His areas of expertise include Cisco routers andswitches, wide area network architecture, troubleshooting and optimiza-tion, network security, wireless access, and Microsoft NT and 2000
Trang 1Protect Your Wireless Network From Attack
• Complete Coverage of Wireless Standards: IEEE 802.15, HomeRF, IEEE 802.11, IEEE 802.16, Bluetooth,WEP, and WAP
• Hundreds of Damage & Defense,Tools & Traps, and Notes from the Underground Sidebars, Security Alerts, and FAQs
• Complete Case Studies: Using Closed Systems, Deploying
IP Over the WLAN, Utilizing a VPN, Filtering MAC Addresses, and More!
Trang 2s o l u t i o n s @ s y n g r e s s c o m
With more than 1,500,000 copies of our MCSE, MCSD, CompTIA, and Ciscostudy guides in print, we continue to look for ways we can better serve theinformation needs of our readers One way we do that is by listening
Readers like yourself have been telling us they want an Internet-based vice that would extend and enhance the value of our books Based onreader feedback and our own strategic plan, we have created a Web sitethat we hope will exceed your expectations
ser-Solutions@syngress.com is an interactive treasure trove of useful
infor-mation focusing on our book topics and related technologies The siteoffers the following features:
product upgrades You can access online updates for any affectedchapters
questions to our authors and editors
reader queries and clear explanations of complex material
readers desiring additional reliable information on key topics
Best of all, the book you’re now holding is your key to this amazing site
Just go to www.syngress.com/solutions, and keep this book handy when
you register to verify your purchase
Thank you for giving us the opportunity to serve your needs And be sure
to let us know if there’s anything else we can do to help you get the maximum value from your investment We’re listening
www.syngress.com/solutions
Trang 5Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results
to be obtained from the Work.
There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work
is sold AS IS and WITHOUT WARRANTY You may have other legal rights, which vary from state
to state.
In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you.
You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files.
Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,” and “Ask the Author UPDATE®,” are registered trademarks of Syngress Publishing, Inc “Mission Critical™,”“Hack Proofing™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc Brands and product names mentioned in this book are trademarks or service marks of their respective companies.
KEY SERIAL NUMBER
Hack Proofing Your Wireless Network
Copyright © 2002 by Syngress Publishing, Inc All rights reserved Printed in the United States of America Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication.
Printed in the United States of America
1 2 3 4 5 6 7 8 9 0
ISBN: 1-928994-59-8
Technical Editor: Neal O’Farrell Cover Designer: Michael Kavish
Technical Reviewer: Jeffrey Posluns Page Layout and Art by: Shannon Tozier
Acquisitions Editor: Catherine B Nolan Copy Editor: Michael McGee
Developmental Editor: Kate Glennon Indexer: Ed Rush
Distributed by Publishers Group West in the United States and Jaguar Book Group in Canada.
Trang 6Acknowledgments
v
We would like to acknowledge the following people for their kindness and support
in making this book possible
Ralph Troupe, Rhonda St John, and the team at Callisma for their invaluable insightinto the challenges of designing, deploying and supporting world-class enterprisenetworks
Karen Cross, Lance Tilford, Meaghan Cunningham, Kim Wylie, Harry Kirchner,Kevin Votel, Kent Anderson, and Frida Yara of Publishers Group West for sharingtheir incredible marketing experience and expertise
Jacquie Shanahan and AnnHelen Lindeholm of Elsevier Science for making certainthat our vision remains worldwide in scope
Annabel Dent of Harcourt Australia for all her help
David Buckland,Wendi Wong, Marie Chieng, Lucy Chong, Leslie Lim, Audrey Gan,and Joseph Chan of Transquest Publishers for the enthusiasm with which they receiveour books
Kwon Sung June at Acorn Publishing for his support
Ethan Atkin at Cranbury International for his help in expanding the Syngressprogram
Jackie Gross, Gayle Voycey, Alexia Penny, Anik Robitaille, Craig Siddall, DarleneMorrow, Iolanda Miller, Jane Mackay, and Marie Skelly at Jackie Gross & Associatesfor all their help and enthusiasm representing our product in Canada
Lois Fraser, Connie McMenemy, Shannon Russell and the rest of the great folks atJaguar Book Group for their help with distribution of Syngress books in Canada
Trang 8Contributors
Donald Lloyd(CCNA, CCSE, CCSA), co-author of Designing a Wireless
Network (Syngress Publishing, ISBN: 1-928994-45-8), is a Senior
Consultant at Lucent Worldwide Services (Enhanced Services and Sales)and a Regional Leader for their Fixed Wireless Practice His specialtiesinclude network security architecture and wireless network design, as well
as the implementation of Juniper routers Donald’s background includes asuccessful career with International Network Services, and now LucentTechnologies Besides “unwiring” corporate offices, Donald has spentconsiderable time designing and deploying secure wireless networks inremote oil and gas fields.These networks not only carry voice and datatraffic, but also help energy companies monitor the pipelines that carrythese commodities
David M Zendzianis CEO and High Programmer with DMZServices, Inc He provides senior IT and security solutions to singleperson startups and multi-national corporations “anywhere the Nettouches.” His specialties include large- and small-scale IT and securitydesigns, deployments, infrastructure audits, and complete managed sup-port David’s background includes positions with Wells Fargo Bank as aSecurity Consultant where he developed and evaluated platform-specificsecurity standards, assisted with identification of security risks to applica-tions, and designed bank interconnectivity projects that required firewalls,VPNs, and other security devices He was also a founding partner in one
of the first Internet service providers of South Carolina and founder ofthe first wireless ISP in the Carolinas, Air Internet
David is an active Debian Linux developer who maintains packagesfor network audio streaming (icecast, liveice) and the PGP PublicKeyserver (pks) He has provided patches to several projects, most notably
to the Carnegie Mellon Simple Authentication and Security Layer(SASL) David studied computer science at the oldest municipal college inAmerica,The College of Charleston in Charleston, SC He currently lives
in the San Francisco area with his wife, Dana David would like to thank
Trang 9terrestrial, satellite relay, wireless, and trusted communication links Erichas also been responsible for designing some of the leading Public KeyInfrastructure deployments currently in use and for devising operationalpolicy and procedures to meet the Electronic Signature Act (E-Sign) andthe Health Insurance Portability and Accountability Act (HIPAA) He hasprovided his services to financial, commercial, government, and militarycustomers including US Federal Government, Canadian Federal
Government, and NATO He regularly speaks at leading security ences and teaches networking and CISSP classes He is currently working
confer-on two upcoming titles with Syngress Publishing, Building a Cisco Wireless
LAN (ISBN: 1-928994-58-X) and Sniffer Network Optimization and Troubleshooting Handbook (ISBN: 1-931836-57-4) Eric would like to
acknowledge the understanding and support of his family and friendsduring the writing of this book, and “The Boys” for being who they are
Christian Barnes(CCNP, CCDA, MCSE, MCP+I, CNA, A+) is amember of the Consulting Staff at Lucent Worldwide Services (Enhanced
Services and Sales) He is a contributing author to Designing a Wireless
Network (Syngress Publishing, ISBN: 1-928994-45-8) and he currently
provides technical consultation to clients in the South Central Region forLucent Technologies His areas of expertise include Cisco routers andswitches, wide area network architecture, troubleshooting and optimiza-tion, network security, wireless access, and Microsoft NT and 2000 net-working design and support Chris has worked with clients such as BirchTelecom,Williams Energy, and the Cerner Corporation
Trang 10Randy Hiseris a Senior Network Engineer for Sprint’s Research,Architecture and Design Group, with design responsibilities for home dis-tribution and DSL self-installation services for Sprint’s Integrated OnDemand Network He is knowledgeable in the area of multimedia ser-vices and emerging technologies, has installed and operated fixed wirelessMMDS facilities in the Middle East, and has patented network communi-cation device identification in a communication network for Sprint Helives with his wife, Deborah, and their children, Erin, Ryan, Megan, Jesse,and Emily, in Overland Park, KS
Andy McCullough(BSEE, CCNA, CCDA) has been in network sulting for over seven years He is currently a Distinguished Member ofthe Consulting Staff at Lucent Worldwide Services (Enhanced Servicesand Sales) Andy has done architecture and design work for several globalcustomers of Lucent Technologies including Level 3 Communications,Sprint, MCI/WorldCom, the London Stock Exchange, and BritishTelecom His areas of expertise include network architecture and design,
con-IP routing and switching, and con-IP multicast Prior to working for Lucent,Andy ran a consulting company and a regional ISP
Andy is co-author of Building Cisco Remote Access Networks (Syngress
Publishing, ISBN: 1-928994-13-X) He is also an Assistant Professor at acommunity college in Overland Park, KS, where he teaches networkingclasses
Tony Bautts is a Senior Security Consultant with Astech Consulting Hecurrently provides security advice and architecture for clients in the SanFrancisco Bay area His specialties include intrusion detection systems,firewall design and integration, post-intrusion forensics, bastion hosting,and secure infrastructure design.Tony’s security experience has led him towork with Fortune 500 companies in the United States as well as twoyears of security consulting in Japan He is also involved with theBerkeleyWireless.net project, which is working to build neighborhoodwireless networks for residents of Berkeley, CA
Trang 11Jeffrey A Wheat (Lucent WaveLAN Wireless Certification, FOREATM Certification) is a Principal Member of the Consulting Staff atLucent Worldwide Services He currently provides strategic direction andarchitectural design to Lucent Service Provider and Large Enterprise cus-tomers He is an ATM and Testing Methodology Subject Matter Expertwithin Lucent, and his specialties include convergence architectures andwireless architectures Jeff ’s background with Lucent includes designengagements with Metricom, Sprint ION, Sprint PCS, Raytheon, andMarathon Oil Prior to his employment with Lucent, Jeff spent 11 yearsworking for the U.S Intelligence Agencies as a network architect and sys-tems engineer Jeff graduated from the University of Kansas in 1986 with
a bachelor’s of Science degree in Computer Science and currently resides
in Kansas City with his wife, Gabrielle, and their two children, Madisonand Brandon
Trang 12Technical Editor
Neal O’Farrellis founder and CEO of security training firmHackademia Inc., where he oversees the development of more than 30Web-based security training courses Neal is a panel expert and regularcolumnist on SearchSecurity.com and was recently elected Chair of thefirst Cybercrime on Wall Street Conference He has written more thanone hundred articles and three books, appearing in publications as diverse
as Business Week, Information Week, NetWorker, and Wireless Design News.
With a career in information security that spans nearly two decades, Nealwas recently described by the Institute for International Research as one
of the world’s top 20 security experts Neal got his first taste of wirelesssecurity in the mid-1980s when he was asked by the Irish government todevelop a security system for the nation’s fledgling cellular network
In 1989 he co-hosted with IBM one of Europe’s first network rity conferences, and later helped Nokia incorporate security into theirfirst generation of cellular telephones As the head of the European cryptofirm Intrepid, Neal leads the development of some of the world’s mostadvanced voice, data, and fax encryption systems, including MilCode, aEuropean rival of the U.S government’s Secure Telephone Unit (STU 3)
Trang 13Jeffrey Posluns(CISA, CISSP, CCNP, SSCP, GSEC) is an informationsecurity specialist with over eight years of specialized experience in secu-rity methodologies, audits, and controls He has extensive expertise in theanalysis of hacker tools and techniques, intrusion detection, security poli-cies, and incident response procedures
Jeffrey has held the position of Chief Technology Officer ofSecureOps for the past three years, where he has the responsibility ofbringing technical vision and strategy to the company, overseeing thedevelopment and implementation of all technological initiatives, andbeing a key resource in the research and development of new practices,methodologies, procedures, and information assets Jeffrey is a regularspeaker at industry conferences organized by such groups as theInformation Systems Audit and Control Association (ISACA) and theAssociation of Certified Fraud Examiners (ACFE) He also speaks regu-larly for, and participates in, various panels and working groups promotinginformation security awareness with the Canadian IT, government, andlaw enforcement industries
Technical Reviewer
Trang 14Wireless Networking Applications forBusiness 9Wireless Networking Applications for
Trang 15The Limitations of Wireless Security 32Cellular-based Wireless Networks
Understanding Public Key
Summary 68
Introduction 76Understanding Security Fundamentals and
Trang 16Implementing Policy 98Recognizing Accepted Security
Understanding the Common
Electronic Signatures in the Global
Experiencing Denial and Disruption
Tools & Traps…
Clear-text Authentication
An example of a force password dictionary generator that can produce a brute-force dictionary from specific character sets can be found at www.dmzs.com/
brute-tools/files Other brute force crackers, including POP, Telnet, FTP, Web and others, can be found at http://packetstormsecurity com/crackers
Trang 17Chapter 3 Wireless Network
Introduction 126
Multichannel Multipoint Distribution
Why the Need for a Wireless LAN Standard? 132What Exactly Does the 802.11
Does the 802.11 Standard Guarantee Compatibility across Different Vendors? 137802.11b 138802.11a 139802.11e 140Developing WLANs through the 802.11
Architecture 141
Developing WPANs through the 802.15Architecture 150Bluetooth 150
Fixed Wireless
Technologies
In a fixed wireless
network, both transmitter
and receiver are at fixed
locations, as opposed to
mobile The network uses
utility power (AC) It can
be to-point or
point-to-multipoint, and may
use licensed or unlicensed
spectrums.
Trang 18Second Generation Technologies 156
Performing Analysis of
Reviewing and Validating the PlanningPhase 173
Trang 19Defining the Operations Services 175Creating a High-Level Operating Model 175
Creating the Network ArchitectureDeliverable 177
Reviewing and Validating the NetworkArchitecture 178
Creating a Detailed Service
Creating a Detailed Operating
Creating the Detailed Design Documents 183Understanding Wireless Network Attributes
Chapter 4 Common Attacks and Vulnerabilities 201
Introduction 202
Trang 20Weaknesses in Key Management 208
Protecting Against Sniffing andEavesdropping 219
Protecting Against Spoofing and
Protection against Network Hijacking
Protecting Against DoS and FloodingAttacks 228
Summary 232
Notes from the Underground…
Lucent Gateways broadcast SSID in clear
on encrypted networks
It has been announced (www.securiteam.com/
securitynews/5ZP0I154UG html) that the Lucent Gateway allows an attacker an easy way to join a closed network.
Lucent has defined an option to configure the wireless network as
“closed.” This option requires that to associate with the wireless network
a client must know and present the SSID of the network Even if the network is protected by WEP, part of the broadcast messages the gateway transmits in cleartext includes the SSID All an attacker need do is sniff the network to acquire the SSID, they are then able to associate with the
network.
Trang 21Chapter 5 Wireless Security Countermeasures 239
Introduction 240
Implementing WEP on the ORiNOCOAP-1000 262Securing a WLAN with WEP:
Implementing MAC Filters on the
Security Implications of Using ProtocolFilters 272
■ Identify the likelihood
that someone other
■ Identify the cost to
replace, fix, or track the
securing the resource
versus cost of damage
control
Trang 22Closed System Benefits and Advantages 274
Security Implications of Using a ClosedSystem 275
A Closed Environment on a Cisco
Deploying IP over the WLAN:
Deploying IP over the WLAN:
Disadvantages 279Security Implications of Deploying IP
Deploying IP over the WLAN:
Summary 292
Trang 23Choosing the Tools and
What Threat Do These “Open Networks”
What Tools Are Necessary to Perform
What Network Information
Where in the Authentication/Association
War driving has become
the common term given
for people who drive
around with wireless
equipment looking for
other wireless networks.
This term gets its history
from “war-dialing” – the
age old practice of having
your computer dial every
phone number within a
certain range to see if a
computer would pick up.
Trang 24Installing Rogue Access Points 320
Where Is the Best Location for
Summary 323
Chapter 7 Monitoring and Intrusion Detection 327
Introduction 328
Watching for Unauthorized Traffic
Signatures 343
Defensive Monitoring Considerations
■ Define your wireless network boundaries, and monitor to know if they’re being exceeded
■ Limit signal strength to contain your network.
■ Make a list of all authorized wireless Access Points (APs) in your environment.
Knowing what is supposed to be there can help you
immediately identify rogue APs.
Trang 25Reporting 351Cleanup 352Prevention 352Conducting Site Surveys for Rogue
Summary 358
Audit Information Analysis and
Wireless network audits
consist of several stages
where different resources
or tools are needed to
perform a specific activity.
These activities generally
fall into six categories:
Trang 26Technical Auditing Tools 375
Standards 378Guidelines 378
Policies 378Procedures 379Auditing, Security Standards, and
Fraud 385
Trang 27Appendices 396Glossary 396
Sample Management Report:WirelessNetwork Security Audit Report XYZCorporation 397Sample Technical Report Wireless
Network Security Audit Report:
Summary 402
Introduction 408
Summary 433
Appendix: Hack Proofing Your Wireless
Implementing an Ultra
Secure WLAN
■ Make sure that your AP
allows you to change
ESSID, passwords and
supports 128-bit WEP.
■ Find an AP that
supports the “closed
network” functionality.
■ Be certain that the AP
you buy supports flash
upgrades.
■ Isolate the AP and
regulate access from its
network into your
internal network.
■ Conduct audits of your
network using
NetStumbler or other
wireless scanning tools
to make sure that
others aren’t enabling
unauthorized APs.
■ Update security policy
to reflect the dangers
of an unsecured
wireless network.
Trang 28The simple way to make a wireless system or device more secure is to put it into afaraday cage Unfortunately, while this strategy leaves you with a device that isunreachable by attackers, it also leaves you with a device that is almost completelyuseless.
Traditionally, someone had to be sitting in front of your computer to read yourdocuments, see your e-mail, and mess with your settings.Today, however, someonecan be sitting in the office next door, a few floors up or down, or even in the nextbuilding, and have the same abilities as if he were in front of your computer
Advancements in wireless communications have allowed for great increases in ductivity and ease of use, but have brought with them many additional risks to thesystems and information being used
pro-Are you using an 802.11 or Bluetooth device on your computer? pro-Are you using aPDA to communicate with other systems or to get onto the Internet? Are you using
a cellular phone to initiate a network connection back to your office? Have you justset up the latest wireless gateway at home so you can walk around with your note-book? Are you planning on implementing a wireless solution in your office? Simplyput, there is now a greater security risk to your information Someone could moreeasily read your financial data, look at your saved documents, or browse your e-mails.The advances in ease of use with wireless systems come at a cost—they must gohand in hand with advances in information security.You will now have to deal withissues like: network identification and encryption keys; making your wireless networkinvisible to people passing close enough to see it; and making sure that nothing and
no one, other than your defined list of devices, systems, or people, are able to useyour wireless resources
People are naturally disinclined to consider security Security and cost, or securityand ease of use, are often at odds in the workplace, and many other items tend to begiven a comparatively higher business priority It is for these reasons that one must
xxvii
Foreword
Trang 29anticipate security when considering any new implementation, generate a clear and
well-defined business case, and allow the security processes to be properly and ciently managed throughout their lifecycles
effi-There is no way to make your systems 100 percent secure, but what you can do
is learn about what hackers and crackers can do to you, learn how to protect yourselffrom them, learn how to catch them in the act of attacking your computer or otherwireless device, and learn how to make it difficult enough for them that they willmove on to easier targets
The intent of this book is to provide perspective and relevant information withrespect to wireless communications to people in all areas of business analysis andinformation technology, whether they are preparing a business case for a wirelessproject, are IS/IT specialists planning for a new wireless implementation, securityneophytes expanding a home network to include wireless access, reacting to an attack
on their network, or being proactive in security measures
If you don’t have to time to read and understand all of the chapters describingthe complex facets of information security as they are applied to wireless technolo-gies, you can simply follow the instructions on planning and implementing a wirelessnetwork, along with the security aspects surrounding it.You will benefit from thehands-on descriptions of hardening and securing your wireless networks and devices,allowing you to rest easy knowing that no one will compromise your information ortake advantage of your systems without your knowledge
—Jeffrey Posluns, CISA, CISSP, SSCP, CCNP
Trang 30The Wireless Challenge
Solutions in this chapter:
■ Wireless Technology Overview
■ Understanding the Promise of Wireless
■ Understanding the Benefits of Wireless
■ Facing the Reality of Wireless Today
■ Examining the Wireless Standards
; Summary
; Solutions Fast Track
; Frequently Asked Questions
Chapter 1
1
Trang 31When the concept of a network without wires was first suggested more than twodecades ago, it sparked the imagination of scientists, product vendors, and usersaround the globe eager for the convenience and flexibility of a free roaming con-nection Unfortunately, as the variety of wireless solutions began to emerge, antic-ipation turned to disappointment.The first wave of solutions proved inadequatefor the networking, portability, and security needs of a changing IT environment.While this has largely continued to be the case throughout the 1990s withmost cell-based and office local area network (LAN)-based wireless technologydeployments, great strides have been made specifically over the last two years toaddress the fundamental concerns impeding the full acceptance of wireless net-working in the mainstream of corporate IT departments and the small office
In this chapter, you will learn about the technology that is available today forwireless data networking and what tomorrow’s wireless technologies have tooffer.We will cover office LAN wireless solutions including 802.11, its subgroups(802.11b, 802.11a, 802.11g) and HomeRF, cellular-based wireless data solutionsincluding the Wireless Application Protocol (WAP) and i-Mode and the networkinfrastructures supporting them (in particular 2G, 2.5G, and 3G), and finally,802.15 Personal Area Network (PAN) solutions such as Bluetooth In addition,
we will review some of the new standards being developed to create wirelessmetropolitan area networks (WMANs) and other wireless data transmission solu-tions that are being proposed for commercial application
In conjunction with the review of the technologies behind wireless, we willalso cover the main security concerns specifically impacting cellular-based officeLAN and PAN wireless deployments In doing so, we will review the major secu-rity concerns you can expect to read about in later chapters, and will discusssome of the efforts being made to minimize their impact
After completing this chapter, you will have gained a solid understanding ofwireless technologies and their associated security risks It is our hope that weprovide you with an appreciation of how wireless networking technologies willimpact our work and home lives, and that security will have to play an importantrole in wireless deployments Let’s get started!
Wireless Technology Overview
Wireless technologies today come in several forms and offer a multitude of tions applicable to generally one of two wireless networking camps:
Trang 32solu-■ Cellular-based wireless data solutions
Defining Cellular-based Wireless
Cellular-based wireless data solutions are solutions that use the existing cellphone and pager communications networks to transmit data Data can be catego-rized into many forms, including traditional corporate communications such as e-mail, directory information exchange and basic information transfers,
peer-to-peer communications such as messaging services, and informationlookups such as navigational information, and news and variety, amongst others
Some cellular-based wireless data network solutions only support one-waycommunications.While technically they fall into the category of cellular-baseddata solutions, we will not include them in the discussions proposed in this book
Instead, we will focus on the cellular-based solutions that provide, at minimum,two-way data communications Furthermore, in this book, we will only discusssolutions that can support a basic security overlay
Defining the Wireless LAN
Wireless LAN solutions are solutions that provide wireless connectivity over alimited coverage area.The coverage area generally consists of between 10 and 100meters (30-300 feet) from a base station or Access Point (AP).These solutionsprovide the capabilities necessary to support the two-way data communications
of typical corporate or home desktop computers with other network resources
The data streams in this case generally consist of remote application access andfile transfers.Wireless LAN solutions provide a means for wireless nodes to inter-face with hard-wired LAN resources.This results in the creation of hybrid net-works where hard-wired nodes and wireless nodes may interact with each other
The Convergence of Wireless Technologies
While for the time being, the two classifications hold generally true, many newvendor product offerings planned for introduction over the next year will begin
to blur the lines between cellular-based wireless devices and wireless LAN-baseddevices.These include cell phones, high-end pagers, and cell-enabled personaldigital assistants (PDAs), which also provide personal area network connectivity tolocal devices using wireless LAN technologies such as Bluetooth
Trang 33This trend will only continue to accelerate.With the evolution of more erful and compact wireless network components supporting greater access speedsand communications capabilities, and the increased versatility of PDAs and otherportable information appliances, consumers will continue to demand more tightlyintegrated communication environments that provide seamless application sup-port across their hard-wired and wireless information resources.
pow-Trends and Statistics
At this point in our wireless technology review, it is worthwhile to take a closerlook at some of the emerging wireless data trends and usage statistics.The picturethat begins to emerge is quite interesting
Initially, the big trend that becomes readily apparent is that support for vergence within devices will be the norm over the next two years.While themajority of cellular-based wireless traffic today mainly consists of voice, it is esti-mated that by the end of 2003 nearly 35 to 40 percent of cellular-based wirelesstraffic will be data
wire-less LANs (0.7 probability) (Source: Gartner Group)
wireless LANs (0.6 probability) (Source: Gartner Group)Figure 1.1 shows the projected number of wireless Internet users in 2005
Figure 1.1Projected Number of Wireless Internet Users in 2005
(Source: Yankee Group)
North America
195.2
0 100 200 300 400 500
Europe Asia Latin
America
Africa and Middle East
313.3
466.7
118.7
86
Trang 34Increasing Use of Information Appliances
While users on the move are leading the push for the integration of wireless
devices, a recent trend in the availability of information appliances is beginning to
have an impact on the wireless industry at large and will soon be one of theleading platforms for wireless data communications
Information appliances are single purpose devices that are portable, easy touse and provide a specific set of capabilities relevant to their function Examples
of devices currently shipping include PDAs, MP3 players, e-books, and DVDplayers Information appliance shipments over this year will outnumber PC ship-ments (See Figure 1.2.)
This trend will continue for the foreseeable future As new features and thelevel of functionalities incorporated within information appliances increase, sowill their market share of the information technology deployment landscape Inthe end, the full value of these devices will only be realized when wireless net-working capabilities are fully integrated within the information appliances
As the information appliance and wireless networking integration occurs, endusers will be provided with the ability to obtain and manipulate content ondemand Content will range from existing textual data (such as books and news)
to full-blown multimedia (such as audio, video and interactive media files) Access
to content will be provided using both local (or proximity-based) wireless working technologies and cellular-based wireless networking technologies
net-Content will be available from traditional external sources such as content servers
Figure 1.2Projected PC and Information Appliance Shipments (Source: IDC Report 1998)
0 5 10 15 20 25
PCs Info Appliances
Trang 35and Web servers located on the Internet, and from proximity or locally accessedsources such as shopping malls, airports, office buildings, and other public places.
The Future of Wireless, circa 2005
Think of a nice sunny morning.The year is 2005 and you are about to go on abusiness trip in a foreign city.You have your trusty universal integrated two-wayvoice, data, and video multimedia PDA by your side
Using references to your personal digital identification module stored inyour PDA, your travel agent registered all of your travel arrangements, includingyour flights, car, and a room at your favorite hotel Now that the preparations aremade, let’s take a look at how this day might unfold
Using your wireless PDA, you bring up the local taxi service, and call up andrequest a car to pick you up from home.The taxi arrives and drives you to theairport.You authenticate to the electronic payment module on your PDA usingintegrated writing analysis software and charge the cost of the trip to your cor-porate account.The payment transaction between the cab, your PDA, and yourbank is encrypted and digitally signed A confirmation of payment is recorded forexpense billing and audit review at a later date
You walk up to the self-service check-in counter for frequent flyers.Theproximity wireless network in your PDA becomes active and your PDA authenti-cates you at the counter An encrypted session is set up.Your flight information isdisplayed on the check-in counter screen and you are prompted to sign a confir-mation on your PDA Boarding passes and self-tacking baggage tags are printed.You affix the tags to your bags and deposit them on the checked baggage belt Asthey disappear behind the wall, you receive confirmation on your PDA that yourbags have been checked As your session with the check-in counter is terminated,
a new session is established with airport information control From now until thetime you board the plane, you will be able to obtain the latest information onflight schedules, gate information, baggage information, airport layout, restaurants,shopping and other airport services
Your flight arrives at its destination and you make your way to baggage claim
A new session has been established with the local airport information control.Based on your ticketing information, it tells you where your bags are currently,where you will be able to pick them up and their estimated time of availability
An airport map is conveniently made available for your use along with tion on local services
informa-You collect your bags and hop on the local car rental agency bus In transit to thecar lot, you preselect your car and sign the rental agreement.The car keys are
Trang 36downloaded to your PDA.To save time, you preconfigure your PDA to open thetrunk and unlock the doors when you are within a few feet.You have a few extraminutes left and you use them to check your voice and video messages from yourPDA One of the video messages has a large format graphics file attached.Youmake a note to view that message when you get to the hotel.
You arrive at the car, the trunk opens and the doors unlock.You store yourbags and select the hotel information on your PDA.The in-car display and GPSdirectional system provides you with directions to the hotel.You prepay the tollsand a confirmation of payment is recorded for expense billing and use at theautomated toll.You’ll be able to drive to the hotel using the express lane.YourPDA will take care of passing on the prepayment when you get to the toolbooth
You arrive at the hotel and leave the car with the valet.They will take care ofcarrying your heavy bags up to your room As you make your way through thelobby, your PDA authenticates your reservation and provides you with your roomassignment.You conditionally sign for the room, and the keys are downloaded toyour PDA As you arrive at the door of your room, the door unlocks and youenter.You verify the room is as you asked for and click Accept Room on yourPDA
You make a video call on your PDA to your in-town associates and makereservations for four at a local restaurant for dinner.You download the wine listand menu and make a selection for appetizers.Your PDA reminds you that youstill have an unviewed video message
Now that you are all checked in and in your room, you’ll have some time toview it.You bring up the video message with a large format graphic file on yourPDA and display it on the in-room TV It’s video highlights of the after-schoolsoccer league game.Your daughter scored the winning goal
While at first, many of the elements in our “day in the life” may appear to befrom the realm of science fiction, by the time you complete this chapter, you willrealize that they are not as far-fetched as they may appear Surprisingly, the tech-nologies and standards exist today to make all of this real
Let’s take a look at what wireless has in store for us
Understanding the Promise of Wireless
At this point it might be a worthwhile exercise to do a quick historical review ofdata networking and telephony to get a clearer understanding of where the tech-nology is heading
Trang 37As we all know, in the beginning, computers lived in glass houses At thattime, these machines were more like objects to be admired for their technicalcomplexity and problem-solving abilities than as useful day-to-day tools.The factthat they even existed was the stuff of legend, and great pains were taken to keepaccess to them, and even knowledge of them in some cases, restricted to only aprivileged few.
Throughout the sixties and most of the seventies, computing resourcesremained in the central computing complex.The machines of that period werebulky and difficult to use Networking was in its infancy and few protocolsexisted to support the sharing of data
When the personal computer revolution took hold in the late seventies andearly eighties, the demystification of computing resources brought in an unprece-dented era of access New applications were devised in the realms of business,communications and entertainment A novel trend had emerged: computing tech-nologies were being brought to the users, instead of the users being taken to thecomputers As these resources became more compact and more powerful, com-puting visionaries began to dream about a future where anyone could access acomputer at anytime, from anywhere
The computing folks were not the only ones to share that dream A similardesire was being manifested within the telephone industry Users had begun todemand portable telephone services and more extensive telephone coverage inremote or limited access environments where traditional physical line-based ser-vices were not viable
Throughout the late eighties and nineties, a number of wireless telephonesolutions began to appear in the market place By this time, traditional computinghad become a user of wired telephone services for network dial-in access,
Bulletin Board Services, and other data communications Laptop computers hadbecome available and the marriage of wireless networking and portable com-puting had finally arrived Or so it seemed
It was a difficult time Networking standards were evolving at breakneckspeeds to address the ever-changing data computing needs of the corporate andscientific users New applications were being developed that were more powerfuland complex, and which required an ever increasing availability of bandwidth Allthe while, new security standards were unfolding to address the shift from theglasshouse computing concept to a fully distributed computing model
Few of these new standards were fully adaptable to meet the demands ofwireless networking users If we take into account all of the data networkingstandards being defined at that time and factor in the hardware limitations of the
Trang 38day, it’s little wonder why wireless never reached the masses Many of the portabledata transceivers and cell phones being offered were very bulky and provided toolow of a throughput to make them effective platforms for remote computing.
Wireless networking was an idea too early for the technology and data munication standards available then.The ideal of a completely untethered net-work would have to wait
com-So where are we in terms of wireless networking today? Networking andapplication standards began to coalesce and are more wireless networking friendlythan ever Special classes of standards have been established to meet the demands
of wireless networking On the technological side, breakthroughs in tronics have manifested themselves in the form of higher density fabrics withlower power requirements Real-world workable wireless networking solutionshave begun to emerge and are now within reach of most corporate and homeconsumers
micro-elec-As it would be expected, the original appeal of wireless networking is just asdesirable today as it was 10 or 20 years ago.Today’s wireless solutions offer usflexibility, performance, and proven solutions that promise increased productivityand potential reductions of long-term capital and management costs associatedwith network deployments
Soon wireless will be used in almost every context Its presence will becomeuniversally accepted and implicitly trusted In many ways, integrated wireless net-working technologies will represent a revolution in the way people interact andcommunicate with each other and with data stores, not unlike the early days oftelegraph and Morse code
This next step will be larger than any other previous evolution in cations.We will have to take care and ensure that our new friend is up to all ofthe challenges we hope to send its way and that we provide opportunities for it
communi-to grow and evolve so that it can meet our needs long incommuni-to the future
Wireless Networking
With 3G cellular-based wireless networks, wireless LANs, wireless personal areanetworks, and broadband wireless services becoming available in most locationsover the next few years, new applications and classes of services will be created tomeet the networking needs of both business and consumers
Wireless Networking Applications for Business
Wireless networking applications that provide solutions for business use consist of
Trang 39Mobile messaging involves the extension of an internal corporate messaging
network environment to a remote user over a wireless network connection Atypical application includes the use of third-party solutions to extend electronicmail to wireless users Using wireless-enabled PDAs, two-way pagers, and smartcell phones, users can be kept up-to-date with their corporate e-mail inbox andcan provide brief responses to urgent or pressing issues
The Short Message System (SMS), used to send and receive instant short textmessages, is also an effective means used by the corporate user to keep up to datewith the latest news and other developments.While the service is predominantlyused to obtain information from text information media, it can also be used fortwo-way text messaging with other users
Lastly, with the full integration of unified messaging around the world, themobile wireless user will finally have a true remote presence Multimedia func-tions will be incorporated to support both real-time and messaging requirements
of users
In Figure 1.3, we can see that a universal address supporting roaming willprovide unprecedented mobility.When this occurs, corporate users will have asingle point of contact Communications will be directed to their localized point
of presence, wherever that may be
Trang 40The second area in the wireless corporate communications solution set
involves mobile office and corporate groupware Figure 1.4 demonstrates the concept
of the roaming wireless desktop Mobile office and corporate groupware tions over wireless provide internal corporate network resources to the remoteuser over a wireless network connection.The most dominant applications in thisarea include corporate database servers, application servers, information and newsservers, directory services, travel and expense services, file synchronizations,intranet server browsing, and file transfers
applica-Telepresence over wireless provides an avenue for increased collaborative
net-working Figure 1.5 illustrates the premise of telepresence, that of providing alocalized presence to a remote user.Two-way videoconferencing and Webcasts areexamples of telepresence
Figure 1.3Single Point of Contact for 3G-enabled Devices
3G Device