Prof. Alfred J Bird, Ph.D., NBCT Office – Science 3rd floor – S-03-130 Office Hours – Monday and Thursday.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Advertisements

Security+ All-In-One Edition Chapter 10 – Wireless Security
PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel Mobile Technologies.
PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel Mobile Technologies.
RuBee Andrew Giles An alternative to RFID? ● What is RuBee? ● The differences between RuBee and RFID. ● Applications that could benefit from.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Chapter - 11 CWNA Certified Wireless Network Administrator Introduction to Wireless LANs.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
WiMAX Introduction Worldwide Interoperability for Microwave Access
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Short Distance Wireless Communication. Team 5 Thomas French Jordan Harris Mike Symanow Luseane Tangataevaha.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Wireless technology.
RFID Radio frequency identification,or RFID,is an Auto-ID technology that uses radio waves to identify a physical object. Tags ReaderAntenna.
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
Fundamental of wireless network.  Heinrich Hertz discovered and first produced radio waves in 1888 and by 1894 the modern way to send a message over.
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Regulations, Standards and Protocols. RFID systems are Radio Systems The function of other radio systems must not be disrupted Restriction on the range.
1 Lecture Network Media Media refers to the means used to link a network's nodes together communications channel is the transmission media on which.
Prof. Alfred J Bird, Ph.D., NBCT Door Code: 52461* Office – McCormick 3rd floor 607 Office Hours – Monday and Thursday 3:00PM to 3:45PM.
Chapter 2 Mobile Technologies Lecture 3 By :Jigar M Pandya
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Be careful, a spy is following you!. 2 Outline – Overview Introduction - What is RFID ? Radio frequency spectrum How does RFID work ? Technical contraints.
Wireless Networking and Security
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless technologies LAN Switching and Wireless – Chapter 7 and Fundamentals.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Wireless Networks Tamus, Zoltán Ádám
Sybex CCNA Chapter 12: Wireless Networks.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Computer Concepts 2014 Chapter 5 Local Area Networks.
WiMAX Fixed Vs. Mobile Mustafa Saad Mustafa Networks Eng. Dept. College of Information Engineering Al-Nahrain University Mustafa Saad Mustafa Networks.
24-July-2007 Wireless Networks. Wireless Technologies Bluetooth, ZigBee & Wireless USB short range communication between devices typically controlled.
Lecture 11 Wireless security
Wi-Fi Standards Lucy Nguyen Corey Trouard Zack Wepasnick.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
45 nm transistor 45nm =.045um (microns)= 450 Angstroms.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Wireless Data Transmission. For wireless data transmission to occur you need three things A transmitter A receiver A wireless channel –The higher the.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Sybex CCNA Chapter 12: Wireless Networks Instructor & Todd Lammle.
Mobile Technology Last Mile Problem Solved 1. Mobile Web’s Potential Mobile Tech 2011 The Future is Now 2.
IWD2243 Wireless & Mobile Security Chapter 1 : Wireless Fundamentals Prepared by : Zuraidy Adnan, FITM UNISEL1.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
What is WiMax? Worldwide Interoperability for Microwave Access.
Strategic Innovation Management Prof. Marc Gruber January 27, 2011.
Prof. Alfred J Bird, Ph.D., NBCT Office – Science 3rd floor – S Office Hours – Monday and Thursday.
A Technical Seminar Presentation on WIMAX ( Worldwide Interoperability for Microwave Access ) BY M.K.V HARSHA VARDHAN REDDY-07K81A0440.
Sybex CCENT Wireless Technologies Instructor & Todd Lammle.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Prof. Alfred J Bird, Ph.D., NBCT Office – Science 3rd floor – S Office Hours – Monday and Thursday.
Table 1. The Comparison of Li-Fi & Wi-Fi & WiMAX and Bluetooth
English for Advance Learners I
Wireless Technologies
CS1: Wireless Communication and Mobile Programming
אינגר משה ינואר 2007 אינגר משה ינואר 2007.
Networking Fundamentals
RFID & applications گردآوری: بیتا تدین
IOT Technologies: Radio Frequency Identification (RFID)
King Fahd University of Petroleum and Minerals EE 400 PROJECT
Presentation transcript:

Prof. Alfred J Bird, Ph.D., NBCT Office – Science 3rd floor – S Office Hours – Monday and Thursday 3:00PM to 4:00PM

 Seven Levels  7 – Application  6 – Presentation  5 – Session  4 – Transport  3 – Network  2 – Data Link  1 - Physical

 4 – Applications  3 – Transport  2 – Internet  1 – Network Interface

 Wavelength – the distance between two similar points on the wave.  Frequency – The number of cycles (up and down) that happen in one time unit (a second).  Wave Speed is equal to the Frequency multiplied by the Wavelength.  In symbols: v = f * λ  Pay attention to the units.

 a  Data rates up to 54Mbps  Operating range up to 75 feet  Uses 5Ghz band  Uses OFDM modulation  b  Data rates up to 11Mbps  Operating range of feet  Uses ISM (2.4Ghz) band  Uses DSSS modulation

 g  Data rates up to 54Mbps  Operating rages up to 150 feet  Uses ISM (2.4Ghz) band  Uses DSSS or OFDM modulation  n  Data rates of 200Mbps or higher  Operating range up to 150 feet  Uses both ISM (2.4Ghz) and 5Ghz bands  Uses DSSS and/or OFDM modulation

 i  Improved data encryption on a/b/n  r  Increases speed of hand-off between access points

 Bluetooth  WiMAX  RFID  NFC

 What is Bluetooth  Piconet  Uses ISM Band  Up to eight (8) devices  Three power classes  Class 1 – 20dBm - ~100m  Class 2 – 4dBm - ~10m  Class 3 – 0dBm - ~ 1m

 Discovery  Inquiry procedure  Paging procedure  Piconet  Paring  Passkey

 Worldwide Interoperability for Microwave Access  IEEE e  Under development IEEE  Not a single protocol design.  Serves many different types of topologies.  Many different frequencies  Many different power levels  Uses OFDM modulation

 WiMAX  BWA  NLOS  Last mile

 Radio Frequency Identification  Three types of RFID systems  Active  Semi-active  Passive  Three frequency bands  LF (low frequency) – 125/134 kHz  HF (high frequency) – MHz  UHF (ultra high frequency) MHz & 2.4GHz

 RFID tag (a transponder)  RFID reader (a transceiver)

 Tracking inventory  Easy Pay  Checking ID Cards  Tracking animals  Wrist bands to track people (hospitals, etc.)  What else can you think of??

 RFID  Backscatter  Slotted Aloha

 Near Field Communications  Used for many new purposes such as  Apple Pay  Pay by cellphone  Security devices such as watches  Many other under development

 Why do we want to secure a wireless network?  How do we secure a wireless network?  Change passwords  Change SSID  Change passcode  Turn off broadcast  Use MAC filtering  Use RADIUS  Use third party encryption software

 Two ways to authenticate clients  Open  Shared-key  Encryption technologies  WEP  WPA  WPA2