Sunteți pe pagina 1din 56

WIRELESS DEVICES

Wireless devices
Very common in recent years for serial
transmission of bits
Based on InfraRed (IR) or radio frequencies
after suitable modulation of data bits
Network using innovative FHSS or DSSS
transmitters and receivers
Popular protocols IrDA, Bluetooth, Wi Fi,
802.11 and ZigBee
InfraRed (IR)
Origin of the Term
Latin infra meaning below.
Red has the longest wavelength.
The name means below red,
INFRAED=INFRA+RED
Introduction
Electromagnetic radiation
Higher frequency
wavelength
Invisible light







Sub-Division Scheme
Near-infrared
Short-wavelength infrared
Mid-wavelength infrared
Long-wavelength infrared
Far infrared
Wireless Communication
Short-range wireless communication.
Line of sight communication.
Data transmission bidirectionally.
Computer infrared network adapters both
transmit and receive data through ports on a
device.

Wireless Communication
An Ir source communicates over a line of sight and
the receiver of photo transistor is used for detecting
Infrared rays
Uses
In mobile phones,
Digital cameras, Image scanners
Keyboard & mouse,
Printers to communicate to laptop or computer
For data and pictures download and
synchronization.
Used for remote control for TV,
Air-conditioning,
LCD projector, VCD devices from a distance
Wireless Communication
Infrared technology used in local networks
exists in three different forms:
1 . IrDA-SIR
2 . IrDA-MIR
3 . IrDA-FIR

IR Data Transmission Techniques
Directed Beam Infrared
Ominidirectional
Diffused

Directed Beam Infrared
Used to create point-to-point links
Range depends on emitted power and degree
of focusing
Focused IR data link can have range of
kilometer


Directed Beam Infrared - II
Omni directional
Single base station within line of sight of all
other stations on LAN
Station typically mounted on ceiling
Base station acts as a multiport repeater
Ceiling transmitter broadcasts signal received by
IR transceivers
IR transceivers transmit with directional beam
aimed at ceiling base unit

Omni directional - II
Diffused
All IR transmitters focused and aimed at a
point on diffusely reflecting ceiling
IR radiation strikes ceiling
Reradiated omnidirectionally
Picked up by all receivers


Types of Protocols
Required IrDA Protocols
Optional IrDA Protocols
Required Protocols
Physical Layer
IrLAP
IrLMP
IAS
Optional Protocols
Tiny TP
IrOBEX
IrCOMM
IrLAN
Infrared Layers
constitute the complete Infrared
Communication Protocol
for Data Transfer and Communication
between IrDA devices
these layers combine to form the Infrared
Communication possible in this network
IrDA Protocol Stack
IrPHY (Infrared Physical
Layer)
equivalent to Physical layer of OSI
model
handles the Medium
transformation rates and
connectivity characteristics
IrLAP (Infrared Link Access Protocol)
Access control
Discovery of potential communication
partners
Establishing of a reliable bidirectional
connection
Negotiation of the Primary/Secondary device
roles
Embedded stack Layers
IrLMP (Infrared Link Management Protocol)
LM-MUX (Link
Management Multiplexer)
lies on top of the IrLAP layer.
provides multiple logical channels
allows change of Primary/Secondary
devices
LM-IAS (Link Management
Information Access Service)
provides a list, where service providers can
register their services
other devices can access these services via
querying the LM-IAS.
Tiny TP (Tiny Transport Protocol
provides Transmission and
Flow control features in IrDA
Network
IrCOMM (Infrared Communications
Protocol)
acts like a serial or parallel port
on top of transmission layer
for application integration
IrOBEX (Infrared Object Exchange)
OBEX is optional (Object Exchange)
provides the exchange of arbitrary data objects
(e.g., vCard, vCalendar or even applications)
between infrared devices
IrLAN (Infrared Local Area Network)
the optional IrLAN (Infrared Local Area
Network) provides the possibility to connect an
infrared device to a local area network.

Methods
Access
Point
Peer to
Peer
Hosted
IrS (IrSimple)
enhancing transfer rates 4 10
times
provides backward compatibility
with other IrDA Protocols
Kataria Arvind P.
Wi-Fi, or Wireless Fidelity, is freedom: it allows a person
to connect to the Internet

Wi-Fi is a wireless technology. Wi-Fi enabled
computers send and receive data indoors and out;
anywhere within the range of a base station.

Its just as fast as a cable modem connection.

Allows you to access the Internet while on the move ;
you can remain online while moving from one area to
another, without a disconnection or loss in coverage.
it is possible to create high-speed wireless local
area networks

Wireless Technology is commonly used for
connecting devices in wireless mode.

Wi-Fi (Wireless Fidelity) is a generic term that
refers to the IEEE 802.11 communications standard
for Wireless Local Area Networks (WLANs).

Wi-Fi Network connect computers to each other,
to the internet and to the wired network.
Why Wi-Fi?

Setup Cost Reduced cabling required

Flexibility Quick and easy to setup in temp or
permanent space

Scalable Can be expanded with growth

Freedom You can work from any location that
you can get a signal

Lower total cost of ownership Because s of
affordability and low install cost Additionally

THE WI-FI TECHNOLOGY
Wi-Fi Networks use Radio Technologies to transmit &
receive data at high speed:

IEEE 802.11b

IEEE 802.11a

IEEE 802.11g
IEEE 802.11B

Appear in late 1999

Operates at 2.4GHz radio spectrum

11 Mbps (theoretical speed) - within 30 m Range

4-6 Mbps (actual speed)

100 -150 feet range

Most popular, Least Expensive

Interference from mobile phones and Bluetooth devices which
can reduce the transmission speed.
IEEE 802.11A
Introduced in 2001

Operates at 5 GHz (less popular)

54 Mbps (theoretical speed)

15-20 Mbps (Actual speed)

50-75 feet range

More expensive

Not compatible with 802.11b

IEEE 802.11G
Introduced in 2003

Combine the feature of both standards (a,b)

100-150 feet range

54 Mbps Speed

2.4 GHz radio frequencies

Compatible with b


What do you need to do Wi -fi?

Existing wired network/services (Infrastructure
Mode)

DHCP/DNS

Access point

Antennas and bridges

Wireless adapter
ELEMENTS OF A WI-FI NETWORK
Access Point (AP) - The AP is a wireless
LAN transceiver or base station that can
connect one or many wireless devices
simultaneously to the Internet.

Wi-Fi cards - They accept the wireless
signal and relay information. They can be
internal and external.(e.g PCMCIA Card
for Laptop and PCI Card for Desktop PC)

Safeguards - Firewalls and anti-virus
software protect networks from uninvited
users and keep information secure.
WI-FI NETWORK TOPOLOGIES
Point-to-point topology



Point-to-multipoint topology




Mesh topology

Point-to-point TOPOLOGY
Usually very high speed and
high capacity

Requires a clear line of sight to
tower

Backbone, or backhaul
connectivity

Corporate/Business Class
service

.
Point-to-multipoint
Similar technology to point-to-
point network

This is used to connect a LAN in
one building to a LANs in other
buildings even if the buildings are
miles apart
Mesh
Distributed gateway devices

Self healing network

Uses multiple radios in tight
formation

Micro cell concept
Relatively easy to deploy
WI-FI CONFIGURATIONS
WI-FI CONFIGURATIONS
WI-FI CONFIGURATIONS
WI-FI APPLICATIONS
Home

Small Businesses

Large Corporations & Campuses

Health Care

Wireless ISP (WISP)

Travellers

WI-FI SECURITY THREATS

Eavesdropping


Man-in-the-middle attacks


Denial of Service

EAVESDROPPING
Easy to perform, almost impossible to detect
By default, everything is transmitted in clear text
Usernames, passwords, content ...
No security offered by the transmission medium
Different tools available on the internet
Network sniffers, protocol analysers . . .
Password collectors
With the right equipment, its possible to eavesdrop
traffic from few kilometers away
MITM ATTACK


Attacker spoofes a disassociate
message from the victim

The victim starts to look for a new
access point, and the attacker
advertises his own AP on a
different channel, using the real
APs MAC address

The attacker connects to the real
AP using victims MAC address
DENIAL OF SERVICE
Attack on transmission frequecy used
Frequency jamming
Not very technical, but works

Attack on MAC layer
Spoofed deauthentication / disassociation messages
can target one specific user

Attacks on higher layer protocol (TCP/IP protocol)
SYN Flooding

ADVANTAGES
Mobility
Ease of Installation
Flexibility
Cost
Reliability
Security
Use unlicensed part of the radio spectrum
Roaming
Speed


DISADVANTAGES
To no longer The use of WiFi
band that is 2.4 GHz does not
require a license in most
countries provided that is stays
below limit of 100mW.

And one accepts interference
from other sources; including
interference which causes the
users devices function.
LIMITATIONS
Interference

Degradation in performance

High power consumption

Limited range
BLUETOOTH

S-ar putea să vă placă și