Top Banner
PYDAH COLLEGE OF ENGINEERING AND TECHNOLOGY SHASIKANTH MCA III YEAR PYDAH College of Engg & Tech U.HARIKRISHNAN NAIR MCA III YEAR PYDAH College of Engg & Tech PRESENTED BY:
23

WIRELESS GIGABIT TECHNOLOGY

Jan 15, 2015

Download

Hari Krishnan

this power point is on the topic wireless data transfer..also known as gigabit technology..a future in wireless world.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: WIRELESS GIGABIT TECHNOLOGY

PYDAH COLLEGE OF ENGINEERING AND TECHNOLOGY

SHASIKANTHMCA III YEARPYDAH College of Engg & Tech

U.HARIKRISHNAN NAIRMCA III YEARPYDAH College of Engg & Tech

PRESENTED BY:

Page 2: WIRELESS GIGABIT TECHNOLOGY

ADVANCED WIRELESSTECHNOLOGY

W i r e l e s s G i g a b i t

Page 3: WIRELESS GIGABIT TECHNOLOGY

A J O U R N E Y T O W I R E L E SS G I G A B I T

CABLES OPTICAL FIBERSWIRELESS ACCESS

WI-FI

Page 4: WIRELESS GIGABIT TECHNOLOGY

WHAT IS WIGIG?

The Wireless Gigabit Alliance(also known as the WiGig)

Operates on unlicensed 60 GHz frequency band.

Allows wireless transfer of audio and video data at up to 7Gb per second.

Transfer data within an indoor environment usually within a range of 10ms.

Page 5: WIRELESS GIGABIT TECHNOLOGY

M O D U L AT I O N & C O D I N G S C H E M E

Two types of modulation and coding schemes

Orthogonal frequency-division multiplexing (OFDM)

supports communication over longer distances with greater delay spreads

providing more flexibility in handling obstacles and reflected signals.

OFDM allows the greatest transmission speeds of up to 7 Gbps.

Single carrier (SC)

Typically results in lower power consumption, so it is often a better fit for small, low-power handheld devices.

SC supports transmission speeds up to 4.6 Gbps.

Page 6: WIRELESS GIGABIT TECHNOLOGY

60Ghz !

60GhzWavelengthin mm units

= millimeterwave

Enables use of previously unavailable wide band

Page 7: WIRELESS GIGABIT TECHNOLOGY

60 GHz SPECTRUM ALLOCATION

7

57 GHZ 66 GHZ

Millimeter Wave Band

Europe : 57-66

USA and Canada : 57-64

Japan : 59-66

Australia : 59.4-62.9

Page 9: WIRELESS GIGABIT TECHNOLOGY

STANDARDIZATION FOR 60 GHZ WLAN/WPAN

IEEE 802.11 ad State-of-the-art PHY/MAC standardization activities o

improve WLAN data rate to MGbps Dominated by Intel, Broadcom, NEC etc.

WiGig (Wireless Gigabit Alliance) 60-GHz Industry alliance led by Intel Promoters include Intel, Broadcom, NEC, Apple, Dell,

Microsoft, Panasonic, LGE, Toshiba, Wilocity, etc. IEEE 802.15.3c (First IEEE standard on 60 GHz WPAN)

Promoted mainly by Japanese companies

ECMA TC48 European standardization for 60 GHz WPAN

WirelessHD9

Page 10: WIRELESS GIGABIT TECHNOLOGY

BEAMFORMING 

o To overcome signal decay, WiGig uses a process called adaptive beamforming .

I. The antennas do this by adjusting both the amplitudes and the phase shifts of their broadcasted waves.

II. The reception of the signal is optimized by minimizing different kinds of problems: the error between the antenna's output and the expected signal.

Page 11: WIRELESS GIGABIT TECHNOLOGY

WIRELESS SECURITY

Page 12: WIRELESS GIGABIT TECHNOLOGY

WIRELESS SECURITY

WIRED EQUIVALENT PRIVACY (WEP)

WEP

RC4

CRC-32

This algorithm is used for confidentiality

This is used for integrity

Wired equivalent privacy

Page 13: WIRELESS GIGABIT TECHNOLOGY

A 128-bit WEP key is almost always entered by users as a string of 26 hexadecimal characters. Each character represents four bits of the key.

40 bit key 24 bit initial vector

RC4 traffic key

64 bit standard WEP key

Page 14: WIRELESS GIGABIT TECHNOLOGY

WEP is a protocol that adds security to wireless local area networks.

WEP gives wireless networks the equivalent level of privacy protection as a comparable wired network.

WEP offers interoperability, since all wireless devices support basic WEP encryption.

Another advantage of WEP is that when uses happen to see your network during wireless detection, they will mostly likely be discouraged since it will require a key. This makes users that they are not welcome. Hence network is secure.

ADVANTAGES OF WEP SECURITY ALGORITHM

Page 15: WIRELESS GIGABIT TECHNOLOGY

Key size is one of the security limitations in Wired Equivalent Privacy.

Cracking a longer key requires interception of more packets, but there are active attacks that simulate the necessary traffic.

The other weaknesses in Wired Equivalent Privacy include the possibility of IV collisions and altered packets that are not helped at all by a longer key.

Most users usually do not change their keys. This gives hackers more time to crack the encryption.

Master keys, instead of temporary keys, are directly used.

D R A W B A C K S O F W E P S E C U R I T Y A L G O R I T H M

Page 16: WIRELESS GIGABIT TECHNOLOGY

T E M P O R A L K E Y I N T E G R I T Y P R O T O C O L

A security protocol used in the IEEE 802.11 wireless networking standard.

TKIP was designed by the IEEE 802.11i task group and the Wi-Fi Alliance.

 To replace WEP without requiring the replacement of legacy hardware.

This was necessary because the breaking of WEP had left Wi-Fi networks without viable link-layer security, and a solution was required for already deployed hardware.

Key size-128bits

Page 17: WIRELESS GIGABIT TECHNOLOGY

S E C U R I T Y AT TA C K S W I T H W E P A N D T K I P

Beck-Tews attack

Ohigashi-Morii attack

FMS attack

KoreK attack

PTW attack

The Chopchop attack

WEP

TKIP

Page 18: WIRELESS GIGABIT TECHNOLOGY

W I - F I P R O T E C T E D A C C E S S ( W PA )

WiFi Protected Access (WPA) and WiFi Protected Access II (WPA2)

 WiFi Protected Access (WPA) is a security standard for users of computers equipped with WiFi wireless connection.

 WiFi Protected Access (WPA) protocol implements the majority of the IEEE 802.11i standard.

TKIP encryption replaces WEP’s 40-bit or 128-bit encryption key that must be manually entered on wireless access points and devices and does not change.

Page 19: WIRELESS GIGABIT TECHNOLOGY

W I G I G S E C U R I T Y ? ? ?

WEP with 64bit or 128bit encryption strength - a simple encryption that offers limited security and is relatively easy to break

WPA-PSK (WPA-Pre Shared Key) - in the forms of WPA-TKIP which offers better security and is backwards compatible with older routers and USB keys, and WPA2-AES which offers the best security and performance but less compatibility

Since the problem with WEP AND WPA-TKIP.

WIGIG MAKE USE OF WPA2-AES(ADVANCED ENCRYPTION STANDARD)

Since only AES is not compatible with older devices thus a completely new devices should be made for this technology.

Page 21: WIRELESS GIGABIT TECHNOLOGY

In wireless LAN networks.

Inter-vehicle communication system.

Huge data file transfer.

Office appliances.

Video information transfer.

APPLICATIONS OF WiGig

Page 22: WIRELESS GIGABIT TECHNOLOGY

F U T U R E O F W I G I G

NO WIRE WORLD:

Leave messy wires in your work places. And enter in to

FAST AND FURIOUS WORLDA DIGITALIZED LIFE.

Designed to work in high-density area

Wirelessly connect all devices to your tablet

(wireless Docking)

Download the 25Gb blu-ray disc movie in a minute.

Wireless display

Page 23: WIRELESS GIGABIT TECHNOLOGY

“ NECCESITY IS THE MOTHER OF INVENTION”

THANK YOU

“Special Issue on Gigabit Wireless Communications,” IEEE JSAC, October 2009

Peter Smulders, “Exploiting the 60 GHz Band for Local Wireless Multimedia Access: Prospects and Future Directions,” IEEE Comm. Magazine, January 2002

htttp://www.wikipedia.comhtttp://www.pcpress.comWhite paper final press release by wigig alliance

For security related topic:

Wikipedia

www.electronicbus.com