Beruflich Dokumente
Kultur Dokumente
PRESENTED BY:
ROHAN A. INGLE (18) RUSHABH SHETH (43) PARAG KANITKAR (21) GOPAL AGRAWAL (01) VAIBHAV BAGADE (05) DEEP WORAH (54)
JAMES CLERK MAXWELL showed mathematically that electromagnetic waves could propagate through free space. HEINRICH RUDOLF HERTZ and many others demonstrated radio wave propagation on a laboratory scale. In 1895, MARCONI built a wireless system capable of transmitting signals at long distances (1.5 mi./ 2.4 km). From Marconi's experiments, the phenomenon that transmission range is proportional to the square of antenna height is known as "Marconi's law". This formula represents a physical law that radio devices use.
Wireless WAN:
Wireless PAN: Interconnect devices within a relatively small area Within a persons reach.
Security Problems
Security features in Wireless products are frequently not enabled. Use of static WEP keys (keys are in use for a very long time). WEP does not provide key management. Cryptographic keys are short. No user authentication occurs only devices are authenticated. A stolen device can access the network. Identity based systems are vulnerable. Packet integrity is poor.
FACTS
Personal computer, Smart phone can connect to internet via wireless network access point. Range of Access point. Hotspot. Used over 700 million people. 4 million hotspot around the world. 800 million new Wi-Fi devices are sold every year. In India, Mysore is first to offer Wi-Fi free city(2004) and second in the world after Jerusalum. In 2005 Sunnyvale, California.
How it Works
Wireless network interface controller. The combination of computer and interface controller is called a station. Single radio frequency communication channel. Transmissions received by all stations within range. A carrier wave is used to transmit the data in packets (Ethernet Frames). Radio frequency communication channel.
Securing Methods:
Hiding the access points name by disabling the SSID broadcast. Allow computers with known MAC addresses to join the network. Wired Equivalent Privacy (WEP) encryption. Wi-Fi Alliance approved Wi-Fi Protected Access (WPA) which uses TKIP.
THANK YOU