Presented to: MAG January 15, 2004 By Client Technologists: Chris Colby & Randy Kendzior.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Workshop on Telecommunications for Disaster Relief, February 2003, Geneva Dag Nielsen & Catherine Mulligan Ericsson Response WLAN in Disaster and.
C01 - ORiNOCO AS-2000 Networks course overview ORiNOCO AS-2000 Networks Course Overview.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
ORG. ENTITY GSM WIFI VIRTUAL SERVICE NETWORK. Support for wired and wireless networked workstations Wireless PDAs Integrated GPS VoIP Integrated Video.
What is Wireless LAN? Mika Setälä Chairman, HiperLAN/2 Global Forum Marketing Working Group And what it is not!
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
© Siemens January WiMAX – Experience Best Wireless Broadband Contents 1.Wireless Technologies – Roadmap 2.Wireless Access Technologies Roadmap 3.Wireless.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
Short Distance Wireless Communication. Team 5 Thomas French Jordan Harris Mike Symanow Luseane Tangataevaha.
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
RSA SecurID November 10, 2005.
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
By: Matthew Follett. Introduction  A Wireless local area network (WLAN) links two or more devices using some wireless distribution method and usually.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Mobility at CERN 29/10/2013 HEPiX Fall IT/Communication Systems HEPiX Fall 2013.
January 2001 Richard Paine, BoeingSlide 1 doc.: IEEE /050 Submission Boeing Enterprise User Scenario Wireless VOIP Mobile Nets DEN Richard Paine.
1 Remote Management of Wireless Gateway Student Name: Dinesh D N (BITS ID: 2004HZ12158) MphasiS Technologies Ltd, Bangalore March 2006.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 FCC-NTIA Joint Advisory Committee on Communications Capabilities of.
1 IS 8950 Managing Network Infrastructure and Operations.
1999 Cabletron Systems. Wireless Networking RoamAbout Introduction to Wireless Networking Overview of the Wireless functionality Applications for Wireless.
Wrocław University of Technology, Faculty of Fundamental Problems of Technology. 1.
Development of Mobile Applications Juan Fernando Arboleda Carlos Avendaño Juan David Gomez Medellín, Colombia South America.
Goodbye! ….. to all things that are connected by cable…… NOW it can be connected using….
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless communications Prof. Sheldon Lou College of Business Administration CSU San Marcos.
Company & Products Overview Januarary Company Overview A Semiconductor & System vendor of next generation networking solutions for IP-based entertainment.
Doc.: IEEE wng Submission July 11-16, 2004 J.W Lim Slide 1 WirelssLAN Spectrum Issue in Rep. of Korea Jaewoo LIM 1, Jongtaek Oh, Taejin.
Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.
 Introduction  Components of Wi-Fi and its working  IEEE Architecture  Advantages and Limitations.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
BY NEHA CHOUDHARY ASST. PROFFESSOR DEPT. OF CSE/IT LHST-A.
Randy Kendzior, Dell, Inc. September 24, 2004 Wireless Technology Discussion Massachusetts Digital Government Summit.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
Communications & Computing Convergence Mac Agan Director of Wireless Marketing Wireless Networking Division Intel Corporation April 2, 2003.
Wireless networking Unit objective: Identify wireless networking standards, and install a SOHO network.
Wireless Telecommunications Networks personal area network (PAN) A wireless telecommunications network for device-to-device connections within a very short.
Winning Wireless Applications Corina Moore PrinterOn Corporation
Remote Access for Mobile Computing Andrew Jessett NT Support and Development Group (a.k.a. PC Support) Business and Information.
IWD2243 Wireless & Mobile Security Chapter 1 : Wireless Fundamentals Prepared by : Zuraidy Adnan, FITM UNISEL1.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
Equipping Your Mobile Workforce for a Seamless Customer Experience in an Unsecured Wireless World Dr. Simon Blake-Wilson Chief Security Advisor.
Submitted By:- Raushan Kr. Chaurasiya(68) Santu Thapa(75) Satyanarayan Prajapat(76)
PRESENTATION ON. What is a Wi-Fi Hotspot? A Wi-Fi hotspot is location or access point where you can access wireless broadband using a wireless enabled.
EVOLUTION FROM 3G TO 4G AND BEYOND 5G
Urban Wireless Internet Amenity BANDWIDTH BAY City of San Diego Economic Development Corporation Downtown Partnership Downtown Business Government and.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
BYTTON 3G Router for SOHO. Double Wireless Router ●Wireless WAN: GPRS, EDGE, UMTS, HSDPA, HSUPA, CDMA 1x RTT, CDMA 1xEVDO ●Wireless LAN: WIFI TOPEX BYTTON.
4G Wireless Technology Prepared by K.Sai Kumar Yadav 07K81A0584.
BYTTON DS 3G Router for enterprise applications. TOPEX Bytton DS is a professional solution offering high speed and secure mobile access to Internet,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Wireless Networks Dave Abbott.
Instructor Materials Chapter 6 Building a Home Network
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
Presented by: Jeffrey D. Bombell, American Computer Technologies
Chapter 4: Wireless LANs
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Introduction to WiFi Telephony
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Presentation transcript:

Presented to: MAG January 15, 2004 By Client Technologists: Chris Colby & Randy Kendzior

Agenda Wireless Landscape & Technology Trends Dell Wireless Products & Services Applications of Wireless Implementation Considerations Q & A

Wireless Landscape and Technology Trends

Wireless Technology Positioning Each wireless technology category provides an unique set of capabilities and options... ` ` WPAN WLANWWAN Personal spaceHome, campus, hotspotsMetros, countries, global AttributeWPAN (Bluetooth) WLAN (802.11b/g/a) WWAN (GPRS) Usage Model Object exchange, cable replacement LAN extension & hotspot coverage On-the-road remote access Network Ad-hocDedicated enterprise or “hotspot” infrastructure Operator owned infrastructure Data-rate 1 Mbps  10 Mbps?11 Mbps  54 Mbps40 Kbps  384 Kbps Range / coverage 10m, personal proximity area 50m, “hotspot” coverageMetro/global coverage with vehicular support Power LowMediumHigh Cost LowMediumHigh (with access) Volume Driver Cell phones & headsetsNotebooksCell phones

Past WPAN WLAN WWAN Bluetooth 1.1 Bluetooth b GPRS cdma2000 1xRTT cdma2000 1xRTT g a WCDMA EDGE n (HTSG) n (HTSG) Bluetooth 2.x Bluetooth 2.x a UWB a UWB 54Mbps at 5GHz 1xEV-DO 54Mbps at 2.4GHz 180Kbps ?Kbps 140Kbps Data overlay 11Mbps 35kbps 721Kbps 3Mbps (Medium rate) 10Mbps(High-data rate) Next generation 100+ Mbps thruput Wireless technologies, categorized by mobility and range, will continue to evolve to higher data rates Mbps+ Bluetooth 1.2 Bluetooth 1.2 AFH, Improvements Dual-Band Wireless Technology Roadmap 1xEV-DV HSPDA 300Kbps 600Kbps 60kbps

Dell Wireless Products & Services

 Notebook  Wi-Fi standard on all Latitude notebooks  Bluetooth internal module  Cellular PC Cards  Desktop  WLAN USB adapters  Bluetooth (combo) dongle  Axim  WLAN / Bluetooth CF and SDIO cards  Internal wireless modules (WWAN, BT, WLAN)  Assessment  Needs, wants, requirements, restraints, roadblocks  Design  Design spec based on assessment & site survey  Deployment  Install, configure, verify – transfer of knowledge  Support  On-going support and maintenance Client ServicesAccess  WLAN hotspot  Catalog, web-links, coupons, client SW / icons  Cellular  Cellular cards + Access  Convergent  Bundled WLAN+Cellular Access Infrastructure  Consumer & Small Business  WLAN router AP  WLAN print server and media servers  Enterprise  Access Point  Corporate middleware server Beyond simple client enablement, Dell is adding emphasis on other primary pieces… Dell Areas of Focus

WLAN Reference Model SoHo / Consumer Broadband Enterprise Adapters for CE devices Wireless Media server Wireless BB routers Notebook cards Desktop cards Axim cards & modules Enterprise APs AP controllers Consumer Enterprise Beyond common client HW, the consumer and enterprise segments will motivate different product solutions… Public WLAN Access

Applications of Wireless

Public Utilities Meter reading Tax appraisals Preventative maintenance Public Safety Police reporting & Investigations (Mobile terminals) Mobile Hotspots (Fire & Police stations, Courthouses, etc.) Judicial Applications Courthouse law library access Attorney network access Medical Applications Prescription dispensing Mobile cart admissions Physician order entry General Administration Mobile & scheduling Safety alerts

Implementation Considerations

 Network perimeter is clearly defined  ‘Trusted’ users are only inside the network Past Evolving Security Usage Models Future A shift towards a less defined network and trusted-user base will require increased emphasis on end-user authentication and data encryption… Paradigm Shift Wireless Increasing On-line Info Remote Access Extranets Internet  Network perimeter is less defined  ‘Trusted’ users both inside and outside the network

General Security Framework In the room Ability to physically protect and secure systems and track assets In the room Ability to physically protect and secure systems and track assets At the keyboard Processes and policies to assure user identification, authorization and access privileges At the keyboard Processes and policies to assure user identification, authorization and access privileges In the box Real-time protection from data and programs that have entered a system In the box Real-time protection from data and programs that have entered a system On the net Ability to interact with internal and external users and remote systems in a secure manner On the net Ability to interact with internal and external users and remote systems in a secure manner Security is a “chain” of technologies/solutions Security is also a continuous process Interoperability requires security standards A security policy encompasses many different facets…and is only as secure as the weakest one..

Questions & Answers

THANK YOU