0% found this document useful (0 votes)
56 views

Bluetooth and Wi-Fi

This document provides information about Bluetooth and Wi-Fi technologies. It discusses that Bluetooth is a wireless technology standard designed for short-range communications, connecting devices like phones and headphones. Wi-Fi allows wireless networking using radio frequencies and standards like 802.11b/a/g. The document then details aspects of both technologies such as applications, security considerations, and comparisons between Bluetooth and Wi-Fi. It concludes with an example case study of setting up a campus-wide Wi-Fi network.

Uploaded by

budhc
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views

Bluetooth and Wi-Fi

This document provides information about Bluetooth and Wi-Fi technologies. It discusses that Bluetooth is a wireless technology standard designed for short-range communications, connecting devices like phones and headphones. Wi-Fi allows wireless networking using radio frequencies and standards like 802.11b/a/g. The document then details aspects of both technologies such as applications, security considerations, and comparisons between Bluetooth and Wi-Fi. It concludes with an example case study of setting up a campus-wide Wi-Fi network.

Uploaded by

budhc
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 38

BLUETOOTH AND Wi-Fi

PRESENTED BY:
DHIRAJ BARANWAL
BUDHADITYA CHATTERJEE
GAURAV JINDAL
Bluetooth Technology
• Bluetooth is an industrial
specification for wireless
personal area networks
(PANs), also known as IEEE
802.15.1.
• Bluetooth provides a way to
connect and exchange
information between
devices such as mobile
phones, laptops, PCs,
printers, digital cameras and
video game consoles via a
secure, globally unlicensed
short-range radio frequency.
Bluetooth Contd.
 Bluetooth is a radio standard and communications protocol.

 It is primarily designed for low power consumption, with a


short range (1 meter, 10 meters, 100 meters).
 The devices use a radio communications system, so they do
not have to be in line of sight of each other, and can even be
in other rooms, so long as the received transmission is
powerful enough.
How it all started
• The Bluetooth specification was first developed in
1994 by Jaap Haartsen, who was working for Ericsson
Radio Systems.
• The specifications were formalized by the Bluetooth
Special Interest Group (SIG). The SIG was formally
announced on May 20, 1998.
• It was established by Ericsson, Sony Ericsson, IBM,
Intel, Toshiba and Nokia.
• Today it has over 1800 companies worldwide.
Bluetooth Applications

 Between a cell phone and a hands free headset or car kit.


 Wireless networking between PCs.
 Wireless communications with PC input and output
devices.
 Transfer of files between devices.
 Wireless control of a games console, Nintendo's Wii and
Sony's PlayStation 3 will both use Bluetooth technology
for their wireless controllers.
Introduction to Wi-Fi
 Wireless Technology is an alternative to Wired
Technology, which is commonly used, for connecting
devices in wireless mode.

 Wi-Fi (Wireless Fidelity) is a generic term that refers


to the IEEE 802.11 communications standard for
Wireless Local Area Networks (WLANs).

 Wi-Fi Network connect computers to each other, to


the internet and to the wired network.
The Wi-Fi Technology
Wi-Fi Networks use Radio Technologies to transmit &
receive data at high speed:
• IEEE 802.11b
• IEEE 802.11a
• IEEE 802.11g
802.11 Physical Layer

There are three sub layers in physical layer:

• Direct Sequence Spread Spectrum (DSSS)


• Frequency Hoping Spread Spectrum (FHSS)
• Diffused Infrared (DFIR) - Wide angle
DSSS
• Direct sequence signaling technique divides the 2.4 GHz band
into 11 22-MHz channels. Adjacent channels overlap one
another partially, with three of the 11 being completely non-
overlapping. Data is sent across one of these 22 MHz channels
without hopping to other channels.
IEEE 802.11 Data Link Layer

The data link layer consists of two sublayers :

Logical Link Control (LLC)


Media Access Control (MAC)

802.11 uses the same 802.2 LLC and 48-bit


addressing as other 802 LANs, allowing for very
simple bridging from wireless to IEEE wired
networks, but the MAC is unique to WLANs.
Elements of a WI-FI Network
• Access Point (AP) - The AP is a wireless LAN
transceiver or “base station” that can connect one or many
wireless devices simultaneously to the Internet.

• Wi-Fi cards - They accept the wireless signal and relay


information.They can be internal and external.(e.g PCMCIA
Card for Laptop and PCI Card for Desktop PC)

• Safeguards - Firewalls and anti-virus software protect


networks from uninvited users and keep information secure.
Wi-Fi Network Topologies

 AP-based topology (Infrastructure Mode)

 Peer-to-peer topology (Ad-hoc Mode)

 Point-to-multipoint bridge topology


AP-based topology
• The client communicate through Access Point.
• BSA-RF coverage provided by an AP.
• ESA-It consists of 2 or more BSA.
• ESA cell includes 10-15% overlap to allow roaming.
Peer-to-peer topology
• AP is not required.
• Client devices within a
cell can communicate
directly with each
other.
• It is useful for setting
up of a wireless
network quickly and
easily.
Point-to-multipoint bridge topology
This is used to connect a LAN in one building to a LANs in
other buildings even if the buildings are miles apart.These
conditions receive a clear line of sight between buildings. The
line-of-sight range varies based on the type of wireless bridge
and antenna used as well as the environmental conditions.
Wi-Fi Configurations
Wi-Fi Configurations
Wi-Fi Applications
• Home
• Small Businesses or SOHO
• Large Corporations & Campuses
• Health Care
• Wireless ISP (WISP)
• Travellers
Wi-Fi Security Threats
• Wireless technology doesn’t remove any old
security issues, but introduces new ones
• Eavesdropping
• Man-in-the-middle attacks
• Denial of Service
Wi-Fi Security
The requirements for Wi-Fi network security
can be broken down into two primary
components:
• Authentication
 User Authentication
 Server Authentication
• Privacy
Wi-Fi Security Techniques
• Service Set Identifier (SSID)

• Wired Equivalent Privacy (WEP)

• 802.1X Access Control

• Wireless Protected Access (WPA)

• IEEE 802.11i
Advantages
 Mobility
 Ease of Installation
 Flexibility
 Cost
 Reliability
 Security
 Use unlicensed part of the radio spectrum
 Roaming
 Speed
Bluetooth vs. Wi-Fi
 Bluetooth is in a variety of new products such as phones, printers,
modems, and headsets, to name a few. Bluetooth is acceptable for
situations when two or more devices are in close proximity with
each other and don't require high bandwidth.

 Since Bluetooth uses short-range radio frequencies, it is not as


effective for setting up networks that can be accessed from remote
locations as with Wi-Fi.

 Wi-Fi is more analogous to the traditional Ethernet network, and


requires configuration to set up shared resources, transmit files, set
up audio links , whereas Bluetooth devices advertise all services
they actually provide.
Bluetooth vs. Wi-Fi
 Wi-Fi uses the same radio frequencies as Bluetooth, but with
higher power consumption resulting in a stronger connection.

 Wi-Fi is better suited for setting up networks as it enables a


faster connection and has better security than Bluetooth.

 As a traditional networking medium, Wi-Fi is more versatile, but


harder to configure.

 Most users need good know-how to get things set up, especially
when using more obscure services such as audio and HID.
Setting up and securing a
campus-wide Wi-Fi
network
Define your Wi-Fi needs:

•  Types of connections
•  Speed of connection
•   Acceptable users
•   Cost and redundancy
Site Survey:
• What types of interference are you going to
contend with
•  What distances do you need to broadcast
•  What types of data are you going to support over
WIFI
•  Setup worst-case scenario for testing
• Know what your signal to Noise ratio
• You should be expect an interview before any
testing is done
Site Survey: Report
• Describe survey’s basis, approach and results.
•   Define all requirements, and assumptions
• Describe RF interference found
• Identify recommended installations locations and
channels for Access Points
• Give a map with listing of RF strength, and list any
dead spots
A Case study—GCA:
• GCA has two separate WIFI networks one is secured
and one is open.
• Providing wireless ISP services for another school
(secured)
• Giving access to all staff on campus homes
(secured)
• The campus WIFI network for student access (not
secure)
Campus Map External WIFI
Campus Map External WIFI
Hardware: Used @ GCA

 Amplifier
 Bridges 3COM work
 Access Points
 Client cards
Photos Outside WIFI network

3Com 11 Mbps Wireless


LAN Workgroup Bridge

3Com 13 dBi Directional Sector


Panel Antenna (Homes)

3Com 18 dBi Directional Sector


Panel Antenna (Ad Building and
Coble) 3com Building to
Building Bridge
Outside WIFI network cont.
AMP244 500 mW
Outdoor Amplifier

Pigtail 3Com Workgroup Bridge


SMA Cable Adapter

15 dBi Omni-Directional
3Com 20 foot Antenna Antenna Used Radio Shack TV
Cable Antenna mast
Inside WIFI

Meru AP100 Access Point


Installing Meru A P (what is wrong?)

Meru Controller 1100 Blade


Security: used @ GCA
• Building to building Networks
– Used non WIFI Compatible settings
– WEP
– MAC Address Filtering
• Campus in the buildings
– Separate from main school network
– Open system
– Radius ?
THANK YOU
ANY QUERY

You might also like