April 11, 2007 Healthcare Engineering Course Online 1 Wireless Internet Shigeki Goto Waseda University.

Slides:



Advertisements
Similar presentations
Security in Wireless Networks Juan Camilo Quintero D
Advertisements

WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
WiMAX Introduction Worldwide Interoperability for Microwave Access
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Wireless Fidelity (Wi-Fi)
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Introduction to Wireless Networking. Basic Wireless and Wired Network.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
WLAN What is WLAN? Physical vs. Wireless LAN
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
WIRELESS NETWORKING. What are the advantages to wireless networking? How has society changed?
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
1 Lecture Network Media Media refers to the means used to link a network's nodes together communications channel is the transmission media on which.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless technologies LAN Switching and Wireless – Chapter 7 and Fundamentals.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
IEEE & Priyanka Vanjani CST 554: Short Presentation ASU Id #
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Perceptions of Wi-Fi Security Requirements: A Stratified View Merrill Warkentin Xin (“Robert”) Luo Mississippi State University.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Providing QoS in Ad Hoc Networks with Distributed Resource Reservation IEEE802.11e and extensions Ulf Körner and Ali Hamidian.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Chapter 7- Mobile and Wi-Fi Networks Taking signals on and off the air Connections to other networks Need to manage spectrum Managing and billing for services.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
IEEE &
WME ABC ’ s LayerDescription aPHY 54 Mb/s in 5 GHz bands bPHY 11 Mb/s direct sequence in 2.4 GHz band cMAC Bridging operation dPHY International.
IEEE EDCF: a QoS Solution for WLAN Javier del Prado 1, Sunghyun Choi 2 and Sai Shankar 1 1 Philips Research USA - Briarcliff Manor, NY 2 Seoul National.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wireless Technology Charles R. Wolfe Network Architect Georgetown University.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Performance Characterization of Voice over Wireless LANs Lionel PEREZ August 3rd, 2005.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Using in an FTTP Application. FTTP Application.
WiMAX Chapter 11. Wireless Technologies WWAN (proposed) WMAN 70 Mbps ~50 Km a/e WiMAX New standard for Fixed broadband Wireless. Trying to.
 Router › A router is the networking device that integrates two or more networks together, while controlling the data traffic over the entire network.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Chapter-7 Basic Wireless Concepts and Configuration.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Chapter 4: Wireless LANs
Wireless Networking Chapter 23.
Presentation transcript:

April 11, 2007 Healthcare Engineering Course Online 1 Wireless Internet Shigeki Goto Waseda University

April 11, 2007 Healthcare Engineering Course Online 2 Wireless and Wired In earlier days, Wireless = long distance, International, short wave, satellite. Wired = subscriber line, LAN (Ethernet). In our modern life, Wireless = cellular phone, wireless LAN. Wired = optical fiber for long distance, and international communications.

April 11, 2007 Healthcare Engineering Course Online 3 Long Distance Wireless comm. 11.3km 2.4GHz KDDI Lab. IP communications cover schools and clinics.

April 11, 2007 Healthcare Engineering Course Online 4 Modern Wireless Communications 1.Cellular phone Japanese culture, i-mode browser on the phone vs. SMS, short message. 2.Wireless LAN At home, office and hospital and in the town 3.IP, Mobile IP  Dr Hongbo Shi

April 11, 2007 Healthcare Engineering Course Online 5 Cellular phone and PHS (PCS) PHS (PCS) is preferable in a hospital because of low power. A patient has a PHS unit which receives a call from the receptionist.

April 11, 2007 Healthcare Engineering Course Online 6 Wireless LAN in the town San-gen-jaya in

April 11, 2007 Healthcare Engineering Course Online 7 Wireless LAN or IEEE x issues Security Quality High speed

April 11, 2007 Healthcare Engineering Course Online 8 Security MAC address filtering WEP, Wired Equivalent Privacy IEEE802.1X, authentication, RADIUS PSK : Pre-Shared Key TKIP, Temporal Key Integrity Protocol AES, Advanced Encryption Standard

April 11, 2007 Healthcare Engineering Course Online 9 Security Wi-Fi Protected Access StandardAuthenticationEncryption --MACWEP WPA IEEE801.1X, PSK TKIP WPA2, IEEE802.11i AES

April 11, 2007 Healthcare Engineering Course Online 10 Another approach to Security Upper level solutions VPN ssh portforwarding

April 11, 2007 Healthcare Engineering Course Online 11 Quality (Congestion)

April 11, 2007 Healthcare Engineering Course Online 12 Quality (Congestion) 20 clients can use a single access point.

April 11, 2007 Healthcare Engineering Course Online 13 How to accommodate 80 PC’s? Use multiple access points.

April 11, 2007 Healthcare Engineering Course Online 14 Class room (100 students)

April 11, 2007 Healthcare Engineering Course Online 15 Network Configuration

April 11, 2007 Healthcare Engineering Course Online 16 First experiment

April 11, 2007 Healthcare Engineering Course Online 17 First experiment (1)

April 11, 2007 Healthcare Engineering Course Online 18 First experiment (2)

April 11, 2007 Healthcare Engineering Course Online 19 First experiment (3)

April 11, 2007 Healthcare Engineering Course Online 20 Summary — First experiment Many clients use AP2 intensively. Throughput: AP1: 50 ~ 350KB/sec AP2: 0 ~ 100KB/sec AP3: 100 ~ 600KB/sec

April 11, 2007 Healthcare Engineering Course Online 21 Second experiment

April 11, 2007 Healthcare Engineering Course Online 22 Second experiment (1)

April 11, 2007 Healthcare Engineering Course Online 23 Second experiment (2)

April 11, 2007 Healthcare Engineering Course Online 24 Second experiment (3)

April 11, 2007 Healthcare Engineering Course Online 25 Summary — Second experiment Distributed usage Throughput: AP1: 0 ~ 150KB/sec AP2: 50 ~ 300KB/sec AP3: 0 ~ 150KB/sec

April 11, 2007 Healthcare Engineering Course Online 26 Zero 0 Mbps is a serious problem Roaming, or hand off at physical level very fast recovery, 1mili-second Device driver selects the strongest signal among multiple Access Points.

April 11, 2007 Healthcare Engineering Course Online 27 QoS in Wireless LAN In earlier days, QoS technology is applied to Backbone networks. DiffServ, RSVP In modern life, QoS is applied to Wireless LAN

April 11, 2007 Healthcare Engineering Course Online 28 QoS control, IEEE e IEEE e Extended capability for QoS control. HCCA, HCF Controlled Channel Access EDCA, Enhanced Distributed Coordination Access Put some priority among packets

April 11, 2007 Healthcare Engineering Course Online 29 EDCA, Enhanced Distributed Channel Access Waiting time = Const. + TimeSlot X Rand. CW ( Contention Window) Random waiting time AIFS ( Arbitration Inter Frame Space) Constant TXOP ( Transmission Opportunity) Continuous transmission time

April 11, 2007 Healthcare Engineering Course Online 30 Experiment 1. No EDCA function Cross Traffic Voice traffic Traffic generator XTraffic generator Y Wireless Access Point Terminal A Terminal C Terminal B

April 11, 2007 Healthcare Engineering Course Online 31 Result — Experiment 1 When packet loss happens? 7Mbps

April 11, 2007 Healthcare Engineering Course Online 32 Experiment 2, EDCA basic Traffic generator X Terminal A Terminal B Terminal C Cross traffic 7Mbps total Voice traffic EDCA Traffic generator Y Wireless Access Point

April 11, 2007 Healthcare Engineering Course Online 33 Result — Experiment 2

April 11, 2007 Healthcare Engineering Course Online 34 Experiment 3-1, No cross traffic Traffic generator X Terminal A Terminal B Terminal C Voice traffic EDCA Traffic generator Y Wireless Access Point

April 11, 2007 Healthcare Engineering Course Online 35 Experiment 3-2, Cross Traffic Traffic generator X Terminal A Terminal B Terminal C Cross traffic 7Mbps total Voice traffic EDCA Traffic generator Y Wireless Access Point

April 11, 2007 Healthcare Engineering Course Online 36 R E-model formula is calculated from 20 parameters in IP telephony. IP telephony classification: ClassRDelay A80100 ms B70150 ms C50400 ms

April 11, 2007 Healthcare Engineering Course Online 37 Result — Experiment 3 R (3-1) 77.8 No EDCA (3-1) 76.5 EDCA (3-2) 23.7 No EDCA (3-2) 65.4 EDCA ・ For heavy traffic, EDCA is not effective (3-2). ・ Investigating the optimum value for EDCA parameters

April 11, 2007 Healthcare Engineering Course Online 38 Experiment 4, EDCA parameters Traffic generator X Terminal A Terminal B Terminal C Cross traffic 7Mbps total Voice traffic EDCA Traffic generator Y Wireless Access Point

April 11, 2007 Healthcare Engineering Course Online 39 Experiment 4 (1/3)

April 11, 2007 Healthcare Engineering Course Online 40 Experiment 4 (2/3)

April 11, 2007 Healthcare Engineering Course Online 41 Experiment 4. (3/3)

April 11, 2007 Healthcare Engineering Course Online 42 New method vs. Default value DefaultNew CWmin 31 CWmax 73 AIFS 11 TXOP R R

April 11, 2007 Healthcare Engineering Course Online 43 High Speed IEEE n 100Mbps MIMO, Multiple Input Multiple IEEE WiMAX, Worldwide Interoperability for Microwave Access 75Mbps IEEE802.16e WiBro in Korea 1Mbps/3Mbps/4Mbps

April 11, 2007 Healthcare Engineering Course Online 44 High speed solves many problems? YES