Professional Documents
Culture Documents
WI-FI:
CATS AND DOGS LIVIVNG
TOGETHER
BLUETOOTH AND WI-FI --
DIFFERENT ANIMALS:
Bluetooth technology was developed to create a
short-range wireless voice and data link between
a broad range of devices such as PCs, notebook Bluetooth is secure in that it employs several
computers, handhelds and PDAs (hereafter layers of data encryption and user authentication
referred to as PDAs), Smart Phones, mobile measures. Bluetooth devices use a combination
phones and digital cameras. Consistent with its of the Personal Identification Number (PIN) and
aim of operating in even the smallest battery- a Bluetooth address to identify other Bluetooth
powered devices, the Bluetooth specification devices. Data encryption (i.e., 128-bit) can be
calls for a small form factor, low power used to further enhance the degree of Bluetooth
consumption and low cost. The range and speed security. The transmission scheme (FHSS)
of the technology were kept intentionally low so provides another level of security in itself.
as to ensure maximum battery life and minimum Instead of transmitting over one frequency
incremental cost for devices incorporating the within the 2.4 GHz band, Bluetooth radios use a
technology. At its heart, Bluetooth is about fast frequency-hopping spread spectrum (FHSS)
creating a Wireless Personal Area Network technique, allowing only synchronized receivers
(WPAN) consisting of all the Bluetooth-enabled to access the transmitted data. The Bluetooth
electronic devices immediately surrounding a radio transmissions will conform to the safety
user, wherever that user may be located. standards required by the countries where the
technology will be used with respect to the
The IEEE 802.11 standard was designed to be affects of radio transmissions on the human
the best solution for a single specific application: body. Emissions from Bluetooth enabled devices
wireless Ethernet. It is implemented in PCs, will be no greater than emissions from industry-
laptops, PDAs and network access points and is standard cordless phones. The Bluetooth module
meant to offer comparable performance to wired will not interfere or cause harm to public or
Ethernet LANs. Wi-Fi offers benefits to users private telecommunications network.
that wish to gain LAN or Internet access while
moving about an office or traveling and to small Bluetooth is a convenient way for
to mid-sized organizations seeking a rapid LAN communicating for a personal network, but it is
deployment. At its heart, Wi-Fi is about enabling not suitable as a LAN replacement, or in
wireless LAN access for computer and other perennial data transfer. But the growing
portable device users. popularity of laptops necessitated the need for a
wireless standard that would allow the people to
walk around their laptops and still be connected
INTRODUCTION: to a network. Wi-Fi, an abbreviation for Wireless
Bluetooth is a Wireless Personal Area Fidelity, is a wireless standard that promises
Networking (WPAN) protocol designed as a modularity while offering data rates comparable
cable-replacement technology providing a low on those a wired LAN. Wi-Fi is a collection of
cost, low power, modest speed, and short range standards ratified by the IEEE (Institute of
(<10 meters) radio communications. Originated Electrical and Electronics Engineering). In 1997,
in 1999, it is intended to provide robust services IEEE approved the 802.11 standard which laid
to small ad hoc networks. Since security is down the specifications in wireless LAN.
essential to many wireless applications, the Subsequently, revisions were made to this
Bluetooth specifications include security standard and these resulted in three other
mechanisms at various levels of their protocol standards, namely 802.11a, 802.11b, 802.11g.
stack. The entire family of 802.11 standards are
collectively called Wi-Fi. Hence, Wi-Fi or short
for "Wireless Fidelity" is the term for a high-
frequency wireless local area network (WLAN).
ORIGIN: clients to replace traditional cable networks. A
wire network required a thorough design of the
In 1994, Ericsson Mobile Communications, the
network topology and manual laying of hundreds
global telecommunications company based in
of meters of cable, sometimes in the most
Sweden, initiated a study to investigate the
unexpected places. Whereas all it takes to
feasibility of a low-power, low-cost radio
organize a wireless network is to install several
interface between mobile phones and their
base stations at one or several spots in the office
accessories. The aim of the study was to find a
(a central receiver and transmitter with an
way to eliminate cables between mobile phones
antenna connected to an outside network or a
and PC cords, headsets, desktops and other
server) and insert a network card with an
devices. The study was part of the larger project
antenna. After that, both people and computers
investigating how different communications
can be moved freely, and even changing offices
devices could be connected to the cellular
wouldn’t damage the network.
network via mobile phones. The company
determined that the last link in such a connection
In the United States, a company had
should be short-range radio link. As the project
offered in December 2003 to make the whole of
progressed, it became clear that the applications
San Francisco Wi-Fi. In Spain, Telephonic
for a short-range radio link were virtually
launched the services ADSL Wi-Fi, which has
unlimited.
led it to sign various agreements with public
centers, like hotels or convention centers, to
Ericsson’s work in this area caught the attention
install access points. The operator has created
of IBM, Intel, Nokia and Toshiba. The
almost 400 hotstops. Some educational institutes
companies formed a Bluetooth Special Interest
offering Wi-Fi are Pathways World School,
Group (SIG) in May 1998, which grew to over
Guraon while most IITs and IIMs, Anna
1500 member companies by April 2000 faster
University, Annamalai University, and
than any other wireless consortium has grown.
International School of Business (ISB) in
The companies jointly developed the Bluetooth
Hyderabad, Mount Zion College of Engineering
1.0 specification, which was released in July
and Technology have also become hotspots.
1999. The specification consists of two
documents:
• The foundation core: This provides MAIN FEATURES:
design specification.
• The foundation profile: This BLUETOOTH TECHNOLOGY:-
provides interoperability o It is wireless
guidelines. o It is inexpensive.
The core document specifies components such as o You don’t have to think about it i.e.,
radio, base band, link manager, service discovery does not require you to do anything
protocol, transport layer, and interoperability special to make it work.
with different communication protocols. The o Operates in the 2.56 GHz ISM band,
profile document specifies the protocols and which is globally available.
procedures required for different types of o Uses FHSS (Frequency Hopping Spread
Bluetooth applications. Spectrum)
o Can support up to 8 devices in the Pico
The five founding companies of Bluetooth SIG net.
were joined by 3Com, Lucent, Microsoft and o Omni-directional, non line of sight
Motorola to form the Promoter Group. The transmissions through walls.
charter of Promoter Group is to lead the efforts o 10m to 100m range.
of the Bluetooth SIG by creating a forum for o 1mW power.
enhancing the Bluetooth specification and o Extended range with external power
providing vehicle for interoperability testing. amplifier (100m).
o Its main strength is its ability to
The 802 .11b standard was developed at the end simultaneously handle both data and
of 1990’s and finally approved at the beginning voice transmissions.
of 1999. The first data transmission devices o It is capable of supporting one
based on the standard were launched in 2000. asynchronous data channel and up to
Wi-Fi devices were designed for corporate three synchronous voice channels, or
one channel supporting both voice and Bluetooth is designed to be low cost – eventually
data. under $10 per unit. It is now $5 per unit.
When operating in its most protected modes, the For other types of secure interactions, other
first level of Bluetooth security entails application-level authentication and
determining the trust level of another device. authorization procedures can be put in place.
Unknown or untrusted devices can automatically Mobile commerce transactions, for example, can
be denied access to certain services available be protected with Secure Socket Link (SSL) just
over the Bluetooth link. The next layer of as are Internet commerce transactions. Any
security involves entering the same PIN number number of application-level security measures
into two devices that wish to connect. The PIN is can and will be implemented as Bluetooth device
used, in conjunction with a random number, to deployment becomes more widespread.
generate a 128-bit link key that is used for
authentication. In order to best ensure security, Finally, Bluetooth is an evolving standard.
users should be sure to use a PIN with as many Future iterations of the Bluetooth specification
digits as possible and that is as difficult to guess are expected to accommodate both higher speeds
as possible. and more robust security measures.
Two Belkin’s Bluetooth USB Adapters were The Bluetooth piconet was set up as shown
attached to the above laptops: below in the diagram:
ADAPTER 1: BD_Addr: 0003C92D5225
ADAPTER2: BD_Addr: 0003C92D5226
BLUETOOTH NETWORK:
BLUETOOTH SETTINGS AND i) The “Notifications” tab lets you associate a
CONFIGURATION: sound (Windows *.wav file) with specific
Bluetooth events.
To customize the configuration settings of
Bluetooth software for Windows operating
system, follow the instructions described below:
1. Right click on the Bluetooth icon on the right-
hand side of the task bar of your screen. The
“Bluetooth Configuration” window appears to
allow you to customize the configuration settings
of “Explore”, “Setup”, or “Services”. In the
“Setup” menu, there are two extended items,
“Security” and “Configuration”.
2. Click on “Configuration”.
a) The “General” tab of “Configuration” allows
you to customize the device’s user name, type,
and security type.
b) The “Accessibility” tab allows you to specify
which individual devices are allowed to access
the user’s computer.
c) The “Discovery” tab allows you to specify
which individual devices, type of, or class of
device the user’s computer is allowed access to.
d) The “Information Exchange” tab allows you
to specify the location of different types of files.
e) The “Local Services” tab indicates the
services this computer makes available to the
other computers.
f) The “Client Applications” tab indicates the
properties of each application.
g) The “Hardware” tab indicates device
information of the user’s hardware.
h) The “Version Info” tab indicates the module
version of the user’s software component.
PRACTICAL IMPLEMENTATION Wi-Fi PDA through the access point. The LAN
OF WI-FI TECHNOLOGY: can also be accessed through it. We have also
created a peer-to-peer network to link up a Wi-Fi
In this report we show you how we enabled PDA and a laptop directly without the
created a Wi-Fi network using 2.4 GHz USB access point. The following section explains how
Wireless Adapter DWL-122 and DI- to configure the network.
614+2.4GHz Wireless Router 5V DC Power
Adapter. Thus we can access the laptop from a
DI-614+2.4GHZ WIRELESS
ROUTER 5V DC POWER
ADAPTER:-
2.4GHZ USB WIRELESS
ADAPTER DWL-122:
REFERENCES: 27. http://www.vlsi.ee.upatras.gr/~sklavos/
Papers03/IEEE03_Bluetooth.pdf
1. Living digital, Vol.8 issues,
28. http://www6.tomshardware.com/networ
11.November 2003, Pg.84-85
k/20020626/bluetooth-09.html
2. Living digital, Vol.9 issues, 01.January
29. An Overview of the Bluetooth Wireless
2004, Pg.62-64
Technology, Chatschik, IBM
3. CHIP magazine, January 2004,
Corporation.
Volume1, Issue 3, Page 129
30. AN1997, Philips FM/IF systems for
4. Digit, January 2004, Volume 4 issue 1,
GMSK/GFSK receivers, Yanpeng Guo,
Pg.102-105
1997 Aug 20, Philips.
5. “Wi-fi Home Networking”, Raymond
31. Bluetooth Encryption and Security,
Smith
Kjell Jorgen Hole, 13.5.2003,
6. Nathan.J.Muller, “Bluetooth
www.kjhole.com
Demystified” (2001), p.p. 1-36,44-
32. Bluetooth Overview, Kjell Jorgen Hole,
47,123-148, Tata McGraw Hill
13.5.2003, www.kjhole.com
Publishing Company.
33. Bluetooth Security SAFER+, Kjell
7. Manish Jain, “Bluetooth The Basics”
Jorgen Hole, 13.5.2003,
(2001), p.p 1-26, 104-105, 130-152,
www.kjhole.com
BPB Publications.
34. Bluetooth Platform Solution from
8. Anil Kumar, “The Bluetooth Protocol
Motorola, Motorola.
Stack”, p.p 33-36, Information
35. Bluetooth Security White Paper,
Technology Magazine, (Vol 11; No.3,
Bluetooth SIG Security Expert Group,
January 2002)
19.4.2002, Christian Gehrmann
9. Prasanto.K.Roy, “The Phone
36. Bluetooth Version 1.1, Specification of
Collector”, p.p 66, Computers @ Home
the Bluetooth system, Bluetooth,
Magazine, (Vol 7; Issue.1, January
www.bluetooth.com, February 22 2001.
2002)
37. Industrial Use of Bluetooth, 18.04.2001,
10. www.bluetooth.com
Mats Anderson, connectBlue.
11. Hasan Jawaid Khan, "Smart Homes of
38. How Secure Is Bluetooth, Karen. J.
the Future", pp.: 9-15, 50, The Science
Marcelo, March/April,
Reporter Magazine, (May 2002)
www.WBT2.com
12. www.HAL2000.com
39. Bluetooth Technology in a Nutshell,
13. www.homeseer.com
Mark Fu, KC Technology, 2001.
14. Michael Miller, Discovering Bluetooth,
40. Multimedia transmission in Bluetooth-
2001, SYBEX.
based networks, Marcin Michalak, June
15. Dean. A. Gratton, Bluetooth Profiles –
2001.
The Definitive Guide, 2003, Prentice
41. Mobile Computing Outlook, 2003,
Hall.
www.mobileinfo.com
16. Jim Geier, Wireless LAN, 2nd Edition-
42. Bluetooth Revealed
2002, SAMS.
43. Bluetooth-Connect without cables
17. http://www.codeproject.com
44. Stubblefield, A. et al., Using the
18. http://www.kjhole.com
Fluhrer, Mantin, and Shamir Attack to
19. http://learning.ericsson.net/bluetoothde
Break WEP, AT&T Labs Technical
mo
Report TD-4ZCPZZ
20. http://learning.ericsson.net/bluetoothde
45. Mobilian Corporation, Wi-Fi (802.11b)
mo/content/lesson1/blx11101.html
and Bluetooth: An Examination of
21. http://opensource.nus.edu.sg/projects/bl
Coexistence Approaches, 2001.
uetooth/noosphere/saferfigures.pdf
46. Mobilian Corporation, Wi-Fi (802.11b)
22. http://opensource.nus.edu.sg/projects/bl
and Bluetooth Simultaneous Operation:
uetooth/noosphere/safertweak.doc
Characterizing the Problem, November
23. http://www.palowireless.com/bluetooth/
2000.
24. http://www.rococo.com
47. Zyren, J., Reliability of IEEE 802.11 Hi
25. http://www.techonline.com/community/
Rate DSSS WLANs in a High Density
tech_topic/bluetooth
Bluetooth Environment, June 1999.
26. http://www.techonline.com/pdf/pavillio
48. Haartsen, J. et al., Bluetooth voice and
ns/standards/kct_bluetooth.pdf
data performance in 802.11 DS WLAN
environment, SIG publication, May
1999.
49. Shoemake, M., Wi-Fi (802.11b) and
Bluetooth: Coexistence Issues and
Solutions for the 2.4 GHz ISM Band,
February 2001.
50. Nedeltchev, P., Wireless Local Area
Networks and the 802.11 Standard,
March 31, 2001.
51. Nedeltchev, P., Wireless LAN Ready for
Prime Time, Cisco Packet Magazine, 3rd
Quarter, 2001.
52. Schenk, R. et al., Wireless LAN
Deployment and Security Basics,
ExtremeTech.com, August 2001.
53. Ellison, C., Exploiting and Protecting
802.11b Wireless Networks,
ExtremeTech.com, September 2001.
54. Cisco Systems, Wireless LAN Security,
Overview White Paper, 1999-2001.
55. Bluetooth, Bluetooth Specification
Version 1.1, February 2001
56. Vainio, J., Bluetooth Security, 2000-05-
25
57. Träskbäck, M., Security of Bluetooth:
An Overview of Bluetooth Security,
2000-11-2
58. Jakobbson, M. et al., Security
Weaknesses in Bluetooth, February
2001
59. Müller, T., Bluetooth Security
Architecture Version 1.0, July 1999
60. InfoTooth Knowledge Base,
http://www.palowireless.com/infotooth/
knowbase.asp