOHNET, had seven computers set up onfour islands communicating with one central computer on Oahu, none of them using phone lines(Bautts, 2005). In a modern-day example of WLAN technology, businesses commonly issue network-connected laptops with wireless cards to their employees to replace desktop computers.T h i s a l l o w s t h e i r e m p l o y e e s t o b e p r o d u c t i v e a n y w h e r e w i t h i n t h e b o u n d s o f t h e c o r p o r a t e network. It also encourages collaboration by giving them the ability to form ad hoc work groups. Incertain situations, it can provide employees with incentives to use their computers at home or incoffee shops, where they may do work outside of traditional work hours. In this case, because theemployees work time seeps into their leisure time, a perceived benefit for the employee (the useof a computer with wireless capabilities) becomes a very real benefit for the employer. 4 H. Nodler, A World Without Wires: The future of Wireless Networking, Knowledge Management Systems,Dr. Don Turnbull, May 3, 2005 5

http://technet2.microsoft.com/WindowsServer/en/Library/f2552467-f693-4c14-b42149cb2491bb361033.mspx?mfr=true

April2008 6 | P a g e Wireless LANs operate using a transceiver device to send and receive data. This device, alsoreferred to as an access point, connects the computers on the wireless network to a wired network. The computers are equipped with wireless networking devices, which come standard onmany laptop and handheld computers now. Each access point ensures connection to the networkwithin a radius of anywhere from 100 to several hundred feet. Access points are strategicallyplaced across a network area so that connection areas overlap and users can travel between them without interruption of service, a process called roaming. (Proxim, 1998) Several differentprotocols exist for wireless local area networking; all approved by the Institute of Electrical andElectronics Engineers (IEEE). Together, LAN protocols have been assigned the numericalgrouping 802. They are then broken down into further groupings. 802.11b (Wireless Fidelity -commonly referred to as WiFi) is the standard used by most WLANs today. A new standard 802.16 (WiMax) is currently being developed to provide connectivity with a 30-mile radius aroundeach access point. WMAN WMAN technologies enable users to establish wireless connections b e t w e e n m u l t i p l e locations within a metropolitan area (for example, between multiple office buildings in a city or ona university campus), without the high cost of laying fiber or copper cabling and leasing lines. Inaddition, WMANs can serve as backups for wired networks, should the primary leased lines for wired networks become unavailable. WMANs use either radio waves or infrared light to transmitdata. Broadband wireless access networks, which provide users with high-speed access to theInternet, are in increasing demand. Although different technologies, such as the multichannel multipoint distribution service (MMDS) and the local multipoint distribution services (LMDS), arebeing used, the IEEE 802.16 working group for broadband wireless access standards is still developing specifications to standardize development of these technologies. WWAN WWAN technologies enable users to establish wireless connections over remote public or private networks. These connections can be maintained over large geographical areas, such ascities or countries, through the use of multiple antenna sites

or satellite systems maintained bywireless service providers. Current WWAN technologies are known as second-generation (2G)systems. Key 2G systems include Global System for Mobile Communications (GSM), Cellular Digital Packet Data (CDPD), and Code Division Multiple Access (CDMA). Efforts are under way tot r a n s i t i o n from 2G networks, some of which have limited roaming c a p a b i l i t i e s a n d a r e incompatible with each other, to third-generation (3G) technologies that would follow a global s t a n d a r d a n d p r o v i d e worldwide roaming capabilities. The ITU is actively promoting t h e development of a global standard for 3G.Below is a table indicating the range that wireless data networks can handle: M e t e r s N e t w o r k 0 - 1 0 P e r s o n a l A r e a N e t w o r k 0 - 1 0 0 L o c a l A r e a N e t w o r k 0 - 1 0 0 0 0 W i d e A r e a N e t w o r k Table 1. Wireless rangeWireless Mesh Network In a mesh network, the wireless connection extends not only to client computers, such as wireless laptops, but between other network nodes. This is in contrast with a typical wireless localarea network, where the client computers connect wirelessly to an access point but that device is

April2008 7 | P a g e in turn plugged into the wired corporate network. The connection between the local area networkand a larger corporate network or the Internet is known as the "backhaul." 6 Connectivity and Bandwidth In 1985, the FCC made segments of the bandwidth spectrum available for use by certain telecommunications devices without a license. The unregulated spectrum was known as the ISM(Industrial, Scientific and Medical) bands, and the FCC recently added to the unregulated a spectrum 300 MHz of additional bandwidth. This dedicated free bandwidth ensures that anyoneadhering to pre-set standards of power and technologies applied can reap the benefits of wirelessconnectivity without having to obtain a license or pay fees. Future WLAN Applications

Wireless connectivity has to a great extent changed the way we live, and it promises to do soincreasingly. Currently, WLANs allow employees in organizations to carry out their duties andremain constantly connected to a network, where they can retrieve, and exchange and store information. Doctors and nurses in hospitals frequently carry handheld devices connected to thehospitals WLAN to record and download vital patient information to and from the network. ( P r o x i m , 1 9 9 8 ) Students on college campuses tote laptop computers from class to c l a s s , remaining constantly connected to the Internet, and supplementing their classroom educations.WLANs are also increasingly employed to establish voice connections between users with Voice-over Internet Protocol (VoIP), which transmits voice data across the Internet in data packets. Theappeal of VoIP is that since most providers charge a flat monthly rate, calls can be connected without incurring long-distance fees. This can provide a very cost-effective solution to users whoroutinely make international calls. Voice-over WiFi (VoWiFi) combines VoIP with wirelessnetworking technology. Using a PDA or a laptop computer equipped with a wireless card andInternet telephony software, a user can make a telephone call over a wireless network. One advantage of this technology over traditional cellular phone technology is improved connectionq u a l i t y i n d o o r s o r underground. Some cellular phone companies have developed hybridtelephones that operate using VoWiFi most of the time but can s w i t c h t o a r e g u l a r c e l l u l a r connection if the user happens to move out of the LAN area. (Beal, 2005) Future WPAN Applications The possibilities of WPAN extend beyond the ability to sync ones Palm Pilot to a desktop without wires. Currently, the Bluetooth protocol is being applied in the development of pervasivecomputing solutions for the home. In the very near future, the majority of people may use aBluetooth-enabled wireless connection and a personal controller to access or remotely control m a n y intelligent devices, such as handheld computers, mobile t e l e p h o n e s , c a r s , k i t c h e n appliances, home lighting systems, etc., which can detect users changing locations and respondto their needs accordingly (WPAN, 2005)Developers are working on a generation of wearable devices that will perform functions sucha s a l l o w i n g t h e w e a r e r t o i n p u t d a t a w i t h o u t u s i n g a k e y b o a r d o r m o u s e , o r m o n i t o r i n g t h e wearers vital statistics. These applications, together with home and office pervasive computing,could save time and be of tremendous help to people with illnesses or disabilities. Wireless Standards The developing generations of wireless technology we believe that will have soon access toan unprecedented breadth of wireless standards. Those should increase the range, speed, andquality of wireless connectivity. A specific topic deals about those standards in general, and themost known of them. 6 http://www.baselinemag.com/print_article2/0,1217,a=159982,00.asp

April2008 8 | P a g e Wireless software To manage the hardware of the new wireless technology, we need some tools that wouldindirect those tools to us. As the number and type of wireless devices increase to networks, theneed for their management and control is a priority. This part deals with this middleware, as animportant part of using the wireless network. Wireless Security Wireless security is a discussable topic, which should be one of the primary concerns of theevery networks administration. Mechanisms are a lot, but if they are playing the real role and providing the needed security protection, is a topic that should be explained later on. Conclusion We live in exciting times, when hosts of emerging wireless technologies promise radical c h a n g e i n o u r m o d e s o f p e r c e p t i o n , i n t e r a c t i o n , d e m o c r a t i c p a r t i c i p a t i o n , a n d t i m e a n d information management. As new technology is developed, we will witness even greater change,which hopefully will benefit society, rather than harm it. In the meantime, we have an obligation toapproach that technology with a certain degree of criticality. Types of Wireless Networks Till now we have mentioned what our project will consist and we h a v e d e s c r i b e d t h e i r essence. Now we are going to explain things more detailed.In this project we will discus about 5 wireless networks categories:1 . S y s t e m interconnection (Bluetooth)2 . W i r e l e s s P A N s 3 . W i r e l e s s L A N s 4 . W i r e l e s s M A N s 5 . W i r e l e s s W A N s System interconnection is all about interconnecting the components of a computer using short-range radio 7 . A personal area network (PAN ) isA PAN is a subset of a wireless LAN, it is acomputer networkused for communicationamongcomputer devices includingtelephonesandpersonal digital assistantsclose to one person.The reach of a PAN is typically a few meters. PANs can be used for communication among thepersonal devices themselves, or for connecting to a higher level network and theInternet.

8 Now that we explain what PAN is we can continue with the Wireless PAN which is tone of theobjective of this research paper.A wireless PAN is a collection of mobile devices that make up a piconet (tiny network), typically located in one room. The PAN replaces the wires that would normally connect one pieceof equipment to another 9 .So, Wireless PAN can be made possible via IrDA and Bluetooth. 7 Tanenbaum, Andrew S; Computer Networks 8 http://en.wikipedia.org/wiki/Wireless_PAN 9 White paper ; HP Broadband Wireless notebooks: integrated high-speed wireless connectivity

April2008 9 | P a g e Bluetooth is a personal area network (PAN)standard and is the most common W P A N technology.It is a low power, short range, two-way wireless communication network.Its goal is to connect components without wires.Bluetooth, the new technology was namedafter the 10th Century Danish King Harold Bluetooth.It was designed to allow low bandwidth wireless connections to become so simple to use thatthey seamlessly integrate into our daily life. The Bluetooth specification is an open specificationthat is governed by the Bluetooth Special Interest Group (SIG) 10 . Intel, IBM, Toshiba, Nokia , and Ericsson formed the SIG GROUP in 1998.Its a great opportunity if we want to connect scanners, digital cameras, headsets, mobilephones etc by only being brought within the range, no driver installation, just turn them on and theyll work.Bluetooth has short range (10 m), low power consumption, license-free 2.45 GHz ISM, voiceand data transmission, approx. 1 Mbit/s gross data rate 11 . Figure 3. Examples of Bluetooth and their connection Another type of wireless networks is Wireless Metropolitan Area Network WMAN. It was based on the 802.16a standard and appeared in June 2 0 0 4 a n d i t provides a communications path between a subscriber site and a core network such as the public telephonenetwork and the Internet.The goal of WMANs is to provide high-speed wireless Internet access similar to wired accesstechnologies such as cable modem, digital subscriber line (DSL), Ethernet, and fiber optic. IEEEwas motivated by the ability of the wireless technologies to cover large geographic areas withoutthe need to deploy wires.The Wireless MAN standard has a range up to 30 miles with a data rate of up to 70 Mbits per s e c o n d , c a p a b l e o f p r o v i d i n g 6 0 b u s i n e s s e s w i t h Internet connections at T1 speeds of 1.5Megabits or up to 400 homes at DSL rates 12 .It is a single-carrier (SC) modulation schemedesigned to operate in the 10-66 GHz spectrum. However, the 10-66 GHz spectrum is strictly line-ofsight.Wireless MAN can serve as the "backhaul" or Internet connection for WiFi hotspots 13

.Intelparticipation in the wireless MAN industry is a major wildcard factor, very important factor because it has integrated Wi-Fi functionality in its Centrino mobile computing chipset. Now Intel istouting WiMax as the metropolitan area version of Wi-Fi. The European organization, ETSI, hasbeen working on a similar project, referred to as HiperMAN.Wireless MAN has interesting advantages. It can deliver real-time voice-over-IP and video services at very low costs, in terms of data-carrying capability, wireless MAN far surpasses 3G 10 http://www.wirelessdevnet.com/channels/bluetooth/features/bluetooth.html 11 http://www.holtmann.org/lecture/bluetooth/Bluetooth.pdf 12 http://www.wi-fiplanet.com/columns/article.php/2195771 13 Wi-Fi is a way to connect to the Internet wirelessly - no phone jack required. Wi-Fi hotspots arelocations where you can find a Wi-Fi connection.

April2008 10 | P a g e wireless networks, it allows delivery of service in a highly flexible way, extends, replaces or backsup existing fiber infrastructure within hours, eliminates fiber trenching and leased line cost etc.This table shows the comparison between WMAN, WLAN and Bluetooth 14 .Parameters 802.16a (WiMAX) 802.11 (WLAN) 802.15 (Bluetooth) F r e q u e n c y B a n d : 2 - 1 1 G H z 2 . 4 G H z V a r i e s R a n g e ~ 3 1 m i l e s ~ 1 0 0 m e t e r s ~ 1 0 m e t e r s D a t

a t r a n s f e r r a t e : 7 0 M b p s 1 1 M b p s 5 5 M b p s 2 0 K b p s 5 5 M b p s N u m b e r o f u s e r s : T h o u s a n d s Table 4. WMAN, WLAN and Bluetooth comparison Figure 4 shows an example of a network topology in which PMP and mesh topologies are used to cover a large metropolitan area. Figure 4. Network Topology The use of WMAN in reality WMAN is a very powerful tool for linking all high schools in around 50 villages; it lets teachers,stuff and students in touch between themselves, farmers can communicate with agricultural experts, health care professionals at villages can consult specialist at the Main Hospital etc.MANs bring people into a community and assist them with social, educational and career challenges.A Local Area Network or LAN is simply a way of connecting computers together within a singleorganization, and usually in a single site (which may comprise many buildings such as a collegecampus). A LAN can be considered to be the same as an intranet, although the term intranet isoften used to include the computers, servers and the software systems attached to it as well 15 . 14 http://www.javvin.com/protocolWiMAX.html 15 Franklin, Tom Wireless Local Area Network 2001

April2008 11 | P a g e We have wired LANs and wireless LANs.The basic distinction between them is their construction where wired LANs are connected through wires and wireless LANs via radio links or infrared light.In this part of the project we will be concentrated in wireless LANs. How it started?WLAN technology and the WLAN industry date back to the mid1980s when the Federal Communications Commission (FCC) first made the RF spectrum available to industry. During the1980s and early 1990s, growth was relatively slow. Today, however, WLAN technology isexperiencing tremendous growth. The key reason for this growth is the increased bandwidth made possible by the IEEE 802.11 standard 16 .W i r e l e s s L A N i s a t y p e o f l o c a l a r e a n e t w o r k t h a t u s e s h i g h f r e q u e n c y r a d i o w a v e s t o communicate between computers, peripherals, and networking devices.These wireless devices needs wireless card which will send and receive signals. Nowadayslaptops come with cards already installed.A wireless LAN comprises a number of "access points" linked into the main campus networkbackbone. An access point is a piece of equipment which acts as a bridge between the wirelessp a r t s o f t h e L A N a n d t h e w i r e d p a r t s . T h e y a r e r a d i o t r a n s m i t t e r s a n d r e c e i v e r s w h i c h communicate with the computers in range and with the LAN backbone.Typically only one or two access points will be needed in a room (depending on the size of theroom, the expected number of users and its construction

17 .It permits data rates up to 54Mbps for coverage indoor spots. An access point communicates with devices equipped with wireless network adaptors; it connects to a wired Ethernet LAN via an RJ-45 port. Access point devicestypically have coverage areas of up to 300 feet (approximately 100 meters). This coverage areais called a cell or range 18 .Wireless LAN uses electromagnetic airwaves to communicate information from one point toanother without relying on any physical connection. Electromagnetic airwaves for transmittingsignals can be radio waves which simply perform the function of delivering energy to a remotereceiver and infrared waves which are cheaper to install and also some devices have already installed infrared ports.A wireless LAN can be used as an extension to or as an alternative for a wired LAN, a stand-alone network, or as a group access point to the Internet.So, wireless LANs will be used in conjunction with wired LANs to maximize the benefits. Wireless devices can be simply a part of the traditional wired LAN as we see in the figure 5. 16 Karygiannis,Tom ; Owens.Les ; Wireless Network Security 802.11, Bluetooth and Handheld Devices Gaithersburg,November 2002. 17 Franklin, Tom Wireless Local Area Network 2001 18 Karygiannis,Tom ; Owens.Les ; Wireless Network Security 802.11, Bluetooth and Handheld Devices Gaithersburg,November 2002 .

April2008 12 | P a g e Figure 5. Basic wireless LANs

It is a flexible data communication system; it transmits and receives d a t a o v e r t h e a i r , minimizing the need for wired connections. Also It is very important cause it combines data connectivity with user mobility.T h i s l e a d s t o a number of benefits which can be economic and educational. E c o n o m i c benefits in the aspect of setting wireless network in the buildings or places where is very difficultt o l a y c a b l e s a n d w h e r e d r i l l i n g w a l l s i s v e r y e x p e n s i v e , m a k i n g r o o m s f l e x i b l e a n d e x t e n d coverage to new areas etc.Also educational benefits for students who are computing with wireless connectivity this means new methods into classrooms and new educational possibilities for exploring. Furthermorethey can be accessed from anywhere, so users with access to a LAN can share applications anddevices anywhere in LAN. Who mostly needs wireless LAN? Wireless mostly needs those who cannot run wires through the environment or those who livein places where wires cannot be set up, companies that need common shared facilities, those who will use temporary offices for example for campaign where is bad to involve money in LANinfrastructure and than to leave that environment, its ideal thing for travelers and commuters which have to be connectedOne important issue for Wireless LANs is their cost. It will depend on the infrastructure alreadyin that place, the configuration of the campus including the buildings, the building materials thatthey are constructed from and of course the coverage that the LAN is expected to provide 19 .So far WLANs have been installed in universities, airports, and other major public places. Their use is inevitable. Decreasing costs of WLAN equipment has also brought it to many homes.Large future markets are estimated to be in health care, corporate offices and the downtownarea of major cities.Today wireless LANs are becoming more widely recognized as general purpose connectivityalternative for a broad range of business customers. 20 19 Franklin, Tom Wireless Local Area Network 2001 20 http://www.windowsnetworking.com/articles_tutorials/Introduction-Wireless-NetworkingPart1.html

April2008 13 | P a g e So, we mentioned above so many impressing things about wireless LANs. But nothing in thisworld is perfect, and so is LAN. It also has a number of disadvantages.As disadvantages we can mention: Security Wired LANs are more secure than Wireless ones. As we now the signal produced y WirelessLAN will pass through walls which means that hackers does not even need to be inside thepremises to access LAN, and be inside the firewall. Also its easier to monitor the traffic on thenetwork and so acquire user names and passwords. Standards still evolving Standards are still rapidly evolving and sometimes they are not compatible with each other because there are many organizations from many countries which have been defining variousstandards. Network cards Network cards for wireless Networks are more expensive than those for wired networks. For example we can mention that the card for Ethernet start at 10 and wirelesscards start at around 60. Eventhat the price is going down everyday more it still they cannot be as cheap as wired cards causethey are more complex ones. Interference from other devices

Wireless LANs frequencies are part of unlicensed spectrum which is shared among many devices. These include cordless telephones, garage door openers, microwave cookers andBluetooth. Till now it doesnt seems as great problem but as we see the number of wirelessdevices is increasing and this may be a serious problem in the future. Wireless WAN has been utilizes since the mid 1980s and it is a communications network utilizing devices such as telephone lines, satellite dishes, antennas, and microwaves to span alarger geographic area than can be covered by a local area network.Wireless WANs are used to give Internet connectivity over a much broader coverage area. Itallows users to have access to the Internet, e-mail and corporate applications and information even while away from their offices or home.Wireless WANs use existing cellular telephone networks, so there is also the option of makingvoice calls over a wireless WAN. Both cellular telephones and wireless WAN PC Cards have theability to make voice calls as well as pass data traffic on wireless WAN networks.A WWAN differs from aWLAN since it uses cellular network technologies such as GPRS/CDMA2000/GSM/ CDPD/Mobitex to transfer data. These cellular technologies are offeredregionally, nationwide, or even globally and are provided by a wireless service provider such as:AT&T Wireless, Cingular Wireless,Sprint PCSor Verizon for a monthly usage fee 21 .Although wireless LANs and wireless WANs may appear to be competing technologies, theyare far more useful as complementary technologies. Used together, a user would have the best of both technologies, offering high-speed wireless access in a campus area, and access to all their data and applications with high-speed cellular access from anywhere with wireless WAN networkcoverage.WWAN today and tomorrow 22 21 http://en.wikipedia.org/wiki/WWAN 22 http://en.wikipedia.org/wiki/WWAN/Microsoft - Wireless WAN Interface

April2008 14 | P a g e T o d a y L o n g h o r n Devic e TypesPC CardsCell PhonesEmbedded Radio ModulesPC CardsCell PhonesDriver ModelNDIS using custom OIDsModem EmulationWWAN NDIS InterfaceFeaturesCustom configuration softwareComplicated OOB configurationNo integration with WLANDifficult to get Windows logoNo test tools providedExtensible Native WWAN UIEasy OOB configurationEnables WLAN-WWAN RoamingEasy to get Windows logoTest tool included with beta Table 2. WWAN today and tomorrow With wireless WAN, customer satisfaction is up and support costs are down. WWAN broughtm a n y b e n e f i t s t o m a n y c o m p a n i e s a n d s a t i s f a c t i o n t o t h e e m p l o y e r s a s w e s e e f r o m t h e quotation. The wireless WAN has dramatically improved the way wes e r v i c e o u r c u s t o m e r s . H P p r o v i d e s o n - s i t e technical support faster than ever before and at less cost. Bob Floyd 23 Vice president-Service Delivery Operations America Technology Services Comparing Wireless LAN with Wireless WAN Now that we know the basic concepts for Wireless LAN and Wireless WAN we can make a comparison between them. A wireless wide area network (Wireless WAN), covers a much moreextensive area than wireless LANs. Coverage is generally offered on a nationwide level with wireless network infrastructure provided by a wireless service carrier.While wireless LANs are used to allow network users to be mobile within a small fixed area,wireless WANs are used to give Internet connectivity over a much broader coverage area, for mobile users such as business travelers or field service technicians.We can compare them in these fields: 1 ) S p e e d 802.11b wireless LAN standard transfers data at speeds of up to 11 Mbps, with typical rates of between 14 Mbps, decreasing as more users share the same wirelessLAN connection. The next version, 802.11a, is supposed to transfer data at speeds of upto 54 Mbps 24 .Wireless WAN speeds differ depending on the technology used. GPRS networks offer amaximum user data rate of over 115 kbps if all eight timeslots in a cell are allocated for data transmission, (one timeslot can provide between 9 and 21 kbps

25 ) 23 http://www.sprint.com/business/resources/CaseStudy_HP.pdf 24 White paper ; Wireless LANs vs. Wireless WANs ; 2002 November 18; Sierra Wireless 25 White paper ; Wireless LANs vs. Wireless WANs ; 2002 November 18; Sierra Wireless

April2008 15 | P a g e 2)Data security Security is one of the most important features when using a wireless network. Security isone of the biggest strengths for cellular wireless networks (WWANs) and one of the biggest weaknesses in 802.11 networks (WLANs). Security can be increased on wirelessLANs by using shared key authentication. This shared key must be delivered through asecure method other than the 802.11 connection. 3 ) H o t s p o t s Hotspots are wireless LANs available to the public in a location, like an airport, coffee shop, or city neighborhood. These (hotspots) enable users to access the network either free of charge, or for a fee paid to the network operator. 4 ) C o s t s Since wireless LANs operate in the unlicensed frequency range, there is no service costfor using a private wireless LAN. There will be a monthly Internet service provider cost for accessing the Internet through your wireless LAN access pointFor cellular wireless WANs, the wireless network is acting as your Internet serviceprovider by providing access to the Internet over their wireless network. The wirelessprovider therefore charges a monthly subscription rate to their network, similar to a wireless phone subscription.As a great SOLUTION is to WLAN and WWAN work together.Used together, a user would have the best of both technologies, offering high-speed wirelessaccess in a campus area, and access to all their data and applications with high-speed cellular access from anywhere with wireless WAN network coverage.

April2008 16 | P a g e Wireless Standards All standard that are developed for Wireless Network have one author, it is the IEEE or Institute of Electrical and Electronics Engineers Inc. IEEE is a non-profit, technical professionalassociation of more than 360,000 individual members in approximately 175 countries that is anauthority in technical areas such as computer engineering and telecommunications.Below in this chapter we will describe more details about WLAN IEEE 802.11 Standardespecially its architecture and subsets. Thereafter we will talk about characteristics for WPAN IEEE 802.15 and WMAN IEEE 802.16. IEEE standard 802.11 IEEE Standards are documents that are developed within the Technical Committees of the IEEE Societies and the Standards Coordinating Committees of the IEEE Standards Board. Thestandards developed within IEEE represent a consensus of the broad expertise on the subject within the Institute as well as those activities outside of IEEE that have expressed an interest inparticipating in the development of the standard.The figure below enables us to show the relationship between the IEEE standard 802.11 (thatis part of a family of standards for local (WLAN) and metropolitan area networks (WMAN)) andother members of the family: Figure 6. IEEE 802.11(for local WLAN) and WMAN Wireless LAN standard defines the protocols and compatible i n t e r c o n n e c t i o n o f d a t a communication tools by means of the air, infrared or radio in a LAN using the carrier sense multiple access protocol with collision avoidance (CSMA/CA) medium sharing mechanism. MACor the medium access control supports operation under control of an access point as well asbetween independent stations. Power management to reduce power consumption in mobile s t a t i o n s , a n d a p o i n t c o o r d i n a t i o n f u n c t i o n f o r t i m e b o u n d e d t r a n s f e r o f d a t a , v e r i f i c a t i o n , association, and re-association services and an optional encryption/decryption procedure are includes by the protocols.The standard includes the definition of the management information base (MIB) using AbstractS y n t a x N o t a t i o n 1 ( A S N . 1 ) a n d s p e c i f i e s t h e M A C p r o t o c o l i n a f o r m a l w a y , u s i n g t h e Specification and Description Language (SDL). Both ASN.1 and SDL source code have been added on a floppy diskette.

April2008 17 | P a g e The main purpose of this standard is to provide wireless connectivity to automatic machinery,equipment, or stations that require rapid deployment, which may be manageable or hand-held, or which may be mounted on moving vehicles within a local area (this is used in games). This s t a n d a r d a l s o o f f e r s r e g u l a t o r y b o d i e s a r e s o u r c e o f s t a n d a r d i z i n g a c c e s s t o o n e o r m o r e frequency bands for the purpose of local area communication. Architecture of IEEE 802.11 standard One most important part of Wireless LAN Standard is the architecture of IEEE 802.11,because it describes the components that interact to p r o v i d e a w i r e l e s s L A N t h a t s u p p o r t s location mobility transparently to its upper layers.The fundamental construction Block of an IEEE 802.11 Wireless LAN is the Basic service setor BSS because all radio-related functions are performed in the BSS, constricts of base stationcontroller (BSC) and the base transceiver station (BTS). BSC provides all the control functionsa n d p h y s i c a l l i n k s b e t w e e n t h e M S C ( m o b i l e s e r v i c e s s w i t c h i n g c e n t e r ) a n d B T S w h e r e b y handles the radio interface to the mobile station.In figure 1 show two BSS, each of which has two stations that are members of the BSS. It isuseful to think of the ovals used to represent a BSS as the exposure area within which the member stations of the BSS may stay behind in communication. If a station moves out of its BSS,it can no longer directly communicate with other members of the BSS. Figure 7. The independent BSS as an ad hoc network Firstly, let we say few words about ad hoc network (including the definition) and them we willdescribe the independent BSS as an ad hoc network.An ad-hoc (sometimes known as a "spontaneous") network is a local area network or other small network, especially one with wireless or temporary plug-in connections, in which some of the network devices are part of the network only for the duration of a communications session or,in the case of mobile or portable devices, while in some close proximity to the rest of the network.In Latin, ad hoc exactly means "for this," further meaning "for this purpose only," and as a

resultusually temporary.The independent BSS or IBSS is the most basic type of IEEE 802.11 LAN standard. When IEEE 802.11 stations are able to communicate directly is possible IBSS. A minimum IEEE 802.11LAN may consist of only two stations. In figure 1 shows two IBSS. This type of operation is often

April2008 18 | P a g e referred to as an ad hoc network, for the reason that this type of standard is often formed with nopre-planning, for only as long as the LAN is needed. Distribution system concepts For some networks, the physical limitations agree on the direct station-to-station distance thatmay be supported, this distance is sufficient. For some others networks this distance is not constant, it is dynamic (increased reporting is required).The architectural component used to interconnect BSS is the distribution system (DS). Insteadof existing competition, a BSS may also form a component of an extended form of network that isbuilt with multiple BSS. The distribution system mediums (DSM) are separates from the wirelessmedium logically IEEE 802.11 standard. Its coherent that each logical medium is used for different component of course for purposes of architecture. The distribution system enables m o b i l e d e v i c e s u p p o r t b y providing the logical services necessary to handle address t o destination mapping and seamless integration of multiple BSS.An access point (AP) is a station (STA) that provides access to the DS by providing DS services in addition to acting as a station.As a result, data move between a BSS and the DS via an AP. The addresses used by an APfor communication on the WM and on the DSM are not necessarily the same. Figure 8. The IEEE 802.11 subsets The IEE 802.11 wireless LAN standard inland has 9 subsets. Those subsets or substandardare used because Wireless LAN works with different frequency range, signals and some otherscharacteristics that we will describe bellow for each subset. 802.11a IEEE 802.11a operates in the 5-GHz frequency range (5.125 to 5.85 GHz) with a maximum54Mbit/sec. signaling rate. The 5-GHz frequency band isn't as crowded as the 2.4-GHz frequencybecause it offers considerably more radio channels than the 802.11b and is used by smaller number applications. It has a shorter range than 802.11g, is essentially newer than 802.11b andisn't well-matched with 802.11b. 802.11b

April2008 19 | P a g e Operates in the 2.4-GHz Industrial, Scientific and Measurement (ISM) band (2.4 to 2.4835 GHz) and provides signaling rates of up to 11Mbit/sec. This is a very commonly used frequency.Microwave ovens, cordless phones, medical and

scientific equipment, as well as Bluetooth devices, all work within the 2.4-GHz ISM band. 802.11e Ratified in late September of 2005, the 802.11e quality-of-service specification is designed toguarantee the quality of voice and video traffic. It will be particularly important for companies interested in using Wireless fidelity (Wi-Fi) phones. 802.11g Similar to 802.11b, but this standard supports signaling rates of up t o 5 4 M b i t / s e c . I t a l s o operates in the heavily used 2.4-GHz ISM band but uses a different radio technology to boost overall throughput. 802.11i Sometimes called Wi-Fi Protected Access 2 (WPA 2), 802.11i was ratified in June 2004. WPA2 s u p p o r t s t h e 1 2 8 - b i t - a n d - a b o v e A d v a n c e d E n c r y p t i o n S t a n d a r d , a l o n g w i t h 8 0 2 . 1 x authentication and key management features. 802.11k Predicted for ratification in mid-2006, the 802.11k Radio Resource Management standard willprovide measurement information for access points and switches to make wireless LANs run more efficiently. It may, for example, better distribute traffic loads across access points or allowdynamic adjustments of transmission power to minimize interference. 802.11n The Standard for Enhancements for Higher Throughput is designed to raise effective WLANthroughput to more than 100Mbit/sec. Final ratification is expected in late 2006. 802.11r Expected to be ratified in mid to late 2006, the 802.11r Fast Roaming standard will addressmaintaining connectivity as a user moves from one access point to another. This is especiallyimportant in applications that need low latency and high quality-of-service standards such as voice-over-WLAN. 802.11s This standard will deal with mesh networking. It is predicted to be ratified in mid-2008. IEEE standard 802.15 A wireless personal area network (WPAN) has its standard as wireless LAN, developed by Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA). The name of this standard is IEEE standard 802.15, it was approves in 2002. The first version of this standard,8 0 2 . 1 5 . 1 w a s a d a p t e d f r o m t h e B l u e t o o t h s p e c i f i c a t i o n a n d i s c o m p l e t e l y c o m p a t i b l e w i t h Bluetooth 1.1.Parameters for wireless communications among portable digital devices including notebookcomputers, peripherals, cellular telephones, beepers, and consumer electronic devices are f a m i l i a r a n d u s u a l l y u s e d b y B l u e t o o t h . T h e s p e c i f i c a t i o n a l s o a l l o w s f o r c o n n e c t i o n t o t h e Internet.

April2008 20 |

P a g e The IEEE 802.15 Working Group proposes two general categories of 802.15, called TG4 (lowrate) and TG3 (high rate). The TG4 version provides data speeds of 20 Kbps or 250 Kbps. TheTG3 version supports data speeds ranging from 11 Mbps to 55 Mbps. Added skin contain the useof up to 254 network devices, dynamic device addressing, support for devices in which latency iscritical, full handshaking, security supplies, and power management. There will be 16 channels inthe 2.4-GHz band, 10 channels in the 915-MHz band, and one channel in the 868-MHz band.P l a n s o f I E E E a r e t o r e f i n e t h e 802.15 specification to work with the Specification andDescription Language (SDL), particularly SDL-88, SDL-92, and SDL-2000 updates o f t h e International Telecommunication Union (ITU) recommendation Z.100. IEEE standard 802.16 IEEE 802.16 is a Wireless Metropolitan area network standard for 10 to 66 GHz published byInstitute of Electrical and Electronics Engineers, approves in 2002. It addresses the "first-mileand last-mile" connection in wireless metropolitan area networks.Inland this standard is created a platform that enables to build a broadband wireless industryusing high-rate systems that install quickly without extensive metropolitan cable infrastructures.The IEEE 802.16 standard enables interoperability between devices from multiple manufacturers.It also, includes a medium access control layer (MAC) that supports multiple physical layer specifications. The physical layer is optimized for bands from 10 to 66 GHz.Akin the Wireless LAN IEEE 802.11 standard and Wireless MAN IEEE 802.16 standard has itssubsets. IEEE 802.16a is one of them. It is advanced from principles to support multimediaservices like a videoconferencing, voice, and gaming. There also are includes optional mesh architecture. Wireless Home Our focus within this chapter is to describe the concept of Wireless Home, in underway we aregoing to explain more details which are in relations with mobile telecommunication.C T I A o r t h e C e l l u l a r T e l e c o m m u n i c a t i o n s & I n t e r n e t A s s o c i a t i o n i s t h e i n t e r n a t i o n a l organization that aims to represent all elements of wireless communication - cellular, personalcommunications services, enhanced specialized mobile radio and mobile satellite services andserves the interests of service providers, manufacturers and others."The wireless home is a terrific way to demonstrate the wireless lifestyle. Each year we b e c o m e m o r e a n d m o r e wireless in our everyday lives, and the home is a great way t o demonstrate the pervasiveness of this medium. It has a new look and feel this year that is sure tocapture the attention of everyone in attendance", said Robert Mesirow, vice president and showdirector for CTIA WIRELESS. Highlights of the Wireless Home The car company Chrysler will demo a crash-proof wireless-enabled car of the future. T h a n k s t o 7 5 M H z o f s p e c t r u m r e c e n t l y a l l o c a t e d b y t h e F C C f o r d e d i c a t e d s h o r t r a n g e communications, an in-board unit will communicate wirelessly with roadside units and alert thed r i v e r i f h e / s h e i s i n d a n g e r o f drifting off the road. Research to develop this cooperativecommunication network between vehicles and the road is b e i n g c o n d u c t e d u n d e r t h e U . S . Department of Transportation's Intelligent Transportation Program, in partnership with theautomotive industry and state departments of transportation. This smart car can also transmitanonymous traffic data to traffic operation centers and deliver real-time information to news outlets and other drivers.

April2008 21 | P a g e Use of this technology maximizes efficiency and reduces costs for the consumer. Accenturewill demonstrate smart metering with a series of networked intelligent meters and appliances thatallow utility companies to better monitor energy usageWireless technology is just scratching the service of what is possible in kitchens today! Samsung's Internet refrigerator is the "brains" of the kitchen.In the powder room, Accenture will display an online medicine cabinet that integrates smart labels, face recognition, voice synthesis and flat panel displays. This display will be used torecognize members of a household and in return, display a list of personalized health reminderssuch as allergy alerts, doctor's appointments and medication reminders. Because it is connectedto the Internet, all of this information can be shared securely with physicians and pharmacistsfrom the comfort and the convenience of your home. In the same time with the device, you canmonitor vital signs such as blood pressure, pulse rate, cholesterol and blood sugar, and it will even send a warning if you pick up the wrong medication.For sure that for every parent is very important the safety and security of children. Because of this fact, Mobile Guardian comes into play, providing operators with an end-to-end solution thatblocks unwanted, unauthorized and harmful content and contact from mobile phones. On displayin the child's bedroom, visitors will experience how mobile operators can take advantage of fully-integrated age verification, content access controls, content filtering and usage controls; and howthis product allows all aspects of mobile service to be controlled directly by subscribers, parentsand administrators from Web-based or handset-based interfaces.Also from Accenture this year is a media transformation prototype -- a novel approach tomedia storage that replaces the CD/DVD format by almost any shape or form. In the family room,this device will enable music, movies, video games and other interactive media to be embeddedinto standardized forms smaller than a credit card or other creative shapes such as concert tickets, T-shirts, booklets or figurines.The Samsung i830 world phone is an international favorite that can be used virtually anywhere your travels may take you with its dual mode GSM/CDMA functionality. Also on displayin the living room, the i830 is packed with Windows(R) Pocket PC applications, Bluetooth wirelesst e c h n o l o g y , a d v a n c e d speech recognition, speakerphone, MP3 player, built-in Q W E R T Y keyboard, and EVDO connectivity for faster data transfer. Motorola's C51 Communication Systemis a 5.8 GHz digital expandable, cordless phone system that connects to a Bluetooth mobile phone and has audio/video monitoring capabilities. A camera located at the front door integrateswith the phone system and enhances any security system.T h e h o m e o f f i c e i s w h e r e w i r e l e s s t e c h n o l o g y f i r s t m a d e i t s e n t r y i n t o t h e h o m e , b u t technology for this important room certainly hasn't stopped evolving! The Kyocera KR1 MobileRouter creates a wireless broadband network and functions like an access point supporting multiple computers and devices with high-speed wireless data services.

VeriSign's Backup Plus isan over-the-air, mobile phone data backup and restore solution that empowers and protects themobile lifestyle. Developed for mass-market devices, Backup Plus stores your valuable mobiledata such as contacts, pictures, video, and music to a secure VeriSign server where you can manage your data directly from a phone or online "virtual locker."As the premiere global event representing the complete wireless, mobile computing andwireless Internet industry and the largest wireless show in the world, CTIA WIRELESS 2006brings together all industries within the communications ecosystem and all those affected by wireless technology for three days of intense learning and networking.

April2008 22 | P a g e Wireless Mesh Network Until now, there were mentioned many types of the wireless networks, but certainly not the most interesting one of them, wireless mesh network.This type of network, as the name says, is mesh networking implemented over a Wireless LAN. 26 The mesh networking is not a thing which is new. That is a smarter and an efficient wayof combining two components (ex: computers) for transmitting data, voice and other stuffs. Thistype of continuous connection is established with hopping from node to node. A better definitionstands from Tomas Krag and Sebastian Bettrich, who defined it as a network that employs oneof two connection arrangements, full mesh topology or partial mesh topology. In the full meshtopology, each node is connected directly to each of the others. In the partial mesh topology nodes are connected to only some, not all of the other nodes. 27 Lets go back where we start, about the Wireless mesh networks. Wireless mesh networks arenetworks which are similar to Internet, except that are smaller. There are multihop systems inw h i c h d e v i c e s a s s i s t e a c h o t h e r i n t r a n s m i t t i n g p a c k e t s t h r o u g h t h e n e t w o r k , e s p e c i a l l y i n adverse conditions. You can drop these ad hoc networks into place with minimal preparation, andthey provide a reliable, flexible system that can be extended to thousands of devices. 28 With this kind of networking we are in the benefit, because information from one node is transmitted just to the other next node, but every one of them is linked with many others, and not just with one. So, if a node is off (from damage), her work is done by her neighbors, whose job isto find another route for transmitting the same data. It implies that Wireless mesh networking isreliable and resilient. Figure 9. Nodes organized in a mesh network Those nodes play the role of mesh routers and mesh clients. They operate not only as a host,but also as a router. The connection between nodes is established automatically and that meshconnectivity is maintained among them-selves. Thats why when

mentioning Wireless mesh network, we mean about network, which is self-configured and self-organized.The reasons for using the Wireless mesh networks arent in small numbers. In the most important ones, we are numbering: 26 http://en.wikipedia.org/wiki/Wireless_mesh_network 27 http://www.oreillynet.com/pub/a/wireless/2004/01/22/wirelessmesh.html 28 http://www.surfability.com/ITC/mesh.php

April2008 23 | P a g e

Price: 802.11 radios have become quite cheap, but the radios are often still among themost expensive elements of such network. The fact that each mesh node runs both as aclient and as a repeater potentially means saving on the number of radios needed and thus the total budget. Ease and simplicity: I f y o u h a v e a b o x t h a t i s p r e - i n s t a l l e d w i t h w i r e l e s s m e s h software and uses standard wireless protocols such as 802.11b/g, the setup is extremelysimple. Since routes are configured dynamically, it is often enough to simply drop the boxinto the network, and attach whatever antennas are required for it to reach one or moree x i s t i n g n e i g h b o r i n g n o d e s ( a s s u m i n g t h a t w e c a n s o l v e t h e i s s u e o f I P a d d r e s s allocation). Organization and business models : The decentralized nature of mesh networkslends itself well to a decentralized ownership model wherein each participant in the network owns and maintains their own hardware, which can greatly simplify the financialand community aspects of the system. Network robustness: The character of mesh topology and ad-hoc routing promisesgreater stability in the face of changing conditions or failure at single nodes, which will quite likely be under rough and experimental conditions. Power: The substrate nodes of a mesh network possibly excepting those nodes thatmaintain an up-link to the Internet can be built with extremely low power requirements,meaning that they can be deployed as completely autonomous units with solar, wind, or hydro power. (A side comment: Piggybacking mesh networks on projects that primarilyaim at energy production might be a very feasible strategy with every panel or windmill,a node. Power generating units are typically connected to points of infrastructure andhuman presence. This makes them valid locations for network nodes. As a secondarybenefit, the presence of integrated network nodes within power networks may aloe for better monitoring and management.) Integration: Mesh hardware is typically small, noiseless, and easy encapsulated in weatherproof boxes. This means it also integrates nicely outdoors as well as in humanhousing. Reality fit: Reality rarely comes as a star, ring or a straight line. In difficult terrain bethat urban or remote where not every user can see one or few central points, chancesare she can see one or more neighboring users. 29 How is created this kind of network?! Its very easy; using a series of special 802.11b AccessPoints (MeshAPs) that create a single, scalable wireless network. The gateway MeshAPs (that is,the MeshAP that is connected to the internet) can obtain its internet access from WiFi, local b r o a d b a n d , d i a l - u p m o d e m , I S D N o r e v e n a s e l f c o n t a i n e d G S M / G P R S m o d u l e f o r r e a l l y unconnected locations. 30 Later one, in order we want the network we have to become bigger insize, we have to add just another MeshAP. Built around standard 802.11b (WiFi) Hardware, access to the networks is similar, and that with a standard WiFi network card.Conventional nodes (e.g., desktops, laptops, PDAs, PocketPCs, phones, etc.) equipped withwireless network interface card (NICs) can connect directly to wireless

mesh routers. Customerswithout wireless NICs can access WMNs by connecting to wireless mesh routers through, for example, Ethernet. Thus, WMNs will greatly help the users to be always-on-line anywhere anytime. Moreover, the gateway/bridge functionalities in mesh routers enable the integration of WMNs with warious existing wireless networks such as cellular, wireless sensor, wireless-fidelity( W i Fi), worldwide inter-operability for microwave access (WiMAX), W i M e d i a n e t w o r k s . Consequently, through an integrated WMN, the users of existing network can be provided withotherwise impossible services of these networks. 31 29 http://www.oreillynet.com/pub/a/wireless/2004/01/22/wirelessmesh.html 30 http://www.surfability.com/ITC/mesh.php 31 I.F.Akyildiz, X. Wang, W. Wang: Wireless mesh networks: a survey, 1. Introduction, availableonline(from 1 January 2005)

April2008 24 | P a g e Todays network technology is filled up with many protocols, standards and products, includingthe Wireless mesh networks. The importance differs from one to another. But, all they try to manage one job, and that is better communication rules between sides.Different approaches are review hereinafter: AODV is a routing protocol for ad-hoc networks designed with mobile wireless devices inmind. It is not subject to copyright protection and is in the public domain. Mobile Mesh protocol contains three separate protocols, each addressing a specific function:1 . L i n k D i s c o v e r y 2 . R o u t i n g 3 . B o r d e r D i s c o v e r y The Mobile Mesh software is covered by the GNU General Public License (Version2). TBRPF

, or Topology Broadcast based on Reverse-Path Forwarding, is a proactive,link-state routing protocol designed for mobile as-hoc networks, which provides hop-by-hop routing along minimum hop paths to each destination. It seems it is patentprotected unless it becomes an IETF standard. OSPF is a link-state routing protocol. It is designed to be run internal to a single Autonomous System. Each OSPF router maintains an identical database describingthe Autonomous Systems topology. From this database, a routing table is calculatedby constructing a shortest-path tree. GNU Zebra is free software that manages TCP/IP-based routing protocols. It is released as part of the GNU Project, and is distributed under the GNU General PublicLicense. It supports BGP-4 protocol as described in RFC1771 (A Border Gateway Protocol 4) s well as RIPv1, RIPv2, and OSPFv2. LocustWorld develops a free bootable CD solution based on the AODV protocol, a n d a l s o develops and sells a complete ready-to-deploy MeshBox running i t s software, most (but not all) of which is available under the GPL. The Mesh Box andmesh software have been used in a number of community networks in the UK. 4G MeshCube. The German company 4G Mobile Systems has developed a tiny MeshCube running Debian Linux on a MIPS processor, using MITRE Mobile Meshrouting software. This is a ready-to-deploy gateway with both a wireless and a wiredinterface. With a power consumption of 4W (and potentially lower), it is ideal for deployment with an autonomous sustainable power source. 32 As a conclusion: Clearly, wireless mesh networks are gaining traction. The promise of morecomplete coverage, faster speed, strong reliability, ease of deployment and a lower cost than many existing options make wireless mesh networks a very attractive and affordable alternative.As city governments, metropolitan areas and businesses evaluate mesh networks, keep in mindtheyre best suited for large indoor and outdoor spaces where cabling doesnt exist and the design of the network is the most critical factor for completing a successful implementation. 33 32 http://www.oreillynet.com/pub/a/wireless/2004/01/22/wirelessmesh.html 33 http://www.dominopower.com/issues/issue200507/00001406003.html

April2008 25 | P a g e Figure 10. An example of a WMN in a city We can freely say that this technology is promising a lot for the generations that come. In theUSA, most of the interest in this technology has come from municipalities wanting to providecitywide data networking to police, firefighters and other public employees. Some cities and grassroots organizations are offering Internet access via mesh topology; the city of Philadelphia isplanning an ambitious project of this sort. Cities often can mount the required equipment on lightpoles throughout area. 34 With Philadelphia, are starting to joint the Wireless mesh network alsoTaipei, Tempe, etc., and this is not the end. But, to strengthen the market penetration and securethe success of WMNs, more research is needed. 35 Wireless Networks Software Fixing problems wireless technology need some extra tool that maybe indirect tool. This moreto see what is happening to the radio signal or datas that are passing between adapter and access point or between adapters in one ad hoc network.Of course to manage these tests, die-hard techies and serious radio frequency engineers willuse high tech equipment that cost like expensive test equipmentsignal generators, spectrumanalyzers, and network packet sniffers/analyzersto assess the environment of and around awireless network installation. This means that for most of us is difficult to pay such cost for highly specialized electronic equipment we will use only once or twice.Practically wireless networking is not as logical or measurable as tests you may perform on ahard drive or serial I/O port. In these cases you will not find diagnostic programs, but instead, metering software that provides some visualizations of wireless signals. However there are a fewexamples of adapter cardspecific signal strength and network availability monitors that provide agood relative indication of signal strength, but as you get into network design and reliability, youneed something more absolute than a poor/weak, good, or excellent indication. In fact, what is 34 http://www.baselinemag.com/article2/0,1540,1858551,00.asp 35

I.F.Akyildiz, X. Wang, W. Wang: Wireless mesh networks: a survey, 18. Conclusion, availableonline(from 1 January 2005)

April2008 26 | P a g e needed is something that will tell you in known absolute values which signals exist nearby, andhow strong they areFortunately, many programmers took it upon themselves to find out how these new wirelessdevices work and pulled out some very valuable data. They have found ways to present us theinformation that will help to make sense of this invisible connection between computers and networks.The results are several programs that can help to see and somehow understand what is goingon in one wireless networking environments. Herewith should be underlined that most of thoseprograms are for Linux systems. All this results are coming to us through the features, functions,and admitted limitations of what a wireless network adapter can reveal to us. Saying that the world of Linux is a good ground for some of the deepest and most profound network and interneti n n o v a t i o n , t h i s d o e s n o t m e a n t h a t W i n d o w s a n d M a c i n t o s h u s e r s a r e n o t l e f t i n t h e d a r k . Wireless may be the one thing, next to the Internet, that brings these separate and distinct platforms together for the good of all. It is not about replacing wires with invisible energy fields. Itis that all at once, three distinct computing platforms are thrust into working together at the sametime. Through wireless and all that it promises for networking and applications outside of pure c o m p u t i n g , u s e r s o f t h e s e p l a t f o r m s m u s t c o n f i g u r e a n d e x c h a n g e a v a r i e t y o f c o m m o n information in order to establish a common networking ground. It is no longer AppleTalk versusNetBIOS, TCP/IP versus IPX/SPX, or variants and workarounds in between, but purely the sametechnology and the same terms applicable to all platforms. The

interaction of users with wireless,signal integrity, wireless security and failure analysis bring these platforms together.In the same time the tools used to monitor and analyze wireless and security is not in samelevel available for all platforms. In this direction the most known applications for determiningwireless network security levels, AirSnort and WEPCrack, are available only for Linux/UNIXplatforms. This fact makes all Windows and Mac networks system administrators, who do notknow to use Linux, to try to learn it quickly or to hire a consultant from outside to help them to assess the security for their networks. Of course hiring this type of consultants has usually highcost. But, AirSnort and WEPCrack could be labeled as tools that have been designed only for thepurpose of hacking into someones wireless network. But in order to assess security, you needsomething or someone to try to breach it. Better you using these tools on yourself and tighteningup security than someone unknown, with motives unknown, trying to breach your networks borders. UNIX/Linux It can deal with the operating system just so much before becoming frustrated at the lack of concise step-by-step documentation to get you quickly to the point where a new device, feature,or program simply functions. For Linux to be viable, some degree of detailed technical support must exist with or for the user, this more for wireless applications. In terms of realizing the user-friendly attributes that make an operating system approachable and practical ore at least tolerableto work with, UNIX systems have far to go. Most of us do not want to GUnzip, untar, compile, link,debug, decipher log files, decipher and edit obscure and esoteric configuration file parameters,learn C and shell scripting to be able to read and extract salient bits of command parameters, anddo so over and over again for 12 to 24 hours, only to fail to get a simple wireless network card or two to work. Linux and UNIX in general, need more user-friendly tools, at least in the context of wireless networking, before it can make a dent in the Windows market. In reality, it is need moretime to find information on the internet to get various fragments of information that finally can helpgetting a wireless adapter to work with Linux. There is quit big need for manual about stepsthrough UNIX system configuration for the masses. These are not religious or philosophical issues, abiding respect for UNIX experts and the many great things about UNIX-based systems,but this genre of operating system is still about five years behind the DOS-to-Windows, plug-and-play, auto recovery, goof protection progress that has been made in the WinTel (Windows+Intel)market recently. However, there are ways to get Linux to do at least one thing it is good at withwireless devices routing, firewall, and access control. This can be done without immersing yourself in the struggles of getting this card or that to be recognized and automatically configured

April2008 27 | P a g e

at boot time, using external wireless bridges or access points c o n n e c t e d t o a n o t h e r w i s e ubiquitous Ethernet card in the Linux system.While you avoid the trials and tribulations of configuring Linux for wireless, you will not be ableto use AirSnort, WEPCrack, or the other low-level sniffing tools with an external wireless device,but the practical goal is wireless + Linux, leaving the sniffing and packet analysis to those with more time on their hands.If you have accomplished getting a peripheral component interconnect (PCI) or personalcomputer (PC) card-based wireless adapter to work with Linux, you are probably familiar withmany of the tools and discussion groups available that helped get you through the experience and allowed you to play with wireless all you wanted. Apple Macintosh The lack of information and easy, logical accessibility to essential s y s t e m a n d f e a t u r e configuration that would make it about 110 percent easier to do many common, expected thingswith a Macintosh operating system, is a concern for many users as well. Common, expected things in this context, mean being able to install, troubleshoot, and support Ethernet connections.To become familiar with the user interface, control panels, program installations there is a need tomaintain about 10 Mac G3s, G4s, and a few iBooks. But there is a lot missing from the Mac. For all the easyto-use hype, at least is expected one complete panel of idiot lights to tell us what ishappening or not with these systems. Even settle for a simple Link LED indicator for the Ethernetconnection I acceptable, but apparently that is asking too much. OS X is the best thing to happento Apple since it first hit the market. Maybe there is hope, only because OS X offers a full range of UNIX-based network troubleshooting toolsat least PING and TRACEROUTE without havingto scrounge for, download, and install several different third-party tools to provide these featuresto OS 9. Microsoft Windows Although Microsoft Windows is in advantage for personal and b u s i n e s s c o m p u t i n g , t h e number of wireless-specific tools available for Windows falls well behind Linux. This shortfall doesnot prevent you from using Windows for access control or as a gateway for a wireless network.Windows for desktops provides Internet connection sharing. Windows 2000 can act as a remoteaccess server to a LAN or the Internet, and will host RADIUS and other forms of access controland user authentication. Summary (about Wireless Standard) Wireless networking support provided in the current operating systems, and the software thatcomes with your network card, can help on easily jump in on the basics of the wireless wave. For more intense wireless projects, you will find the software and information links provided here tob e i n v a l u a b l e i n g e t t i n g y o u f a r t h e r a l o n g i n t o a r o b u s t a n d s e c u r e w i r e l e s s i n f r a s t r u c t u r e . Expensive and precise test equipment from Agilent (formerly Hewlett-Packards test equipmentdivision), Tektronix, Anritsu, IFR, or Motorola are the only solution in case you need to know moreabout the signals floating around in the wireless spectrum, because no amount of software for any operating system will help you. If you need more specific information about a particular network product, technology, or problem, consult any of the Web sites and list servers listed, or use your favorite Web search engine. If you feel the prospect of implementing a wireless networkis way over your head, you can probably find a suitable local vendor to help you design and builda network to suit your needs. Of course on the internet you will be amazed at the wealth of specific data available.

April2008 28 | P a g e Wireless Networks Security With the good, always comes the other part: the bad. Our job is to face with it, because if weclose our eyes, that wont disappears.We all agree that wireless technology, in many cases is making benefits to people, for the reason that is making connection among them, also in places that wires cannot. But, undoubtedlyit comes with many risks, and those in good number. It is a thing which is vulnerable to humanhacking or biological bugs; that is, the network users. Vulnerability doesnt come just from the humans, but also from the other sources of wireless signals, but especially humans.The first and the most important one of them is its security. The term wireless security mayseem a contradiction in terms. After all, how can any data sent into the open air be secure? 36 Almost every day we hear about some tries to access to some network, from someone interestedfor information; a modern thief, who doesnt want to besmirch his hands, but he seats in front of his computer, time on his hands and a lot of nerves while trying to decode some banks accounts.Often, they gain their goal. Those network stakes, will right we can say that are raised with wireless.Suddenly, one no longer needs physical presence to log data: shy bother trying to smuggleequipment onsite when you can crack from your own home or office two blocks away with a high-gain antenna? 37 The balance between making an easy connection for an average user and a safety one is notan easy job. We havent done any work if we couldnt made a simpler form of checking the e-mailfrom any user, and on the other side we have the most cryptographically sound method on the planet for authenticating a user to the system. Thus, the balance must be found, or saying witha n o t h e r w o r d s , w e s h o u l d try to make maximum security but with minimum problems i n communication between users of the network.There are many threats that come to the computers in network, which the NIST handbook AnIntroduction to Computer Security generically classifies in nine categories ranging from errors andomissions to threat to personal privacy. 38 The risks that comes from these threats, is harmless for the people, and of course for their data (information).NIST Special Publication (SP) 800-26, Security SelfAssessment Guide for Information Technology Systems, states that information must be protected from unauthorized, unanticipated,or unintentional modification. Security requirements include the following: Authenticity A third party must be able to verify that the content of a message has notbeen changed in transit.

Nonrepudiation The origin of the receipt of a specific message must be verifiable by athird party. Accountability The actions of an entity must be traceable uniquely to that entity. 39 Wireless networks, like a new way of making connections between two sides, is plenty withrisks. Those are equal to the sum of the risks of the operating a wired network (as in operating anetwork in general) plus the new risks introduced by weaknesses in wireless protocols.There are a couple of reasons why wireless networks are currently less secure than their w i r e d c o u n t e r p a r t s . F i r s t o f f , t h e r e i s t h e f a c t o f t h e i r p h y s i c a l n a t u r e . T h e y a t e w i r e l e s s , broadcasting a signal out over an area. Any computer within this area with the correct equipmentcan be considered to be connected to the network.No wires equal easier access to the network for everyone. This also makes one of the most popular hacking tactics vastly easier: packet sniffing, or capturing data sent over the network toanalyze it for information. Anyone on range can receive all traffic sent over the wireless network. 36 http://www.jiwire.com/wi-fi-security-introduction-overview.htm 37 Rob Flickenger, Building Wireless Community Networks, Chapter 3. Network Layout 3.3 SecurityConsiderations, First Edition, OReilly, January 2002 38 The NIST Handbook, Special Publication 800-12, An Introduction to Computer Security 39 T. Karygiannis and L. Owens, Wireless Network Security 802.11, Bluetooth and Handheld Devices,NIST, Technology Administration, U.S. Department of Commerce, Special Publication 800-48

April2008 29 | P a g e Figure 11. 802.11. Architecture Secondly, current security methods for the most widely available wireless technology, 802.11b,are either easy to defeat or difficult to implement. 40 Threats and vulnerabilities that come next are some of the more salient ones of the wirelesssystems:

All the vulnerabilities that exist in a conventional wired network a p p l y t o w i r e l e s s technologies. Malicious entities may gain unauthorized access to an agencys computer or voice (IPtelephony) network through wireless connections, potentially bypassing any firewall protections. Sensitive information that is not encrypted (or that is encrypted with poor cryptographictechniques) and that is transmitted between two wireless devices may be intercepted anddisclosed. Denial of service (DoS) attacks may be directed at wireless connections or devices. Malicious entities may steal the identity of legitimate users and masquerade as them oninternal or external corporate networks. Sensitive data may be corrupted during improper synchronization. Malicious entities may deploy unauthorized equipment (e.g., client devices and accesspoints) to surreptitiously gain access to sensitive information. Data may be extracted without detection from improperly configured devices. Viruses or other malicious code may be corrupt data on a wireless d e v i c e a n d b e subsequently introduced to a wired network connection. Malicious entities may, through wireless connections, connect to other agencies for thepurposes of launching attacks and concealing their activity. Interlopers, from inside or out, may be able to gain connectivity to network managementcontrols and thereby disable or disrupt operations. Malicious entities may use a third party, untrusted wireless network services to gain access to an agencys network resources. Internal attacks may be possible via as hoc transmissions. 41 The 802.11b networks can be secured (normally, not 100% percent) in two ways: by WEP (wireless encryption protocol) and MAC addressing filter. 40 http://www.pcstats.com/articleview.cfm?articleID=1489 41 T. Karygiannis and L. Owens, Wireless Network Security 802.11, Bluetooth and Handheld Devices,NIST, Technology Administration, U.S. Department of Commerce, Special Publication 800-48

April2008 30 | P a g e With the packets encryption at the MAC layer, an access point-to-point (peer-to-peer) groupcan associate only clients who know the secret key. Others can see those packets in the network traffic, but unfortunately they are encrypted.T h i s encryption key employs a 40-bit, shared RC4 PRNG (Pseudo-Random N u m b e r Generator) algorithm from RSA Data Security. There are manufacturers that have implementedtheir own proprietary extensions to WEP. They (e.g., Agere and Cisco) have included 128-bit keysand dynamic key management. Because they are belong and defined by the 802.11b standard, inpractice it is shown that these cards from different manufacturers that use these extensions, interoperate.MAC address filtering is another way that people have tried to secure their networks over andabove

the 802.11b standards. The MAC address of a network card is a 12 digit hexadecimalnumber that is unique to each and every network card in the world. Because each card has its own individual address, if you limit access to the AP to only those MAC addresses of authorizeddevices, you can easily shut out everyone who should not be on your network. 42 But, also and thishas its disadvantages, and as the biggest one is the management aspect of it.But we must have in minded that although these difficulties, it doesnt mean that we shouldntuse this kind of networking. There are some basic precautions that we have to take, in order tomake more difficult for curiosity seekers to get into our personal information. The following aresome steps, which are mentioned by Tony Bradley: Change the System ID: D e v i c e s c o m e w i t h a d e f a u l t s y s t e m I D c a l l e d t h e S S I D (Service Set Identifier) or ESSID (Extended Service Set Identifier). It is easy for ahacker to find out what the default identifier is for each manufacturer of wireless equipment soyou need to change this to something else. Use something unique- not your name or something easily guessed. Disable Identifier Broadcasting: Announcing that you have a wireless connection to theworld is an invitation for hackers. You already know you have one so you dont need tob r o a d c a s t i t . C h e c k t h e m a n u a l f o r y o u r h a r d w a r e a n d f i g u r e o u t h o w t o d i s a b l e broadcasting. Enable Encryption: WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access)encrypt your data so that only the intended recipient is supposed to be able to read it.WEP has many holes and is easily cracked. 128-bit keys impact performance slightly withouta significant increase in security so 40-bit (or 64-bit on some equipment) encryption is just as well. As with all security measures there are ways around it, but by using encryption you will keepthe casual hackers out of your systems. If possible, you should use WPA encryption (most older equipment can be upgraded to be WPA compatible). WPA fixes the security flaws in WEP but isstill subject to DOS (denial-of-service) attacks. Restrict Unnecessary Traffic: Many wired and wireless routers have built-infirewalls. They are not the most technically advanced firewalls, but they help create one more lineof defense. Read the manual for your hardware and learn how to configure your router toonly allow incoming or outgoing traffic that you have approved. Change the Default Administrator Password: T h i s i s j u s t g o o d p r a c t i c e f o r A L L hardware and software. The default passwords are easily obtained and because so manyp e o p l e d o n t b o t h e r t o t a k e t h e s i m p l e s t e p o f c h a n g i n g t h e m t h e y a r e u s u a l l y w h a t hackers try first. Make sure you change the default password on your wireless router / access point to something that is not easily guessed like your last name. Patchand Protect Your PCs: As a last line of defense you should have personalfirewall software s u c h a s Z o n e A l a r m P r o a n d anti-virussoftware installed on your computer. As important as installing the anti-virus software, you must keep it up to date.New viruses are discovered daily and anti-virus software vendors generally releaseupdates at least once a week. You also must keep up to date with patches for known 42 http://arstechnica.com/articles/paedia/security.ars/3

April2008 31 | P a g e security vulnerabilities.For Microsoft operating systems you can use Windows Update totry and help keep you current with patches. 43

Spurred by the insecurities and management issues exposed w i t h W E P a s i t w a s standardized in 802.11b, the IEEE formed Task Force 802.11i to write a good standard for wireless security. The 802.11i standard is a work in progress, but enough has been done to figureout what much of it will be. Wireless implementations are divided into two groups, legacy and new. Legacy networks are those which were put in place before the .11i standard was ratified,and new networks are those put in place after it is ratified. Both groups use 802.1X as the meansof handling credential verification, but the encryption method differs. 802.11i also specifies thatonly EAP standards which handle dynamic key generation may be used.To conform to 802.11i legacy networks will be required to use 104 bit WEP, and also use Temporal Key Integrity Protocol (TKIP, formerly known as WEP2) and Message Integrity Check( M I C ) . B o t h o f t h e s e t e c h n o l o g i e s w e r e d e v e l o p e d b y C i s c o a s p r o p r i e t a r y m e a n s o f strengthening WEP. Though they are available today, these are only available on all Cisconetworks, and then not on all platforms. TKIP addresses the IV attacks on WEP by encrypting e v e r y t h i n g b e f o r e i t i s r u n t h r o u g h t h e W E P m a c h i n e , e s s e n t i a l l y a d d i n g a n o t h e r l a y e r o f encryption to the packet. MIC adds stronger integrity checking than a simple CRC check to prevent attackers from changing messages after transmission. 44 For the Wireless Technology,scientists havent given the final word yet. New tools, methodologies, and technologies areWireless Network Security being introduced regularly to implement, enhance, detect, combat, secure, and add value to this resource. The most vulnerable part of your network may not be thelimitations of technology, and are no technical. In addition to the available solutions for the technology at hand, it is important to remember that many security issues are biological or humanin nature. Vulnerability includes using simple passwords instead of those that are more difficult toguess or reproduce; using default SSIDs or passwords; sharing passwords with others; leavingpasswords on sticky notes next to system; and of course disgruntled employees taking data away from the network on paper, diskettes, CDs, or transmitting by e-mail or file transfer protocol(FTP). The easiest pickings are had when you have direct and obvious access to the informationyou want. So limiting access to information on a need-to-know basis is also crucial. 45 Societal Implications of Wireless Connectivity As a rule, technological innovations force a society to reevaluate its core principles andsometimes make significant, often irreversible, cultural adjustments to accommodate the new technology. Wireless networking is uniquely poised to change the world in a relatively short periodof time, insofar as it engenders an unprecedented cultural situation in which users are constantlyc o n n e c t e d t o e a c h other with mobile devices through the Internet or ad hoc peer-top e e r networks.In Smart Mobs (2002), Howard Rheingold considers many of the implications of such a situation envisioning a wireless commons in which every person, object and place is connectedto the Web and assigned a unique URL, transmitting and receiving information constantly acrosst h e n e t w o r k . I n t h i s d e n s e ( a n d m o s t l y i n v i s i b l e ) w e b o f d a t a , r o a m i n g h u m a n n o d e s i n t h e network will be able to retrieve and share information about everything , everywhere, effortlessly.On the positive side, Rheingold views such a network as a means of dissolving barriers betweenpeople and fostering the formation of communities, both of divergent segments of the populationwho stand to benefit from each others knowledge, and of like-minded individuals who choose toc o n v e n e f o r s o c i a l purposes or for spur-of-the moment, cooperative political action. B o t h functions are critical for effective knowledge management. Rheingold cites several feats of political coordination enabled by wireless computer connectivity, including the 1999 World TradeOrganization protests in Seattle and the ongoing

demonstrations by bicycling Critical Mass protesters. On a more mundane level, the process of arranging ones social or business calendar 43 T. Bradley, Introduction to Wireless Network Security, http://netsecurity.about.com/mbiopage.htm 44 http://arstechnica.com/articles/paedia/security.ars/5 45 Jim Aspinwall, Installing, Troubleshooting, and Repairing Wireless Networks, McGraw-Hill, 2003, USA

April2008 32 | P a g e is streamlined when friends and colleagues can keep tabs on each others whereabouts, and communicate across the network instantly. As Rheingold points out, however, this omnisciencecomes with a price. Being permanently tied into a network requires one to relinquish a privilegethat people in this country have traditionally held very dear: privacy. If information flows freely across the network, it has the potential to be seen by anyone. Information can be intercepted over networks, whether by a nosy family member, a malevolent thief, or a government authority.Already, the prevalence of personal data theft has created calls for governmental regulation of data brokers and massive network security initiatives (Zetter, 2005). Many people are wary of anytechnology that has the ability to make our private lives public. With that in mind, Rheingold suggests that more powerful encryption technology, along the lines of the Wireless EncryptionProtocol (WEP), may be the only way that users will be able to maintain any semblance of privacyin the new wireless world.Philip Agre in his essay Welcome to the Always On World, (2001)

presents a few more socialdiscomforts that can, and have, resulted from ubiquitous human networking. Among them are: 1) constant interruptions the always on mentality can distract people from their tasks; 2) divided attention when people are constantly paying attention to maintaining their social networks andcommunications devices, they have little attention to devote to individual personal relationships;3) addiction some people become addicted to information in a networked e n v i r o n m e n t , constantly checking their email, blogs, message boards, etc., because they fear they might missout on something important; 4) boundaries when people give each other tacit permission to keep track of each others affairs, social boundaries collapse, causing what can be perceived asan invasion of each others privacy (Agre, 2001). These concerns have been manifested in use of wireless technology, and as wireless computing becomes more ubiquitous, they will only growmore intense. Therefore, it is incumbent upon people in this age to approach the use of new technology with a critical eye. People should be able to ask, What are the implications of usingthis technology? Does it make my life more manageable or more complicated? Are its benefits worth its consequences? Certainly, wireless networking will change the very fabric of our society,but we as societal participants have the opportunity to make decisions regarding just how this change will take place. The Politics of Wireless Networking The adoption of wireless networking technology comes with many political considerations aswell. One concern is how it affects the so-called digital divide. Some people view wireless networks as opening up new opportunities for learning and participation in society for people whoa r e a t a d i s a d v a n t a g e e i t h e r t h r o u g h l a c k o f m a t e r i a l r e s o u r c e s o r i n f o r m a t i o n i l l i t e r a c y . A counterargument posits, however, that building a wireless network into our societys core will onlyserve to alienate those without access to Internet service, laptops, PDAs, or wearable devices.According to Metcalfes Law, the addition of people to the network will increase the networks value, while Reeds Law suggests that adding a new group of people will increase its value evenmore. In short, a wireless society stands to benefit from the inclusion of all citizens, especially those who would otherwise be excluded.One response to this issue has been the creation of low-cost or free public wireless networksto ensure that all citizens have access to the Internet. Sponsored by libraries, philanthropists andcity or state governments, these projects have created much controversy and a series of territorialdisputes, in part because broadband Internet service providers feel they should be able to chargepeople for wireless service without fear of competition from the government. Due to their stronglobbying power in Congress, the broadband companies have posed a formidable challenge tomunicipalities, and several states are considering bills to outlaw municipal wireless projects. (Tanner, 2005) While corporations think that they should control the networks, others think thatnetworks should remain uncontrolled and subject to the will of the people. Still others argue for more government involvement. Rheingold (2002) discusses the case of government projects, likeCalifornias Center for Information Technology Research in the Interest of Society (CITRIS) thatuse wireless networks as a security infrastructure in case of a catastrophic event. In part becausewireless networks lack the physical constraints of wired networks, the question of who has the

April2008 33 | P a g e right to exercise control over them is a difficult one that will need to be decided in the near future. 46 We live in exciting times, when hosts of emerging wireless technologies promise radical c h a n g e i n o u r m o d e s o f p e r c e p t i o n , i n t e r a c t i o n , d e m o c r a t i c p a r t i c i p a t i o n , a n d t i m e a n d information management. As new technology is developed, we will witness even greater change,which hopefully will benefit society, rather than harm it. In the meantime, we have an obligation toapproach that technology with a certain degree of criticality. 46 H. Nodler, A World Without Wires: The future of Wireless Networking, Knowledge Management Systems,Dr. Don Turnbull, May 3, 2005

April2008 34 | P a g e Conclusion

Increasing the security of wireless networking is becoming essential and necessity. Thisb e c a u s e t h e w i r e l e s s n e t w o r k s h a v e t h e u n d e s i r a b l e p r o p e r t y t h a t a l l d a t a t r a n s m i t t e d i s broadcast to all wireless clients on the network. This leaves open the possibility of eavesdroppingon private information and it appears as perfect opportunity for hackers to use it for their own benefit.H o w e v e r t h e r e are improvements that have occurred in both confidentiality andauthentication, by including the 802.11 wireless standards. This s t a n d a r d i s a p r o t o c o l f o r encryption in wireless networks called WEP. Basically this was a huge improvement over plain-text communication. Above mentioned standard it also served as a catalyst for hackers who wished to gain access the data that are being transmitted through a wireless network. This secured a t a i n c l u d e d bank transactions, e-commerce sales, and several others. Later on s e v e r a l weaknesses were discovered in the WEP protocol that allowed hackers to decode data.In the same time the computer security community reaches by improving some of the known weaknesses in the WEP protocol. Also, the most secure networks do not use a single pre-shared key, because most of the weaknesses with WEP involved capture vast amounts of dataencrypted with a single key. As substitute for this they use a protocol that provides user with a session key after authenticates each of them. But, if single user keeps a session open for a longtime, it is likely that an attacker could discover the session key. Even if the case when the sessionkey is compromised, the attacker will only have the ability to read the messages for the remainder of that session.Wireless Network use will continue to grow and become more important over the next five years.One of the most common questions about wireless is, How far will it go?As with most answers about technical things, it depends. 802.11b was designed with native, unmodified, unenhanced devices to extend the length of a 10BaseT Ethernet wire by 300 meters.This equals 985 feet, about a city block, or 0.18 miles. Unobstructed, unimpeded with line-of- sight, 802.11b will do just that and probably more. But who is going to hold their laptops abovetheir heads or mount an access point itself on a rooftop to communicate digitally? Who knows what will happen after 10 yearsNew standards will be created, old standards willdie offIt is the choices of today which will inevitably help to shape the emerging world of wireless tomorrow.

April2008 35 | P a g e References 1.Call for Papers Wireless Mesh N e t w o r k i n g www.comsoc.org/dl/pcm/mesh_cfp.htm 2.O'Reilly Network -- Wireless Mesh Networking http://www.oreillynet.com/pub/a/ wireless/2004/01/22/wirelessmesh.html3 . P C M a g a z i n e W i r e l e s s M e s h N e t w o r k s 1 &4.PC Magazine Wireless Mesh Networks 2 http://www.findarticles.com/p/articles/mi_zdpcm/is_200307/ai_ziff435645. Primer Wireless Mesh

Networkswww.baselinemag.com/article2/0,1540,1858551,00.asp6.Surfability solutions Wireless 'mesh' networks www.surfability.com/ITC/mesh.php7.Wireless mesh network - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Wireless_mesh_network 8. Wireless mesh networks boost reliability - Network Worldwww.networkworld.com/news/tech/2003/1110techupdate.html9. I.F.Akyildiz, X. Wang, W. Wang: Wireless mesh networks: a survey,available online(from 1January 2005)10. An Overview of Wireless Network Securityhttp://www.windowsnetworking.com/articles_tutorials/Overview-WirelessNetwork-Security.html11. Beginners Guides Wireless Network Security - PCStats_com 1&Beginners Guides Wireless Network Security - PCStats_com 2http://www.pcstats.com/articleview.cfm?articleID=148912. Complete Guide to Wi-Fi Securitywww.jiwire.com/wi-fi-security-introduction-overview.htm13. Robert J. Boncella, WIRELESS SECURITY: AN OVERVIEW, Washburn University,Communications of the Association for Information Systems (Volume 9, 2002)14. Jim Aspinwall, Installing, Troubleshooting, and Repairing Wireless Networks,McGraw-Hill, 2003, USA15. T. Karygiannis and L. Owens, Wireless Network Security 802.11, Bluetooth andHandheld Devices, NIST, Technology Administration, U.S. Department of Commerce,Special Publication 800-4816. N.Aboudagga, D. Giry*, J.J.Quisquater;WIRELESS SECURITY DESIGN OVERVIEW,UCL Crypto Group - Place du levant, 3 - 1348 Louvain-la-Neuve Belgium17. Tara M., Charles R. Elden; Wireless Security and Privacy: Best Practices andDesign Techniques, Addison Wesley, September 13, 200218. Rob Flickenger, Building Wireless Community Networks, First Edition, OReilly,January 2002

April2008 36 | P a g e 19. Wireless home:1.http://www.wirelessdevnet.com/news/2006/mar/31/news5.html2.http://www.hom etechnews.com/info/2006/03/31/122000.html20. Wireless Standard: 20. 1. IEEE 802.16 -> http://wirelessman.org/tutorial/ http://www.palminfocenter.com/view_story.asp?ID=4936 http://www.geek.com/news/geeknews/2003Feb/bpd20030203018457.htm http://csdl2.computer.org/comp/mags/ds/2004/08/o8004.pdf 2 0 . 2 . 8 0 2 . 1 5 > http://searchmobilecomputing.techtarget.com/sDefini tion/0,,sid40_gci837226,00.html http://shop.ieee.org/ieeestore/product.aspx?product_no=SP113120.3. 802.11Wireless LAN Medium Access IEEE 802.11", June, 2003William A. Arbaugh, Narendar Shankar, and Y.C. Justin Wan, "802.11 Wireless Network.pdf",March 30, 2001

Wireless 802.11 Standards.pdf 21. Wireless Networks Software JIM ASPINWALL, "Installing, Troubleshooting, and Repairing Wireless Networks.pdf22. H. Nodler, A World Without Wires: The future of Wireless Networking,Knowledge Management Systems, Dr. Don Turnbull, May 3, 200523. Microsoft, Getting Started Guide To Wireless Networks, University of Birmingham, 200324. Introduction to 802.11 Wireless Networks standard; CyberScience laboratory; May 200325. Tanenbaum, Andrew S; Computer Networks26.http://en.wikipedia.org/wiki/Wireless_PAN27. White paper; HP Broadband Wireless notebooks: integrated high-speed wireless connectivity 28 http://www.wirelessdevnet.com/channels/bluetooth/features/bluetooth.html 29 http://www.holtmann.org/lecture/bluetooth/Bluetooth.pdf 30 http://www.wi-fiplanet.com/columns/article.php/219577131Franklin, Tom Wireless Local Area Network 2001 32http://www.windowsnetworking.com/articles_tutorials/Introduction-WirelessNetworking-Part1.html

April2008 37 | P a g e

33http://en.wikipedia.org/wiki/WWAN 34http://en.wikipedia.org/wiki/WWAN/ Microsoft - Wireless WAN Interface 35 http://www.sprint.com/business/resources/CaseStudy_HP.pdf 36 http://www.brabantbreedband.nl/publications/openingssymposium/08.%20Erik %20Fledderus. pdf 37 http://www.newsfactor.com/story.xhtml?story_id=41852 38 http://www.bitpipe.com/rlist/term/WLAN.html?src=ggbp74185i&CMP=KNCGoogleAdwords&HBX_PK=wireless+LAN&HBX_OU=50 39 http://www.sss-mag.com/wlan.html 40 http://www.windowsnetworking.com/articles_tutorials/Introduction-Wireless-NetworkingPart1.html 41 http://www.windowsnetworking.com/articles_tutorials/Introduction-Wireless-NetworkingPart2.html 42 http://www.wirelessdevnet.com/channels/bluetooth/features/bluetooth.html 43 http://www.wi-fiplanet.com/columns/article.php/2195771 44 http://www.javvin.com/protocolWiMAX.html 45 http://www-run.montefiore.ulg.ac.be/Research/Topics/index.php?topic=Mobile 46 http://www.verilan.com/news/wilan.shtml 47 http://en.wikipedia.org/wiki/Wireless_PAN 48 http://www.sprint.com/business/resources/CaseStudy_HP.pdf 49 http://www.holtmann.org/lecture/bluetooth/Bluetooth.pdf 50Introduction to 802.11 Wireless Networks standard; CyberScience laboratory; May 200351Aspinwall, Jim Installing, troubleshooting and repairing wireless networks USA 2003:McGrawHill52Karygiannis,Tom ; Owens.Les ;Wireless Network Security 802.11, Bluetooth and Handheld Devices, Gaithersburg,November 2002.53Tanenbaum, Andrew S ; Computer Networks54White paper ;HP Broadband Wireless notebooks: integrated high-speed

April2008 38 |

P a g e wireless connectivity58. Franklin, Tom Wireless Local Area Network, 200159. White paper; Wireless LANs vs. Wireless WANs; 2002 November 18; Sierra Wireless Abbreviations List PDA Personal digital assistanceWPAN Wireless Personal Area NetworkWLAN Wireless Local Area NetworkWMAN Wireless Metropolitan Area NetworkPC Personal Computer DNS Domain Name SystemMbps Mega bit per secondPOS Personal Operating SpaceSIG Special Interest GroupIEEE Institute of Electrical and Electronics EngineersRF Radio frequencyWi-Fi Wireless FidelityMMDS Multichannel multipoint distribution serviceGSM Global System for Mobile CommunicationsCDPD Cellular Digital Packet Data CDMA Code Division Multiple AccessISM Industrial, Scientific and MedicalVoIP Voice-over Internet Protocol DSL Digital Subscriber LineSC Single-Carrier SS Subscriber StationFCC Federal Communications Commission

April2008 39 | P a g e GPRS General Packet Radio Service

April2008 40 | P a g e Glossary Ad-hoc An ad-hoc network (sometimes known as a "spontaneous") is a local area network or other smallnetwork, especially one with wireless or temporary plug-in connections, in which some of the network devices are part of the network only for the duration of a communications session or, inthe case of mobile or portable devices, while in some close proximity to the rest of the network. InLatin, ad hoc exactly

means "for this," further meaning "for this purpose only," and as a result usually temporary. PDA Personal Digital Assistant is a term for any small mobile hand held d e v i c e t h a t p r o v i d e s computing and information storage retrieval capabilities for personal or business use, often for keeping schedule calendars and adress book information handy. WPAN Wireless Personal Area Network; personal area means up to 10 meter r a d i u s . E x a m p l e : Bluetooth, IEEE 802.15 WLAN A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier: thelast link with the users is wireless, to give a network connection to all users in the surrounding area. Areas may range from a single room to an entire campus. The backbone network usuallyuses cables, with one or more wireless access points connecting the wireless users to the wirednetwork. WMAN Wireless Metropolitan Area Network: A regional wireless computer or communication network spanning the area covered by an average to large city. WWAN WWAN stands for Wireless wide area network. Like WLAN i.e, wireless LAN WWAN works but ona wider scale. The architectural details about WWAN can be obtained from any site describing or defining wireless network IP addresses A unique number identifying every computer on the Internet (like 62.162.99.55) DNS A computer program running on a web server, translating domain names into IP addresses Access point (AP) A wireless network interface device, acting as or replacing the function of the hub or switch in awired network, to allow wireless network cards in client systems to connect to a LAN or the Internet. IEEE

April2008 41 | P a g e Institute of Electrical and Electronics Engineers Inc. is a nonprofit, t e c h n i c a l p r o f e s s i o n a l association of more than 360,000 individual members in approximately 175 countries that is anauthority in technical areas such as computer engineering and telecommunications. Radio Frequency (RF) Electro-magnetic waves used in radio communications to carry information. WiFi

Wireless fidelity is the generic term for 802.11 technology WiMax Popular name of the 802.16 wireless metropolitan-area network standard that's currently beingdeveloped. WiMax, which will have a range of up to 31 miles, is primarily aimed at making broadband network access widely available without the expense of stringing wires (as in cable-access broadband) or the distance limitations of Digital Subscriber Line. There are two flavors of WiMax: 802.16-2004 or 802.16d, for fixed implementations, and 802.16e, for mobile service 2G Most common type of wireless telephone communication t o d a y . I t a l l o w s s l o w d a t a communication, but its primary focus is voice. 3G 3G stands for the third generation of wireless communication technology. It refers to pending improvements in wireless data and voice communications through any of a variety of proposedstandards. The immediate goal is to raise transmission speeds to 2Mbit/sec. Code Division Multiple Access (CDMA) Code Division Multiple Access is a digital cellular technology that u s e s s p r e a d s p e c t r u m techniques that, instead of separating users by frequency, separates them through the use of digital frequency codes across the full available spectrum. Competes with GSM and TDMA CDMA2000 CDMA2000 is a radio transmission technology for the evolution of narrowband cdmaOne/IS-95 to3rd-generation adding up multiple carriers. ISM (Industrial, Scientific and Medical) Industrial Scientific and Medical bands were originally created for the purpose of short range connectivity between equipment used in these fields of application. Federal Communications Commission (FCC) A government agency in the United States. The FCCs recent limitations on EMI have greatly affected digital electronic systems and power supplies in design and production VoIP

April2008 42 | P a g e Voice over Internet Protocol is a system for delivering digitized voice communications across IPnetworks. VoIP technology allows phone calls to be made between compatible handsets or on computers with appropriate software. ETSI (The European organization) The European Telecommunications Standards Institute (ETSI) is a standardization organization of the telecommunications industry (equipment makers and network operators) in Europe, with worldwide projection. ETSI has been successful in standardizing the GSM cell phone system.

Bluetooth A short-range radio technology aimed at simplifying communications among various devices. It ismost often used for nonnetwork/Internet applications, such as remote controls, wireless headsets,mice and keyboards, and printers. GPRS General Packet Radio Service technology runs at speeds up to 115Kbit/sec., compared with the9 . 6 K b i t / s e c . o f o l d e r G S M s y s t e m s . I t e n a b l e s h i g h - s p e e d w i r e l e s s I n t e r n e t a n d o t h e r communications such as e-mail, games and applications. It supports a wide range of bandwidthsand is an efficient use of limited bandwidth. It's particularly suited for sending and receiving smallamounts of data, such as e-mail and Web browsing, as well as large volumes of data. GSM Global System for Mobile Communications is a digital cellular system b a s e d o n T D M A narrowband technology, which gives users access to time slots on the same frequency bands. Itallows up to eight simultaneous communications on the same frequency. It competes with CDMA CDPD Cellular Digital Packet Data technology is used by telecommunications carriers to transfer data tousers via unused analog cellular networks. If one part of the network -- a specific geographic areaor "cell" -- is overused, CDPD can automatically reallocate network resources to handle extra traffic. Gateway The Internet protocol (IP) address of the router, switch, cable, or digital subscriber line (DSL) modem through which your PCs gain access to the Internet or foreign (nonlocal) networks. Mobitex Mobitex is a packet-switched, narrowband PCS network, designed for wide-area wireless datacommunications. It was developed in 1984 by Eritel, an Ericsson subsidiary, a nd there are nowover 30 Mobitex networks in operation worldwide AT&T Wireless AT&T Wireless Services, Inc. was, before October 26, 2004, the third-largest wireless telephonecarrier in the United States, based in Redmond, Washington, and trading on the New York StockExchange under the stock symbol, AWE. Formerly part of AT&T Corp., as of January 1, 2004, thelargest single shareholder of AT&T Wireless was Japan's NTT DoCoMo.

April2008 43 | P a g e Sprint PCS Sprint Corporation is one of the world's largest telecommunication companies. It is a global communications provider and a major competitor in the American cellular phone market, throughits Sprint PCS service based on CDMA and PCS, and local

telephone service in some smaller markets. It is also a Tier 1 internet service provider under the name SprintLink. Verizon Verizon Communications is a New York City-based local exchange telephone company formed bythe merger of Bell Atlantic, a former Bell Operating Company, and GTE, which was the largestindependent local-exchange telephone company in the U.S., with presence in most all of the continental United States and Hawaii. NDIS Network Driver Interface Specification - definition of interface between the local network operatingsystem and the network adapter. CSMA/CA Carrier Sense Multiple Access/Collision Avoidance is the principle medium access methodemployed by IEEE 802.11 WLANs. It is a "listen before talk" method of minimizing (but noteliminating) collisions caused by simultaneous transmission by multiple radios. IEEE 802.11states collision avoidance method rather than collision detection must be used, because the standard employs half duplex radios - radios capable of transmission or reception, but not bothsimultaneously. MAC Every wireless 802.11 device has its own specific Media Access Control address hardcoded intoit. This unique identifier can be used to provide security for wireless networks. When a networkuses a MAC table, only the 802.11 radios that have had their MAC addresses added to that network's MAC table are able to get onto the network. Abstract Syntax Notation (ASN) An OSI language used to define datatypes for networks. It is used within TCP/IP to provide conformance with the OSI model. Distribution system (DS) Means a distribution network, together with the connection assets associated with the distributionnetwork, which is connected to another transmission or distribution system. International Telecommunication Union (ITU)CTIA The Cellular Telecommunications & Internet Association is the international organization that aimsto represent all elements of wireless communication - cellular, personal communications services,enhanced specialized mobile radio and mobile satellite services and serves the interests of service providers, manufacturers and others.

April2008 44 | P a g e Accenture Accenture is a global management consulting, technology services and outsourcing company. Itso r g a n i z a t i o n a l s t r u c t u r e i n c l u d e s d i v i s i o n s b a s e d o n c l i e n t industry types and employeew o r k f o r c e s . I n d u s t r y d i v i s i o n s , r e f e r r e d t o a s O p e r a t i n g G r o u p s , i n c l u d e P r o d u c t s , Communications and High Technology, QWERTY

The name QWERTY for our typewriter keyboard comes from the first s i x l e t t e r s i n t h e t o p alphabet row(The one below the numbers). It is also called the Universal Keyboard. It was invented by CLSholes who put together the prototypes of the first commercial typewriter back inthe 1860`s. The keyboard arrangement was considered important enough to be included on Shole`s patent granted in 1878, some years after the machine was put into production EVDO Evolution Data Only,Evolution Data Optimized, often abbreviated as EVDO, EV-DO, EvDO, 1xEV-DO or 1xEvDO is a wireless radio broadband data protocol being adopted by many CDMA mobilep h o n e p r o v i d e r s i n J a p a n , K o r e a , I s r a e l , t h e U n i t e d S t a t e s , a n d C a n a d a a s p a r t o f t h e CDMA2000 standardGUnzip, WinTel Wintel is a colloquial, often pejorative, term used to describe desktop computers of the type commonly used in homes and businesses since the late 1980s. NIST NIST in the Department of Commerces Technology Administration was established by Congressto assist industry in the development of technology needed to improve product quality, modernizemanufacturing processes, ensure product reliability, and facilitate rapid commercialization of products based on new scientific discoveries. TKIP In computing, TKIP (Temporal Key Integrity Protocol) is a security protocol defined in IEEE802.11i specifications for WiFi networks to replace WEP. TKIP was designed to replace WEP without replacing legacy hardware. This was necessary because the breaking of WEP left WiFinetworks without viable link-layer security.

Wireless Network Project DownloadPrintMobileCollectionsReport Document Report this document? Please tell us reason(s) for reporting this document Top of Form

Spam or junk Porn adult content

Hateful or offensive If you are the copyright owner of this document and want to report it, please follow these directions to submit a copyright infringement notice. Report Cancel Bottom of Form This is a private document. Info and Rating Reads: 37,333 Uploaded: 03/25/2009 Category: Research Rated: (91 Ratings) Copyright: Attribution Non-commercial

A research project about Wireless Network Network wireless Wireless Network Network wireless Wireless Network (fewer) Follow stratackus

Share & Embed Related Documents PreviousNext 1.

23 p.

10 p.

27 p. 2.

27 p.

16 p.

20 p.

3.

24 p.

10 p.

35 p. 4.

52 p.

52 p.

52 p. 5.

52 p.

52 p.

52 p. 6.

35 p.

7 p.

12 p. 7.

12 p.

7 p.

337 p. 8.

337 p.

337 p.

36 p. 9.

14 p.

1 p.

77 p. 10.

1 p.

1 p.

1 p. 11.

21 p.

19 p.

14 p. 12.

333 p.

333 p.

333 p. 13.

31 p.

1 p.

1 p.

14.

1 p.

1 p.

1 p. 15.

2 p.

50 p.

50 p. 16.

50 p.

14 p.

4 p. 17.

315 p.

8 p.

10 p. 18.

14 p.

7 p.

6 p. 19.

205 p.

20 p. More from this user PreviousNext 1.

601 p.

3 p.

17 p. 2.

6 p.

2 p.

18 p. 3.

25 p.

43 p.

4.

44 p.

30 p.

11 p. 5.

2 p.

11 p. Recent Readcasters

Add a Comment Top of Form

Submit Characters: 400

Bottom of Form

Shubham Saurabhleft a comment anybody if you hav got a copy of dis please please mail me at shub_sau@live.com..thnx a lot in advance..!! 11 / 14 / 2011 Reply

Ali Ahmedleft a comment who has a copy ,could you send it to me on my e mail,yousefabohamra@gmail.com,thanks for every body 11 / 13 / 2011 Reply

Ali Ahmedleft a comment Could you send me a copy of this document on my e mail:yousefabohamra@gmail.com,thanks 11 / 13 / 2011 Reply

M left a comment can you please send me a copy of document, to milan88.randjelovic@gmail.com thanks in advance 09 / 24 / 2011 Reply

Kevin Murrayleft a comment please send me a copy to my email vinkerry@gmail.com

08 / 20 / 2011 Reply Show More Print This Document High Quality Open the downloaded document, and select print from the file menu (PDF reader required). Download and Print Closes in seconds. X Use your Facebook login and see what your friends are reading and sharing. Other login options Login with Facebook Top of Form

Bottom of Form Signup I don't have a Facebook account Top of Form

email address (required) create username (required) password (required) Send me the Scribd Newsletter, and occasional account related communications. Sign UpPrivacy policy You will receive email notifications regarding your account activity. You can manage these notifications in your account settings. We promise to respect your privacy. Bottom of Form Why Sign up? 1. 1. Discover and Connect With people of similar interests 2. 2. Publish Your Documents Quickly and easily 3. 3. Share Your Reading Interest On Scribd and social sites like Facebook and Twitter

Already have a Scribd account? Top of Form

email address or username password Log In Trouble logging in? Bottom of Form Login Successful Now bringing you back...

Reset Your Password Back to Login Please enter your email address below to reset your password. We will send you an email with instructions on how to continue. Top of Form

Email Address: You need to provide a login for this account as well. Login Submit Bottom of Form Upload a Document Top of Form

Search Documents Bottom of Form Follow Us! scribd.com/scribd twitter.com/scribd facebook.com/scribd About Press Blog Partners Scribd 101

Web Stuff Support FAQ Developers / API Jobs Terms Copyright Privacy

Copyright 2012 Scribd Inc. Language: English Choose the language in which you want to experience Scribd: English Espaol Portugus (Brasil)

scribd. scribd. scribd. scribd. scribd. scribd. scribd. scribd. scribd. scribd. scribd. scribd. scribd. < div style="display: none;"><img src="//pixel.quantserve.com/pixel/p-13DPpbyg8ofc.gif" height="1" width="1" alt="Quantcast"/></div> <img src="http://b.scorecardresearch.com/p?c1=2&c2=9304646&cv=2.0&cj=1" />

S-ar putea să vă placă și