Professional Documents
Culture Documents
15
15
15
CIS 4360
Fall 2009
Taking Steps Towards a
Wireless World
QuickTime™ and a
decompressor QuickTime™ and a
are needed to see this picture. decompressor
are needed to see this picture.
QuickTime™ and a
decompressor
are needed to see this picture.
QuickTime™ and a
decompressor
are needed to see this picture.
What is a Wireless Network?
A group of
connected devices
that communicate
through the air by
means of
electromagnetic
waves, such as radio
waves.
Types of Wireless Networks
WPAN’s dynamically connect devices within a
relatively small area; maintain random
network configurations.
i.e. Bluetooth, ad-hoc networks
WLAN’s connect devices over a more broad
area, known as a cell. Can be found in our
homes, libraries, and coffee shops.
i.e. Wi-Fi, laser bridges
Types of Wireless Networks
WMAN’s are the connection of multiple
WLAN’s and may span an entire city or
college campus.
i.e. WiMAX
Mobile device networks which are
used by our cell phones.
i.e. GSM (2G), 3G cellular networks
Wireless Applications
Laptops Laser Bridges
Cellular phones Emergency Services
Headphones Robotics
Keyboards Biotechnology
Printers Nanotechnology
Speakers Radio Frequency
Global Positioning Identification (RFID)
Systems (GPS) transponders
The possibilities are endless!
What is RFID?
QuickTime™ and a
By means of a simple
integrated circuit and
decompressor
are needed to see this picture.
an antenna, RFID
tags can quickly and
QuickTime™ and a
decompressor
are needed to see this picture.
reliably identify
nearly anything
when scanned with
QuickTime™ and a
decompressor
are needed to see this picture.
an RFID reader.
Radio Frequency Identification
Three types:
1. Passive does not have a
power supply.
QuickTime™ and a
decompressor
are needed to see this picture.
-Accidental
association
-Malicious
association
-Ad-hoc networks
-Non-traditional
networks
Types of unauthorized access :
-Identity theft
(MAC spoofing)
-Man-in-the-
middle attacks
- Denial of service
-Network
injection
- Café Latte
attack
Counteracting security risks