Wireless Network Pro

download Wireless Network Pro

of 30

Transcript of Wireless Network Pro

  • 8/3/2019 Wireless Network Pro

    1/30

    Name : Ramesh Kumar Yadav Submitted To :

    Enroll. No. : 03416204410 Mr. Ashwani Kumar

    Subject : NUES (MCA 261) Signature ________

  • 8/3/2019 Wireless Network Pro

    2/30

    1

    Table of Contents:

    Abstract..... 2

    Introduction..................2

    How it started?.........2

    The wireless networks components..........4

    Wireless Network Technology: Overview and Applications.....5

    Types of Wireless Networks.......9

    Comparing Wireless LAN with Wireless WAN...12

    Wireless Standards....13

    IEEE standard 802.11...13

    Architecture of IEEE 802.11 standard....14

    The independent BSS as an ad hoc network....13

    The IEEE 802.11 subsets.....15

    IEEE standard 802.15...16

    IEEE standard 802.16...17

    Wireless Home...17

    Wireless Networks Software.18

    Wireless Networks Security..20

    Societal Implications of Wireless Connectivity..20

    The Politics of WirelessNetworking21

    Conclusion .... 22

    Abbreviations List...23

    Glossary..24

  • 8/3/2019 Wireless Network Pro

    3/30

    2

    Abstraction

    Undoubtedly, Wireless networks are changing the way people connect to each other and that

    very fast. This kind of networks has become popular since the first days of introduction and use.

    I believe that this was our primary reason, why we as a team have chosen this topic as our

    Research Project. Through him (RP), we think to cover some important details and necessarythings which have to know everyone who thinks to use this kind of network.

    The Project includes an introduction part and overview; skip through general types of wireless

    networks and their applications to wireless standards, to later on continue with wireless software

    and also with the wireless security. Our idea was to cover also the impact of this new technologyin the modern world and changes made. With the paper, comes everything which fulfils normal

    Research Project standards. We suppose that time spent on reading it, wont be a wasted time.

    Introduction

    Any sufficiently advanced technology is indistinguishable from magic.

    Arthur C. Clark

    If you want to make a call from your mobile, if you want to check your email from your PDA, if

    you want to receive a message in your pager, if you want to make data portable and if you dontwant to have cable problems than all you need is WIRELESS NETWORK.

    How it started?

    Wireless Network started as a research project of the University of Hawaii. It has been

    surprisingly around for a little over 30 years.

    In Hawaii Islands, people there needed a wireless network to connect universities in 4 Islands.The result of the researchers was Alohanet which was predecessor of nowadays WLAN. Even

    that Alohanet it was a mess of networks it still reached the goal and achieved data transmission

    1-2Mbps which was very impressive for that time.

    Over the last couple of years Wireless Network has begun to see various incremental

    enhancements and adaptations to the protocol as it grows to meet industrys needs1.

    Wireless technologies are increasingly becoming popular in our everyday lives. Government

    agencies, public places, businesses are using it more and more in their environment.

    Devices commonly used for wireless networking include portable computers, desktop computers,

    hand-held computers, personal digital assistants (PDAs), cellular phones, pen-based computers,and pagers.

    You may also ask why wireless instead of wired networks? Because in the simplest sense wirednetworks are for communication between fixed locations and wireless is for communication

  • 8/3/2019 Wireless Network Pro

    4/30

    3

    between devices, so this means that we are not anymore dependable on the location. Also the air

    is free so why dont we use it So, as we said the basic idea behind the wireless network isnetwork connections without wires.

    Less wiring means greater flexibility, portability, increased efficiency, and reduced wiring costs.

    Wireless technologies cover a broad range of differing capabilities oriented toward different usesand needs. They range from global voice and data networks, which allow users to establish

    wireless connections across long distances, to infrared light and radio frequency technologiesthat are optimized for short-range wireless connections.

    Components of Wireless Networks (as we can see from the configuration in the figure 12) are all

    directly replacing the common wired network components one per one where wireless network

    card replaces the wired network card; radio waves replaces Ethernet cabling, plugs and jacks and

    a wireless network access point unit replaces the Ethernet hub.

    Fig 1. Wired network components replaced by wireless network component

    This figure contains the simplest network configuration and it doesnt show the network

    addressing and configuration details-IP addresses, gateways, DNS etc.

  • 8/3/2019 Wireless Network Pro

    5/30

    4

    The wireless networks components

    It is consisted of two types of equipment:

    Wireless station (it can be laptop, notebook personal computer, desktop PC, PDA,barcode scanner etc)

    Access point (it functions as a base station for wireless network, aggregating multiplewireless stations onto wired network.

    Theoretical ranges for wireless LAN 802.11 are from 29 meters (for 11 Mbps) in a closed officearea to 485 meters (for 1 Mbps) in an open area.

    However, through empirical analysis, the typical range for connectivity of 802.11 equipment is

    approximately 50 meters (about 163 ft.) indoors. A range of 400 meters, nearly mile, makes

    WLAN the ideal technology for many campus applications. It is important to recognize that

    special high-gain antennas can increase the range to several miles.3

    Figure 2. Typical Range of 802.11 WLANUse of Wireless Networks in real-life

    Wireless networks can be used anywhere. Its very useful in university campuses where studentscan sit under the tree and read mail or search library for books, it is of great value to fleets of

    trucks, taxis, delivery vehicles, and repairpersons for keeping in contact with home, are also

    important to the military, wireless parking meters, important use also is for food, drink, and other

    vending machines

    Once you begin using wireless data, you'll wonder how you ever lived without it.

    Wireless Network Technology: Overview and Applications

    It is obvious that Wireless Networks are making a big mess for the other and older kind ofnetworking technologies. Researches try to make that kind of connection even more secure,

    which is another thing that does wireless technology to proliferate as a fire.

  • 8/3/2019 Wireless Network Pro

    6/30

    5

    So, making a wireless networks from a side of the biggest cities in the world it is not

    accidentally.

    Gaithersburg,November 2002.

    A New York Times article (Scheisel, 2005) recently reported that more than 10 million homesin the United States employ a wireless router to access the Internet, up from virtually none in theyear 2000.

    Legislative battles rage over the right of municipalities to provide free or inexpensive wirelessInternet access to citizens. The technology to support wireless networking continues to evolve at

    a rapid pace, promising that faster, cheaper, more pervasive wireless computing solutions will be

    available to businesses and consumers who will require always-on, seamless, wireless computing

    experiences. Wireless networks clearly offer an array of advantages over traditional wirednetworking solutions to users in all types of networks and industries. These advantages include

    mobility, ease of installation, reduced cost of ownership and scalability, which in turn lead to

    increased productivity and interpersonal communication.

    4

    In this project will be discussed in deeper way about the history, types of wireless networks, their

    applications, the standards used today for this kind of network. We wont forget also to mentionsomething about the security aspect, which is one of the unpleasant sides for the wireless

    technology. This paper will also outline an interesting part which deals with installing,troubleshooting and possible repairing of the network.

    WPAN

    WPAN technologies enable users to establish ad hoc, wireless communications for devices

    (such as PDAs, cellular phones, or laptops) that are used within a personal operating space(POS). A POS is the space surrounding a person, up to a distance of 10 meters. Currently, thetwo key WPAN technologies are Bluetooth and infrared light. Bluetooth is a cable replacement

    technology that uses radio waves to transmit data to a distance of up to 30 feet. Bluetooth data

    can be transferred through walls, pockets, and briefcases. Technology development for Bluetoothis driven by the Bluetooth Special Interest Group (SIG), which published the Bluetooth version

    1.0 specification in 1999. Alternatively, to connect devices at a very close range (1 meter or

    less), users can create infrared links.

    To standardize the development of WPAN technologies, IEEE has established the 802.15

    working group for WPANs. This working group is developing a WPAN standard, based on the

    Bluetooth version 1.0 specification. Key goals for this draft standard are low complexity, lowpower consumption, interoperability, and coexistence with 802.11 networks.5

    WLAN

    At this point in time, wireless connectivity solutions can be grouped into three main categories.All three use Radio Frequency (RF) technology to transmit data through the air. The first

    category, wireless local area networking (WLAN), transmits data between a wired network and a

  • 8/3/2019 Wireless Network Pro

    7/30

    6

    mobile user or users (Types, 2005). Its origins lie in the encrypted radio signals sent by allied

    operatives across enemy lines during World War II. Referred to as spread spectrum

    technology, the wartime messages paved the way for the first computational wireless network,which was created in 1971 at the University of Hawaii. The project, called ALOHNET, had

    seven computers set up on four islands communicating with one central computer on Oahu, none

    of them using phone lines (Bautts, 2005). In a modern-day example of WLAN technology,businesses commonly issue network-connected laptops with wireless cards to their employees to

    replace desktop computers. This allows their employees to be productive anywhere within the

    bounds of the corporate network. It also encourages collaboration by giving them the ability toform ad hoc work groups. In certain situations, it can provide employees with incentives to use

    their computers at home or in coffee shops, where they may do work outside of traditional work

    hours. In this case, because the employees work time seeps into their leisure time, a perceivedbenefit for the employee (the use of a computer with wireless capabilities) becomes a very real

    benefit for the employer.

    Wireless LANs operate using a transceiver device to send and receive data. This device, also

    referred to as an access point, connects the computers on the wireless network to a wirednetwork. The computers are equipped with wireless networking devices, which come standard onmany laptop and handheld computers now. Each access point ensures connection to the networkwithin a radius of anywhere from 100 to several hundred feet. Access points are strategically

    placed across a network area so that connection areas overlap and users can travel between them

    without interruption of service, a process called roaming. (Proxim, 1998) Several differentprotocols exist for wireless local area networking; all approved by the Institute of Electrical and

    Electronics Engineers (IEEE). Together, LAN protocols have been assigned the numerical

    grouping 802. They are then broken down into further groupings. 802.11b (Wireless Fidelity

    commonly referred to as WiFi) is the standard used by most WLANs today. A new standard802.16 (WiMax) is currently being developed to provide connectivity with a 30-mile radius

    around each access point.

    WMAN

    WMAN technologies enable users to establish wireless connections between multiple locations

    within a metropolitan area (for example, between multiple office buildings in a city or on a

    university campus), without the high cost of laying fiber or copper cabling and leasing lines. Inaddition, WMANs can serve as backups for wired networks, should the primary leased lines for

    wired networks become unavailable. WMANs use either radio waves or infrared light to transmit

    data. Broadband wireless access networks, which provide users with high-speed access to the

    Internet, are in increasing demand. Although different technologies, such as the multichannelmultipoint distribution service (MMDS) and the local multipoint distribution services (LMDS),

    are being used, the IEEE 802.16 working group for broadband wireless access standards is still

    developing specifications to standardize development of these technologies.

    WWAN

    WWAN technologies enable users to establish wireless connections over remote public or

    private networks. These connections can be maintained over large geographical areas, such as

  • 8/3/2019 Wireless Network Pro

    8/30

    7

    cities or countries, through the use of multiple antenna sites or satellite systems maintained by

    wireless service providers. Current WWAN technologies are known as second-generation (2G)systems. Key 2G systems include Global System for Mobile Communications (GSM), Cellular

    Digital Packet Data (CDPD), and Code Division Multiple Access (CDMA). Efforts are under

    way to transition from 2G networks, some of which have limited roaming capabilities and are

    incompatible with each other, to third-generation (3G) technologies that would follow a globalstandard and provide worldwide roaming capabilities. The ITU is actively promoting the

    development of a global standard for 3G.

    Below is a table indicating the range that wireless data networks can handle:

    Wireless Mesh Network

    In a mesh network, the wireless connection extends not only to client computers, such as

    wireless laptops, but between other network nodes. This is in contrast with a typical wirelesslocal area network, where the client computers connect wirelessly to an access point but that

    device is

    in turn plugged into the wired corporate network. The connection between the local area network

    and a larger corporate network or the Internet is known as the "backhaul."5

    Connectivity and Bandwidth

    In 1985, the FCC made segments of the bandwidth spectrum available for use by certaintelecommunications devices without a license. The unregulated spectrum was known as the ISM

    (Industrial, Scientific and Medical) bands, and the FCC recently added to the unregulated a

    spectrum 300 MHz of additional bandwidth. This dedicated free bandwidth ensures that anyone

    adhering to pre-set standards of power and technologies applied can reap the benefits of wireless

    connectivity without having to obtain a license or pay fees.

    Future WLAN Applications

  • 8/3/2019 Wireless Network Pro

    9/30

    8

    Wireless connectivity has to a great extent changed the way we live, and it promises to do so

    increasingly. Currently, WLANs allow employees in organizations to carry out their duties andremain constantly connected to a network, where they can retrieve, and exchange and store

    information. Doctors and nurses in hospitals frequently carry handheld devices connected to the

    hospitals WLAN to record and download vital patient information to and from the network.

    (Proxim, 1998) Students on college campuses tote laptop computers from class to class,remaining constantly connected to the Internet, and supplementing their classroom educations.

    WLANs are also increasingly employed to establish voice connections between users with

    Voice- over Internet Protocol (VoIP), which transmits voice data across the Internet in datapackets. The appeal of VoIP is that since most providers charge a flat monthly rate, calls can be

    connected without incurring long-distance fees. This can provide a very cost-effective solution to

    users who routinely make international calls. Voice-over WiFi (VoWiFi) combines VoIP withwireless networking technology. Using a PDA or a laptop computer equipped with a wireless

    card and Internet telephony software, a user can make a telephone call over a wireless network.

    One advantage of this technology over traditional cellular phone technology is improved

    connection quality indoors or underground. Some cellular phone companies have developed

    hybrid telephones that operate using VoWiFi most of the time but can switch to a regular cellularconnection if the user happens to move out of the LAN area. (Beal, 2005)

    Future WPAN Applications

    The possibilities of WPAN extend beyond the ability to sync ones Palm Pilot to a desktop

    without wires. Currently, the Bluetooth protocol is being applied in the development of pervasive

    computing solutions for the home. In the very near future, the majority of people may use a

    Bluetooth-enabled wireless connection and a personal controller to access or remotely control

    many intelligent devices, such as handheld computers, mobile telephones, cars, kitchenappliances, home lighting systems, etc., which can detect users changing locations and respond

    to their needs accordingly (WPAN, 2005)

    Developers are working on a generation of wearable devices that will perform functions such as

    allowing the wearer to input data without using a keyboard or mouse, or monitoring the wearersvital statistics. These applications, together with home and office pervasive computing, could

    save time and be of tremendous help to people with illnesses or disabilities.

    Wireless Standards

    The developing generations of wireless technology we believe that will have soon access to an

    unprecedented breadth of wireless standards. Those should increase the range, speed, and quality

    of wireless connectivity. A specific topic deals about those standards in general, and the most

    known of them.

    Wireless software

  • 8/3/2019 Wireless Network Pro

    10/30

    9

    To manage the hardware of the new wireless technology, we need some tools that would indirect

    those tools to us. As the number and type of wireless devices increase to networks, the need fortheir management and control is a priority. This part deals with this middleware, as an important

    part of using the wireless network.

    Wireless Security

    Wireless security is a discussable topic, which should be one of the primary concerns of the

    every networks administration. Mechanisms are a lot, but if they are playing the real role and

    providing the needed security protection, is a topic that should be explained later on.

    Conclusion

    We live in exciting times, when hosts of emerging wireless technologies promise radical change

    in our modes of perception, interaction, democratic participation, and time and information

    management. As new technology is developed, we will witness even greater change, which

    hopefully will benefit society, rather than harm it. In the meantime, we have an obligation toapproach that technology with a certain degree of criticality.

    Types of Wireless Networks

    Till now we have mentioned what our project will consist and we have described their essence.Now we are going to explain things more detailed.

    In this project we will discuss about 5 wireless networks categories:

    1. System interconnection (Bluetooth)2.

    Wireless PANs3. Wireless LANs

    4. Wireless MANs5. Wireless WANs

    System interconnection is all about interconnecting the components of a computer using short-

    range radio6.

    A personal area network (PAN) is A PAN is a subset of a wireless LAN, it is a computer

    network used for communication among computer devices including telephones and personaldigital assistants close to one person.

    The reach of a PAN is typically a few meters. PANs can be used for communication among thepersonal devices themselves, or for connecting to a higher level network and the Internet.8

    Now that we explain what PAN is we can continue with the Wireless PAN which is tone of the

    objective of this research paper.

  • 8/3/2019 Wireless Network Pro

    11/30

    10

    A wireless PAN is a collection of mobile devices that make up a piconet (tiny network),

    typically located in one room. The PAN replaces the wires that would normally connect onepiece of equipment to another 7.

    So, Wireless PAN can be made possible via IrDA and Bluetooth.

    wireless connectivity

    Bluetooth is a personal area network (PAN) standard and is the most common WPAN

    technology.

    It is a low power, short range, two-way wireless communication network. Its goal is to connectcomponents without wires. Bluetooth, the new technology was named after the 10th Century

    Danish King Harold Bluetooth.

    It was designed to allow low bandwidth wireless connections to become so simple to use that

    they seamlessly integrate into our daily life. The Bluetooth specification is an open specificationthat is governed by the Bluetooth Special Interest Group (SIG)8. Intel, IBM, Toshiba, Nokia, and

    Ericsson formed the SIG GROUP in 1998.

    Its a great opportunity if we want to connect scanners, digital cameras, headsets, mobile phones

    etcby only being brought within the range, no driver installation, just turn them on and theyllwork.

    Bluetooth has short range (10 m), low power consumption, license-free 2.45 GHz ISM, voiceand data transmission, approx. 1 Mbit/s gross data rate11.

    Figure 3. Examples of Bluetooth and their connection

    Another type of wireless networks is Wireless Metropolitan Area NetworkWMAN. It wasbased on the 802.16a standard and appeared in June 2004 and it provides a communications pathbetween a subscriber site and a core network such as the public telephone network and the

    Internet.

    The goal of WMANs is to provide high-speed wireless Internet access similar to wired access

    technologies such as cable modem, digital subscriber line (DSL), Ethernet, and fiber optic. IEEE

  • 8/3/2019 Wireless Network Pro

    12/30

    11

    was motivated by the ability of the wireless technologies to cover large geographic areas without

    the need to deploy wires.

    The Wireless MAN standard has a range up to 30 miles with a data rate of up to 70 Mbits per

    second, capable of providing 60 businesses with Internet connections at T1 speeds of 1.5

    Megabits or up to 400 homes at DSL rates

    12

    .It is a single-carrier (SC) modulation schemedesigned to operate in the 10-66 GHz spectrum. However, the 10-66 GHz spectrum is strictly

    line-of-sight.

    Wireless MAN can serve as the "backhaul" or Internet connection for Wi-Fi hotspots13

    . Intel

    participation in the wireless MAN industry is a major wildcard factor, very important factorbecause it has integrated Wi-Fi functionality in its Centrino mobile computing chipset. Now Intel

    is touting WiMax as the metropolitan area version of Wi-Fi. The European organization, ETSI,

    has been working on a similar project, referred to as HiperMAN.

    Wireless MAN has interesting advantages. It can deliver real-time voice-over-IP and video

    services at very low costs, in terms of data-carrying capability, wireless MAN far surpasses 3G

    wireless networks, it allows delivery of service in a highly flexible way, extends, replaces or

    backs up existing fiber infrastructure within hours, eliminates fiber trenching and leased line costetc. This table shows the comparison between WMAN, WLAN and Bluetooth 9.

    Figure 4 shows an example of a network topology in which PMP and mesh topologies are usedto cover a large metropolitan area.

  • 8/3/2019 Wireless Network Pro

    13/30

    12

    Figure 4. Network Topology

    Comparing Wireless LAN with Wireless WAN

    Now that we know the basic concepts for Wireless LAN and Wireless WAN we can make a

    comparison between them. A wireless wide area network (Wireless WAN), covers a much moreextensive area than wireless LANs. Coverage is generally offered on a nationwide level withwireless network infrastructure provided by a wireless service carrier.

    While wireless LANs are used to allow network users to be mobile within a small fixed area,wireless WANs are used to give Internet connectivity over a much broader coverage area, for

    mobile users such as business travelers or field service technicians. We can compare them in

    these fields:

    1)Speed

    %802.11b wireless LAN standard transfers data at speeds of up to 11 Mbps, with typical rates ofbetween 14 Mbps, decreasing as more users share the same wireless LAN connection. The next

    version, 802.11a, is supposed to transfer data at speeds of up to 54 Mbps24

    .

    - Wireless WAN speeds differ depending on the technology used. GPRS networks offer a

    maximum user data rate of over 115 kbps if all eight timeslots in a cell are allocated for datatransmission, (one timeslot can provide between 9 and 21 kbps 25)

    2)Data security

    Security is one of the most important features when using a wireless network. Security is one of

    the biggest strengths for cellular wireless networks (WWANs) and one of the biggest weaknessesin 802.11 networks (WLANs). Security can be increased on wireless LANs by using shared key

    authentication. This shared key must be delivered through a secure method other than the 802.11

    connection.

    3)Hotspots

    Hotspots are wireless LANs available to the public in a location, like an airport, coffee shop, or

    city neighborhood. These (hotspots) enable users to access the network either free of charge, or

    for a fee paid to the network operator.

    4)Costs

    Since wireless LANs operate in the unlicensed frequency range, there is no service cost for using

    a private wireless LAN. There will be a monthly Internet service provider cost for accessing theInternet through your wireless LAN access point For cellular wireless WANs, the wireless

    network is acting as your Internet service provider by providing access to the Internet over their

    wireless network. The wireless provider therefore charges a monthly subscription rate to their

    network, similar to a wireless phone subscription.

  • 8/3/2019 Wireless Network Pro

    14/30

    13

    As a great SOLUTION is to WLAN and WWAN work together. Used together, a user would

    have the best of both technologies, offering high-speed wireless access in a campus area, andaccess to all their data and applications with high-speed cellular access from anywhere with

    wireless WAN network coverage.

    Wireless Standards

    All standard that are developed for Wireless Network have one author, it is the IEEE or Institute

    of Electrical and Electronics Engineers Inc. IEEE is a non-profit, technical professional

    association of more than 360,000 individual members in approximately 175 countries that is an

    authority in technical areas such as computer engineering and telecommunications.

    Below in this chapter we will describe more details about WLAN IEEE 802.11 Standard

    especially its architecture and subsets. Thereafter we will talk about characteristics for WPANIEEE 802.15 and WMAN IEEE 802.16.

    IEEE standard 802.11

    IEEE Standards are documents that are developed within the Technical Committees of the IEEESocieties and the Standards Coordinating Committees of the IEEE Standards Board. The

    standards developed within IEEE represent a consensus of the broad expertise on the subject

    within the Institute as well as those activities outside of IEEE that have expressed an interest in

    participating in the development of the standard.

    The figure below enables us to show the relationship between the IEEE standard 802.11 (that is

    part of a family of standards for local (WLAN) and metropolitan area networks (WMAN)) andother members of the family:

    Figure 6. IEEE 802.11(for local WLAN) and WMAN

    Wireless LAN standard defines the protocols and compatible interconnection of data

    communication tools by means of the air, infrared or radio in a LAN using the carrier sense

    multiple access protocol with collision avoidance (CSMA/CA) medium sharing mechanism.MAC or the medium access control supports operation under control of an access point as well

    as between independent stations. Power management to reduce power consumption in mobile

    stations, and a point coordination function for time bounded transfer of data, verification,

  • 8/3/2019 Wireless Network Pro

    15/30

    14

    association, and re-association services and an optional encryption/decryption procedure are

    includes by the protocols.

    The standard includes the definition of the management information base (MIB) using Abstract

    Syntax Notation 1 (ASN.1) and specifies the MAC protocol in a formal way, using the

    Specification and Description Language (SDL). Both ASN.1 and SDL source code have beenadded on a floppy diskette

    The main purpose of this standard is to provide wireless connectivity to automatic machinery,

    equipment, or stations that require rapid deployment, which may be manageable or hand-held, or

    which may be mounted on moving vehicles within a local area (this is used in games). Thisstandard also offers regulatory bodies a resource of standardizing access to one or more

    frequency bands for the purpose of local area communication.

    Architecture of IEEE 802.11 standard

    One most important part of Wireless LAN Standard is the architecture of IEEE 802.11, becauseit describes the components that interact to provide a wireless LAN that supports location

    mobility transparently to its upper layers.

    The fundamental construction Block of an IEEE 802.11 Wireless LAN is the Basic service set or

    BSS because all radio-related functions are performed in the BSS, constricts of base station

    controller (BSC) and the base transceiver station (BTS). BSC provides all the control functionsand physical links between the MSC (mobile services switching center) and BTS whereby

    handles the radio interface to the mobile station.

    In figure 1 show two BSS, each of which has two stations that are members of the BSS. It is

    useful to think of the ovals used to represent a BSS as the exposure area within which themember stations of the BSS may stay behind in communication. If a station moves out of itsBSS, it can no longer directly communicate with other members of the BSS.

    Figure 7.

    The independent BSS as an ad hoc network

  • 8/3/2019 Wireless Network Pro

    16/30

    15

    Firstly, let we say few words about ad hoc network (including the definition) and them we will

    describe the independent BSS as an ad hoc network.

    An ad-hoc (sometimes known as a "spontaneous") network is a local area network or other

    small network, especially one with wireless or temporary plug-in connections, in which some of

    the network devices are part of the network only for the duration of a communications session or,in the case of mobile or portable devices, while in some close proximity to the rest of the

    network. In Latin, ad hoc exactly means "for this," further meaning "for this purpose only," and

    as a result usually temporary.

    The independent BSS or IBSS is the most basic type of IEEE 802.11 LAN standard. When IEEE802.11 stations are able to communicate directly is possible IBSS. A minimum IEEE 802.11

    LAN may consist of only two stations. In figure 1 shows two IBSS. This type of operation is

    often

    referred to as an ad hoc network, for the reason that this type of standard is often formed with no

    pre-planning, for only as long as the LAN is needed.

    The IEEE 802.11 subsets

    The IEE 802.11 wireless LAN standard inland has 9 subsets. Those subsets or substandard are

    used because Wireless LAN works with different frequency range, signals and some others

    characteristics that we will describe bellow for each subset.

    802.11a

    IEEE 802.11a operates in the 5-GHz frequency range (5.125 to 5.85 GHz) with a maximum

    54Mbit/sec. signaling rate. The 5-GHz frequency band isn't as crowded as the 2.4-GHzfrequency because it offers considerably more radio channels than the 802.11b and is used bysmaller number applications. It has a shorter range than 802.11g, is essentially newer than

    802.11b and isn't well-matched with 802.11b.

    802.11b

    Operates in the 2.4-GHz Industrial, Scientific and Measurement (ISM) band (2.4 to 2.4835 GHz)

    and provides signaling rates of up to 11Mbit/sec. This is a very commonly used frequency.

    Microwave ovens, cordless phones, medical and scientific equipment, as well as Bluetooth

    devices, all work within the 2.4-GHz ISM band.

    802.11e

    Ratified in late September of 2005, the 802.11e quality-of-service specification is designed to

    guarantee the quality of voice and video traffic. It will be particularly important for companiesinterested in using Wireless fidelity (Wi-Fi) phones.

    802.11g

  • 8/3/2019 Wireless Network Pro

    17/30

    16

    Similar t o 802.11b, but this standard supports signaling rates of up to 54Mbit/sec. It also

    operates in the heavily used 2.4-GHz ISM band but uses a different radio technology to boostoverall throughput.

    802.11i

    Sometimes called Wi-Fi Protected Access 2 (WPA 2), 802.11i was ratified in June 2004. WPA 2supports the 128-bit -and-above Advanced Encryption Standard, along with 802.1x

    authentication and key management features.

    802.11k

    Predicted for ratification in mid-2006, the 802.11k Radio Resource Management standard will

    provide measurement information for access points and switches to make wireless LANs run

    more efficiently. It may, for example, better distribute traffic loads across access points or allow

    dynamic adjustments of transmission power to minimize interference.

    802.11n

    The Standard for Enhancements for Higher Throughput is designed to raise effective WLAN

    throughput to more than 100Mbit/sec. Final ratification is expected in late 2006.

    802.11r

    Expected to be ratified in mid to late 2006, the 802.11r Fast Roaming standard will address

    maintaining connectivity as a user moves from one access point to another. This is especially

    important in applications that need low latency and high quality-of-service standards such as

    voice-over-WLAN.

    802.11s

    This standard will deal with mesh networking. It is predicted to be ratified in mid-2008.

    IEEE standard 802.15

    A wireless personal area network (WPAN) has its standard as wireless LAN, developed by

    Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA). The name of

    this standard is IEEE standard 802.15, it was approves in 2002. The first version of this standard,

    802.15.1 was adapted from the Bluetooth specification and is completely compatible withBluetooth 1.1.

    Parameters for wireless communications among portable digital devices including notebookcomputers, peripherals, cellular telephones, beepers, and consumer electronic devices are

    familiar and usually used by Bluetooth. The specification also allows for connection to the

    Internet.

  • 8/3/2019 Wireless Network Pro

    18/30

    17

    The IEEE 802.15 Working Group proposes two general categories of 802.15, called TG4 (low

    rate) and TG3 (high rate). The TG4 version provides data speeds of 20 Kbps or 250 Kbps. TheTG3 version supports data speeds ranging from 11 Mbps to 55 Mbps. Added skin contain the use

    of up to 254 network devices, dynamic device addressing, support for devices in which latency is

    critical, full handshaking, security supplies, and power management. There will be 16 channels

    in the 2.4-GHz band, 10 channels in the 915-MHz band, and one channel in the 868-MHz band.

    Plans of IEEE are to refine the 802.15 specification to work with the Specification andDescription Language (SDL), particularly SDL-88, SDL-92, and SDL-2000 updates of the

    International Telecommunication Union (ITU) recommendation Z.100.

    IEEE standard 802.16

    IEEE 802.16 is a Wireless Metropolitan area network standard for 10 to 66 GHz published byInstitute of Electrical and Electronics Engineers, approves in 2002. It addresses the "first-mile

    and last-mile" connection in wireless metropolitan area networks.

    Inland this standard is created a platform that enables to build a broadband wireless industry

    using high-rate systems that install quickly without extensive metropolitan cable infrastructures.

    The IEEE 802.16 standard enables interoperability between devices from multiplemanufacturers. It also, includes a medium access control layer (MAC) that supports multiple

    physical layer specifications. The physical layer is optimized for bands from 10 to 66 GHz.

    Akin the Wireless LAN IEEE 802.11 standard and Wireless MAN IEEE 802.16 standard has its

    subsets. IEEE 802.16a is one of them. It is advanced from principles to support multimedia

    services like a videoconferencing, voice, and gaming. There also are includes optional mesharchitecture.

    Wireless Home

    Our focus within this chapter is to describe the concept of Wireless Home, in underway we are

    going to explain more details which are in relations with mobile telecommunication.

    CTIA or the Cellular Telecommunications & Internet Association is the internationalorganization that aims to represent all elements of wireless communication - cellular, personal

    communications services, enhanced specialized mobile radio and mobile satellite services and

    serves the interests of service providers, manufacturers and others.

    "The wireless home is a terrific way to demonstrate the wireless lifestyle. Each year we becomemore and more wireless in our everyday lives, and the home is a great way to demonstrate the

    pervasiveness of this medium. It has a new look and feel this year that is sure to capture theattention of everyone in attendance", said Robert Mesirow, vice president and show director for

    CTIA WIRELESS.

  • 8/3/2019 Wireless Network Pro

    19/30

    18

    Wireless Networks Software

    Fixing problems wireless technology need some extra tool that maybe indirect tool. This more to

    see what is happening to the radio signal or datas that are passing between adapter and access

    point or between adapters in one ad hoc network.

    Of course to manage these tests, die-hard techies and serious radio frequency engineers will usehigh tech equipment that cost like expensive test equipmentsignal generators, spectrum

    analyzers, and network packet sniffers/analyzersto assess the environment of and around a

    wireless network installation. This means that for most of us is difficult to pay such cost for

    highly specialized electronic equipment we will use only once or twice.

    Practically wireless networking is not as logical or measurable as tests you may perform on a

    hard drive or serial I/O port. In these cases you will not find diagnostic programs, but instead,metering software that provides some visualizations of wireless signals. However there are a few

    examples of adapter cardspecific signal strength and network availability monitors that provide

    a good relative indication of signal strength, but as you get into network design and reliability,you need something more absolute than a poor/weak, good, or excellent indication. In fact, what

    is

    needed is something that will tell you in known absolute values which signals exist nearby, and

    how strong they are

    Fortunately, many programmers took it upon themselves to find out how these new wireless

    devices work and pulled out some very valuable data. They have found ways to present us the

    information that will help to make sense of this invisible connection between computers andnetworks.

    The results are several programs that can help to see and somehow understand what is going onin one wireless networking environments. Herewith should be underlined that most of those

    programs are for Linux systems. All this results are coming to us through the features, functions,

    and admitted limitations of what a wireless network adapter can reveal to us. Saying that theworld of Linux is a good ground for some of the deepest and most profound network and internet

    innovation, this does not mean that Windows and Macintosh users are not left in the dark.

    Wireless may be the one thing, next to the Internet, that brings these separate and distinct

    platforms together for the good of all. It is not about replacing wires with invisible energy fields.It is that all at once, three distinct computing platforms are thrust into working together at the

    same time. Through wireless and all that it promises for networking and applications outside of

    pure computing, users of these platforms must configure and exchange a variety of common

    information in order to establish a common networking ground. It is no longer AppleTalk versusNetBIOS, TCP/IP versus IPX/SPX, or variants and workarounds in between, but purely the same

    technology and the same terms applicable to all platforms. The interaction of users with wireless,

    signal integrity, wireless security and failure analysis bring these platforms together.

    In the same time the tools used to monitor and analyze wireless and security is not in same level

    available for all platforms. In this direction the most known applications for determining wireless

  • 8/3/2019 Wireless Network Pro

    20/30

    19

    network security levels, AirSnort and WEPCrack, are available only for Linux/UNIX platforms.

    This fact makes all Windows and Mac networks system administrators, who do not know to useLinux, to try to learn it quickly or to hire a consultant from outside to help them to assess the

    security for their networks. Of course hiring this type of consultants has usually high cost. But,

    AirSnort and WEPCrack could be labeled as tools that have been designed only for the purpose

    of hacking into someones wireless network. But in order to assess security, you need somethingor someone to try to breach it. Better you using these tools on yourself and tightening up security

    than someone unknown, with motives unknown, trying to breach your networks borders.

    UNIX/Linux

    It can deal with the operating system just so much before becoming frustrated at the lack of

    concise step-by-step documentation to get you quickly to the point where a new device, feature,

    or program simply functions. For Linux to be viable, some degree of detailed technical support

    must exist with or for the user, this more for wireless applications. In terms of realizing the user-friendly attributes that make an operating system approachable and practical ore at least tolerable

    to work with, UNIX systems have far to go. Most of us do not want to GUnzip, untar, compile,link, debug, decipher log files, decipher and edit obscure and esoteric configuration fileparameters, learn C and shell scripting to be able to read and extract salient bits of command

    parameters, and do so over and over again for 12 to 24 hours, only to fail to get a simple wireless

    network card or two to work. Linux and UNIX in general, need more user-friendly tools, at leastin the context of wireless networking, before it can make a dent in the Windows market. In

    reality, it is need more time to find information on the internet to get various fragments of

    information that finally can help getting a wireless adapter to work with Linux. There is quit big

    need for manual about steps through UNIX system configuration for the masses. These are notreligious or philosophical issues, abiding respect for UNIX experts and the many great things

    about UNIX-based systems, but this genre of operating system is still about five years behind the

    DOS-to-Windows, plug-andplay, auto recovery, goof protection progress that has been made inthe WinTel (Windows+Intel) market recently. However, there are ways to get Linux to do at

    least one thing it is good at with wireless devicesrouting, firewall, and access control. This can

    be done without immersing yourself in the struggles of getting this card or that to be recognized

    and automatically configured

    at boot time, using external wireless bridges or access points connected to an otherwiseubiquitous Ethernet card in the Linux system.

    While you avoid the trials and tribulations of configuring Linux for wireless, you will not be able

    to use AirSnort, WEPCrack, or the other low-level sniffing tools with an external wirelessdevice, but the practical goal is wireless + Linux, leaving the sniffing and packet analysis to

    those with more time on their hands.

    If you have accomplished getting a peripheral component interconnect (PCI) or personal

    computer (PC) card-based wireless adapter to work with Linux, you are probably familiar with

    many of the tools and discussion groups available that helped get you through the experience andallowed you to play with wireless all you wanted.

  • 8/3/2019 Wireless Network Pro

    21/30

    20

    Wireless Networks Security

    With the good, always comes the other part: the bad. Our job is to face with it, because if we

    close our eyes, that wont disappears.

    We all agree that wireless technology, in many cases is making benefits to people, for the reasonthat is making connection among them, also in places that wires cannot. But, undoubtedly itcomes with many risks, and those in good number. It is a thing which is vulnerable to human

    hacking or biological bugs; that is, the network users. Vulnerability doesnt come just from the

    humans, but also from the other sources of wireless signals, but especially humans.

    The first and the most important one of them is its security. The term wireless security may

    seem a contradiction in terms. After all, how can any data sent into the open air be secure?16

    Almost every day we hear about some tries to access to some network, from someone

    interested for information; a modern thief, who doesnt want to besmirch his hands, but he seats

    in front of his computer, time on his hands and a lot of nerves while trying to decode some banks

    accounts. Often, they gain their goal. Those network stakes, will right we can say that are raisedwith wireless.

    Suddenly, one no longer needs physical presence to log data: shy bother trying to smuggleequipment onsite when you can crack from your own home or office two blocks away with a

    high- gain antenna?

    Societal Implications of Wireless Connectivity

    As a rule, technological innovations force a society to reevaluate its core principles andsometimes make significant, often irreversible, cultural adjustments to accommodate the new

    technology. Wireless networking is uniquely poised to change the world in a relatively shortperiod of time, insofar as it engenders an unprecedented cultural situation in which users areconstantly connected to each other with mobile devices through the Internet or ad hoc peer-to-

    peer networks.

    In Smart Mobs (2002), Howard Rheingold considers many of the implications of such a situation

    envisioning a wireless commons in which every person, object and place is connected to the

    Web and assigned a unique URL, transmitting and receiving information constantly across thenetwork. In this dense (and mostly invisible) web of data, roaming human nodes in the network

    will be able to retrieve and share information about everything, everywhere, effortlessly. On the

    positive side, Rheingold views such a network as a means of dissolving barriers between people

    and fostering the formation of communities, both of divergent segments of the population whostand to benefit from each others knowledge, and of like-minded individuals who choose to

    convene for social purposes or for spur-of-the moment, cooperative political action. Both

    functions are critical for effective knowledge management. Rheingold cites several feats of

    political coordination enabled by wireless computer connectivity, including the 1999 WorldTrade Organization protests in Seattle and the ongoing demonstrations by bicycling Critical

    Mass protesters. On a more mundane level, the process of arranging ones social or business

    calendar

  • 8/3/2019 Wireless Network Pro

    22/30

    21

    is streamlined when friends and colleagues can keep tabs on each others whereabouts, and

    communicate across the network instantly. As Rheingold points out, however, this omnisciencecomes with a price. Being permanently tied into a network requires one to relinquish a privilege

    that people in this country have traditionally held very dear: privacy. If information flows freely

    across the network, it has the potential to be seen by anyone. Information can be intercepted over

    networks, whether by a nosy family member, a malevolent thief, or a government authority.Already, the prevalence of personal data theft has created calls for governmental regulation of

    data brokers and massive network security initiatives (Zetter, 2005). Many people are wary of

    any technology that has the ability to make our private lives public. With that in mind, Rheingoldsuggests that more powerful encryption technology, along the lines of the Wireless Encryption

    Protocol (WEP), may be the only way that users will be able to maintain any semblance of

    privacy in the new wireless world.

    Philip Agre in his essay Welcome to the Always On World, (2001) presents a few more social

    discomforts that can, and have, resulted from ubiquitous human networking. Among them are: 1)constant interruptionsthe always on mentality can distract people from their tasks; 2) divided

    attentionwhen people are constantly paying attention to maintaining their social networks andcommunications devices, they have little attention to devote to individual personal relationships;3) addictionsome people become addicted to information in a networked environment,constantly checking their email, blogs, message boards, etc., because they fear they might miss

    out on something important; 4) boundarieswhen people give each other tacit permission to

    keep track of each others affairs, social boundaries collapse, causing what can be perceived as an

    invasion of each others privacy (Agre, 2001). These concerns have been manifested in use ofwireless technology, and as wireless computing becomes more ubiquitous, they will only grow

    more intense. Therefore, it is incumbent upon people in this age to approach the use of new

    technology with a critical eye. People should be able to ask, What are the implications of usingthis technology? Does it make my life more manageable or more complicated? Are its benefits

    worth its consequences? Certainly, wireless networking will change the very fabric of our

    society, but we as societal participants have the opportunity to make decisions regarding justhow this change will take place.

    The Politics of Wireless Networking

    The adoption of wireless networking technology comes with many political considerations aswell. One concern is how it affects the so-called digital divide. Some people view wirelessnetworks as opening up new opportunities for learning and participation in society for people

    who are at a disadvantage either through lack of material resources or information illiteracy. A

    counterargument posits, however, that building a wireless network into our societys core willonly serve to alienate those without access to Internet service, laptops, PDAs, or wearable

    devices. According to Metcalfes Law, the addition of people to the network will increase the

    networks value, while Reeds Law suggests that adding a new group of people will increase its

    value even more. In short, a wireless society stands to benefit from the inclusion of all citizens,especially those who would otherwise be excluded.

    One response to this issue has been the creation of low-cost or free public wireless networks to

    ensure that all citizens have access to the Internet. Sponsored by libraries, philanthropists and

  • 8/3/2019 Wireless Network Pro

    23/30

    22

    city or state governments, these projects have created much controversy and a series of territorial

    disputes, in part because broadband Internet service providers feel they should be able to chargepeople for wireless service without fear of competition from the government. Due to their strong

    lobbying power in Congress, the broadband companies have posed a formidable challenge to

    municipalities, and several states are considering bills to outlaw municipal wireless projects.

    (Tanner, 2005) While corporations think that they should control the networks, others think thatnetworks should remain uncontrolled and subject to the will of the people. Still others argue for

    more government involvement. Rheingold (2002) discusses the case of government projects, like

    Californias Center for Information Technology Research in the Interest of Society (CITRIS) thatuse wireless networks as a security infrastructure in case of a catastrophic event. In part because

    wireless networks lack the physical constraints of wired networks, the question of who has the

    right to exercise control over them is a difficult one that will need to be decided in the near

    future.20

    We live in exciting times, when hosts of emerging wireless technologies promise radical changein our modes of perception, interaction, democratic participation, and time and information

    management. As new technology is developed, we will witness even greater change, whichhopefully will benefit society, rather than harm it. In the meantime, we have an obligation toapproach that technology with a certain degree of criticality.

    Conclusion

    Increasing the security of wireless networking is becoming essential and necessity. This because

    the wireless networks have the undesirable property that all data transmitted is broadcast to allwireless clients on the network. This leaves open the possibility of eavesdropping on private

    information and it appears as perfect opportunity for hackers to use it for their own benefit.

    However there are improvements that have occurred in both confidentiality and authentication,by including the 802.11 wireless standards. This standard is a protocol for encryption in wireless

    networks called WEP. Basically this was a huge improvement over plain- text communication.

    Above mentioned standard it also served as a catalyst for hackers who wished to gain access thedata that are being transmitted through a wireless network. This secure data included bank

    transactions, e-commerce sales, and several others. Later on several weaknesses were discovered

    in the WEP protocol that allowed hackers to decode data.

    In the same time the computer security community reaches by improving some of the knownweaknesses in the WEP protocol. Also, the most secure networks do not use a single preshared

    key, because most of the weaknesses with WEP involved capture vast amounts of data encrypted

    with a single key. As substitute for this they use a protocol that provides user with a session key

    after authenticates each of them. But, if single user keeps a session open for a long time, it islikely that an attacker could discover the session key. Even if the case when the session key is

    compromised, the attacker will only have the ability to read the messages for the remainder of

    that session.

    Wireless Network use will continue to grow and become more important over the next five

    years.

  • 8/3/2019 Wireless Network Pro

    24/30

    23

    One of the most common questions about wireless is, How far will it go? As with most answers

    about technical things, it depends. 802.11b was designed with native, unmodified, unenhanceddevices to extend the length of a 10BaseT Ethernet wire by 300 meters. This equals 985 feet,

    about a city block, or 0.18 miles. Unobstructed, unimpeded with line-ofsight, 802.11b will do

    just that and probably more. But who is going to hold their laptops above their heads or mount an

    access point itself on a rooftop to communicate digitally? Who knows what will happen after 10yearsNew standards will be created, old standards will die off It is the choices of today

    which will inevitably help to shape the emerging world of wireless tomorrow.

    Abbreviations List

    PDAPersonal digital assistance

    WPAN Wireless Personal Area Network

    WLAN Wireless Local Area Network

    WMAN Wireless Metropolitan Area Network

    PCPersonal Computer DNSDomain Name System MbpsMega bit per second POSPersonal Operating Space SIGSpecial Interest Group IEEEInstitute of Electrical and

    Electronics Engineers RFRadio frequency Wi-FiWireless Fidelity MMDSMultichannel

    multipoint distribution service GSMGlobal System for Mobile Communications CDPDCellular Digital Packet Data

    CDMA Code Division Multiple Access

    ISM Industrial, Scientific and Medical

    VoIP Voice-over Internet Protocol

    DSLDigital Subscriber Line SCSingle-Carrier SSSubscriber Station FCCFederalCommunications Commission

    April

    2008

    GPRSGeneral Packet Radio Service

  • 8/3/2019 Wireless Network Pro

    25/30

    24

    Glossary

    Ad-hoc

    An ad-hoc network (sometimes known as a "spontaneous") is a local area network or other

    small network, especially one with wireless or temporary plug-in connections, in which some ofthe network devices are part of the network only for the duration of a communications session or,in the case of mobile or portable devices, while in some close proximity to the rest of the

    network. In Latin, ad hoc exactly means "for this," further meaning "for this purpose only," and

    as a result usually temporary.

    PDA

    Personal Digital Assistant is a term for any small mobile hand held device that provides

    computing and information storage retrieval capabilities for personal or business use, often for

    keeping schedule calendars and adress book information handy.

    WPAN

    Wireless Personal Area Network; personal area means up to 10 meter radius. Example:

    Bluetooth, IEEE 802.15

    WLAN

    A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier:

    the last link with the users is wireless, to give a network connection to all users in the

    surrounding area. Areas may range from a single room to an entire campus. The backbone

    network usually uses cables, with one or more wireless access points connecting the wirelessusers to the wired network.

    WMAN

    Wireless Metropolitan Area Network: A regional wireless computer or communication networkspanning the area covered by an average to large city.

    WWAN

    WWAN stands for Wireless wide area network. Like WLAN i.e, wireless LAN WWAN works

    but on a wider scale. The architectural details about WWAN can be obtained from any sitedescribing or defining wireless network

    IP addresses

    A unique number identifying every computer on the Internet (like 62.162.99.55)

    DNS

  • 8/3/2019 Wireless Network Pro

    26/30

    25

    A computer program running on a web server, translating domain names into IP addresses

    Access point (AP)

    A wireless network interface device, acting as or replacing the function of the hub or switch in a

    wired network, to allow wireless network cards in client systems to connect to a LAN or theInternet.

    IEEE

    Institute of Electrical and Electronics Engineers Inc. is a nonprofit, technical professional

    association of more than 360,000 individual members in approximately 175 countries that is anauthority in technical areas such as computer engineering and telecommunications.

    Radio Frequency (RF)

    Electro-magnetic waves used in radio communications to carry information.

    WiFi

    Wireless fidelity is the generic term for 802.11 technology

    WiMax

    Popular name of the 802.16 wireless metropolitan-area network standard that's currently being

    developed. WiMax, which will have a range of up to 31 miles, is primarily aimed at makingbroadband network access widely available without the expense of stringing wires (as in cable-

    access broadband) or the distance limitations of Digital Subscriber Line. There are two flavors ofWiMax: 802.16-2004 or 802.16d, for fixed implementations, and 802.16e, for mobile service

    2G

    Most common type of wireless telephone communication today. It allows slow data

    communication, but its primary focus is voice.

    3G

    3G stands for the third generation of wireless communication technology. It refers to pending

    improvements in wireless data and voice communications through any of a variety of proposedstandards. The immediate goal is to raise transmission speeds to 2Mbit/sec.

    Code Division Multiple Access (CDMA)

    Code Division Multiple Access is a digital cellular technology that uses spread spectrum

    techniques that, instead of separating users by frequency, separates them through the use of

    digital frequency codes across the full available spectrum. Competes with GSM and TDMA

  • 8/3/2019 Wireless Network Pro

    27/30

    26

    CDMA2000

    CDMA2000 is a radio transmission technology for the evolution of narrowband cdmaOne/IS-95

    to 3rd-generation adding up multiple carriers.

    ISM (Industrial, Scientific and Medical)

    Industrial Scientific and Medical bands were originally created for the purpose of short range

    connectivity between equipment used in these fields of application.

    Federal Communications Commission (FCC)

    A government agency in the United States. The FCCs recent limitations on EMI have greatlyaffected digital electronic systems and power supplies in design and production

    VoIP

    Voice over Internet Protocol is a system for delivering digitized voice communications across IPnetworks. VoIP technology allows phone calls to be made between compatible handsets or on

    computers with appropriate software.

    ETSI (The European organization)

    The European Telecommunications Standards Institute (ETSI) is a standardization organization

    of the telecommunications industry (equipment makers and network operators) in Europe, with

    worldwide projection. ETSI has been successful in standardizing the GSM cell phone system.

    Bluetooth

    A short-range radio technology aimed at simplifying communications among various devices. It

    is most often used for nonnetwork/Internet applications, such as remote controls, wireless

    headsets, mice and keyboards, and printers.

    GPRS

    General Packet Radio Service technology runs at speeds up to 115Kbit/sec., compared with the

    9.6Kbit/sec. of older GSM systems. It enables high-speed wireless Internet and other

    communications such as e-mail, games and applications. It supports a wide range of bandwidths

    and is an efficient use of limited bandwidth. It's particularly suited for sending and receivingsmall amounts of data, such as e-mail and Web browsing, as well as large volumes of data.

    GSM

    Global System for Mobile Communications is a digital cellular system based on TDMAnarrowband technology, which gives users access to time slots on the same frequency bands. It

  • 8/3/2019 Wireless Network Pro

    28/30

    27

    allows up to eight simultaneous communications on the same frequency. It competes with

    CDMA

    CDPD

    Cellular Digital Packet Data technology is used by telecommunications carriers to transfer datato users via unused analog cellular networks. If one part of the network -- a specific geographicarea or "cell" -- is overused, CDPD can automatically reallocate network resources to handle

    extra traffic.

    Gateway

    The Internet protocol (IP) address of the router, switch, cable, or digital subscriber line (DSL)

    modem through which your PCs gain access to the Internet or foreign (nonlocal) networks.

    Mobitex

    Mobitex is a packet-switched, narrowband PCS network, designed for wide-area wireless data

    communications. It was developed in 1984 by Eritel, an Ericsson subsidiary, a nd there are nowover 30 Mobitex networks in operation worldwide

    AT&T Wireless

    AT&T Wireless Services, Inc. was, before October 26, 2004, the third-largest wireless telephonecarrier in the United States, based in Redmond, Washington, and trading on the New York Stock

    Exchange under the stock symbol, AWE. Formerly part of AT&T Corp., as of January 1, 2004,

    the largest single shareholder of AT&T Wireless was Japan's NTT DoCoMo.

    Sprint PCS

    Sprint Corporation is one of the world's largest telecommunication companies. It is a global

    communications provider and a major competitor in the American cellular phone market,

    through its Sprint PCS service based on CDMA and PCS, and local telephone service in somesmaller markets. It is also a Tier 1 internet service provider under the name SprintLink.

    Verizon

    Verizon Communications is a New York City-based local exchange telephone company formed

    by the merger of Bell Atlantic, a former Bell Operating Company, and GTE, which was thelargest independent local-exchange telephone company in the U.S., with presence in most all of

    the continental United States and Hawaii.

    NDIS

    Network Driver Interface Specification - definition of interface between the local network

    operating system and the network adapter.

  • 8/3/2019 Wireless Network Pro

    29/30

    28

    CSMA/CA

    Carrier Sense Multiple Access/Collision Avoidance is the principle medium access method

    employed by IEEE 802.11 WLANs. It is a "listen before talk" method of minimizing (but not

    eliminating) collisions caused by simultaneous transmission by multiple radios. IEEE 802.11

    states collision avoidance method rather than collision detection must be used, because thestandard employs half duplex radios - radios capable of transmission or reception, but not both

    simultaneously.

    MAC

    Every wireless 802.11 device has its own specific Media Access Control address hard-coded into

    it. This unique identifier can be used to provide security for wireless networks. When a network

    uses a MAC table, only the 802.11 radios that have had their MAC addresses added to thatnetwork's MAC table are able to get onto the network.

    Abstract Syntax Notation (ASN)

    An OSI language used to define datatypes for networks. It is used within TCP/IP to provideconformance with the OSI model.

    Distribution system (DS)

    Means a distribution network, together with the connection assets associated with the distributionnetwork, which is connected to another transmission or distribution system.

    International Telecommunication Union (ITU)CTIA

    The Cellular Telecommunications & Internet Association is the international organization that

    aims to represent all elements of wireless communication - cellular, personal communicationsservices, enhanced specialized mobile radio and mobile satellite services and serves the interests

    of service providers, manufacturers and others.

    Accenture

    Accenture is a global management consulting, technology services and outsourcing company. Itsorganizational structure includes divisions based on client industry types and employee

    workforces. Industry divisions, referred to as Operating Groups, include Products,

    Communications and High Technology,

    QWERTY

    The name QWERTY for our typewriter keyboard comes from the first six letters in the top

    alphabet row(The one below the numbers). It is also called the Universal Keyboard. It was

    invented by CLSholes who put together the prototypes of the first commercial typewriter back in

  • 8/3/2019 Wireless Network Pro

    30/30

    the 1860`s. The keyboard arrangement was considered important enough to be included on

    Shole`s patent granted in 1878, some years after the machine was put into production

    EVDO

    Evolution Data Only,Evolution Data Optimized, often abbreviated as EVDO, EV-DO, EvDO,1xEVDO or 1xEvDO is a wireless radio broadband data protocol being adopted by many CDMAmobile phone providers in Japan, Korea, Israel, the United States, and Canada as part of the

    CDMA2000 standard GUnzip,

    WinTel

    Wintel is a colloquial, often pejorative, term used to describe desktop computers of the type

    commonly used in homes and businesses since the late 1980s.

    NIST

    NIST in the Department of Commerces Technology Administration was established by

    Congress to assist industry in the development of technology needed to improve product quality,modernize manufacturing processes, ensure product reliability, and facilitate rapid

    commercialization of products based on new scientific discoveries.