©F.M. Rietti Radio Wave Communication Fundamentals.

Slides:



Advertisements
Similar presentations
Bluetooth.
Advertisements

SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel Mobile Technologies.
BLUETOOTH TM :A new radio interface providing ubiquitous connectivity Jaap C.Haartsen Ericssion Radio System B.V IEEE.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Chapter - 11 CWNA Certified Wireless Network Administrator Introduction to Wireless LANs.
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
By Abdullah M. Dalloul… Abdullah M. Dalloul… Salman Y. Mansour Salman Y. Mansour Supervisor. Supervisor. Dr.
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
Overview The Basics Core Specification Version Spectrum International Radio Frequency Allocation Range Power Benefits Protocol Stack Bluetooth Architecture.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Wi-Fi By: Michael Gutierrez. Table of Contents I. Introduction I. Introduction II. Governing Standards Body II. Governing Standards Body III. History.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
Bluetooth Introduction The Bluetooth Technology
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Modeling & Simulation of Bluetooth MAC protocol COE543 Term Project Spring 2003 Submitted by: H.M.Asif (ID# )
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Bluetooth & WPAN. 2 Bluetooth/WPAN WPAN (Wireless Personal Area Network) has a smaller area of coverage, say, 2.5 mW transmitter power, distance
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Goodbye! ….. to all things that are connected by cable…… NOW it can be connected using….
Wi-Fi Technology By Marc Bailey. What is Wi-Fi? Wi-Fi or Wireless Fidelity is a wireless technolgy owned by the Wi-Fi Alliance (formed in 1999) Goal:
Wireless Networks Tamus, Zoltán Ádám
WIRELESS LANs BLUETOOTH.
Group Members Nishant Vaity Sushant Chavan Wireless Networks As early as 1901, the Italian physcist Guglielmo Marconi demostrated a ship-to- shore.
Sybex CCNA Chapter 12: Wireless Networks.
INTRODUCTION TO BLUETOOTH Named after tenth-century danish King Harald Blatand. Developed by Special Interest Group (SIG). Bluetooth wireless technology.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
An Introduction to BLUETOOTH TECHNOLOGY
Presented by Hampton Smith  An IEEE (Institute for Electrical and Electronics Engineers) protocol ratified in 1997 which defines a standard.
WIFI. What is wifi ? Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
PRESENTED BY M.A.M.JANI S.AMRUTHA RAJU M.A.M.JANI S.AMRUTHA RAJU.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Sybex CCNA Chapter 12: Wireless Networks Instructor & Todd Lammle.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Technology By :-. What Is Bluetooth? Designed to be used to connect both mobile devices and peripherals that currently require a wire Short range wireless.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
A presentation by Abhijit Chakrabarty or Dept of Computer Sc. & Engg. Dream Institute of Technology.
Respected Ma’am & Dear friends
Objective of this Presentation To understand what is Wi-Fi and what is Bluetooth. Difference between Bluetooth and Wi-Fi.
1 March 24, 2016 By Jay, Mihai, and Ryan Wi-Fi. 2 A GENDA ❖ Overview ➢ History ➢ The Big Picture ❖ IEEE Standard ➢ Headers ➢ Payload ❖ Properties.
Ben-Gurion University of The Negev Department of Communication Systems Engineering 2006 Klinger Yaniv Wertzberger Elad Supervisor:
Presented by Khaled Al Otaishan
Wireless Networks Dave Abbott.
Instructor Materials Chapter 6 Building a Home Network
Wireless Network Computer Science Engineering Technical English II
Bluetooth By.
SUBMITTED BY DINEEJ A 28 S3 EC
Three types of wireless technology
Presentation transcript:

©F.M. Rietti Radio Wave Communication Fundamentals

©F.M. Rietti LM-18 Computer Science SSI Embedded Systems I 2 Radio Wave Communication –Wi-Fi Wi-Fi (or WiFi) is a local area wireless computer networking technology that allows electronic devices to connect to the network, mainly using the 2.4 gigahertz (12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands. The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network" (WLAN) product based on the Institute of Electrical and Electronics Engineers' (IEEE) standards. However, the term "Wi-Fi" is used in general English as a synonym for "WLAN" since most modern WLANs are based on these standards. "Wi-Fi" is a trademark of the Wi-Fi Alliance. Follow this link about Wi-Fi Spectrum & channelsUHFWi-Fi AllianceInstitute of Electrical and Electronics Engineers standardsWLANlink –Not in all countries we have same channels

©F.M. Rietti LM-18 Computer Science SSI Embedded Systems I 3 Radio Wave Communication (cont) Wi-Fi (cont) –Service set identifier (SSID) In addition to running on different channels, multiple Wi-Fi networks can share channels. A service set is the set of all the devices associated with a particular Wi-Fi network. Each service set has an associated identifier, the Service Set Identifier (SSID), which consists of 32 bytes that identifies the particular network. The SSID is configured within the devices that are considered part of the network, and it is transmitted in the packets. Receivers ignore wireless packets from other networks with a different SSID.

©F.M. Rietti LM-18 Computer Science SSI Embedded Systems I 4 Radio Wave Communication (cont) Wi-Fi (cont) Securing methods A common measure to deter unauthorized users involves hiding the access point's name by disabling the SSID broadcast. While effective against the casual user, it is ineffective as a security method because the SSID is broadcast in the clear in response to a client SSID query. Another method is to only allow computers with known MAC addresses to join the network, but determined eavesdroppers may be able to join the network by spoofing an authorized address. Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping but it is no longer considered secure. Tools such as AirSnort or Aircrack- ng can quickly recover WEP encryption keys. Because of WEP's weakness the Wi-Fi Alliance approved Wi-Fi Protected Access (WPA) which uses TKIP. WPA was specifically designed to work with older equipment usually through a firmware upgrade. Though more secure than WEP, WPA has known vulnerabilities. The more secure WPA2 using Advanced Encryption Standard was introduced in 2004 and is supported by most new Wi-Fi devices. WPA2 is fully compatible with WPASSIDMAC addressesspoofing Wired Equivalent PrivacyAirSnortAircrack- ngWi-Fi AllianceWi-Fi Protected AccessTKIPWPA2Advanced Encryption Standard

©F.M. Rietti LM-18 Computer Science SSI Embedded Systems I 5 Radio Wave Communication (cont) Wi-Fi (cont) Using in Embedded Systems At this link Arduino Wi-Fi library as examplelink Wi-Fi chips –MicrochipMicrochip –TITI

©F.M. Rietti LM-18 Computer Science SSI Embedded Systems I 6 Radio Wave Communication (cont) Bluetooth Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to GHz) from fixed and mobile devices, and building personal area networks (PANs). Invented by telecom vendor Ericsson in 1994, it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization. Bluetooth is managed by the Bluetooth Special Interest Group (SIG), which has more than 25,000 member companies in the areas of telecommunication, computing, networking, and consumer electronics. The IEEE standardized Bluetooth as IEEE , but no longer maintains the standard.EricssonRS-232Bluetooth Special Interest Group

©F.M. Rietti LM-18 Computer Science SSI Embedded Systems I 7 Radio Wave Communication (cont) Bluetooth (cont) Bluetooth operates at frequencies between 2402 and 2480 MHz, or 2400 and MHz including guard bands 2 MHz wide at the bottom end and 3.5 MHz wide at the top. This is in the globally unlicensed (but not unregulated) Industrial, Scientific and Medical (ISM) 2.4 GHz short-range radio frequency band. Bluetooth uses a radio technology called frequency-hopping spread spectrum. Bluetooth divides transmitted data into packets, and transmits each packet on one of 79 designated Bluetooth channels. Each channel has a bandwidth of 1 MHz. It usually performs 1600 hops per second, with Adaptive Frequency-Hopping (AFH) enabled.guard bandsfrequency-hopping spread spectrumAdaptive Frequency-Hopping

©F.M. Rietti LM-18 Computer Science SSI Embedded Systems I 8 Radio Wave Communication (cont) Bluetooth (cont) –Communication and connection A master Bluetooth device can communicate with a maximum of seven devices in a piconet, though not all devices reach this maximum. The devices can switch roles, by agreement, and the slave can become the master (for example, a headset initiating a connection to a phone necessarily begins as master—as initiator of the connection—but may subsequently operate as slave). The Bluetooth Core Specification provides for the connection of two or more piconets to form a scatternet, in which certain devices simultaneously play the master role in one piconet and the slave role in another. At any given time, data can be transferred between the master and one other device. The master chooses which slave device to address; typically, it switches rapidly from one device to another in a round-robin fashion. Since it is the master that chooses which slave to address, whereas a slave is (in theory) supposed to listen in each receive slot, being a master is a lighter burden than being a slave. Being a master of seven slaves is possible; being a slave of more than one master is difficult. Complete specification at this linkscatternetround-robinlink

©F.M. Rietti LM-18 Computer Science SSI Embedded Systems I 9 Radio Wave Communication (cont) Bluetooth (cont) –Bluetooth profiles In order to use Bluetooth technology, a device must be compatible with the subset of Bluetooth profiles necessary to use the desired services. A Bluetooth profile is a specification regarding an aspect of Bluetooth-based wireless communication between devices. It resides on top of the Bluetooth Core Specification and (optionally) additional protocols. –Details on profiles can be found herehere

©F.M. Rietti LM-18 Computer Science SSI Embedded Systems I 10 Radio Wave Communication (cont) Bluetooth (cont) –Bluetooth using in Embedded Bluetooth can be used in embedded systems via shield card or BT dedicated IC. Soft Commands from IC to microcontroller depends from IC; for HT-05 shield a list can be found herehere

©F.M. Rietti LM-18 Computer Science SSI Embedded Systems I 11

©F.M. Rietti LM-18 Computer Science SSI Embedded Systems I 12 Bluetooth (cont) Bluetooth profiles