Académique Documents
Professionnel Documents
Culture Documents
Emerging Technologies
Emerging Technologies
Bluetooth (802.15.1a) ( . . )
is a technology in the personal area network (PAN)
industry
Wireless Broadband (WiMax 802.16) ( )
is expected to be a mainstream technology very soon
Mobile IP
Allows data handoff over different sub-networks
IPv6
Is the next generation internet protocol
Java Card technology Is emerging as a forerunner in the security and personal identity domain
Bluetooth
It was the nickname of a Danish king Harald Bltand, who Bltand
unified Denmark and Norway in the 10th century Unifying the telecom and computing industries Allows users to make ad hoc wireless connections between devices linke mobile phones desktop or notebook phones, comperters without any cable Transfer data at a speed of about 720 Mbps within 50 meters of range or beyond through walls, clothing and even luggage bags
Scatternet
Bluetooth Protocol
Globally unlicensed 2.4 GHz ISM (Industrial Scientific and 24
Medical) frequency band There are 79 channels spaced 1 MHz apart from 2.402 GHz to p p 2.480 GHz Bluetooth Special Interest Group maintains and manages bluetooth p p g standard IEEE has also adapted Bluetooth as the 802.15.1a standard Power levels starting from 1 mW covering 10cm to 100mW covering upto 100 meters It supports unicast (point-to-point) and multicast (point-tomultipoint) connections
Bluetooth Protocol
Master and slave form a piconet Upto 7 slaves devices can be set to communicate with a master Several of these piconets can be linked together to form a larger
network in an ad hoc manner A scatternet is formed when a device from one piconet also acts as a member of another piconet
(both direct sequence and frequency hopping spread spectrum) There are connectless (ACL-Asynchronous Connectionless li k) and connection-oriented (SCOC ti l link) d ti i t d (SCO Sychronous Connection-oriented Link) links 1. Bluetooth core Protocols
Baseband, Link Manager Protocol (LMP), Logical Link control
and Ad d Adaptation Protocol (L2CAP) and S P l (L2CAP), d Service D Discovery Protocol (SDP)
ATcommands
TCS BIN
SDP
RFCOMM L2CAP
Audio
LMP
only or a combination of audio and data All audio and data packets can be provided with different levels of CRC/FEC for error detection/correction
Link Manager Protocol (LMP) When they are in range, LMP of either device discover each other y g, Authentication, encryption Link setup and negotiates baseband packet size Control power modes, connection state
to join a piconet
Inquires what services are available in a piconet and how to
access
baseband protocol
p protocol
Defines the call control signaling protocol to setup of speech and data
calls between bluetooth devices D fi Defines mobility management procedures for handling groups of bili d f h dli f Bluetooth TCS devices
AT-Command A set of AT-commands by which a mobile phone can be used and controlled as a modem for fax and data transfers
PPP layer and placing them onto the LAN TCP/IP OBEX (Object Exchange Protocol) is a session protocol developed by the Infrared Data Associcaiton (IrDA) to exchange objects
Functionality of HTTP in a much lighter fashion Defines a folderlisting object, which can be used to browse the contents of folders
on remote d i t devices
Content Formats vCard and vCalendar
Defines format of an electronic business card and personal calendar entries
developed by Versit consortium vMessage and vNote are defined in the IrMC (IrDA Mobile Communication) specification
Bluetooth Security
Authentication key exchange and encryption Authentication, exchange, A frequency-hopping scheme with 1600 hops/sec At th l the lowest levels of the protocol stack, Bluetooth uses th t l l f th t l t k Bl t th the
publicly available cipher algorithm known as SAFER+ to authenticate a devices identity devices Different application verticals use their own security infrastructure at the application layer
directories or streaming media formats Internet Bridge: mobile phone or cordless modem acts as modem to the PC, p providing dial-up networking an|d fax capabilities without need for p y g p g | p physical connection to the PC LAN Access: multiple data terminals use a LAN access point (LAP) as a wireless connection to an Ethernet LAN Synchronization: a device-to-device synchronization of data Headset: Handfree cellular phone usage in automobiles
RFID
It is a radio transponder (tags) carrying an ID that can be read
through radio frequency interfaces The object could be an entity in a manufacturing shop, g j y g p, goods in transit, item in a retail store, a vehicle in a parking lot, a pet, or a book in a library There are 6 basic frequencies on which RFID operates.
132.4 KHz, 13.56 MHz, 433 MHz, 918 MHz, 2.4 GHz and 5.8 GHz Low frequency (30 KHz to 500 KHz) systems
short reading ranges and lower system costs Tags are slow in data transfer and suitable for slow-moving objects g g j Security access, asset tracking and animal identification applications
RFID
High frequency (850 MHz to 950 MHz and 2.4 GHz to 2.5GHz) systems g q y( ) y
Long read ranges and high data transfer speeds Fast moving objects like railway wagon tracking and identification of vehicles on freeways
RFID
The reader emits radio waves in any range from 1 cm to 25 meters
or more When an RFID tag passes through the electromagentic zone of the gp g g reader, it detects the readers activation signal The reader decodes the data encoded in the tags integrated circuit g g and the data is passed to the host computer for processing A basic RFID system consists of
A transponder programmed with unique information (RFID tag) A transceiver with decoder (a reader) A antenna or coil An t il
RFID
Close proximity passive tags rely on electromagnetic or
inductive coupling techniques Active tags are based upon propagating electromagnetic waves techniques ANSIs X3T6 group is currently developing a draft ANSI s document-based systems operation at a carrier frequency of 2.45 GHz ISO has already adopted international RFID standards for animal tracking, ISO 11784 and 11785 tracking
WiMax
Last-mile subscriber access WLL wireless local loop Last mile, access, WLL-wireless Figure 4.4 IEEE802 16 IEEE802.16 IEEE802.16.1 Air interface for 10 to 66 GHz IEEE802.16.2 Coexistence of broadband wireless access systems y IEEE802.16.3 Air interface for licensed frequencies, 2 to 11 GHz The physical layer Specifies frequency band, the modulation scheme, error-correction techniques, synchronization between transmitter and receiver, data rate and the multiplexing structure p g
WiMax
The MAC layer
Responsible for transmitting data in frames and controlling
access to the shared wireless medium through media access g control layer Defines how and when a base station or subscriber station may y initiate transmission on the channel
Convergence layer
Provides functions specific to the service being provided For IEEE802.16.1, bearer services include digital audio/video
multicast, digital telephony, ATM, Internet access, wireless trunks in telephone networks and frame relay
WiMax
Physical Layer
Supports FDD and TDD Both TDD and FDD alternatives support adaptive burst profiles
in which modulation and coding options may be dynamically assigned on a burst-by-burst basis g y
MAC
To accommodate both continuous and bursty traffic y ARQ, and Mesh network architecture
Mobile IP
In a portable computing environment we move with the
device from one location to another and use the network w e stat o a y. while stationary. Mobile computing offers seamless computing facility even if the user changes the network Mobile IP
While a user is connected to applications across the Internet
and the users point of attachement changes dynamically, all p g y g connections are maintained despite the change in underlying network properties
Mobile IP
TCP connection is identified by Source port and IP addresses Destination port and IP addresses Mobile IP allows the mobile node to use two IP addresses Home address is static and known to everybody as the identity of the host Care-of address, this changes at each new point of attachement and can be thought of as the mobile nodes location specific address Home agent receives all the packets for the mobile node and
Mobile IP
Whenever the mobile node moves, it registers its new care-of address with its , g
home agent
The home agent forwards the packet to the foreign network using the care-of
address dd
Tunneling, the new header with care-of address encapsulates the original
p packet, causing the mobile nodes home address to have no impact on the , g p encapsulated packets routing
Discovery
A mobile node uses a di bil d discovery procedure to id if prospective h d identify i home agents and d
foreign agents
Registration
A mobile node uses a registration procedure to inform its home agent of its care-of
address
Tunneling
Tunneling procedure is used to forward IP datagrams from a home address to a care-
of address
Mobile IP architecture
Mobile node A Home Network for A
X
Home Agent 2 Internet 1 5
X
Foreign Agent
Foreign g Network
Server X
Mobile IP
Discovery procedure
A router can detect whether a new mobile node has entered
into its network The mobile node determines whether it is in a foreign network For the purpose of discovery, a router or an agent periodically p p y, g p y issues a router advertisment ICMP message A router advertisement can carry information about default routers and information about one or more care-of addresses Or the mobile node can broadcast a solicitation that will be answered b any foreign agent d by f
Mobile IP
Registration procedure
The mobile node sends a registration request to the home agent
with the care-of address information Home agent will update its routing table and reply an acknowledge to the mobile node g Using 128-bit secret key and MD5 hashing algorithm, a digital signature is generated for authentication Home address, care-of address, and registration lifetime is maintained in the home agent which is called binding
Tunneling
IP-within-IP encapsulation mechanism is used
IPv6
IETF has produced a comprehensive set of specifications that
define the next generation IP protocol originally known as IPNg now renamed as IPv6 g ow e a e v6 IPv6 uses 128 bit addresses
Public topology, 48 bit external routing prefix topology Site topology, typically 16 bit subnet number Interface indentifier, typically an automatically generated 64 bit
IPv6 security
IPv6 comes native with a security p y protocol called IPSec S IPSec protocol is a standards-based method of providing privacy, integrity and
network Public key cryptography to guarantee the identity of the two parties and avoid manin-the-middle attacks Bulk encryption algorithms, such as 3DES, for encrypting the data Keyed hash algorithm, such as HMAC, combined with traditional has algorithms such y g , , g as MD5 or SHA for providing packet authentication Digitla certificates signed by a certificate authority to act as digital ID cards IPSec provides IP network-layer encryption
IPv6
Packet payload
Packet is attached a tag for customizing the quality of service
IPv6 can propagate over an IPv4 envelop Computing nodes: Operating system upgrades Networking applications: Porting of the applications from IPv4 to IPv6 environment
IPv6
Migration Windows system
Windows 9x families do not support IPv6 Windows XP and Windows server 2003 support IPv6 natively Windows 2000 Professional can be upgraded ipv6.exe, ping6.exe, tracert6.exe, ttcp.exe,
Linux system
Linux kernel 2.4.x either supports IPv6 directly or can be upgarded All versions afer Red Hat Linux 7.1 supports IPv6 directly ping6, traceroute6, tracepath6, tcpdump, proto,
Applications pp
To allow the larger address space for the destination endpoint
Java Card
A smart card with Java framework Smart card is a plastic card with intelligence and memory ISO 7816 standards t d d
ISO 7816-1 defines physical characteristic of the card ISO 7816 2 di 7816-2: dimensions and l ti of th contacts i d locations f the t t ISO 7816-3: electronic signals and transmission protocols ISO 7816 4 Interindustr Commands for Interchange 7816-4: Interindustry
Java Card
A smart card is embeded with either A microprocessor and a memory chip or Only a memory chip with non-programmable logic A microprocessor card An intelligence program resident within the card which can add, delete, and otherwise manipulate information on the card h l f h d A memory card can store some information for some pre-defined
operation Smart card are capable of carrying data, functions, and information on the card Unlike memory strip cards, they do not require access to remote databases at the time of the transaction
Java Card
To allow interoperability, Java was chosen as the vehicle for interoperability
interoperability All the microprocessor based smart card now offer J API p Java framework on the smart card 3GPP has decided to use Java Card as the standard for USIM and J ICC (Integrated Circuit cards) Productivity, security, robustness, tools, and portability JVM, the language definition, and the core packages have been made more compact to bring Java technology to the resource constrained smart card
Java Card
A smart card of a GSM SIM card supporting Java Card
with 32K to 128K bytes of EEPROM Using proactive SIM technology of GSM Phase 2+, the application on the SIM card can be activated in an automated fashion
Java Card technology supports OTA (Over the air) downloads In OTA download, a Java applet (through SMS) can be download
downloaded by the network operator proactively or by the user interactively over the wireless media y Applications written for the Java Card platform are referred to as applets
Java Card
Java card virtual machine on smart card is splited into
two parts
Runs off card: processing tasks that are not constrained to off-card:
execute at runtime, such as class loading, bytecode verification, g, p resolution and linking, and optimization Runs on-card: JCVM, Java card runtime environment (JCRE), and the Java API
Compile
Class files
Converter
CAP File
Export files
Installer
Interpreter
On-card VM
format The applet is transferred into the card using the installer
API classes JCRE p J performs additional runtime security checks through applet y g pp firewall Applet firewall partitions the objects stored into separate pp p j p protected object spaces, called contexts
Controls the access to shareable interfaces of these objects
browser environment
Backup
Ad h networks hoc t k
Peer-to-peer, multihop networks p , p Data packets are transmitted from a source to destination via
intermediate nodes Communication links could be either symmetric or asymmetric Dynamic topology Limited security Bandwidth limited No backbone to handle or mux higher bw g Routing Complex and depends on finding the routing path, selection of routers, topology, protocols etc. l l