CSI5175 Wireless and Mobile Electronic Commerce Networks and their Applications Mao Zhang 2009.03.20 Wireless Hotspots: Current Challenges and Future Directions.

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
Doc.: IEEE /0898r2 Submission July 2012 Marc Emmelmann, FOKUSSlide 1 Fast Initial Service Discovery: An enabler for Self-Growing Date:
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
WIRELESS NETWORKS - A.HARIKA Y5CSO28. INTRODUCTION It refer to a telecommunication networks whose interconnections between nodes is implemented without.
Protection notice / Copyright notice HiPath MobileConnect Delivering on the Promise of Enterprise FMC February 2007.
Emerging Technologies in Wireless LANs. Replacement for traditional Ethernet LANs Several Municipalities Portland, OR Philadelphia, PA San Francisco,
Communications and Networks
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
By: Alena Newcomb.  What is a WI-FI hotspot?  Wireless Local Area Network location that provides broadband Internet access.  Use of laptops, PDA, or.
Wireless Sensor Network Security Anuj Nagar CS 590.
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
Capacity of Wireless Mesh Networks: Comparing Single- Radio, Dual-Radio, and Multi- Radio Networks By: Alan Applegate.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
Wi-Fi Public Access Requirements for Wireless Products & Technologies Public Access Provider Perspective Phil Belanger.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
SMUCSE 8344 Wireless Mesh. SMUCSE 8344 The Premise.
بسم الله الرحمن الرحيم. Wireless Mesh Network (WMN) Izzeldin Shibeika – April, UNCC -
Computer Concepts 2014 Chapter 5 Local Area Networks.
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
WiMAX, meaning Worldwide Interoperability for Microwave Access Emerging technology that provides wireless transmission of data using a variety of transmission.
5G MOBILE TECHNOLOGY.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Gürkan RAKANOĞLU. Outline Overview of Wireless Mesh Networks Video Streaming over Wireless Networks Applications of Video over Wireless Networks.
Challenges in the Migration to 4G Mobile Systems Suk Yu Hui and Kai Hau Yeung City university of Hong Kong Presenter: Shuai Peng
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
October 4-7, 2004 Los Angeles, CA VoWLAN Trends and Opportunities Kamal Anand Vice President Marketing Meru Networks
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Wireless Network Security and Interworking
Enterprise-Class Telephony on Wireless LANs Tom Alexander CTO VeriWave, Inc.
Ad Hoc Network.
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Performance Evaluation of Mobile Hotspots in Densely Deployed WLAN Environments Presented by Li Wen Fang Personal Indoor and Mobile Radio Communications.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
1 Wireless Networks Lecture 31 Wireless Mesh Networks Dr. Ghalib A. Shah.
TECHNICAL SEMINAR S V Suresh 08731A1254 By. 1 st GENERATION:  Introduced in 1980  Analog cellular mobile,Data speed 2.4kbps  1G mobiles- AMPS,NMT,TACS.
4G Wireless Technology Prepared by K.Sai Kumar Yadav 07K81A0584.
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
Created by: Prashant More Dipak Chavan Ajinkya Khude WI-FI.
By Sanjay S Pawar Ashutosh Jha Chavi Asrani.  Can end user access internet anywhere seamlessly  How easy is it to connect  Are there any common ways.
Wi-Fi Technology.
Integration of and Third-Generation Wireless Data Networks
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Authentication and handoff protocols for wireless mesh networks
Xiuzhen Cheng Csci332 MAS Networks – Challenges and State-of-the-Art Research – Wireless Mesh Networks Xiuzhen Cheng
Presentation transcript:

CSI5175 Wireless and Mobile Electronic Commerce Networks and their Applications Mao Zhang Wireless Hotspots: Current Challenges and Future Directions 1

Content Introduction An example scenario Technological challenges Alternative approaches to connectivity Conclusions 2

Introduction Today, users access the Internet at a variety of places and environments where they spend a considerable amount of time outside private networks. Wireless local area networks (WLANs) have emerged as a promising networking platform to extend network connectivity to these public places, or hotspots. WISPs have established Wi-Fi hotspots in increasing numbers at public venues. Several technological and deployment challenges remaining  Can roam anywhere?  Easy configuration?  A common way to authenticate?  Payment and billing?  Get bandwidth required?  Alternative network access technologies?  In summary, problems include authentication, security, coverage, management, location services, billing, and interoperability. 3

An example scenario A scenario to motivate the vision of widespread Wi-Fi availability and to explore the various barriers Kate needs to travel from San Diego to New York to attend a business meeting.  A presentation needs to send to colleagues before the departure  Register with the meeting venue’s Wi-Fi and get the location within the building to be guided to the meeting room  During the meeting, retrieve data from San Diego through VPN and then share with colleagues over an in-room ad hoc wireless network  Dinner time, CDMA 1xRTT card into Laptop to connect to the Internet to locate a good restaurant and get driving directions  Back to hotel, access s using the hotel Wi-Fi network 4

Technological challenges – Authenticating to the hotspot provider Sometimes, authentication is coupled with wireless-hop security where only authorized users receive network access. Authentication helps the network to establish the users’ identity, while wireless-hop security ensures data privacy for authenticated users and protection for the network. Repeat authentication at each hotspot location and the process might be configured differently. Research questions:  Ease of access and mechanism  Authentication Latency: existing hardware mechanisms such as SIM-Card based authentication?  User Identity: existing identities such as those already through other services  3 rd party authenticators? 5

Technological challenges – Wireless- hop security Security mechanisms provide data privacy to network users and also protect the network against malicious use. Current approaches include per-user authentication, authorization of authenticated users through access keys, and access control, a number of schemes achieve security and provide authentication at MAC are being deployed in W-Lans  WEP is simple to manage in environment with known users.  Port-based network access control: ports are configured to block all traffic except authentication until the user identity is established.- IEEE 802.1X 6

Technological challenges – Wireless- hop security - Continued Security challenges  Mutual Trust: e.g., implicit trust in the key distributor in WEP  Dynamic Key Management: simplified and transparent key exchange and renew  Hardware Approaches: Are there ways to provide the robustness of 802.1X through alternative hardware-based approaches?  Denial-of-Service: Current Wi-Fi networks are highly susceptible to denial-of-service (DoS) attacks  Malicious Attacks: Hotspots are a comparatively open environment for malicious users 7

Technological challenges – Network performance and QoS The ability to adequately provide capacity and coverage to handle dynamically-varying, location-dependent user load.  Understand the users’ behavior  Adapt to the changing resource availability or changing traffic characteristics which is not easy  Suggestion if adaptation is not possible Questions for research  Measurement and Modeling  Monitoring (measurements of throughput, channel contention, packet errors, etc.)  QoS Enforcement: How can MAC protocols be designed to guarantee users a fair share of the wireless bandwidth and better channel utilization 8

Technological challenges – Location and context-awareness Hotspots has the potential to make location and context- aware services more valuable and readily accessible to users Requires a number of issues to be addressed  Application scenarios  Location Privacy and Anonymity: balance  Sensor Fusion: possibility to integrate multiple location sensing technologies  Location Granularity: absolute location vs. relative location  Location to Place: the capability to translate geographic location information into a more usable form 9

Technological challenges – Pricing model 10 Wi-Fi revenues are comparatively poor, the networks are at a disadvantage compared to their cellular counterpart due to the lack of widespread coverage. But it has the potential to offer users a higher bits/sec value. Related challenges:  Subscription-based (prepaid) vs. pay-per-use model?  Central Billing Entity

Alternative approaches to connectivity - Multihop hotspots 11 Multihop access increases the network diameter and allows clients out of range of access points to receive connectivity. Challenges introduction:  Node Mobility: the number of active nodes in the ad hoc network, the network topology, and the volume of network traffic is constantly changing  Channel Interference: transmissions can cause interference at the access points, degrading effective throughput and the channel capacity.  Multiple Network Access: nodes in the multihop hotspot need: a wireless network adapter with more than one radio; or a wireless network adapter with the capability to multiplex connections from more than one network ; or more than one wireless adapter.

Alternative approaches to connectivity - Interoperation with WAN data services 12 Interoperation between cellular and hotspot networks is beneficial to both wireless carriers and hotspot operators.  Hardware support: for both services on mobile devices to migrate the connection across access technologies  Software ability through sensing to switch to the most resource-efficient mode of access  The establishment of roaming relationships and agreements between network operators for effective packet routing as users switch between them. TOGEWAnet AG offers a seamless integration of WLAN and GSM GPRS services and an integrated authentication, security, and billing over a common infrastructure:  Handoff Mechanism  Location-assisted Roaming  System Support for Handoff: Is handoff initiated at the user device or by the network?  Billing

Conclusions 13 The continuing rollout of hotspot deployment is being fueled by the growing requirement for high-speed connectivity in public areas A successful and viable hotspot business model will depend on the extent that it can provide value for all its stakeholders  End user: easy to use, economically attractive, and provides fast access  Hotspot network providers: reliable and robust third-party authenticating entity, establish peering agreements with other providers and accommodate the various resource and performance demands of the users.  Premise and building owners: establish business agreements with hotspot network providers to offer network access an everyday utility for the end user.