gauarvjindal

  • Upload
    budhc

  • View
    225

  • Download
    0

Embed Size (px)

Citation preview

  • 8/9/2019 gauarvjindal

    1/38

    BLUETOOTH AND Wi-Fi

    PRESENTED BY:

    DHIRAJ BARANWAL

    BUDHADITYA CHATTERJEE

    GAURAV JINDAL

  • 8/9/2019 gauarvjindal

    2/38

    Bluetooth Technology

    Bluetooth is an industrialspecification for wirelesspersonal area networks(PANs), also known as IEEE

    802.15.1. Bluetooth provides a way to

    connect and exchangeinformation betweendevices such as mobilephones, laptops, PCs,printers, digital cameras andvideo game consoles via asecure, globally unlicensedshort-range radio frequency.

  • 8/9/2019 gauarvjindal

    3/38

    Bluetooth Contd.

    Bluetooth is a radio standard and communications protocol.

    It is primarily designed for low power consumption, with a

    short range (1 meter, 10 meters, 100 meters).

    The devices use a radio communications system, so they do

    not have to be in line of sight of each other, and can even be

    in other rooms, so long as the received transmission is

    powerful enough.

  • 8/9/2019 gauarvjindal

    4/38

    How it all started

    The Bluetooth specification was first developed in

    1994 by Jaap Haartsen, who was working for Ericsson

    Radio Systems.

    The specifications were formalized by the Bluetooth

    Special Interest Group (SIG). The SIG was formally

    announced on May 20, 1998.

    It was established by Ericsson, Sony Ericsson, IBM,Intel, Toshiba and Nokia.

    Today it has over 1800 companies worldwide.

  • 8/9/2019 gauarvjindal

    5/38

    Bluetooth Applications

    Between a cell phone and a hands free headset or car kit.

    Wireless networking between PCs.

    Wireless communications with PC input and output

    devices.

    Transfer of files between devices.

    Wireless control of a games console, Nintendo's Wii and

    Sony's PlayStation 3 will both use Bluetooth technology

    for their wireless controllers.

  • 8/9/2019 gauarvjindal

    6/38

    Introduction to Wi-Fi

    Wireless Technology is an alternative to WiredTechnology, which is commonly used, for connectingdevices in wireless mode.

    Wi-Fi (Wireless Fidelity) is a generic term that refersto the IEEE 802.11 communications standard forWireless Local Area Networks (WLANs).

    Wi-Fi Network connect computers to each other, tothe internet and to the wired network.

  • 8/9/2019 gauarvjindal

    7/38

    The Wi-Fi Technology

    Wi-Fi Networks use Radio Technologies to transmit &

    receive data at high speed:

    IEEE 802.11b

    IEEE 802.11a

    IEEE 802.11g

  • 8/9/2019 gauarvjindal

    8/38

    802.11 Physical Layer

    There are three sub layers in physical layer:

    Direct Sequence Spread Spectrum (DSSS)

    Frequency Hoping Spread Spectrum (FHSS)

    Diffused Infrared (DFIR) - Wide angle

  • 8/9/2019 gauarvjindal

    9/38

    DSSS

    Direct sequence signaling technique divides the 2.4 GHz band

    into 11 22-MHz channels. Adjacent channels overlap one

    another partially, with three of the 11 being completely non-

    overlapping. Data is sent across one of these 22 MHz channelswithout hopping to other channels.

  • 8/9/2019 gauarvjindal

    10/38

    IEEE 802.11 Data Link Layer

    The data link layer consists of two sublayers :

    Logical Link Control (LLC)Media Access Control (MAC)

    802.11 uses the same 802.2 LLC and 48-bitaddressing as other 802 LANs, allowing for very

    simple bridging from wireless to IEEE wired

    networks, but the MAC is unique to WLANs.

  • 8/9/2019 gauarvjindal

    11/38

    Elements of a WI-FI Network

    Access Point (AP) - The AP is a wireless LANtransceiver or base station that can connect one or many

    wireless devices simultaneously to the Internet.

    Wi-Fi cards - They accept the wireless signal and relayinformation.They can be internal and external.(e.g PCMCIA

    Card for Laptop and PCI Card for Desktop PC)

    Safeguards - Firewalls and anti-virus software protectnetworks from uninvited users and keep information secure.

  • 8/9/2019 gauarvjindal

    12/38

    Wi-Fi Network Topologies

    AP-based topology (Infrastructure Mode)

    Peer-to-peer topology (Ad-hoc Mode)

    Point-to-multipoint bridge topology

  • 8/9/2019 gauarvjindal

    13/38

    AP-based topology

    The client communicate through Access Point.

    BSA-RF coverage provided by an AP.

    ESA-It consists of 2 or more BSA.

    ESA cell includes 10-15% overlap to allow roaming.

  • 8/9/2019 gauarvjindal

    14/38

    Peer-to-peer topology

    AP is not required.

    Client devices within a

    cell can communicate

    directly with each

    other.

    It is useful for setting

    up of a wirelessnetwork quickly and

    easily.

  • 8/9/2019 gauarvjindal

    15/38

    Point-to-multipoint bridge topology

    This is used to connect a LAN in one building to a LANs in

    other buildings even if the buildings are miles apart.These

    conditions receive a clear line of sight between buildings. The

    line-of-sight range varies based on the type of wireless bridgeand antenna used as well as the environmental conditions.

  • 8/9/2019 gauarvjindal

    16/38

    Wi-Fi Configurations

  • 8/9/2019 gauarvjindal

    17/38

    Wi-Fi Configurations

  • 8/9/2019 gauarvjindal

    18/38

    Wi-Fi Applications

    Home

    Small Businesses or SOHO

    Large Corporations & Campuses Health Care

    Wireless ISP (WISP)

    Travellers

  • 8/9/2019 gauarvjindal

    19/38

    Wi-Fi Security Threats

    Wireless technology doesnt remove any old

    security issues, but introduces new ones

    Eavesdropping

    Man-in-the-middle attacks

    Denial of Service

  • 8/9/2019 gauarvjindal

    20/38

    Wi-Fi Security

    The requirements for Wi-Fi network security

    can be broken down into two primary

    components:

    Authentication

    User Authentication

    Server Authentication

    Privacy

  • 8/9/2019 gauarvjindal

    21/38

    Wi-Fi Security Techniques

    Service Set Identifier (SSID)

    Wired Equivalent Privacy (WEP)

    802.1X Access Control

    Wireless Protected Access (WPA)

    IEEE 802.11i

  • 8/9/2019 gauarvjindal

    22/38

    Advantages

    Mobility

    Ease of Installation

    Flexibility

    Cost

    Reliability

    Security

    Use unlicensed part of the radio spectrumRoaming

    Speed

  • 8/9/2019 gauarvjindal

    23/38

    Bluetooth vs. Wi-Fi

    Bluetooth is in a variety of new products such as phones, printers,

    modems, and headsets, to name a few. Bluetooth is acceptable for

    situations when two or more devices are in close proximity with

    each other and don't require high bandwidth.

    Since Bluetooth uses short-range radio frequencies, it is not as

    effective for setting up networks that can be accessed from remote

    locations as with Wi-Fi.

    Wi-Fi is more analogous to the traditional Ethernet network, and

    requires configuration to set up shared resources, transmit files, set

    up audio links , whereas Bluetooth devices advertise all services

    they actually provide.

  • 8/9/2019 gauarvjindal

    24/38

    Bluetooth vs. Wi-Fi

    Wi-Fi uses the same radio frequencies as Bluetooth, but withhigher power consumption resulting in a stronger connection.

    Wi-Fi is better suited for setting up networks as it enables afaster connection and has better security than Bluetooth.

    As a traditional networking medium, Wi-Fi is more versatile,but harder to configure.

    Most users need good know-how to get things set up,especially when using more obscure services such as audioand HID.

  • 8/9/2019 gauarvjindal

    25/38

    Setting up and securing a

    campus-wide Wi-Finetwork

  • 8/9/2019 gauarvjindal

    26/38

    Define your Wi-Fi needs:

    Types of connections

    Speed of connection

    Acceptable users

    Cost and redundancy

  • 8/9/2019 gauarvjindal

    27/38

    Site Survey:

    What types of interference are you going tocontend with

    What distances do you need to broadcast

    What types of data are you going to support overWIFI

    Setup worst-case scenario for testing

    Know what your signal to Noise ratio You should be expect an interview before any

    testing is done

  • 8/9/2019 gauarvjindal

    28/38

    Site Survey: Report

    Describe surveys basis, approach and results.

    Define all requirements, and assumptions

    Describe RF interference found Identify recommended installations locations and

    channels for Access Points

    Give a map with listing of RF strength, and list anydead spots

  • 8/9/2019 gauarvjindal

    29/38

    A Case studyGCA:

    GCA has two separate WIFI networks one is secured

    and one is open.

    Providing wireless ISP services for another school(secured)

    Giving access to all staff on campus homes

    (secured) The campus WIFI network for student access (not

    secure)

  • 8/9/2019 gauarvjindal

    30/38

    Campus Map External WIFI

  • 8/9/2019 gauarvjindal

    31/38

    Campus Map External WIFI

  • 8/9/2019 gauarvjindal

    32/38

    Hardware: Used @ GCA

    Amplifier

    Bridges 3COM work

    Access Points

    Client cards

  • 8/9/2019 gauarvjindal

    33/38

    Photos Outside WIFI network

    3Com 13 dBi Directional Sector

    Panel Antenna (Homes)

    3Com 11 Mbps Wireless

    LAN Workgroup Bridge

    3com Building to

    Building Bridge

    3Com 18 dBi Directional Sector

    Panel Antenna (Ad Building and

    Coble)

  • 8/9/2019 gauarvjindal

    34/38

    Outside WIFI network cont.

    Pigtail 3Com Workgroup BridgeSMA Cable Adapter

    15 dBi Omni-Directional

    Antenna

    AMP244 500 mW

    Outdoor Amplifier

    3Com 20 foot Antenna

    Cable

    Used Radio Shack TV

    Antenna mast

  • 8/9/2019 gauarvjindal

    35/38

    Inside WIFI

    Installing Meru A P (what is wrong?)

    Meru AP100 Access Point

    Meru Controller 1100 Blade

  • 8/9/2019 gauarvjindal

    36/38

    Security: used @ GCA

    Building to building Networks

    Used non WIFI Compatible settings

    WEP

    MAC Address Filtering

    Campus in the buildings

    Separate from main school network

    Open system

    Radius ?

  • 8/9/2019 gauarvjindal

    37/38

    THANK YOU

  • 8/9/2019 gauarvjindal

    38/38