1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu Hack Proofing Your Wireless Network pdf

513 327 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Hack Proofing Your Wireless Network
Tác giả Christian Barnes, Tony Bautts, Donald Lloyd, Eric Ouellet, Jeffrey Posluns, David M. Zendzian, Neal O’Farrell
Người hướng dẫn Neal O’Farrell
Trường học Syngress Publishing, Inc.
Chuyên ngành Wireless Network Security
Thể loại Sách hướng dẫn kỹ thuật
Năm xuất bản 2002
Thành phố Unknown
Định dạng
Số trang 513
Dung lượng 6,6 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

His areas of expertise include Cisco routers andswitches, wide area network architecture, troubleshooting and optimiza-tion, network security, wireless access, and Microsoft NT and 2000

Trang 1

Protect Your Wireless Network From Attack

• Complete Coverage of Wireless Standards: IEEE 802.15, HomeRF, IEEE 802.11, IEEE 802.16, Bluetooth,WEP, and WAP

• Hundreds of Damage & Defense,Tools & Traps, and Notes from the Underground Sidebars, Security Alerts, and FAQs

• Complete Case Studies: Using Closed Systems, Deploying

IP Over the WLAN, Utilizing a VPN, Filtering MAC Addresses, and More!

Trang 2

s o l u t i o n s @ s y n g r e s s c o m

With more than 1,500,000 copies of our MCSE, MCSD, CompTIA, and Ciscostudy guides in print, we continue to look for ways we can better serve theinformation needs of our readers One way we do that is by listening

Readers like yourself have been telling us they want an Internet-based vice that would extend and enhance the value of our books Based onreader feedback and our own strategic plan, we have created a Web sitethat we hope will exceed your expectations

ser-Solutions@syngress.com is an interactive treasure trove of useful

infor-mation focusing on our book topics and related technologies The siteoffers the following features:

product upgrades You can access online updates for any affectedchapters

questions to our authors and editors

reader queries and clear explanations of complex material

readers desiring additional reliable information on key topics

Best of all, the book you’re now holding is your key to this amazing site

Just go to www.syngress.com/solutions, and keep this book handy when

you register to verify your purchase

Thank you for giving us the opportunity to serve your needs And be sure

to let us know if there’s anything else we can do to help you get the maximum value from your investment We’re listening

www.syngress.com/solutions

Trang 5

Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results

to be obtained from the Work.

There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work

is sold AS IS and WITHOUT WARRANTY You may have other legal rights, which vary from state

to state.

In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you.

You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files.

Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,” and “Ask the Author UPDATE®,” are registered trademarks of Syngress Publishing, Inc “Mission Critical™,”“Hack Proofing™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc Brands and product names mentioned in this book are trademarks or service marks of their respective companies.

KEY SERIAL NUMBER

Hack Proofing Your Wireless Network

Copyright © 2002 by Syngress Publishing, Inc All rights reserved Printed in the United States of America Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication.

Printed in the United States of America

1 2 3 4 5 6 7 8 9 0

ISBN: 1-928994-59-8

Technical Editor: Neal O’Farrell Cover Designer: Michael Kavish

Technical Reviewer: Jeffrey Posluns Page Layout and Art by: Shannon Tozier

Acquisitions Editor: Catherine B Nolan Copy Editor: Michael McGee

Developmental Editor: Kate Glennon Indexer: Ed Rush

Distributed by Publishers Group West in the United States and Jaguar Book Group in Canada.

Trang 6

Acknowledgments

v

We would like to acknowledge the following people for their kindness and support

in making this book possible

Ralph Troupe, Rhonda St John, and the team at Callisma for their invaluable insightinto the challenges of designing, deploying and supporting world-class enterprisenetworks

Karen Cross, Lance Tilford, Meaghan Cunningham, Kim Wylie, Harry Kirchner,Kevin Votel, Kent Anderson, and Frida Yara of Publishers Group West for sharingtheir incredible marketing experience and expertise

Jacquie Shanahan and AnnHelen Lindeholm of Elsevier Science for making certainthat our vision remains worldwide in scope

Annabel Dent of Harcourt Australia for all her help

David Buckland,Wendi Wong, Marie Chieng, Lucy Chong, Leslie Lim, Audrey Gan,and Joseph Chan of Transquest Publishers for the enthusiasm with which they receiveour books

Kwon Sung June at Acorn Publishing for his support

Ethan Atkin at Cranbury International for his help in expanding the Syngressprogram

Jackie Gross, Gayle Voycey, Alexia Penny, Anik Robitaille, Craig Siddall, DarleneMorrow, Iolanda Miller, Jane Mackay, and Marie Skelly at Jackie Gross & Associatesfor all their help and enthusiasm representing our product in Canada

Lois Fraser, Connie McMenemy, Shannon Russell and the rest of the great folks atJaguar Book Group for their help with distribution of Syngress books in Canada

Trang 8

Contributors

Donald Lloyd(CCNA, CCSE, CCSA), co-author of Designing a Wireless

Network (Syngress Publishing, ISBN: 1-928994-45-8), is a Senior

Consultant at Lucent Worldwide Services (Enhanced Services and Sales)and a Regional Leader for their Fixed Wireless Practice His specialtiesinclude network security architecture and wireless network design, as well

as the implementation of Juniper routers Donald’s background includes asuccessful career with International Network Services, and now LucentTechnologies Besides “unwiring” corporate offices, Donald has spentconsiderable time designing and deploying secure wireless networks inremote oil and gas fields.These networks not only carry voice and datatraffic, but also help energy companies monitor the pipelines that carrythese commodities

David M Zendzianis CEO and High Programmer with DMZServices, Inc He provides senior IT and security solutions to singleperson startups and multi-national corporations “anywhere the Nettouches.” His specialties include large- and small-scale IT and securitydesigns, deployments, infrastructure audits, and complete managed sup-port David’s background includes positions with Wells Fargo Bank as aSecurity Consultant where he developed and evaluated platform-specificsecurity standards, assisted with identification of security risks to applica-tions, and designed bank interconnectivity projects that required firewalls,VPNs, and other security devices He was also a founding partner in one

of the first Internet service providers of South Carolina and founder ofthe first wireless ISP in the Carolinas, Air Internet

David is an active Debian Linux developer who maintains packagesfor network audio streaming (icecast, liveice) and the PGP PublicKeyserver (pks) He has provided patches to several projects, most notably

to the Carnegie Mellon Simple Authentication and Security Layer(SASL) David studied computer science at the oldest municipal college inAmerica,The College of Charleston in Charleston, SC He currently lives

in the San Francisco area with his wife, Dana David would like to thank

Trang 9

terrestrial, satellite relay, wireless, and trusted communication links Erichas also been responsible for designing some of the leading Public KeyInfrastructure deployments currently in use and for devising operationalpolicy and procedures to meet the Electronic Signature Act (E-Sign) andthe Health Insurance Portability and Accountability Act (HIPAA) He hasprovided his services to financial, commercial, government, and militarycustomers including US Federal Government, Canadian Federal

Government, and NATO He regularly speaks at leading security ences and teaches networking and CISSP classes He is currently working

confer-on two upcoming titles with Syngress Publishing, Building a Cisco Wireless

LAN (ISBN: 1-928994-58-X) and Sniffer Network Optimization and Troubleshooting Handbook (ISBN: 1-931836-57-4) Eric would like to

acknowledge the understanding and support of his family and friendsduring the writing of this book, and “The Boys” for being who they are

Christian Barnes(CCNP, CCDA, MCSE, MCP+I, CNA, A+) is amember of the Consulting Staff at Lucent Worldwide Services (Enhanced

Services and Sales) He is a contributing author to Designing a Wireless

Network (Syngress Publishing, ISBN: 1-928994-45-8) and he currently

provides technical consultation to clients in the South Central Region forLucent Technologies His areas of expertise include Cisco routers andswitches, wide area network architecture, troubleshooting and optimiza-tion, network security, wireless access, and Microsoft NT and 2000 net-working design and support Chris has worked with clients such as BirchTelecom,Williams Energy, and the Cerner Corporation

Trang 10

Randy Hiseris a Senior Network Engineer for Sprint’s Research,Architecture and Design Group, with design responsibilities for home dis-tribution and DSL self-installation services for Sprint’s Integrated OnDemand Network He is knowledgeable in the area of multimedia ser-vices and emerging technologies, has installed and operated fixed wirelessMMDS facilities in the Middle East, and has patented network communi-cation device identification in a communication network for Sprint Helives with his wife, Deborah, and their children, Erin, Ryan, Megan, Jesse,and Emily, in Overland Park, KS

Andy McCullough(BSEE, CCNA, CCDA) has been in network sulting for over seven years He is currently a Distinguished Member ofthe Consulting Staff at Lucent Worldwide Services (Enhanced Servicesand Sales) Andy has done architecture and design work for several globalcustomers of Lucent Technologies including Level 3 Communications,Sprint, MCI/WorldCom, the London Stock Exchange, and BritishTelecom His areas of expertise include network architecture and design,

con-IP routing and switching, and con-IP multicast Prior to working for Lucent,Andy ran a consulting company and a regional ISP

Andy is co-author of Building Cisco Remote Access Networks (Syngress

Publishing, ISBN: 1-928994-13-X) He is also an Assistant Professor at acommunity college in Overland Park, KS, where he teaches networkingclasses

Tony Bautts is a Senior Security Consultant with Astech Consulting Hecurrently provides security advice and architecture for clients in the SanFrancisco Bay area His specialties include intrusion detection systems,firewall design and integration, post-intrusion forensics, bastion hosting,and secure infrastructure design.Tony’s security experience has led him towork with Fortune 500 companies in the United States as well as twoyears of security consulting in Japan He is also involved with theBerkeleyWireless.net project, which is working to build neighborhoodwireless networks for residents of Berkeley, CA

Trang 11

Jeffrey A Wheat (Lucent WaveLAN Wireless Certification, FOREATM Certification) is a Principal Member of the Consulting Staff atLucent Worldwide Services He currently provides strategic direction andarchitectural design to Lucent Service Provider and Large Enterprise cus-tomers He is an ATM and Testing Methodology Subject Matter Expertwithin Lucent, and his specialties include convergence architectures andwireless architectures Jeff ’s background with Lucent includes designengagements with Metricom, Sprint ION, Sprint PCS, Raytheon, andMarathon Oil Prior to his employment with Lucent, Jeff spent 11 yearsworking for the U.S Intelligence Agencies as a network architect and sys-tems engineer Jeff graduated from the University of Kansas in 1986 with

a bachelor’s of Science degree in Computer Science and currently resides

in Kansas City with his wife, Gabrielle, and their two children, Madisonand Brandon

Trang 12

Technical Editor

Neal O’Farrellis founder and CEO of security training firmHackademia Inc., where he oversees the development of more than 30Web-based security training courses Neal is a panel expert and regularcolumnist on SearchSecurity.com and was recently elected Chair of thefirst Cybercrime on Wall Street Conference He has written more thanone hundred articles and three books, appearing in publications as diverse

as Business Week, Information Week, NetWorker, and Wireless Design News.

With a career in information security that spans nearly two decades, Nealwas recently described by the Institute for International Research as one

of the world’s top 20 security experts Neal got his first taste of wirelesssecurity in the mid-1980s when he was asked by the Irish government todevelop a security system for the nation’s fledgling cellular network

In 1989 he co-hosted with IBM one of Europe’s first network rity conferences, and later helped Nokia incorporate security into theirfirst generation of cellular telephones As the head of the European cryptofirm Intrepid, Neal leads the development of some of the world’s mostadvanced voice, data, and fax encryption systems, including MilCode, aEuropean rival of the U.S government’s Secure Telephone Unit (STU 3)

Trang 13

Jeffrey Posluns(CISA, CISSP, CCNP, SSCP, GSEC) is an informationsecurity specialist with over eight years of specialized experience in secu-rity methodologies, audits, and controls He has extensive expertise in theanalysis of hacker tools and techniques, intrusion detection, security poli-cies, and incident response procedures

Jeffrey has held the position of Chief Technology Officer ofSecureOps for the past three years, where he has the responsibility ofbringing technical vision and strategy to the company, overseeing thedevelopment and implementation of all technological initiatives, andbeing a key resource in the research and development of new practices,methodologies, procedures, and information assets Jeffrey is a regularspeaker at industry conferences organized by such groups as theInformation Systems Audit and Control Association (ISACA) and theAssociation of Certified Fraud Examiners (ACFE) He also speaks regu-larly for, and participates in, various panels and working groups promotinginformation security awareness with the Canadian IT, government, andlaw enforcement industries

Technical Reviewer

Trang 14

Wireless Networking Applications forBusiness 9Wireless Networking Applications for

Trang 15

The Limitations of Wireless Security 32Cellular-based Wireless Networks

Understanding Public Key

Summary 68

Introduction 76Understanding Security Fundamentals and

Trang 16

Implementing Policy 98Recognizing Accepted Security

Understanding the Common

Electronic Signatures in the Global

Experiencing Denial and Disruption

Tools & Traps…

Clear-text Authentication

An example of a force password dictionary generator that can produce a brute-force dictionary from specific character sets can be found at www.dmzs.com/

brute-tools/files Other brute force crackers, including POP, Telnet, FTP, Web and others, can be found at http://packetstormsecurity com/crackers

Trang 17

Chapter 3 Wireless Network

Introduction 126

Multichannel Multipoint Distribution

Why the Need for a Wireless LAN Standard? 132What Exactly Does the 802.11

Does the 802.11 Standard Guarantee Compatibility across Different Vendors? 137802.11b 138802.11a 139802.11e 140Developing WLANs through the 802.11

Architecture 141

Developing WPANs through the 802.15Architecture 150Bluetooth 150

Fixed Wireless

Technologies

In a fixed wireless

network, both transmitter

and receiver are at fixed

locations, as opposed to

mobile The network uses

utility power (AC) It can

be to-point or

point-to-multipoint, and may

use licensed or unlicensed

spectrums.

Trang 18

Second Generation Technologies 156

Performing Analysis of

Reviewing and Validating the PlanningPhase 173

Trang 19

Defining the Operations Services 175Creating a High-Level Operating Model 175

Creating the Network ArchitectureDeliverable 177

Reviewing and Validating the NetworkArchitecture 178

Creating a Detailed Service

Creating a Detailed Operating

Creating the Detailed Design Documents 183Understanding Wireless Network Attributes

Chapter 4 Common Attacks and Vulnerabilities 201

Introduction 202

Trang 20

Weaknesses in Key Management 208

Protecting Against Sniffing andEavesdropping 219

Protecting Against Spoofing and

Protection against Network Hijacking

Protecting Against DoS and FloodingAttacks 228

Summary 232

Notes from the Underground…

Lucent Gateways broadcast SSID in clear

on encrypted networks

It has been announced (www.securiteam.com/

securitynews/5ZP0I154UG html) that the Lucent Gateway allows an attacker an easy way to join a closed network.

Lucent has defined an option to configure the wireless network as

“closed.” This option requires that to associate with the wireless network

a client must know and present the SSID of the network Even if the network is protected by WEP, part of the broadcast messages the gateway transmits in cleartext includes the SSID All an attacker need do is sniff the network to acquire the SSID, they are then able to associate with the

network.

Trang 21

Chapter 5 Wireless Security Countermeasures 239

Introduction 240

Implementing WEP on the ORiNOCOAP-1000 262Securing a WLAN with WEP:

Implementing MAC Filters on the

Security Implications of Using ProtocolFilters 272

■ Identify the likelihood

that someone other

■ Identify the cost to

replace, fix, or track the

securing the resource

versus cost of damage

control

Trang 22

Closed System Benefits and Advantages 274

Security Implications of Using a ClosedSystem 275

A Closed Environment on a Cisco

Deploying IP over the WLAN:

Deploying IP over the WLAN:

Disadvantages 279Security Implications of Deploying IP

Deploying IP over the WLAN:

Summary 292

Trang 23

Choosing the Tools and

What Threat Do These “Open Networks”

What Tools Are Necessary to Perform

What Network Information

Where in the Authentication/Association

War driving has become

the common term given

for people who drive

around with wireless

equipment looking for

other wireless networks.

This term gets its history

from “war-dialing” – the

age old practice of having

your computer dial every

phone number within a

certain range to see if a

computer would pick up.

Trang 24

Installing Rogue Access Points 320

Where Is the Best Location for

Summary 323

Chapter 7 Monitoring and Intrusion Detection 327

Introduction 328

Watching for Unauthorized Traffic

Signatures 343

Defensive Monitoring Considerations

■ Define your wireless network boundaries, and monitor to know if they’re being exceeded

■ Limit signal strength to contain your network.

■ Make a list of all authorized wireless Access Points (APs) in your environment.

Knowing what is supposed to be there can help you

immediately identify rogue APs.

Trang 25

Reporting 351Cleanup 352Prevention 352Conducting Site Surveys for Rogue

Summary 358

Audit Information Analysis and

Wireless network audits

consist of several stages

where different resources

or tools are needed to

perform a specific activity.

These activities generally

fall into six categories:

Trang 26

Technical Auditing Tools 375

Standards 378Guidelines 378

Policies 378Procedures 379Auditing, Security Standards, and

Fraud 385

Trang 27

Appendices 396Glossary 396

Sample Management Report:WirelessNetwork Security Audit Report XYZCorporation 397Sample Technical Report Wireless

Network Security Audit Report:

Summary 402

Introduction 408

Summary 433

Appendix: Hack Proofing Your Wireless

Implementing an Ultra

Secure WLAN

■ Make sure that your AP

allows you to change

ESSID, passwords and

supports 128-bit WEP.

■ Find an AP that

supports the “closed

network” functionality.

■ Be certain that the AP

you buy supports flash

upgrades.

■ Isolate the AP and

regulate access from its

network into your

internal network.

■ Conduct audits of your

network using

NetStumbler or other

wireless scanning tools

to make sure that

others aren’t enabling

unauthorized APs.

■ Update security policy

to reflect the dangers

of an unsecured

wireless network.

Trang 28

The simple way to make a wireless system or device more secure is to put it into afaraday cage Unfortunately, while this strategy leaves you with a device that isunreachable by attackers, it also leaves you with a device that is almost completelyuseless.

Traditionally, someone had to be sitting in front of your computer to read yourdocuments, see your e-mail, and mess with your settings.Today, however, someonecan be sitting in the office next door, a few floors up or down, or even in the nextbuilding, and have the same abilities as if he were in front of your computer

Advancements in wireless communications have allowed for great increases in ductivity and ease of use, but have brought with them many additional risks to thesystems and information being used

pro-Are you using an 802.11 or Bluetooth device on your computer? pro-Are you using aPDA to communicate with other systems or to get onto the Internet? Are you using

a cellular phone to initiate a network connection back to your office? Have you justset up the latest wireless gateway at home so you can walk around with your note-book? Are you planning on implementing a wireless solution in your office? Simplyput, there is now a greater security risk to your information Someone could moreeasily read your financial data, look at your saved documents, or browse your e-mails.The advances in ease of use with wireless systems come at a cost—they must gohand in hand with advances in information security.You will now have to deal withissues like: network identification and encryption keys; making your wireless networkinvisible to people passing close enough to see it; and making sure that nothing and

no one, other than your defined list of devices, systems, or people, are able to useyour wireless resources

People are naturally disinclined to consider security Security and cost, or securityand ease of use, are often at odds in the workplace, and many other items tend to begiven a comparatively higher business priority It is for these reasons that one must

xxvii

Foreword

Trang 29

anticipate security when considering any new implementation, generate a clear and

well-defined business case, and allow the security processes to be properly and ciently managed throughout their lifecycles

effi-There is no way to make your systems 100 percent secure, but what you can do

is learn about what hackers and crackers can do to you, learn how to protect yourselffrom them, learn how to catch them in the act of attacking your computer or otherwireless device, and learn how to make it difficult enough for them that they willmove on to easier targets

The intent of this book is to provide perspective and relevant information withrespect to wireless communications to people in all areas of business analysis andinformation technology, whether they are preparing a business case for a wirelessproject, are IS/IT specialists planning for a new wireless implementation, securityneophytes expanding a home network to include wireless access, reacting to an attack

on their network, or being proactive in security measures

If you don’t have to time to read and understand all of the chapters describingthe complex facets of information security as they are applied to wireless technolo-gies, you can simply follow the instructions on planning and implementing a wirelessnetwork, along with the security aspects surrounding it.You will benefit from thehands-on descriptions of hardening and securing your wireless networks and devices,allowing you to rest easy knowing that no one will compromise your information ortake advantage of your systems without your knowledge

—Jeffrey Posluns, CISA, CISSP, SSCP, CCNP

Trang 30

The Wireless Challenge

Solutions in this chapter:

Wireless Technology Overview

Understanding the Promise of Wireless

Understanding the Benefits of Wireless

Facing the Reality of Wireless Today

Examining the Wireless Standards

; Summary

; Solutions Fast Track

; Frequently Asked Questions

Chapter 1

1

Trang 31

When the concept of a network without wires was first suggested more than twodecades ago, it sparked the imagination of scientists, product vendors, and usersaround the globe eager for the convenience and flexibility of a free roaming con-nection Unfortunately, as the variety of wireless solutions began to emerge, antic-ipation turned to disappointment.The first wave of solutions proved inadequatefor the networking, portability, and security needs of a changing IT environment.While this has largely continued to be the case throughout the 1990s withmost cell-based and office local area network (LAN)-based wireless technologydeployments, great strides have been made specifically over the last two years toaddress the fundamental concerns impeding the full acceptance of wireless net-working in the mainstream of corporate IT departments and the small office

In this chapter, you will learn about the technology that is available today forwireless data networking and what tomorrow’s wireless technologies have tooffer.We will cover office LAN wireless solutions including 802.11, its subgroups(802.11b, 802.11a, 802.11g) and HomeRF, cellular-based wireless data solutionsincluding the Wireless Application Protocol (WAP) and i-Mode and the networkinfrastructures supporting them (in particular 2G, 2.5G, and 3G), and finally,802.15 Personal Area Network (PAN) solutions such as Bluetooth In addition,

we will review some of the new standards being developed to create wirelessmetropolitan area networks (WMANs) and other wireless data transmission solu-tions that are being proposed for commercial application

In conjunction with the review of the technologies behind wireless, we willalso cover the main security concerns specifically impacting cellular-based officeLAN and PAN wireless deployments In doing so, we will review the major secu-rity concerns you can expect to read about in later chapters, and will discusssome of the efforts being made to minimize their impact

After completing this chapter, you will have gained a solid understanding ofwireless technologies and their associated security risks It is our hope that weprovide you with an appreciation of how wireless networking technologies willimpact our work and home lives, and that security will have to play an importantrole in wireless deployments Let’s get started!

Wireless Technology Overview

Wireless technologies today come in several forms and offer a multitude of tions applicable to generally one of two wireless networking camps:

Trang 32

solu-■ Cellular-based wireless data solutions

Defining Cellular-based Wireless

Cellular-based wireless data solutions are solutions that use the existing cellphone and pager communications networks to transmit data Data can be catego-rized into many forms, including traditional corporate communications such as e-mail, directory information exchange and basic information transfers,

peer-to-peer communications such as messaging services, and informationlookups such as navigational information, and news and variety, amongst others

Some cellular-based wireless data network solutions only support one-waycommunications.While technically they fall into the category of cellular-baseddata solutions, we will not include them in the discussions proposed in this book

Instead, we will focus on the cellular-based solutions that provide, at minimum,two-way data communications Furthermore, in this book, we will only discusssolutions that can support a basic security overlay

Defining the Wireless LAN

Wireless LAN solutions are solutions that provide wireless connectivity over alimited coverage area.The coverage area generally consists of between 10 and 100meters (30-300 feet) from a base station or Access Point (AP).These solutionsprovide the capabilities necessary to support the two-way data communications

of typical corporate or home desktop computers with other network resources

The data streams in this case generally consist of remote application access andfile transfers.Wireless LAN solutions provide a means for wireless nodes to inter-face with hard-wired LAN resources.This results in the creation of hybrid net-works where hard-wired nodes and wireless nodes may interact with each other

The Convergence of Wireless Technologies

While for the time being, the two classifications hold generally true, many newvendor product offerings planned for introduction over the next year will begin

to blur the lines between cellular-based wireless devices and wireless LAN-baseddevices.These include cell phones, high-end pagers, and cell-enabled personaldigital assistants (PDAs), which also provide personal area network connectivity tolocal devices using wireless LAN technologies such as Bluetooth

Trang 33

This trend will only continue to accelerate.With the evolution of more erful and compact wireless network components supporting greater access speedsand communications capabilities, and the increased versatility of PDAs and otherportable information appliances, consumers will continue to demand more tightlyintegrated communication environments that provide seamless application sup-port across their hard-wired and wireless information resources.

pow-Trends and Statistics

At this point in our wireless technology review, it is worthwhile to take a closerlook at some of the emerging wireless data trends and usage statistics.The picturethat begins to emerge is quite interesting

Initially, the big trend that becomes readily apparent is that support for vergence within devices will be the norm over the next two years.While themajority of cellular-based wireless traffic today mainly consists of voice, it is esti-mated that by the end of 2003 nearly 35 to 40 percent of cellular-based wirelesstraffic will be data

wire-less LANs (0.7 probability) (Source: Gartner Group)

wireless LANs (0.6 probability) (Source: Gartner Group)Figure 1.1 shows the projected number of wireless Internet users in 2005

Figure 1.1Projected Number of Wireless Internet Users in 2005

(Source: Yankee Group)

North America

195.2

0 100 200 300 400 500

Europe Asia Latin

America

Africa and Middle East

313.3

466.7

118.7

86

Trang 34

Increasing Use of Information Appliances

While users on the move are leading the push for the integration of wireless

devices, a recent trend in the availability of information appliances is beginning to

have an impact on the wireless industry at large and will soon be one of theleading platforms for wireless data communications

Information appliances are single purpose devices that are portable, easy touse and provide a specific set of capabilities relevant to their function Examples

of devices currently shipping include PDAs, MP3 players, e-books, and DVDplayers Information appliance shipments over this year will outnumber PC ship-ments (See Figure 1.2.)

This trend will continue for the foreseeable future As new features and thelevel of functionalities incorporated within information appliances increase, sowill their market share of the information technology deployment landscape Inthe end, the full value of these devices will only be realized when wireless net-working capabilities are fully integrated within the information appliances

As the information appliance and wireless networking integration occurs, endusers will be provided with the ability to obtain and manipulate content ondemand Content will range from existing textual data (such as books and news)

to full-blown multimedia (such as audio, video and interactive media files) Access

to content will be provided using both local (or proximity-based) wireless working technologies and cellular-based wireless networking technologies

net-Content will be available from traditional external sources such as content servers

Figure 1.2Projected PC and Information Appliance Shipments (Source: IDC Report 1998)

0 5 10 15 20 25

PCs Info Appliances

Trang 35

and Web servers located on the Internet, and from proximity or locally accessedsources such as shopping malls, airports, office buildings, and other public places.

The Future of Wireless, circa 2005

Think of a nice sunny morning.The year is 2005 and you are about to go on abusiness trip in a foreign city.You have your trusty universal integrated two-wayvoice, data, and video multimedia PDA by your side

Using references to your personal digital identification module stored inyour PDA, your travel agent registered all of your travel arrangements, includingyour flights, car, and a room at your favorite hotel Now that the preparations aremade, let’s take a look at how this day might unfold

Using your wireless PDA, you bring up the local taxi service, and call up andrequest a car to pick you up from home.The taxi arrives and drives you to theairport.You authenticate to the electronic payment module on your PDA usingintegrated writing analysis software and charge the cost of the trip to your cor-porate account.The payment transaction between the cab, your PDA, and yourbank is encrypted and digitally signed A confirmation of payment is recorded forexpense billing and audit review at a later date

You walk up to the self-service check-in counter for frequent flyers.Theproximity wireless network in your PDA becomes active and your PDA authenti-cates you at the counter An encrypted session is set up.Your flight information isdisplayed on the check-in counter screen and you are prompted to sign a confir-mation on your PDA Boarding passes and self-tacking baggage tags are printed.You affix the tags to your bags and deposit them on the checked baggage belt Asthey disappear behind the wall, you receive confirmation on your PDA that yourbags have been checked As your session with the check-in counter is terminated,

a new session is established with airport information control From now until thetime you board the plane, you will be able to obtain the latest information onflight schedules, gate information, baggage information, airport layout, restaurants,shopping and other airport services

Your flight arrives at its destination and you make your way to baggage claim

A new session has been established with the local airport information control.Based on your ticketing information, it tells you where your bags are currently,where you will be able to pick them up and their estimated time of availability

An airport map is conveniently made available for your use along with tion on local services

informa-You collect your bags and hop on the local car rental agency bus In transit to thecar lot, you preselect your car and sign the rental agreement.The car keys are

Trang 36

downloaded to your PDA.To save time, you preconfigure your PDA to open thetrunk and unlock the doors when you are within a few feet.You have a few extraminutes left and you use them to check your voice and video messages from yourPDA One of the video messages has a large format graphics file attached.Youmake a note to view that message when you get to the hotel.

You arrive at the car, the trunk opens and the doors unlock.You store yourbags and select the hotel information on your PDA.The in-car display and GPSdirectional system provides you with directions to the hotel.You prepay the tollsand a confirmation of payment is recorded for expense billing and use at theautomated toll.You’ll be able to drive to the hotel using the express lane.YourPDA will take care of passing on the prepayment when you get to the toolbooth

You arrive at the hotel and leave the car with the valet.They will take care ofcarrying your heavy bags up to your room As you make your way through thelobby, your PDA authenticates your reservation and provides you with your roomassignment.You conditionally sign for the room, and the keys are downloaded toyour PDA As you arrive at the door of your room, the door unlocks and youenter.You verify the room is as you asked for and click Accept Room on yourPDA

You make a video call on your PDA to your in-town associates and makereservations for four at a local restaurant for dinner.You download the wine listand menu and make a selection for appetizers.Your PDA reminds you that youstill have an unviewed video message

Now that you are all checked in and in your room, you’ll have some time toview it.You bring up the video message with a large format graphic file on yourPDA and display it on the in-room TV It’s video highlights of the after-schoolsoccer league game.Your daughter scored the winning goal

While at first, many of the elements in our “day in the life” may appear to befrom the realm of science fiction, by the time you complete this chapter, you willrealize that they are not as far-fetched as they may appear Surprisingly, the tech-nologies and standards exist today to make all of this real

Let’s take a look at what wireless has in store for us

Understanding the Promise of Wireless

At this point it might be a worthwhile exercise to do a quick historical review ofdata networking and telephony to get a clearer understanding of where the tech-nology is heading

Trang 37

As we all know, in the beginning, computers lived in glass houses At thattime, these machines were more like objects to be admired for their technicalcomplexity and problem-solving abilities than as useful day-to-day tools.The factthat they even existed was the stuff of legend, and great pains were taken to keepaccess to them, and even knowledge of them in some cases, restricted to only aprivileged few.

Throughout the sixties and most of the seventies, computing resourcesremained in the central computing complex.The machines of that period werebulky and difficult to use Networking was in its infancy and few protocolsexisted to support the sharing of data

When the personal computer revolution took hold in the late seventies andearly eighties, the demystification of computing resources brought in an unprece-dented era of access New applications were devised in the realms of business,communications and entertainment A novel trend had emerged: computing tech-nologies were being brought to the users, instead of the users being taken to thecomputers As these resources became more compact and more powerful, com-puting visionaries began to dream about a future where anyone could access acomputer at anytime, from anywhere

The computing folks were not the only ones to share that dream A similardesire was being manifested within the telephone industry Users had begun todemand portable telephone services and more extensive telephone coverage inremote or limited access environments where traditional physical line-based ser-vices were not viable

Throughout the late eighties and nineties, a number of wireless telephonesolutions began to appear in the market place By this time, traditional computinghad become a user of wired telephone services for network dial-in access,

Bulletin Board Services, and other data communications Laptop computers hadbecome available and the marriage of wireless networking and portable com-puting had finally arrived Or so it seemed

It was a difficult time Networking standards were evolving at breakneckspeeds to address the ever-changing data computing needs of the corporate andscientific users New applications were being developed that were more powerfuland complex, and which required an ever increasing availability of bandwidth Allthe while, new security standards were unfolding to address the shift from theglasshouse computing concept to a fully distributed computing model

Few of these new standards were fully adaptable to meet the demands ofwireless networking users If we take into account all of the data networkingstandards being defined at that time and factor in the hardware limitations of the

Trang 38

day, it’s little wonder why wireless never reached the masses Many of the portabledata transceivers and cell phones being offered were very bulky and provided toolow of a throughput to make them effective platforms for remote computing.

Wireless networking was an idea too early for the technology and data munication standards available then.The ideal of a completely untethered net-work would have to wait

com-So where are we in terms of wireless networking today? Networking andapplication standards began to coalesce and are more wireless networking friendlythan ever Special classes of standards have been established to meet the demands

of wireless networking On the technological side, breakthroughs in tronics have manifested themselves in the form of higher density fabrics withlower power requirements Real-world workable wireless networking solutionshave begun to emerge and are now within reach of most corporate and homeconsumers

micro-elec-As it would be expected, the original appeal of wireless networking is just asdesirable today as it was 10 or 20 years ago.Today’s wireless solutions offer usflexibility, performance, and proven solutions that promise increased productivityand potential reductions of long-term capital and management costs associatedwith network deployments

Soon wireless will be used in almost every context Its presence will becomeuniversally accepted and implicitly trusted In many ways, integrated wireless net-working technologies will represent a revolution in the way people interact andcommunicate with each other and with data stores, not unlike the early days oftelegraph and Morse code

This next step will be larger than any other previous evolution in cations.We will have to take care and ensure that our new friend is up to all ofthe challenges we hope to send its way and that we provide opportunities for it

communi-to grow and evolve so that it can meet our needs long incommuni-to the future

Wireless Networking

With 3G cellular-based wireless networks, wireless LANs, wireless personal areanetworks, and broadband wireless services becoming available in most locationsover the next few years, new applications and classes of services will be created tomeet the networking needs of both business and consumers

Wireless Networking Applications for Business

Wireless networking applications that provide solutions for business use consist of

Trang 39

Mobile messaging involves the extension of an internal corporate messaging

network environment to a remote user over a wireless network connection Atypical application includes the use of third-party solutions to extend electronicmail to wireless users Using wireless-enabled PDAs, two-way pagers, and smartcell phones, users can be kept up-to-date with their corporate e-mail inbox andcan provide brief responses to urgent or pressing issues

The Short Message System (SMS), used to send and receive instant short textmessages, is also an effective means used by the corporate user to keep up to datewith the latest news and other developments.While the service is predominantlyused to obtain information from text information media, it can also be used fortwo-way text messaging with other users

Lastly, with the full integration of unified messaging around the world, themobile wireless user will finally have a true remote presence Multimedia func-tions will be incorporated to support both real-time and messaging requirements

of users

In Figure 1.3, we can see that a universal address supporting roaming willprovide unprecedented mobility.When this occurs, corporate users will have asingle point of contact Communications will be directed to their localized point

of presence, wherever that may be

Trang 40

The second area in the wireless corporate communications solution set

involves mobile office and corporate groupware Figure 1.4 demonstrates the concept

of the roaming wireless desktop Mobile office and corporate groupware tions over wireless provide internal corporate network resources to the remoteuser over a wireless network connection.The most dominant applications in thisarea include corporate database servers, application servers, information and newsservers, directory services, travel and expense services, file synchronizations,intranet server browsing, and file transfers

applica-Telepresence over wireless provides an avenue for increased collaborative

net-working Figure 1.5 illustrates the premise of telepresence, that of providing alocalized presence to a remote user.Two-way videoconferencing and Webcasts areexamples of telepresence

Figure 1.3Single Point of Contact for 3G-enabled Devices

3G Device

Ngày đăng: 21/12/2013, 06:16

TỪ KHÓA LIÊN QUAN

w