Bluetooth SD card 6.2.5 Bluetooth Access Points Besides 802.11 wireless access points, Bluetooth access pointsare also becoming common.. Figure 6-8 shows the BluetakeBT300 Bluetooth Acce
Trang 1[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [L] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 2Like the book? Buy it!
Trang 3[SYMBOL] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 4[ SYMBOL ] [A] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 6[ SYMBOL ] [ A ] [B] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 7BSS (Basic Service Set)
Building Wireless Community Networks
bypassing proxy servers
[ Team LiB ]
Trang 8[ SYMBOL ] [ A ] [ B ] [C] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 10[ SYMBOL ] [ A ] [ B ] [ C ] [D] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 12[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [E] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 13[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [F] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 14[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [G] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 15[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [H] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 16[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [I] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 17IP routing
IP subnet addressing
iPaq series of Pocket PCs
ipconfig command 2nd 3rd 4th 5th finding MAC addresses
Trang 18[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [J] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
joining the network
Jones, Matt
[ Team LiB ]
Trang 19[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [K] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 20[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [M] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 21[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [N] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 22[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [O] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 23[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [P] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 24port-based authentication mechanism [See 802.1X standard] ports
Trang 25[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [Q] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
QFE (Quick Fix Engineering) 313183 patch
[ Team LiB ]
Trang 26[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [R] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 27[ Team LiB ]
Trang 28[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [S] [ T ] [ U ] [ V ] [ W ] [ X ]
Trang 30Synchronization Profile
[ Team LiB ]
Trang 31[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [T] [ U ] [ V ] [ W ] [ X ]
Trang 32[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [U] [ V ] [ W ] [ X ]
Trang 33[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [V] [ W ] [ X ]
Trang 34[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [W] [ X ]
Trang 36WPA2 standard (802.11i)
[ Team LiB ]
Trang 37[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [X]
XScale PX250 processor (Intel)
[ Team LiB ]
Trang 38Imagine you are out of the office and need to access a printer
or file server on the office network Unless you dial in to thecompany's server, it is not possible for you to access the
resources in the office Moreover, using a dial-up line is not acheap alternative (despite the slow speed), especially if you areoverseas
A Virtual Private Network (VPN) allows you to establish a
secure, encrypted connection to the office's network, all
through a public network such as the Internet Using a VPN,you can work as though you are connected to your company'snetwork
There are two main types of VPN:
User-to-Network
This type allows a client to use a VPN to connect to a securenetwork, such as a corporate intranet
Network-to-Network
This type connects two networks via a VPN connection Thiseffectively combines two disparate networks into one,
eliminating the need for a Wide Area Network (WAN)
4.2.1 Tunneling
Tunneling is the process of encapsulating packets within other
Trang 39packet forwarding, and masking of IP private addresses Figure4-1 shows a tunnel established between two computers throughthe Internet Think of a tunnel as a private link between the twocomputers: whatever one sends to another is only visible to theother, even though it is sent through a public network like theInternet
Point-to-Point Tunneling Protocol (PPTP)
This was designed by Microsoft (and other companies) tocreate a secure tunnel between two computers PPTP
provides authentication and encryption services, and
encapsulates PPP packets within IP packets It supports
multiple Microsoft networking protocols such as LAN to LANand dial-up connections However, it is proprietary and the
Trang 40Layer 2 Tunneling Protocol (L2TP)
This works like PPTP, except that it does not include
encryption L2TP was proposed by Cisco Systems, and likePPTP, supports multiple networking protocols
In the following sections, I illustrate how to set up a VPN host
as well as a client using two Windows XP Professional systems
4.2.2.1 On the host computer
Trang 42Figure 4-4 Granting access rights to users
The next window allows you to install additional networkingsoftware for this connection (see Figure 4-5) Click on Next to
go to the next screen
Trang 43Figure 4-6 Selecting the network connection type
Trang 44Figure 4-7 Selecting the network connection
Enter a name for the VPN connection (see Figure 4-8) ClickNext
Figure 4-8 Giving your VPN connection a name
Trang 46desktop" checkbox Click Finish
That's it! When the process is completed, an icon is shown onthe desktop (see Figure 4-11)
Figure 4-11 The icon for the VPN connection
To connect to the VPN server, double-click on the icon and log inwith your username information (see Figure 4-12) You can nowwork as though you are working on a computer in your office:most (if not all) of your network resources, such as file and
print servers, will be accessible
Resist the temptation to check the box titled "Save this user name and password for the following users" (see Figure 4-12 ) If you enable this, your password will be saved on your computer; if your computer is stolen or compromised, an attacker will be able to connect to the VPN and access everything it protects.
Trang 47One common error that you might encounter has to do with setting a proxy server in Internet Explorer For example, my ISP does not require
me to use a proxy server when surfing the Web But when I connected
to the VPN server in my workplace, I was suddenly unable to connect to the Web As it turns out, my company requires me to use a proxy
server to connect to the Web With the proxy server configured in IE (Tools Internet Options Connections Connection Name Settings), I am now able to connect to the Web (see Figure 4-13 ).
Figure 4-13 Setting a proxy server for a VPN
connection
Trang 49Most wireless routers support a feature known as "IPSec and PPTP pass
through." What does it do?
IPSec and PPTP are security protocols that provide authentication and encryption over the Internet The "pass through" feature of the wireless router allows
secure packets to flow through the router, but the router itself does not perform any authentication and encryption operation.
IPSec works in two modes: transport and tunnel Transport mode secures IP packets from source to destination, whereas tunnel mode puts an IP packet into another packet that is sent to the tunnel's endpoint Only tunnel mode (ESP) IPSec can be passed through.
Trang 50Just a year ago, Bluetooth devices were a rare species It wasdifficult to find Bluetooth add-ons, not to mention Bluetooth-enabled devices Today, you can find Bluetooth adapters of allshapes and sizes, and with different kinds of interfaces for thevarious devices Bluetooth adapters come in the following types
Trang 51The easiest way to add Bluetooth capability to your system is toinsert a USB Bluetooth adapter into your USB port Today, USBBluetooth adapters come in all shapes and sizes For as little as
$40 you can a get Class 2/3 Bluetooth adapter For slightly
more, you can get a Class 1 adapter that extends the effectivecommunication radius Figure 6-4 shows the Billionton USB
Trang 52Figure 6-6 A PCMCIA Bluetooth card
Trang 53Toshiba seems to be the only vendor producing the Bluetooth
SD (Secure Digital) card (the one used by Palm devices aremanufactured by Toshiba) Figure 6-7 shows the Toshiba
Bluetooth SD card
Figure 6-7 Bluetooth SD card
6.2.5 Bluetooth Access Points
Besides 802.11 wireless access points, Bluetooth access pointsare also becoming common Figure 6-8 shows the BluetakeBT300 Bluetooth Access Point (AP), which is Bluetooth 1.1
compliant and supports an operating range of 100 meters (300feet) The AP comes with two interfaces: RS232 (standard PCserial adapter) and a 10/100 Base-T Ethernet port It supportsthe Bluetooth LAN Access profile (more on this later), operates
at a maximum data rate of 1 Mbps, and supports up to sevensimultaneous users I look at how to use a Bluetooth accesspoint for network access later, in Section 6.6.1
Figure 6-8 The Bluetake BT300 Bluetooth Access
Trang 546.2.6 Personal Digital Assistants
One of the earliest PDAs to support Bluetooth is HP's (formerlyCompaq) iPaq series of Pocket PCs Starting from the iPaq 3800series, HP has been building Pocket PCs with the Bluetooth
capability built in Palm has since also built devices that comewith the Bluetooth capability built in The Palm Tungsten T isone such model Figure 6-9 shows the Palm Tungsten T
Figure 6-9 The Palm Tungsten T
6.2.7 Cell Phones
Trang 55
Figure 6-10 The Sony Ericsson T68i and the Sony Ericsson P800 (shown with the kind permission of Sony Ericsson; copyright Sony Ericsson 2003)
Trang 56The original T68 was marketed under the Ericsson brand It was then that Ericsson and Sony started a joint venture in mobile phone development Subsequent phones were marketed under the Sony Ericsson label The Sony Ericsson T68i was an improved version of the T68 In some places, you can convert your T68 to T68i via a firmware upgrade.
Trang 57As a consumer technology, Bluetooth needs to be widely
supported by vendors to be successful Interoperability, theability for different devices (from different manufacturers) towork with one another, is the key factor in securing this broadsupport (many a technology has been stalled because userswere frustrated by incompatibilities and finger-pointing amongvendors) In Version 1.1 of the Bluetooth specification (the
Generic Access Profile
The Generic Access Profile (GAP) defines how two Bluetoothdevices discover and establish communications betweeneach other The GAP is the "mother" of all profiles, as it
Trang 58Serial Port Profile
The Serial Port Profile defines how two Bluetooth devicescan communicate with each other by using virtual serialports Using this profile, Bluetooth communication can betreated as just another serial communication
Trang 59The Generic Object Exchange Profile (GOEP) defines a set ofprotocols used by applications for exchanging objects
Object Push Profile
The Object Push Profile is used together with the GOEP tosend and receive objects, primarily for exchanging
electronic business cards
File Transfer Profile
The File Transfer Profile is used together with the GOEP totransfer files between two Bluetooth devices
Synchronization Profile
Trang 60In this chapter, we will make use of several of the 13 profiles forfile transfer, Internet connectivity, etc
Trang 61Ericsson 2003)
Trang 62Like Wi-Fi access points, Bluetooth access points are
increasingly popular Using a Bluetooth access point is similar tousing a Wi-Fi access point connect the access point to a wirednetwork and you can wirelessly connect your Bluetooth devices
When the access point is found, right-click on the icon andselect Discover Available Services, as shown in Figure 6-54
Figure 6-54 Discovering the services that the
Bluetooth access point provides
Trang 63Connect to Network Access Point, as shown in Figure 6-55
Figure 6-55 Connecting to the Bluetooth access
point
By default, the Bluetooth access point has a static IP address of 1.1.1.1 You can configure it to obtain its address from a DHCP server I discuss this in more detail in Section 6.6.1.2
4 You should then see a dialog prompting you to enter your username and password Simply leave these
boxes empty and click on Connect, as shown in Figure 6-56
Figure 6-56 Click on Connect to log on to the
Bluetooth access point
Trang 646.6.1.2 Configuring the Bluetooth access point
By default, the connection to the Bluetooth access point is set
at 115200 bps You should set it to the maximum of 921600bps To do so, right-click on My Network Places and selectProperties Then, right-click on BluetoothNullConnection andselect Properties Under the General tab, click on the
Configure button This is shown in Figure 6-57
Figure 6-57 Changing the maximum transfer
speed of the Bluetooth access point
Trang 65One problem that you need to look out for is when you connectthe Bluetooth access point to a router You need to assign an IPaddress to the access point before you can connect to it usingthe Internet To do so, once you are connected to the accesspoint, use a web browser and configure the access point (see
Trang 66For those using an ADSL/DSL modem, choose the PPPoE option(see Figure 6-59) For cable modem users, choose DHCP (Ifyou are not sure whether your Internet connection uses DHCP
or PPPoE, contact your ISP.) There are also three security
options available levels 1 to 3 For security level 3, you need tosupply a PIN code You can also optionally enable data
encryption But doing so will effectively reduce the data transferrate
Figure 6-59 Configuring the network type and
security for the access point
If you use security level 3, you will be prompted to enter thePIN code when your computer connects to the access point
(shown in Figure 6-60)
Figure 6-60 Prompt from the access point when
security level 3 is selected